crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Software Business Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones VoIP Computer Upgrade Business Continuity Google Windows Efficiency Mobile Device Management Microsoft Office Disaster Recovery Innovation Virtualization Miscellaneous Mobile Office Vendor Management Social Media Tech Term Holiday Gadgets Data Backup Quick Tips Passwords Outsourced IT BYOD User Tips Android Smartphone Mobile Computing Network Security WiFi Bring Your Own Device Windows 10 Browser Internet of Things Managed IT services Best Practice Ransomware Spam Remote Monitoring The Internet of Things Users Remote Computing Wireless Technology Data Recovery Alert Data Management Save Money Trending Operating System Apple Firewall Content Filtering Artificial Intelligence History Gmail Unified Threat Management Going Green Cloud Computing App Customer Relationship Management Managed IT Router Big Data Printer Tech Support Office Analytics IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant Encryption Maintenance Document Management Hard Drives Paperless Office Windows 8 Employer-Employee Relationship Productivity Applications Website IT Support Humor Collaboration Two-factor Authentication Saving Time Avoiding Downtime Antivirus Phishing Bandwidth Fax Server IT service Mobile Device Digital Payment Chrome Outlook Health VPN Business Growth Risk Management Wi-Fi Marketing Customer Service Hacking Excel Computers Managed IT Services Phone System Apps Compliance Automation Application Cybersecurity Virus Office Tips Retail Money Running Cable Social User Error Net Neutrality Licensing Data Security Co-Managed IT File Sharing PowerPoint Social Networking Unified Communications Tablet Infrastructure Office 365 Inbound Marketing iPhone Password Government Managed Service Administration Augmented Reality Presentation Budget Project Management Training Computer Repair Proactive IT Point of Sale Regulations Recovery Mouse Twitter Mobility Smart Technology Company Culture Analyitcs Education Mobile Security Help Desk IoT Safety Specifications Settings Flexibility Hosted Solution IBM Cost Management Wireless Data storage Cybercrime Save Time Tip of the week Wearable Technology Robot Hiring/Firing Alerts Printing Display Healthcare End of Support LiFi Computing Statistics Scam Intranet Competition Business Intelligence Network Congestion Vulnerability Recycling Information eWaste Downtime Data loss Blockchain HIPAA BDR Search Virtual Desktop USB Piracy Redundancy Business Owner Files Sports Hacker User Programming Internet Exlporer Storage Connectivity IP Address Google Drive How To Enterprise Content Management Network Management Networking Migration E-Commerce Private Cloud Downloads Refrigeration Cryptocurrency Disaster WPA3 Gaming Console Touchscreen Distributed Denial of Service Google Docs Vulnerabilities Windows 10 Hotspot Chatbots Features Public Cloud Multi-Factor Security Bitcoin Digital Signature Fleet Tracking Memory Star Wars Software Tips Managed IT Service Laptop communications Geography Language Identity Electronic Health Records Sync Google Calendar Hacks Asset Tracking Documents Conferencing Utility Computing Break Fix Halloween Techology Entrepreneur High-Speed Internet Adminstration Server Management Computing Infrastructure 3D PC Care Mobile Device Managment Legislation Undo OneNote PDF Value People Dark Web 5G Scary Stories Virtual Reality Disaster Resistance Development eBay Cooperation Remote Support Motherboard Leadership Employee-Employer Relationship Skype Streaming Media Hard Drive New Additions Data Warehousing Monitors SaaS IT Consulting Deep Learning Print Server Cables Text Messaging Patch Management Staff Work Station Modem G Suite Software as a Service Domains Google Wallet Remote Workers LinkedIn Cache Scheduling Congratulations Microsoft Excel Fun Writing Chromebook Data Breach Word Law Firm IT Wires Video Surveillance Operations Cookies Travel Technology Tips Public Speaking Drones Windows 8.1 Update Best Available Buisness Management Cortana Social Engineering Technology Laws Identities Virtual Private Network Nanotechnology Comparison Backups Monitoring Environment CIO Enterprise Resource Planning How To Permissions Knowledge Telephony Unified Threat Management Solid State Drive Bluetooth MSP IT Technicians Samsung Screen Reader Identity Theft Black Friday Legal Online Currency Consulting Troubleshooting Debate Mobile Assessment Fraud Experience Access Control Heating/Cooling Alt Codes Proactive Computer Accessories Mirgation Managed Services Provider Crowdfunding Smart Tech Macro Cyber Monday Consumers YouTube Managing Stress IT Management Machine Learning SharePoint Typing Remote Monitoring and Management Business Technology

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code