Network Synergy Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Screen Reader Read Only Printing PowerPoint Chatbots Money Consumers Service-based Business Robot Operations Hard Drives Redundancy Apple Current Events HIPAA Language Security Streaming Media IT Support Training Uninterrupted Power Supply Bring Your Own Device Network Congestion Congratulations Employer-Employee Relationship Office 365 Business Technology Managed IT Service Workplace Tips Government Office Managing Stress Safety Wires Environment Trending IT budget Phishing Physical Security Monitors LiFi Motion sickness Managed Service Provider Technology Laws Healthcare Dark Web Digital Signature YouTube Save Money Food iPhone Cryptocurrency 5G Mirgation Backups Hotspot Legislation Permissions Assessment Social Excel Backup Microsoft VoIP Website Printers Servers Time Management IT Technicians Debate Distributed Denial of Service Encryption Users Virtual Desktop Windows 10 Law Enforcement Features Unified Communications Downtime Hacking Business Computing End of Support Refrigeration Gmail Intranet IT Consulting Virtualization Tablet Halloween Business Continuity Software as a Service Disaster Resistance Search SharePoint Information Technology Files Modem Crowdsourcing Network Security Processors IT service Patch Management Value Black Friday Disaster Recovery Fax Server Fraud Artificial Intelligence Competition High-Speed Internet Mail Merge Office Tips Holiday Black Market Cloud Technology Tips History Telephone Systems Social Media Recycling Managed Service Gadgets Virus Heating/Cooling Cookies Superfish Best Available Data Breach Star Wars communications Alt Codes Hacks Cyberattacks Smartphone Information Mobility Google Wallet Mobile Office Upgrades Internet Exlporer Virtual Reality Emoji Botnet Staff Charger Alerts Remote Monitoring Networking Mobile Computing Tip of the Week IT Management Collaboration User Computers Browser Management Geography Electronic Health Records Memory Utility Computing Server Consulting Mobile Technology Presentation Application Typing Retail Tech Support IBM Software Tips Compliance User Tips Business Intelligence Avoiding Downtime Twitter Bluetooth Paperless Office Asset Tracking Productivity VPN Enterprise Content Management Wireless Remote Monitoring and Management Lenovo Windows Data Health Piracy USB Statistics Gaming Console Licensing Co-managed IT Work Station Spam Connectivity Vulnerability Thank You Politics Meetings Chromebook Digital Payment Unsupported Software Monitoring Drones Business Analyitcs Video Surveillance Logs Cost Management Remote Support Inbound Marketing Server Management Managed Services Provider Microsoft Excel Downloads Crowdfunding Shortcut Cables Break Fix Private Cloud Web Server Wireless Technology Settings Facebook Apps Outlook Battery Data Recovery Sports Macro Google Maps BDR Hacker Entrepreneur Display Undo Spyware Content Filtering Computer Repair Disaster Quick Tips Business Growth Net Neutrality PDF Data Loss People IoT Small Business MSP Computing Google Analytics File Sharing Automobile Notifications IP Address Experience E-Commerce Computer Accessories Data Security Managed IT IT Support Cabling Public Speaking Firewall How To Taxes Computing Infrastructure Samsung App Windows 10 Mobile Security Scheduling Conferencing Mouse Tech Term Smart Tech Blockchain Efficiency Social Networking Touchscreen Webcam Router Innovation Documents BYOD Development Comparison Sync Lithium-ion Battery Internet of Things Outsourced IT Upgrade Internet Alert G Suite Identity Theft Print Server Password Leadership Domains Applications Supercomputer Personal Information Mobile Data Identities eBay Secruity Hosted Solutions Two-factor Authentication Going Green Hard Disk Drive Public Cloud Fun Save Time Data storage Solid State Drive IT Services Malware OneNote Best Practice Unified Threat Management Tracking Bandwidth Electronic Medical Records Data Warehousing IT Consultant Managed IT services Point of Sale Law Firm IT Windows 8 Wi-Fi Managed IT Services Maintenance Telephony Flexibility Cleaning CrashOverride Mobile Tip of the week Migration Smartphones Cyber Monday Fleet Tracking Budget Relocation Humor Hosted Solution Company Culture Trainging Employee-Employer Relationship Scary Stories Productivity IT Solutions Saving Money Network Android Education Regulations Hackers User Error Computer Legal Hiring/Firing How To Privacy Unified Threat Management SaaS Mobile Device Cameras Google Drive Knowledge Nanotechnology Data Management Text Messaging Email Digital Bitcoin Social Engineering Consultation CIO Google Techology Motherboard Miscellaneous Laptop Phone System Microsoft Office Best Practices Programming Infrastructure Multi-Factor Security PC Care Machine Learning Google Docs Online Currency GPS WiFi Network Management Cybercrime Mobile Device Management Specifications Deep Learning Computer Care Automation Document Management Hardware Access Control Gadget Cooperation Passwords Hard Drive Cache Big Data Storage Software Cortana Corporate Profile LinkedIn Antivirus Vulnerabilities 3D Printing Administrator 3D Technology Virtual Private Network Chrome Cloud Computing Mobile Devices Remote Computing Customer Service Tutorials Regulation Webinar Travel Buisness Proactive IT Ransomware Tip of the Work Communication Business Management Smart Technology Customer Relationship Management Writing Identity WPA3 Work/Life Balance Cybersecurity Google Calendar Firefox Word Marketing Proactive Running Cable Project Management Troubleshooting Skype Data Backup CCTV Business Owner Address Error Remote Workers Websites Administration Augmented Reality Windows 8.1 Update Saving Time Vendor Management Staffing Start Menu The Internet of Things Printer Recovery Wearable Technology Scam Risk Management Help Desk Enterprise Resource Planning eWaste Operating System

      Latest Blogs

      You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube