Blog
  • Register

Endpoint I.T. Blog

How Exactly Is the GDPR Working to Incorporate Blockchain?

How Exactly Is the GDPR Working to Incorporate Blockchain?

Now that the European Union’s General Data Protection Regulation (GDPR)--the most comprehensive individual data protection law in history--has gone into effect, it is important to know where your business stands in regard to your potential liability. One technology that has a rather lot of ambiguity surrounding it is blockchain, which is essentially an encrypted and distributed digital ledger. How is the development of blockchain, which is built on the idea of security through transparency, going to fare under the guidelines of the new GDPR regulations?

Let’s start with the GDPR itself. Despite not using the PII designation that we’ve come to know, the regulation is the strongest data protection law ever established for its overreaching stance of protecting any individual that is doing business within the member nations of the European Union. Additionally, any organization that works with suppliers or partners in the EU has to comply with the regulations found in the GDPR. If you’ve noticed that all of your favorite online businesses and websites have updated their privacy policy recently, it’s because the GDPR went into effect on May 25, and they need to protect themselves against the immense fines that come with non-compliance to the regulation.

The issue at hand for blockchain technology is actually in the GDPR mandate itself. Under the GDPR, if an organization that doesn’t need personal data, obtains personal data, they are not to keep that data, but are required to delete it. Since you can’t delete blockchain nodes, it stands to reason that the GDPR would be a problem for companies that are looking to innovate using blockchain technology. Ironically, blockchain and the GDPR, despite not having the same agenda in creation, have been cultivated with a shared purpose: to protect the rights of individuals to make the decisions about their own data, but blockchain is not designed to be GDPR-compatible as it is written today.

Technology moves fast so while the GDPR has just now gone into effect, it is already being challenged by technological innovation. The GDPR was designed to be technologically agnostic and flexible enough to allow for such innovations, the blockchain is already testing that. Many of the applications that blockchain is used for actually lend themselves well to the mandate triad of confidentiality, integrity, and availability. In blockchain, the transactions themselves use encryption to be confidential, but the overall ledger, and this is the problem, will still be transparent.

For example, Joe could pay with his blockchain-based account for a physical (as most of the EU has universal healthcare). The particulars (account number, and other personal information) could be hidden, but the record would show that Joe paid so many euros worth of cryptocurrency for a physical. Under the GDPR, because that information, while encrypted, is still in possession of the company that has no rights to it--and it can’t be deleted from the blockchain--it constitutes a breach of the GDPR. Many EU-based companies have stopped accepting Bitcoin and other distributed cryptocurrencies as payments (for a litany of reasons, one being the GDPR).

Now, the GDPR only covers EU-member countries and people doing business with them, but with how much money is being invested in venture capital for blockchain research and application development, it stands to reason that the EU governing body will have to make eventual amendments to the mandate.

The most interesting question going forward is, which is the future of data security? Is it GDPR-like mandates like the California Consumer Privacy Act (CCPA), or is it blockchain itself? What do you think about the GDPR regulation? Would you like to see data privacy be as protected in your country? Or do you think that it is a hindrance to innovation and progress? Leave your comments below and return to our blog regularly. 

Sexy Scam Relies on Your Belief that Someone Was W...
Intro to Your Tech: Software as a Service
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Network Security User Tips Productivity Microsoft Tech Term Internet Google Smartphones Cloud Cybersecurity Communication Malware Email Data Efficiency Hardware Business Android Passwords Communications IT Support Backup Innovation Browser Mobile Device Windows 10 Mobile Devices Users IT Services Software Wi-Fi Collaboration Network Managed IT Services Small Business Data Recovery Ransomware Data Backup Hackers Outsourced IT VoIp Business Management Holiday Cloud Computing Smartphone Saving Money Applications Internet of Things Chrome Hosted Solutions Wireless Managed IT services Workplace Tips Bandwidth Social Media Access Control Blockchain Patch Management Business Intelligence Information Word Networking Router Miscellaneous Microsoft Office Employer-Employee Relationship Settings Marketing Apps Computer Analytics BDR Website Data Breach Gadgets Data Management Phishing Healthcare G Suite Net Neutrality Office Law Enforcement Virtual Assistant Government Virus Tech Terms Excel Managed IT Service Data Security Cortana Computers Remote Computing Tip of the week Twitter Remote Monitoring and Management Dark Web Scam Mobility Automation Data Protection Virtualization Office 365 Business Continuity Battery Medical IT Gmail Artificial Intelligence How To Save Money Password Connectivity Cost Management Wireless Charging Managed Service Physical Security Paperless Office VPN Compliance Facebook Maintenance Chrome OS Plug-In News Conferencing Licensing Upgrade Lead Generation Server Management Authentication Value instant Messaging Digital Websites WhatsApp Knowledge VoIP Profitability Streaming Media Storage Millennials Processors Telecommute Business Technology PowerPoint Employees Inventory App Internet Explorer Proactive IT Technology Tips Telephone System Tech Support Certification Unified Communications Authorization eCommerce Vulnerabilities Safety Alert Eliminating Downtime Downloads Error Spyware Bring Your Own Device Data loss Sports Reporting Mobile Security Remote Support Online Shopping Threat Human Resources Big Data Backup and Disaster Recovery Cleaning Content Filtering RAM Database Cryptocurrency Edge Amazon BYOD Trends Network Attached Storage Apple Environment Personal Information HP Hybrid Cloud Spam Troubleshooting IT budget Operating System Telecommuting Printing Employee-Employer Relationship Analysis Hard Drives Travel Training WannaCry Microsoft Teams Cybercrime Dongle Comparison Vulnerability Wireless Internet Server A.I. Touchscreen iPhone Telephony e-waste E-Commerce Document Management Cables Antivirus Sales Update SaaS File Sharing Files Paper Electronic Health Records Laptop SSD Botnet Managed IT Education Security Cameras HIPAA Company Culture Machine Learning Tactics Time Management Specifications Help Desk Movies Microsoft Office 365 Voice over IP Retail disposal Payment Voice over Internet Protocol Staff Tablet Outlook IT Management GDPR Workers Hard Drive Managing Stress User Security Politics Ink Health Remote Monitoring User Tip Live Streaming Wearables Regulation Quick Tips Emergency Disaster Recovery Windows 7 Thank You Printers WiFi Congratulations

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at http://www.endpointtx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701