crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Business Malware Software Data Mobile Devices IT Support Hardware Small Business Network Communication Server Smartphones Computer VoIP Business Continuity Upgrade Innovation Google Windows Efficiency Disaster Recovery Data Backup Mobile Device Management Virtualization Microsoft Office Outsourced IT Tech Term Miscellaneous Mobile Office Vendor Management Network Security Holiday Gadgets Social Media Productivity BYOD User Tips Quick Tips Passwords Browser Mobile Computing Android Smartphone Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Windows 10 Remote Monitoring The Internet of Things Best Practice Ransomware Users Spam Wireless Technology Alert Data Management Collaboration Save Money Trending Operating System Apple Remote Computing Artificial Intelligence Office Going Green Encryption Firewall Content Filtering Customer Relationship Management History Gmail Unified Threat Management Router Big Data Printer Tech Support Analytics IT Support IT Solutions Lithium-ion Battery Facebook Current Events IT Consultant Information Technology Maintenance App Cloud Computing Managed IT Employer-Employee Relationship Windows 8 Website Customer Service Applications Humor Two-factor Authentication Managed IT Services Saving Time Avoiding Downtime Antivirus Phishing Bandwidth Document Management Hard Drives Mobile Device Paperless Office Wi-Fi Marketing Excel Hacking Computers Phone System Government Apps Compliance Automation Application Virus Office Tips Retail Project Management Fax Server Cybersecurity IT service Digital Payment Outlook Chrome Health Business Growth VPN Risk Management Tablet Data Security Office 365 iPhone Password Inbound Marketing Healthcare Infrastructure Administration Presentation Augmented Reality Vulnerability Budget Managed Service Computer Repair BDR Proactive IT Training Point of Sale Regulations Recovery Mouse Files Money Help Desk Social User Error Net Neutrality Running Cable Licensing Co-Managed IT Wireless File Sharing PowerPoint Social Networking Unified Communications End of Support LiFi Tip of the week Computing Statistics Scam Intranet Business Intelligence Competition Network Congestion Recycling Downtime eWaste Remote Workers Search Virtual Desktop USB Piracy Business Owner Information Data loss Blockchain Sports HIPAA Hacker Programming User Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications IBM Internet Exlporer Settings Flexibility Hosted Solution Cost Management Remote Monitoring and Management Storage Mobility Smart Technology Data storage Save Time Mobile Security Cybercrime communications Wearable Technology IoT Robot Conferencing Hiring/Firing Windows 10 Printing Display Alerts Star Wars Zero-Day Threat Software Tips Managed IT Service 5G PDF Value People Geography eBay Language Scary Stories Virtual Reality Mobile Device Managment Google Calendar Asset Tracking Remote Support Identity Electronic Health Records Leadership Streaming Media Utility Computing Backup and Disaster Recovery New Additions Break Fix Monitors Skype Deep Learning Print Server High-Speed Internet Text Messaging Server Management Computing Infrastructure SaaS Techology Legislation Domains Google Wallet OneNote Work Station Cyberattacks Human Error Scheduling Congratulations Dark Web Fun Writing LinkedIn Word Law Firm IT Development Video Surveillance Cooperation Chromebook Disaster Resistance G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Motherboard Read Only Hard Drive Permission Data Warehousing Cortana Social Engineering Best Available Buisness Identities Cables Patch Management Staff IT Consulting Travel Software as a Service Backups Modem Bookmarks Cache Test Microsoft Excel Knowledge Environment CIO Solid State Drive Bluetooth Wires Operations Politics Data Breach Meetings Technology Tips Legal Online Currency Samsung Cookies Favorites Debate Management Experience Troubleshooting Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Telephony Technology Laws Macro Comparison Consumers Monitoring Crowdfunding Nanotechnology Instant Messaging Enterprise Resource Planning How To Permissions YouTube Typing MSP IT Technicians Unified Threat Management Identity Theft Black Friday IP Address Google Drive Screen Reader Finance Mobile Assessment Fraud How To Refrigeration Cryptocurrency Disaster Proactive Gaming Console Touchscreen Mirgation Consulting Access Control Authentication Cyber Monday Google Docs Smart Tech Managing Stress IT Management Bitcoin Digital Signature Business Technology Managed Services Provider Private Cloud SharePoint Connectivity Authorization Memory Enterprise Content Management Network Management Laptop Downloads Hacks WPA3 Migration E-Commerce Public Cloud Employees Distributed Denial of Service Documents Vulnerabilities Adminstration Hotspot Halloween Networking Entrepreneur Sync Multi-Factor Security Undo Fleet Tracking 3D Chatbots Features PC Care

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...