Blockchain And GDPR: A Rock And A Hard Place

Blockchain and other emerging distributed ledger technologies offer the promise of increased security, transparency and resilience based on the use of distributed, immutable records. At the same time, the European Union General Data Protection Regulation (GDPR), which takes effect May 25, 2018, governs the use and protection of personal data collected from or about any European Union resident.

Personal data is defined very broadly and includes any information relating to an identified or identifiable natural person.

Under current EU legal interpretations, this includes encrypted or hashed personal data as well as public cryptographic keys that can be tied to a private individual.

The penalties for failing to comply with the GDPR are harsh including fines of up to the greater of €20 million or 4% of a company’s annual worldwide revenue.

The GDPR: Centralised, Restricted and Removable

The GDPR was developed based on an assumption that collected personal data would be controlled by an identifiable data controller and processed by the data controller or by a finite number of identifiable data processors and sub-processors. In order to protect the use of personal data, data controllers and processors must control who accesses the personal data, where and to whom it is transferred, and by whom it is accessed.

The GDPR gives EU residents enforceable rights with respect to their personal data, including:

•    the right to erasure of personal data when the personal data is no longer needed for the purpose for which it was collected, when the individual withdraws consent, or when continued processing of the data is unlawful;
•    the right to require correction of incorrect data; and
•    the right to restrict processing when the data accuracy is contested, when processing is no longer necessary, or when the individual objects.

These rights are understandable in the context of a centralized database controlled by a single data controller with a finite set of processors. But how well do they mesh with distributed ledger technology?

Blockchain: Decentralised, Distributed and Immutable

Blockchains can either be open to anyone (such as Bitcoin) or permissioned (limited to a specific set of participants). With a permissioned blockchain, the organisation that sets up the permissioned blockchain is the data controller and is responsible for compliance with GDPR.

In an open blockchain, every individual and organisation that adds EU personal data to the blockchain may be a data controller and may be responsible for compliance with GDPR. Similarly, every node on either an open or permissioned blockchain is, at a minimum, a data processor and may be a data controller depending on the blockchain governance arrangement.

Blocks typically include a header and encrypted content (the payload). Open blockchains allow anyone to view the header. Permissioned blockchains may have options for controlling who can view different parts of the transaction. The blockchain is a trusted record source because the data within each block cannot be changed and blocks cannot be removed.

Can Blockchains and the GDPR be Reconciled?

Not for open blockchains and not easily for permissioned blockchains using currently available technology and current EU data protection interpretations. The two biggest hurdles are control and data removal.

The data controller is liable for controlling access, dissemination, processing and sub-processing of personal information. This is effectively impossible for an open blockchain and will require significant attention and diligence for a permissioned blockchain.

As one example, the data controller needs to have a written data processing agreement in place with each data processor, which means with the owner of every node in the blockchain.

With respect to data removal, two possible solutions are:

  • Off-chain storage
  • Building in processes to make personal data permanently inaccessible (“blacklisting”)

Off-Chain Storage

One option is to store personal data outside of the blockchain and store only a reference (link) to the data and a hash of the data on the blockchain. This allows the removal (erasure) of the personal data without breaking the blockchain. However, this approach defeats many of the benefits of distributed ledger technology, such as security and resilience through redundancy.

Blacklisting

“Erasure” of data is not defined in the GDPR. Greg McMullen of the Interplanetary Database Foundation suggests that destroying the cryptographic key that would allow access to encrypted personal data should be considered to be the equivalent of erasure if the destruction is done in accordance with best practices and in an auditable way. We’ll have to wait for some rulings by Data Protection Authorities to see whether this view will be accepted.

Bottom Line

If you are building a permissioned blockchain, build it with the GDPR in mind. Understand:

  • who will have access to any EU personal data
  • how the data will be controlled
  • how you will comply with requirements to control processors, and
  • how you will respond to requests from individuals to view, correct, erase and restrict their personal information.

Tripwire:

You Might Also Read: 

AI And Blockchain In A Disruptive World:

A New Distributed Database Adds GDPR Controls:

 

« Facebook Collects Your Data Even If You Don’t Use Facebook
Half Of Music Business Revenue Is From Streaming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.