SlideShare a Scribd company logo
{
Data protection by
design and by default
on the blockchain
TILTing2019 - 17 May 2019
Alexandra Giannopoulou
Blockchain and Society Policy Lab
Institute for Information Law (IViR)
University of Amsterdam
 Immutability of the blockchain
 Transnational processing
 Some personal data processing is
essential for the functioning of
blockchains
Dessine-moi une blockchain…
Blocks containing transactions
 Metadata
 Encrypted personal data
 Hashed personal data
What do we store on the
distributed ledger?
Article 25 GDPR Data protection by design and by default
1. Taking into account the state of the art, the cost of implementation and the nature,
scope, context and purposes of processing as well as the risks of varying likelihood
and severity for rights and freedoms of natural persons posed by the processing, the
controller shall, both at the time of the determination of the means for processing
and at the time of the processing itself, implement appropriate technical and
organisational measures, such as pseudonymisation, which are designed to
implement data-protection principles, such as data minimisation, in an effective
manner and to integrate the necessary safeguards into the processing in order to
meet the requirements of this Regulation and protect the rights of data subjects.
1. The controller shall implement appropriate technical and organisational measures
for ensuring that, by default, only personal data which are necessary for each
specific purpose of the processing are processed. That obligation applies to the
amount of personal data collected, the extent of their processing, the period of their
storage and their accessibility. In particular, such measures shall ensure that by
default personal data are not made accessible without the individual's intervention
to an indefinite number of natural persons.
Not at odds conceptually because …
Blockchains and DPbD
Asymmetric encryption is a basic component and essential feature of
blockchains, contributing to giving the technology the value it has today
• Where does this awareness stem from?
However…
• Where does this awareness stem from?
However…
Crypto (as in encryption not in currency) communities imp
• Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
However…
Crypto (as in encryption not in currency) communities imp
• Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
• What about other features of data protection by design?
However…
Crypto (as in encryption not in currency) communities imp
But…
Escape the surveillance machine!
Escape the surveillance machine!
Trust the technology’s features but what about user control?
Escape the surveillance machine!
Trust the technology’s features but what about user control?
Respect for data protection
principles
Respect for data
subjects’ rights
 Privacy-enhancing technologies emerging on
the blockchain
Zero-knowledge proof
Ring signatures
Taproot “scriptless scripts”
 Which design features? Which standards?
Governance!
Technology to the rescue!
 Waiting on blockchain case law to form
guidelines and interpretations?
 How about liability?
Is there a conciliation
point in sight?
a.giannopoulou@uva.nl @alex_giann

More Related Content

What's hot

The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar
Fran Strajnar
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
Gokul Alex
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
Sebastian Cochinescu
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
Tudor Stanciu
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
Gokul Alex
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Gokul Alex
 
Blockchain with Immuto.io
Blockchain with Immuto.ioBlockchain with Immuto.io
Blockchain with Immuto.io
McPhearson TVHolden
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
John ILIADIS
 
Block chain technology ppt
Block chain technology pptBlock chain technology ppt
Block chain technology ppt
Nellore Harilakshmi
 
Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big Data
BYTE Project
 
Bit coin basics 101
Bit coin basics 101Bit coin basics 101
Bit coin basics 101
Tengku Hazleen
 
3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)
aciijournal
 
encryptedDB
encryptedDBencryptedDB
encryptedDB
Gradiant
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
ITU
 
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
IT Arena
 
Building Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMHBuilding Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMH
Lighton Phiri
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Ioannis Krontiris
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
ThreadSol
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
ABHISHEK JAIN
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
Jody Ranck
 

What's hot (20)

The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
 
Blockchain with Immuto.io
Blockchain with Immuto.ioBlockchain with Immuto.io
Blockchain with Immuto.io
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Block chain technology ppt
Block chain technology pptBlock chain technology ppt
Block chain technology ppt
 
Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big Data
 
Bit coin basics 101
Bit coin basics 101Bit coin basics 101
Bit coin basics 101
 
3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)
 
encryptedDB
encryptedDBencryptedDB
encryptedDB
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
 
Building Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMHBuilding Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMH
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 

Similar to Data protection by design and by default on the blockchain

GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
Salman Baset
 
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR  DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
Dataconomy Media
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
How MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceHow MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR compliance
MongoDB
 
Continuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityContinuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric Security
TokenEx
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
shoploala
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
Elsa Prieto
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
Craig Devlin
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
IRJET Journal
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
Bart Van Den Brande
 
WP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsWP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devs
Tiia Rantanen
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
Tomppa Järvinen
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Ransomware
RansomwareRansomware
Ransomware
Lana Sorrels
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 

Similar to Data protection by design and by default on the blockchain (20)

GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR  DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceHow MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR compliance
 
Documentation20
Documentation20Documentation20
Documentation20
 
Continuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityContinuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric Security
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
WP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsWP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devs
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Ransomware
RansomwareRansomware
Ransomware
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

More from Alexandra Giannopoulou

Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?
Alexandra Giannopoulou
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchain
Alexandra Giannopoulou
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
Alexandra Giannopoulou
 
Altered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stackAltered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stack
Alexandra Giannopoulou
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
Alexandra Giannopoulou
 
Social reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AISocial reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AI
Alexandra Giannopoulou
 
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Alexandra Giannopoulou
 
We are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politicsWe are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politics
Alexandra Giannopoulou
 
Moral rights and the Creative Commons licenses
Moral rights and the Creative Commons licensesMoral rights and the Creative Commons licenses
Moral rights and the Creative Commons licenses
Alexandra Giannopoulou
 
Les licences creative commons
Les licences creative commonsLes licences creative commons
Les licences creative commons
Alexandra Giannopoulou
 
From technical protection measures to creative commons
From technical protection measures to creative commonsFrom technical protection measures to creative commons
From technical protection measures to creative commons
Alexandra Giannopoulou
 

More from Alexandra Giannopoulou (11)

Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchain
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
Altered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stackAltered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stack
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
 
Social reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AISocial reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AI
 
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
 
We are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politicsWe are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politics
 
Moral rights and the Creative Commons licenses
Moral rights and the Creative Commons licensesMoral rights and the Creative Commons licenses
Moral rights and the Creative Commons licenses
 
Les licences creative commons
Les licences creative commonsLes licences creative commons
Les licences creative commons
 
From technical protection measures to creative commons
From technical protection measures to creative commonsFrom technical protection measures to creative commons
From technical protection measures to creative commons
 

Recently uploaded

办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 

Recently uploaded (20)

办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 

Data protection by design and by default on the blockchain

  • 1. { Data protection by design and by default on the blockchain TILTing2019 - 17 May 2019 Alexandra Giannopoulou Blockchain and Society Policy Lab Institute for Information Law (IViR) University of Amsterdam
  • 2.  Immutability of the blockchain  Transnational processing  Some personal data processing is essential for the functioning of blockchains Dessine-moi une blockchain…
  • 3. Blocks containing transactions  Metadata  Encrypted personal data  Hashed personal data What do we store on the distributed ledger?
  • 4. Article 25 GDPR Data protection by design and by default 1. Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. 1. The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual's intervention to an indefinite number of natural persons.
  • 5. Not at odds conceptually because … Blockchains and DPbD Asymmetric encryption is a basic component and essential feature of blockchains, contributing to giving the technology the value it has today
  • 6. • Where does this awareness stem from? However…
  • 7. • Where does this awareness stem from? However… Crypto (as in encryption not in currency) communities imp
  • 8. • Where does this awareness stem from? The inherent goal of the PETs is to avoid re-identification of parties and transactions However… Crypto (as in encryption not in currency) communities imp
  • 9. • Where does this awareness stem from? The inherent goal of the PETs is to avoid re-identification of parties and transactions • What about other features of data protection by design? However… Crypto (as in encryption not in currency) communities imp But…
  • 11. Escape the surveillance machine! Trust the technology’s features but what about user control?
  • 12. Escape the surveillance machine! Trust the technology’s features but what about user control? Respect for data protection principles Respect for data subjects’ rights
  • 13.  Privacy-enhancing technologies emerging on the blockchain Zero-knowledge proof Ring signatures Taproot “scriptless scripts”  Which design features? Which standards? Governance! Technology to the rescue!
  • 14.  Waiting on blockchain case law to form guidelines and interpretations?  How about liability? Is there a conciliation point in sight?

Editor's Notes

  1. Decentralization is seen as the architectural guarantee of censorship resistance, and a safeguard against the coercive influence of any centralized, top-down force
  2. Multifaceted concept that goes beyond the aspect of confidentiality but that is often constrained within the limits of the pseudonymization goals.
  3. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  4. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  5. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  6. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  7. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
  8. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
  9. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.