Network Synergy Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Cache Public Speaking Remote Monitoring Blockchain Business Growth Wires Compliance Identity Theft Redundancy Microsoft Excel Data Loss The Internet of Things Employer-Employee Relationship Private Cloud 3D Printing Corporate Profile Mobile Data Enterprise Resource Planning VoIP Hard Drives Cybercrime IT Technicians Backup Business Technology Work Station Sports Website Trainging App Managed IT services Business Continuity WPA3 Taxes RMM IT Consulting Favorites Personal Information Black Friday Government Telephone Systems Hard Drive Hardware Cyberattacks Permission Malware Analyitcs Motherboard Techology Virtual Private Network Writing BDR Humor Firewall Regulations Domains Mobile Technology Managed IT Services Electronic Health Records Cyber Monday Consultation Excel IT Solutions Managing Stress Utility Computing Laptop Mobile Devices Server Management Google Analytics Charger Best Available Data Backup Enterprise Content Management IT Management Service-based Business Disaster Recovery Deep Learning Mobility Entrepreneur Tip of the Work Customer Relationship Management Help Desk Windows Digital Payment Administrator Passwords Big Data Business Star Wars Electronic Medical Records Smartphones Productivity Crowdsourcing High-Speed Internet Remote Monitoring and Management Monitors Chrome Smart Tech Buisness IT Services Samsung Sync Proactive communications Software File Sharing Wireless Drones Finance Unsupported Software End of Support Comparison Debate Encryption Consulting iPhone Application Cookies CCTV Bookmarks Networking Computer Repair Tip of the week Content Filtering History Specifications Downtime Alerts Outlook Upgrade Data Breach Address Apple Physical Security Travel Money Virtual Desktop Gaming Console Mobile Device IP Address Spam Windows 8.1 Update Downloads Co-managed IT Error Crowdfunding Cleaning Administration Two-factor Authentication Best Practices Password IT service Emoji Bitcoin Migration Efficiency Hacking Vendor Management Computer Accessories Logs IT Support Google Docs Alt Codes Cost Management Licensing Risk Management Identity PC Care Vulnerabilities Web Server Fun Net Neutrality Virtualization Cabling Backup and Disaster Recovery Chromebook Automation Proactive IT 5G Video Surveillance IT Support eWaste Project Management Leadership Operating System Staffing Machine Learning Gmail Tutorials IoT Data Security HIPAA Microsoft Office Internet of Things Trending Break Fix Hacker Retail Shortcut Websites Nanotechnology Information Technology Marketing Screen Reader Digital Features Webinar Computing Customer Service Virus Fleet Tracking Disaster Presentation Human Error Save Time Intranet Productivity Unified Threat Management Halloween Instant Messaging How To PowerPoint USB Experience Phone System Backups Remote Workers OneNote Word Smartphone Budget WiFi VPN Lithium-ion Battery Artificial Intelligence Workplace Tips Law Enforcement Consumers Management Regulation Test Software Tips Chatbots Healthcare Time Management Hosted Solutions Social Paperless Office People Black Market Windows 10 CIO Google Maps Mouse Collaboration Privacy Authentication Print Server Botnet Recovery Vulnerability Managed Services Provider Operations Data Warehousing Tech Term Work/Life Balance Server Wearable Technology Saving Money Permissions Facebook Legal Display Meetings Google Wallet Running Cable SharePoint LinkedIn Disaster Resistance Windows 8 Ransomware Public Cloud Firefox Social Engineering Relocation Monitoring Communication Wi-Fi User Tips Troubleshooting Infrastructure Outsourced IT Information Environment Language Documents Training Users Supercomputer Online Currency Development Avoiding Downtime Files Managed IT Hard Disk Drive Network Security Memory Conferencing Thank You Cables PDF Cameras SaaS Document Management Software as a Service Saving Time Apps Applications MSP Asset Tracking Hiring/Firing Miscellaneous Geography Secruity Competition Knowledge Streaming Media Health Holiday Current Events Politics Zero-Day Threat Computer Care Point of Sale Safety LiFi Browser Business Owner Best Practice Technology Phishing Going Green Patch Management Hackers Start Menu Heating/Cooling Inbound Marketing Cybersecurity Piracy YouTube Data Recovery Value Router Upgrades Computing Infrastructure IBM Security Printer Network Management Settings Google Calendar BYOD Motion sickness Authorization Gadget Battery Social Networking Data Management Robot Spyware Office Maintenance Wireless Technology Data Fax Server Bluetooth Gadgets Lenovo E-Commerce Recycling Hosted Solution Employee-Employer Relationship Small Business Cooperation Printing Google Drive Notifications Congratulations Access Control Tablet Programming Cryptocurrency Undo Fraud Augmented Reality Network Mobile Touchscreen Unified Threat Management Save Money Tracking Android Processors Internet Exlporer Hotspot Webcam Business Intelligence Computers Twitter Skype Scam Network Congestion eBay Education Multi-Factor Security Innovation Read Only Antivirus How To Bring Your Own Device User Typing Social Media Smart Technology Business Computing Internet Quick Tips Telephony Technology Laws Mail Merge Unified Communications Cloud Computing Mobile Computing Email Microsoft Printers Office 365 Managed Service Provider Cloud Distributed Denial of Service Mobile Security GPS Storage Scary Stories Solid State Drive Employees IT Consultant Dark Web Hacks Staff Mobile Office CrashOverride Servers Google Connectivity G Suite Refrigeration Bandwidth Mobile Device Management Uninterrupted Power Supply Law Firm IT Search Remote Computing Remote Support Scheduling Food Virtual Reality Office Tips Cortana Managed IT Service User Error Mirgation Assessment Technology Tips Company Culture Macro 3D Data storage Flexibility Text Messaging Tip of the Week Computer Business Management Statistics Modem Automobile Windows 10 Digital Signature IT budget Superfish Managed Service Identities Legislation Alert Tech Support

      Latest Blogs

      With so many people depending on the Internet for a litany of reasons, there might not be the general acknowledgment of just how powerful the ubiquitous use of the Internet really ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube