888.678.7282    Get SUPPORT

Strata Information Technology Blog

How Exactly Is the GDPR Working to Incorporate Blockchain?

How Exactly Is the GDPR Working to Incorporate Blockchain?

Now that the European Union’s General Data Protection Regulation (GDPR)--the most comprehensive individual data protection law in history--has gone into effect, it is important to know where your business stands in regard to your potential liability. One technology that has a rather lot of ambiguity surrounding it is blockchain, which is essentially an encrypted and distributed digital ledger. How is the development of blockchain, which is built on the idea of security through transparency, going to fare under the guidelines of the new GDPR regulations?

Let’s start with the GDPR itself. Despite not using the PII designation that we’ve come to know, the regulation is the strongest data protection law ever established for its overreaching stance of protecting any individual that is doing business within the member nations of the European Union. Additionally, any organization that works with suppliers or partners in the EU has to comply with the regulations found in the GDPR. If you’ve noticed that all of your favorite online businesses and websites have updated their privacy policy recently, it’s because the GDPR went into effect on May 25, and they need to protect themselves against the immense fines that come with non-compliance to the regulation.

The issue at hand for blockchain technology is actually in the GDPR mandate itself. Under the GDPR, if an organization that doesn’t need personal data, obtains personal data, they are not to keep that data, but are required to delete it. Since you can’t delete blockchain nodes, it stands to reason that the GDPR would be a problem for companies that are looking to innovate using blockchain technology. Ironically, blockchain and the GDPR, despite not having the same agenda in creation, have been cultivated with a shared purpose: to protect the rights of individuals to make the decisions about their own data, but blockchain is not designed to be GDPR-compatible as it is written today.

Technology moves fast so while the GDPR has just now gone into effect, it is already being challenged by technological innovation. The GDPR was designed to be technologically agnostic and flexible enough to allow for such innovations, the blockchain is already testing that. Many of the applications that blockchain is used for actually lend themselves well to the mandate triad of confidentiality, integrity, and availability. In blockchain, the transactions themselves use encryption to be confidential, but the overall ledger, and this is the problem, will still be transparent.

For example, Joe could pay with his blockchain-based account for a physical (as most of the EU has universal healthcare). The particulars (account number, and other personal information) could be hidden, but the record would show that Joe paid so many euros worth of cryptocurrency for a physical. Under the GDPR, because that information, while encrypted, is still in possession of the company that has no rights to it--and it can’t be deleted from the blockchain--it constitutes a breach of the GDPR. Many EU-based companies have stopped accepting Bitcoin and other distributed cryptocurrencies as payments (for a litany of reasons, one being the GDPR).

Now, the GDPR only covers EU-member countries and people doing business with them, but with how much money is being invested in venture capital for blockchain research and application development, it stands to reason that the EU governing body will have to make eventual amendments to the mandate.

The most interesting question going forward is, which is the future of data security? Is it GDPR-like mandates like the California Consumer Privacy Act (CCPA), or is it blockchain itself? What do you think about the GDPR regulation? Would you like to see data privacy be as protected in your country? Or do you think that it is a hindrance to innovation and progress? Leave your comments below and return to our blog regularly. 

Sexy Scam Relies on Your Belief that Someone Was W...
Intro to Your Tech: Software as a Service
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Network Security Malware Internet Hackers Communications User Tips Cybersecurity Software Productivity Ransomware Backup Tech Term Microsoft IT Support Passwords Business Management Smartphones Outsourced IT Efficiency VoIP Email Productivity Data Alert Business Hardware Communication Small Business Data Recovery Browser IT Services Innovation Network Google Social Media Data Backup Windows 10 Hosted Solutions Cloud Computing Microsoft Office Mobile Device Smartphone Holiday Phishing Collaboration Users Save Money Business Continuity Apps Data Breach Vulnerability Miscellaneous Android Saving Money App Bandwidth Twitter Access Control Internet of Things Computer Workplace Tips Blockchain Applications Facebook Law Enforcement Patch Management Workers Office 365 Networking Personal Information Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Politics Wireless Cybercrime Compliance Government Mobile Device Management Mobile Devices BDR Wi-Fi Virtual Assistant How To Entertainment Antivirus Computers Recovery Marketing Data Security Maintenance Password Medical IT Retail Office Website Managing Stress Education BYOD Information Remote Monitoring and Management Vendor Management Automation Managed IT Service Chrome SaaS Spam Dark Web Virus Connectivity Windows Word Regulation Vulnerabilities News Dark Data Streaming Media Television Information Technology Outlook Multi-Factor Security Specifications Avoiding Downtime Credit Cards Smart Technology Troubleshooting Email Management Technology Tips Hybrid Cloud Staffing Healthcare Licensing Voice over IP Document Management Database Printer Touchscreen iPhone Staff RAM HaaS Printer Server Tech Support Certification Cortana Safety Reporting Telephone System WannaCry Unified Threat Management Downloads Biometrics Managed Service Gadget Business Intelligence The Internet of Things VoIPMyths Sales Managed Service Provider Cost Management Backup and Disaster Recovery Cables Plug-In Travel Paperless Office Tactics Microsoft Office 365 WiFi Managed IT Websites Microsoft Teams Cleaning Printers Gadgets Budget Mobility Physical Security HIPAA Botnet VPN Artificial Intelligence Trends Leadership Access Profitability Router Content Filtering Hiring/Firing Employer Employee Relationship e-waste Current Events Shortcut Live Streaming IT budget PowerPoint VoIPSavings Tablet SSD Voice over Internet Protocol Proactive IT E-Commerce Digital Internet Explorer Authentication Telephone Systems Data Protection Encryption Computer Care Training Files Battery Data Management CrashOverride GDPR Remote Support Hard Drive A.I. Eliminating Downtime Gmail Automobile disposal Net Neutrality Payment WhatsApp Wireless Charging Synergy IT Management Sports Disaster Recovery Upgrade Update Knowledge Inventory Edge Threat Authorization Remote Control Dongle Gaming Console Security Cameras Yahoo Storage Processors Movies Analytics Wireless Internet Spyware Value instant Messaging Lead Generation Tech Terms Technology Efficiently Comparison Hard Drives Amazon Scalability Phone System Bring Your Own Device Video Games Google Maps Emergency Telephony DDoS Worker Error Apple Data loss IaaS Two-factor Authentication Help Desk HP Emoji Network Attached Storage Operating System VoIP Lithium-ion battery Paper Paste Augmented Reality Business Technology Instagram Wireless Technology 5G Money Remote Computing Samsung Cryptocurrency Server Management IBM Conferencing Environment eCommerce Ink Managed IT Services Hacker Telecommuting Competition Customer Relationship Management Online Shopping Big Data IP Address Fun Millennials Machine Learning Customer Service Google Drive Mobile Office Hosted Solution Domains File Sharing G Suite IT Support Autocorrect Telecommute User Tip Virtualization Mobile Security Laptop Printing Copy Public Speaking Quick Tips Spam Blocking User Security Search Scheduling Wearables Windows 10 Presentation Unified Communications Tip of the week Server

Newsletter Sign Up