Blockchain Technology Data Privacy Issues And Potential Mitigation .

1y ago
1 Views
1 Downloads
557.57 KB
8 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Aliana Wahl
Transcription

Resource ID: W-021-8235Blockchain Technology: Data PrivacyIssues and Potential MitigationStrategiesPRITESH SHAH AND DANIEL FORESTER, DAVIS POLK & WARDWELL LLP, AND MATTHIAS BERBERICHAND CAROLIN RASPÉ, HENGELER MUELLER, WITH PRACTICAL LAW DATA PRIVACY ADVISORSearch the Resource ID numbers in blue on Westlaw for more.A Practice Note discussing blockchaintechnology, recent trends in data privacy law,and the tensions between them. It explainsblockchain technology’s characteristics anddescribes issues and potential strategies forcomplying with the EU General Data ProtectionRegulation (Regulation (EU) 2016/679) (GDPR)and the California Consumer Privacy Act of 2018(CCPA), including anonymity and pseudonymity,data controller and data processoridentification, territorial and cross-border datatransfer issues, legitimate bases for processingpersonal data, and individuals’ rights.Blockchain is one of the most hyped developments to arrive on thetechnology scene in recent years. However, blockchain technologyand data privacy laws and regulations have largely developedindependently. Heightened global data protection regimes withdramatically increased potential fines drive businesses to furtherreevaluate their privacy practices. Significant ambiguity andcomplexity currently exist for organizations in applying data privacyrequirements to blockchain technology and associated services.This Note: Explains blockchain technology, including core elements anddesign choices. Considers key tensions and issues between using blockchaintechnology and data privacy laws and regulations. Offers potential steps for mitigating compliance risks.The technology builds on longstanding concepts and techniquesin distributed transaction processing and encryption. Softwaredevelopers initially brought these ideas together in a remarkablyinnovative manner to support Bitcoin’s 2009 launch, giving rise tothe first “blockchain” network. Cryptocurrencies, many of which usethe concepts Bitcoin introduced, continue to proliferate.Astute observers quickly recognized the underlying technology’spotential beyond its original use to record trustless, peer-to-peertransfers of value. Blockchain applications have grown, with currentuse cases in: Smart contract development. Supply chain management, asset registers, and recordkeepingtools. Other innovations in varied industries, including:zzfintech;zzreal estate;zzhealth care; andzzretail.Blockchain implementations share several core elements, regardlessof use case or application, including: Distributed ledger technology. This software infrastructureprovides a synchronized and shared data structure that multipleparticipants can access and modify over a peer-to-peer network.The ledger chronologically links each new published data blockto previous blocks of transactions using a cryptographic hashingprocess to form a chain. Participants or nodes generally store acomplete copy of the ledger with previous transactions. Consensus mechanisms. These algorithms typically require adefined majority of participants to verify the legitimacy of andagree on each new ledger transaction request, taking the place ofa traditional centralized administrator. Some consensus modelsinclude:zzBLOCKCHAIN TECHNOLOGY CHARACTERISTICSBlockchain gained notoriety and quickly became part of popularparlance during 2017’s unprecedented cryptocurrency boom. 2019 Thomson Reuters. All rights reserved.zzproof-of-work, which, mostly in public blockchains, inducesparticipants to compete for the right to verify and settle blocksof transactions by solving computationally intensive puzzles;proof-of-stake, which sets block publishing rights according toparticipants’ known investment in the blockchain; and

Blockchain Technology: Data Privacy Issues and Potential Mitigation Strategieszzproof-of-authority, which verifies a participant’s identity andauthorization level before granting block publishing rights,typically in private blockchains of known participants. Selection of public versus private participation. Publicor permissionless blockchains, like those supporting mostcryptocurrencies, allow anyone in any location to participate,subject to the implementation’s consensus mechanisms. Private orpermissioned blockchains restrict who may access and participatein the network and particular transactions either automaticallyor through identified gatekeepers. Many business or enterpriseapplications require access controls or other limitations, suchas restricting data content or storage locations, that privateblockchains can offer. These applications, often with morecentralized networks and smaller participant groups, benefit fromblockchain characteristics but also share many features and riskswith traditional centrally administered databases. Transaction immutability. Widely touted as a blockchain benefit,transaction immutability follows from the way the distributedledger technology cryptographically links each new block to theprevious entry. Participants must however consider immutabilitystrength through the lens of the particular blockchain’scharacteristics, including security levels and other potential risks.For example, a “51% attack” occurs when bad actors compromisea majority of participants, overwhelm the consensus mechanism,and alter the blockchain contents for their benefit. The guaranteeof immutability is stronger in large robust networks where theresources required to gain majority control make these attackscost-prohibitive.For more on blockchain technology characteristics, including othercybersecurity risks and issues, see Practice Note, Cybersecurity TechBasics: Blockchain Technology Cyber Risks and Issues: Overview(w-017-1916). Data controllers or businesses that determine the purposes forand means of processing, for instance, by collecting, using, andmanaging personal data at their discretion. Data processors or service providers that work on data controllers’behalf.This longstanding notion of centralized entities that control both thedata they collect and their service provider relationships contrastswith blockchain technology’s distributed peer-to-peer networkarchitecture.THE EU’S GDPR AND DRAFT EU E-PRIVACY REGULATIONThe GDPR sets out a high, harmonized personal data protectionstandard for the EU and the European Economic Area (EEA),although it allows member states to make some derogations.The GDPR: Defines personal data broadly to include any information relatingto an identified or identifiable individual (Article 4(1), GDPR). Takes an expansive extraterritorial view, protecting EU residentsfrom less stringent data protection standards in other countries byapplying to:zzzzParalleling blockchain technology’s growth over the past decade,data privacy has seen a sharp uptick in global attention as a generalpolicy and regulatory concern. Changes in the EU and US especiallyhave the potential to affect blockchain technology users, althoughthese jurisdictions have historically approached data privacy indifferent ways. Specifically: The EU takes an omnibus approach with its General DataProtection Regulation (Regulation (EU) 2016/679) (GDPR), whichentered into force on May 25, 2018. Its proposed EU E-PrivacyRegulation further addresses electronic communications (see TheEU’s GDPR and Draft E-Privacy Regulation). The US conversely approaches data privacy in a patchwork,sector-specific fashion at the federal level. Some states have takenthe lead by adopting broader legislation, for example, with theCalifornia Consumer Privacy Act of 2018 (CCPA) (see The CCPAand US Trends).For a summary comparison of the GDPR and CCPA, see PracticeNote, CCPA and GDPR Comparison Chart (w-016-7418).These and other current regimes perpetuate a traditional dataprotection framework that challenges decentralized technologies likeblockchain because they envision:2online behavioral monitoring of individuals in the EU.Controllers and their optional processors must take various steps todocument their programs and comply with the GDPR’s principlesand many obligations. Blockchain technology users may find severalcompliance requirements challenging, including: Ensuring the legality of personal data processing, for example, by:zzzzRECENT TRENDS IN DATA PRIVACY LAWprocessing personal data of individuals in the EU when offeringgoods or services to those individuals in the EU; andobtaining individual data subjects’ consent; ormeeting requirements for other legal bases like fulfillment of acontract or balancing of legitimate interests.(Article 6, GDPR.) Informing data subjects about and fulfilling various individuals’rights, such as:zznotice;zzdata access, rectification, and portability;zzzzopportunities to object to processing, including automateddecision making; anddata removal, also known as “the right to be forgotten,” underspecified circumstances.(Articles 12 through 23, GDPR.) Maintaining risk-based data security standards (Article 32, GDPR).The GDPR sets out high potential fines for noncompliance of up to thegreater of EUR20 million or 4% of annual worldwide turnover (Article 83,GDPR). For more on the GDPR and its applicability, see Practice Notes,Overview of EU General Data Protection Regulation (w-007-9580) andDetermining the Applicability of the GDPR (w-003-8899).The current E-Privacy Directive (Directive 2002/58/EC), as amendedby the EU Citizens’ Rights Directive (Directive 2009/136/EC),further governs data protection for electronic communications.EU policymakers intend for the draft E-Privacy Regulation to 2019 Thomson Reuters. All rights reserved.

Blockchain Technology: Data Privacy Issues and Potential Mitigation Strategiescomplement the GDPR. A final draft is expected in late 2019 at theearliest, making entry into force unlikely before 2020. Transitionalperiods may postpone its applicability.The current draft E-Privacy Regulation indicates that it is likely toapply to: The processing of electronic communications data relating to theLike the GDPR, the CCPA provides consumer protections andcompliance obligations that may be challenging for blockchaintechnology users, including: Informing consumers about and fulfilling various individuals’rights, such as:zzprovision and use of electronic communications services. Information related to end users’ terminal equipment.The draft E-Privacy Regulation regulates data with a different scopethan the GDPR, including only certain communications data likecontent and metadata regardless of whether it is personal dataor not. Like the GDPR, data processing requires a legal basis byconsent or law, such as processing that is technically necessary forproviding communications services. Potential issues for blockchaintechnology users remain open. For example, as they are finalized, thedraft E-Privacy Regulation provisions may further challenge onlineservices using blockchain technology.US TRENDS AND THE CCPAThe US has not yet implemented a comprehensive federal dataprotection framework, relying instead on sector-specific privacy anddata security laws and regulations, such as: The Gramm-Leach-Bliley Act (GLBA) for financial institutions. The Health Insurance Portability and Accountability Act of 1996(HIPAA) for health care providers, health plans, and their serviceproviders.For more on current US privacy and data security laws, see PracticeNote, US Privacy and Data Security Law: Overview (6-501-4555).Many observers expect Congress to eventually enact a morecomprehensive privacy and data security law that may at leastpartially preempt state laws. In the meantime, states have taken thelead. For example, California enacted the most comprehensive andstringent state-level data protection law in the US to date with theCCPA. The new protections for California residents begin January1, 2020. Similar legislation is under consideration in several otherstates (see Practice Note, 2019-2020 Federal and State PrivacyRelated Legislation Tracker (w-020-3899)).The CCPA: Defines personal information broadly to include any informationthat directly or indirectly identifies, describes, or can reasonablylink to a particular California resident consumer or household (CalCiv. Code § 1798.140(o)). With some exceptions, applies to businesses that collect andcontrol consumers’ personal information and meet at least one ofthe following thresholds:zzzzzzannual gross revenue that exceeds 25 million (adjusted forinflation);annually buys, receives, shares, or sells alone or in combinationthe personal information of more than 50,000 consumers,households, or devices for commercial purposes; orderives 50% or more of annual revenues from sellingconsumers’ personal information.(Cal. Civ. Code § 1798.140(c)(1).) 2019 Thomson Reuters. All rights reserved.zzzznotice, access, and disclosure, including details regarding thirdparty disclosures or sales (Cal. Civ. Code §§ 1798.100, 1798.110,1798.115, and 1798.130);an opportunity to opt-out of sales of personal information withoutdiscrimination, or opt-in for minors (Cal. Civ. Code § 1798.120); andthe right to be forgotten, subject to certain limits (Cal. Civ.Code § 1798.105). Maintaining risk-based data security standards, enforced by aCCPA-granted private right of action regarding data breaches thatresult from a business’s failure to maintain adequate data securitystandards (Cal. Civ. Code §§ 1798.81.5 and 1798.150).The CCPA grants rulemaking and enforcement authority to theCalifornia Attorney General (CAG) with administrative penalties of upto 2,500 per violation and 7,500 per intentional violation that likelyextend to each affected individual (Cal. Civ. Code § 1798.155(b)). It isnot yet clear how the CAG intends to implement these fines.For details on the CCPA and current amendment status, see PracticeNotes, Understanding the California Consumer Privacy Act (CCPA)(w-017-4166) and CCPA Proposed Amendments and Other CaliforniaPrivacy-Related Legislation Tracker (w-020-3287).TENSIONS BETWEEN BLOCKCHAIN TECHNOLOGYAND COMMON DATA PRIVACY REQUIREMENTSLegislators do not appear to have focused on blockchain technologyand its unique features when drafting recent data privacy laws andframeworks. Some blockchain technology features can help mitigate orcater to privacy concerns, such as using encryption and verifying dataintegrity. However, blockchain technology’s distributed peer-to-peernetwork architecture often places it at odds with the GDPR’s and CCPA’straditional notion of centralized controller-based data processing. Thisdisconnect can make it difficult to reconcile current data protection lawswith blockchain’s other core elements, such as the lack of centralizedcontrol, immutability, and perpetual data storage. Regulatory guidanceon reconciling this and other potential conflicts is currently limited.Handling data privacy issues and properly applying laws, such asthe GDPR and CCPA, increasingly contribute to a business venture’ssuccess or failure, including those that use blockchain technology.Circumstances may require or organizations may benefit fromconducting a privacy impact assessment (PIA) or data protectionimpact assessment (DPIA) before implementation or release.Some important tensions between blockchain technology and dataprivacy requirements to consider include: Different perspectives on anonymity and pseudonymity andhow they affect the applicability of various data protection andprivacy laws (see Anonymity, Pseudonymity, and Privacy LawApplicability). How to identify data controllers and data processors in variousblockchain technology implementations (see Data Controller andData Processor Identification).3

Blockchain Technology: Data Privacy Issues and Potential Mitigation Strategies Territorial implications for distributed blockchain networks (seeTerritorial Considerations). When cross-border data transfers occur and potential restrictionson them (see Cross-Border Data Transfers). Applying criteria for legitimate reasons for processing personaldata to blockchain use cases (see Legitimate Reasons forProcessing Personal Data). Reconciling transaction immutability and data preservation inblockchain applications with individuals’ rights (see Immutabilityand Individuals’ Rights). The CCPA takes a similarly broad view of personal information thatincludes:zzzz“online identifiers,” without specific definition; andunique identifiers that encompass “persistent or probabilisticidentifiers that can be used to identify a particular consumer ordevice” (Cal. Civ. Code § 1798.140(x)).See Practice Note, Understanding the California Consumer PrivacyAct (CCPA) : Personal Information Under the CCPA (w-017-4166).Better practice treats public keys as tokenizations of personalinformation from a privacy perspective instead of anonymizeddata, because:For more on PIAs, DPIAs, the commonality between themand a template, see Practice Note, Conducting Privacy ImpactAssessments (w-012-5912) and Standard Document, Privacy ImpactAssessment (w-012-5914). They correspond to an individual.ANONYMITY, PSEUDONYMITY, AND PRIVACY LAW APPLICABILITYBlockchain technologists also sometimes claim that theirimplementations are anonymous because they recordtransaction data that:The applicability of most data privacy laws, including the GDPR andthe CCPA, depends first on whether the activities in question involvethe processing of personal data. Blockchain implementations thatexpressly record personal data on the blockchain are clearly subjectto laws regarding personal data. However, whether the data someblockchains record, process, or use to manage transactions qualifiesas personal data varies. For example: Blockchains may expressly include personal data as “payload” ifthey aim to create a record of ownership or other assigned rightsthat require sufficient identifying information. Blockchains, including many public blockchains that supportpopular cryptocurrencies, tout anonymity or at least some levelof privacy by using public-private key pair encryption. Theseasymmetric encryption systems:zzzzzzzz Only references a public blockchain address and not theunderlying owner’s name or other directly identifiable personalinformation. Often do not display unencrypted public blockchain addresses.This usage again contrasts with data privacy laws that onlyconsider personal information anonymized or deidentified if itcannot be reasonably linked to an identifiable individual. Applyingpseudonymization techniques lowers risk but does not removeregulatory obligations. For more on these techniques under theGDPR, see Practice Note, Anonymization and PseudonymizationUnder the GDPR (w-007-4624).leverage the mathematical relationship between the public andprivate keys in a particular pair;Reidentification risks and related concerns have led some blockchains,including privacy-focused cryptocurrencies, to try to reduce the risk ofidentifying individual participants by:record public keys on the blockchain implementation; Implementing various mitigation strategies to protect transactiondo not typically record public key owner data or other similarpersonal information; and Introducing alternative cryptographic approaches.leave users to retain and protect their own private keys.Some blockchain enthusiasts claim that using public-private keyencryption preserves anonymity and privacy. This is a relativelysimplistic view of personal information that may not hold up underGDPR or CCPA definitions because: Methods exist for linking individuals to public keys by analyzingblockchain transactions and other publicly available data. Somebusinesses offer services to identify individuals using their publickeys, blockchain transactions, and other available data. The GDPR defines personal data broadly (see The EU’s GDPR andDraft E-Privacy Regulation). The threshold for identification is low,recognizing any means “reasonably likely to be used,” consideringall objective factors, such as costs and time, and available andanticipated technology (Recital 26, GDPR). The GDPR alsoincludes online identifiers, which the European Court of Justice(ECJ) previously addressed in its Breyer v. Germany decision (Case582/14), holding that dynamic IP addresses are personal data (seePractice Note, Overview of EU General Data Protection Regulation:Online identifiers (w-007-9580)).4 Reidentification becomes possible in some circumstances.and other data.Organizations should consider the applicability of the GDPR, the CCPA,and other data privacy laws to proposed blockchain use cases by: Carefully assessing specific blockchain implementation details. Reviewing potential reidentification methods and risks. Monitoring emerging guidance.DATA CONTROLLER AND DATA PROCESSOR IDENTIFICATIONBlockchain implementations that process personal informationare at odds with the clear distinction that data privacy laws andframeworks, like the GDPR and CCPA, make between: Controllers and their processors. Individual data subjects.The distributed peer-to-peer network architecture means that it isoften unclear which party determines the purposes and means ofprocessing.Private blockchains present a simpler case. Here a central operator orconsortium likely qualifies as a controller or joint controllers if they: 2019 Thomson Reuters. All rights reserved.

Blockchain Technology: Data Privacy Issues and Potential Mitigation Strategies Have control over the blockchain system, like a traditional systemarchitecture. Determine the purposes and means for any personal dataprocessing.However, when third parties act on a participant’s behalf, they maybecome processors and then should enter into data processingagreements.Regarding miners, the CNIL guidance notes that:Other actors that help operate the blockchain specifically for thecentral operator, such as nodes or miners, can take the processorrole. The private blockchain operator or consortium must implementappropriate data processing agreements or other contracts tohold these service providers accountable and meet regulatoryobligations. Alternatively, private blockchains where the centraloperator performs all technical support activities may not have dataprocessors or service providers by default. Miners that are only validating transactions and are not involved inPublic blockchains typically lack a central operator, making itdifficult to assign traditional controller and processor accountability.For example:Although this may suggest that in certain circumstances miners maybe neither a data controller nor a data processor, the CNIL guidanceis not clear. Each public blockchain node independently processes the sametransaction data set, at least during the block verification process.This might lead to classification of each blockchain node as a jointcontroller under the GDPR, but authorities and commentatorsalike are reluctant to draw this conclusion for all nodes(Articles 4(7) and 26, GDPR; see CNIL Guidance). Conversely, if no entity has clear control over the data, thenparticipants may try to argue that there is no controller and hencethere can be no processors. However, this argument may not becompatible with the GDPR, because the GDPR emphasizes a“clear allocation of responsibilities” for personal data processing(Recital 79, GDPR).Data protection authorities and other regulators have been slow toaddress blockchain technology, except for the French data protectionauthority (Commission Nationale de l’informatique et des Libertés(CNIL)) (see CNIL Guidance).Businesses that use blockchain technology when collecting ormanaging personal data should carefully analyze their accountabilityunder applicable regulations, including the roles any serviceproviders they engage play.CNIL GuidanceThe CNIL has issued initial cautious guidance on applying the GDPRto some blockchain technology use cases. The CNIL guidance focuseson various blockchain actors, distinguishing among: Participants that have full writing rights to enter transactions onthe blockchain and to send the data for validation to miners. Accessors that may retain full copies of a blockchain but haveread-only rights. Miners that validate transactions and create new blocks accordingto the implementation’s governance model.Participants under these distinctions are controllers regardingpersonal data they enter on a blockchain, because in doing so, theydetermine the purposes and means for processing. Mere accessorsand miners normally do not make these determinations and so are notcontrollers. The CNIL guidance also notes that individuals enteringpersonal data on a blockchain for strictly personal purposes are notcontrollers under the GDPR’s household exception (Article 2, GDPR). 2019 Thomson Reuters. All rights reserved.the object of those transactions, for instance, miners just buildingnew blocks according to the technical protocol, are not controllersin the CNIL’s view. In some cases, miners may be data processors in the CNIL’s view, ifthey follow a data controller’s instructions, for example, in a privateblockchain of insurance companies that mine transactions onbehalf of customers.TERRITORIAL CONSIDERATIONSData privacy laws often apply according to either or both: The individual’s location. The personal data processing location.For example: The CCPA is indifferent to a business’s processing location if itinvolves the personal information of California residents. The GDPR applies:zzzzto personal data processing activities by either controllers orprocessors established in the EU or the broader EEA; andregardless of location, if the personal data processing involvesoffering individuals goods or services in the EU or onlinebehavioral monitoring of individuals in the EU.(See The EU’s GDPR and Draft E-Privacy Regulation.)Evaluating jurisdictionality and applying regulations to decentralizedblockchain implementations is not a straightforward exercisecompared to traditional centralized systems.More cautious blockchain projects that handle personal data may tryto limit participants by jurisdiction, although reliably confirming onlinelocations can be difficult. Private blockchains more often set restrictionsin their governance models and agreements to limit regulatory scope.Public blockchains that process personal data may assume applicabilityfor various regulatory regimes as a best practice, but: Managing the diverse set of regulations can incur significantoverhead costs. Using common public-private key pairing for encryption may bringthem in many regimes’ scope (see Anonymity, Pseudonymity, andPrivacy Law Applicability).CROSS-BORDER DATA TRANSFERSThe distributed nature of blockchain technology not only poses achallenge regarding the applicability of various jurisdictions’ laws,but it also raises tensions with those that restrict cross-border datatransfers. Most notably, the GDPR: Permits personal data transfers to countries outside the EEA onlyunder specific circumstances.5

Blockchain Technology: Data Privacy Issues and Potential Mitigation Strategies Requires specific safeguards in the recipient jurisdiction to ensurezzthe same or an adequate level of protection.zzindividuals can withdraw consent at any time without reason;andblockchains may store personal data in a way that is extremelydifficult to remove making later processing unlawful.Controllers must implement additional safeguards unless theEuropean Commission issues an adequacy decision for the recipientlocation. Safeguards may take the form of standard contractualclauses, binding corporate rules, codes of conduct, or certificationmechanisms. For more on cross-border data transfers under theGDPR, see Practice Note, Overview of EU General Data ProtectionRegulation: Cross-border data transfers (w-007-9580).Organizations must carefully consider scenarios like consentwithdrawal when determining what data they store in blockchainapplications and how they record it.These safeguards:Data privacy laws increasingly grant individuals with rights, aiming to: Normally require some centralized compliance program to Helpimplement them. Are especially difficult to consider implementing in publicblockchains with their undefined participant groups.Other jurisdictions are increasingly seeking to limit cross-border datatransfers and may call for similar protective mechanisms.LEGITIMATE REASONS FOR PROCESSING PERSONAL DATASome data protection and data privacy laws limit the permitteduses of or require legitimate reasons for processing personal data.For example: Federal sector-specific laws in the US, like the GLBA and HIPAA,and various state laws limit certain personal data use withoutindividuals’ consent. Various exceptions may apply, such asHIPAA’s permitted uses for treatment, payment, and health careoperations (45 C.F.R. § 164.506). The GDPR only allows controllers to process personal data basedIMMUTABILITY AND INDIVIDUALS’ RIGHTSindividuals regain a measure of control over theirpersonal data. Allow individuals to choose to protect their personal data frommonetization or exploitation without their consent or otherjustification.For more on data subject rights under the GDPR and CCPA, seeRecent Trends in Data Privacy Law.Rights of data correction and data erasure, also known as the rightto be forgotten, present the most apparent conflict with blockchaintechnology’s transaction immutability characteristics. Blockchains,in particular implementations that provide ownership, supply chain,and other recordkeeping tools, including smart contracts, can likelyaddress data updates by recording additional transactions. However,these later transactions do not technically delete data previouslystored on the blockchain. The same approach supports updatingvarious process steps and status values.zzentering or performing a contract with the data subject;Whether blockchain technology fundamentally conflicts with theright to be forgotten depends on how strictly authorities interpret“erasure.” A strict technical erasure of blockchain data, in a currentstandard blockchain architec

data privacy has seen a sharp uptick in global attention as a general policy and regulatory concern. Changes in the EU and US especially have the potential to affect blockchain technology users, although these jurisdictions have historically approached data privacy in different ways. Specifically:

Related Documents:

www.sheppardmullin.com Blockchain Games and Collectibles - Patents and Other Legal Issues March 2019 By: James G. Gatto 1. Blockchain Games and Collectibles Are on the Rise – The use of blockchain (or distributed ledger) technology for games (a.k.a blockchain ga

Pre-production Proofs of concept/value R&D Version 1s Version 2s Version 3s Figure 1: Path to blockchain adoption. Building Value with Blockchain Technology 7 . technologies or other digitization strategies. As noted in "Blockchain Beyond the Hype", blockchain may not be a viable

AWS Blockchain Templates helps you quickly create and deploy blockchain networks on AWS using different blockchain frameworks. Blockchain is a decentralized database technology that maintains a continually growing set of transactions and smart contracts hardened against tampering and revision

THE EMERGENCE OF CHINA'S STATE-BACKED BLOCKCHAIN PLATFORM JUNE 2021 Overview Introduction to Blockchain China's Communisty Party Prioritizes Blockchain p. 2 p. 8 p. 10 p. 11 China's State-backed Blockchain Ecosystem p. 13 The Potential Data Security Risks Associated with BSN p. 18 Permissioned vs. Permissionless Blockchain

Blockchain technology is an emerging technology that has attracted many enterprises’ interest in recent years. Enterprises are interested in improving business processes using blockchain technology. Blockchain technology creates an immutable record and eli

Blockchain Adoption Q12. Which of the following best describes your organization when it comes to business blockchain technologies? N 220, single response, percent responding 33% Already has implemented, or is currently implementing blockchain technologies 22% Currently evaluating or testing blockchain technologies 20% Have discussed blockchain

3 Opportunities for the Use of Blockchain in Health Care 9 3.1 Benefits of Blockchain 10 3.2 Disadvantages of Blockchain 10 3.3 Key Health Care Challenges and Use of Blockchain 11. 3.3.1 Electronic Health Records. 11 3.3.2 Supply Chain 12 3.3.3 Health Insurance 13 3.3.4 Genomics 14 3.3.5 Consent Management 15

Introduction to Logic Catalog Description: Introduction to evaluation of arguments. Concentration on basic principles of formal logic and application to evaluation of arguments. Explores notions of implication and proof and use of modern techniques of analysis including logical symbolism. Credit Hour(s): 3 Lecture Hour(s): 3 Lab Hour(s): 0 Other Hour(s): 0 Requisites Prerequisite and .