Sunteți pe pagina 1din 13

A guide to

blockchain and
data protection

September 2017
Contents Introduction and
Introduction and executive summary 03 executive summary
Data protection basics 04
What is a blockchain? 06
What is a Smart Contract? 06
This guide provides some of the fundamental
Do blockchains process personal data? 07 tools needed to analyse blockchain projects under
applicable data protection law. As time goes by, these
Hashing technology 09 tools will be refined as the privacy regulators around
Who is the data controller? 10 the world provide guidance on how data protection
law should be applied to blockchain projects.
Jurisdiction and applicable law 11
Increased enforcement 13
A good place to start is to look at lessons Our guide assumes some level of knowledge
Data protection principles 14 learnt in the development of cloud about blockchain principles but assumes little
computing and how these apply to knowledge of data protection. We address the
Right to erasure 15 blockchain projects. In particular, as in key data protection questions that will arise
cloud computing, there is no one-size-fits- in any blockchain project. These include:
Variety of blockchain systems 16
all solution for blockchain, given the huge
– Does the blockchain process personal data?
Analysis of the different systems 20 diversity of architectures and use cases.
– Is a hash personal data or anonymised data?
Blockchain data protection impact assessments 21 The major difference between blockchain
and most cloud computing environments – What about a public key?
Blockchain contacts 22 is that blockchain systems do not rely on
a single provider of storage or computing – Who is the data controller and the data
resources. Each user of the blockchain uses processor in a blockchain context?
his or her computing resources, on a peer-
– What is the applicable law?
to-peer basis. Moreover, each user has a
complete copy of the distributed ledger on The answers to these questions may lead to the
his or her own computer. Consequently, the conclusion that a given blockchain project’s
user of a blockchain system may at the same nexus to personal data is so remote that only
Authors time be data controller for the data that he
or she uploads onto the blockchain, and data
minimal data governance mechanisms are
required. By contrast, some projects will
processor by virtue of storing the full copy of involve high-risk data processing, requiring a
the blockchain on his or her own computer. full-blown data protection impact assessment.

Winston Maxwell
Partner, Paris
+33 1 53 67 48 47
winston.maxwell@hoganlovells.com

John Salmon
Partner, London
+44 20 7296 5071
john.salmon@hoganlovells.com
4 Hogan Lovells A guide to blockchain and data protection 5

Data protection basics

GDPR Data controller


means the EU General Data Protection means someone who determines the purposes
Regulation, a new regulation that was published for which and the manner in which any
in May 2016 and is due to come into effect on 25 personal data are processed, whereas a data
May 2018, replacing the current Data Protection processor is someone who processes personal
Directive (95/46/EC). It will be directly data on behalf of a data controller. In other
applicable in all Member States from that date, words, the data controller determines how
and the government has confirmed its intention and why personal data is processed, and
to bring the GDPR into UK law notwithstanding the data processor carries out processing
the UK’s decision to leave the EU. The GDPR according to the data controller’s instructions.
applies only in respect of personal data (as
opposed to data generally). Article 29 Working Party
is the short name for the Data Protection
Personal data Working Party established by Article 29 of
means any information relating Directive 95/46/EC. It provides the European
directly or indirectly to a ‘living natural Commission with independent advice on data
person’, whether it actually identifies protection matters and helps in the development
them or makes them identifiable. of harmonised policies for data protection in
the EU Member States. The Working Party
Processing comprises all the representatives of the national
means any operation or set of operations supervisory authorities in EU Member States.
performed upon Personal Data, for example,
collection, recording, organisation, structuring,
storage, adaptation and alteration.

The major difference between


blockchain and most cloud
computing environments is that
blockchain systems do not rely
on a single provider of storage
or computing resources.
6 A guide to blockchain and data protection 7

What is a blockchain? What is a Smart Contract? Do blockchains Data protection rules do not apply to
A distributed ledger is a replicated, shared,
and synchronised digital data structure
Smart contracts use blockchain
technology. The term is used to describe
process personal anonymised data; as such data cannot
be traced back to a living individual.
maintained by consensus algorithm and
spread across multiple sites, countries,
computer program code, maintained
on the various “nodes” constituting a data? However, the threshold for data to
and/or institutions. blockchain network that is capable of qualify as anonymised is very high.
facilitating, executing, and enforcing
Blockchain is a type of distributed ledger,
the negotiation or performance of an
comprised of digitally recorded data in
agreement upon the occurrence of pre-
packages called blocks which are linked
defined conditions. ‘Personal data’ is any information relating In 2014, the Article 29 Working Party,
together in chronological order in a manner
directly or indirectly to a ‘living natural person’, provided guidance on the difference between
that makes the data very difficult to alter The smart contract code executes on each
whether it actually identifies them or makes pseudonymised and anonymised data in its
once recorded, without the alteration of all node and the resulting output is stored on
them identifiable. To determine whether Opinion 05/2014 (WP 216). This distinction
subsequent blocks and a majority of the the blockchain. Where “tokens” of value
data protection rules apply, we need to assess is important in relation to blockchain as data
network colluding together. are involved, the smart contract code can
whether personal data is being processed protection rules do not apply to anonymised
also automatically transfer these tokens
Each node on the network (generally) when blockchain technology is used. data; as such data cannot be traced back to a
(and underlying value), thus effectively
contains a complete copy of the entire ledger, living individual. However, the threshold for
enforcing the outcome of the smart The nature of the public blockchain means
from the first block created—the genesis data to qualify as anonymised is very high.
contract code. that every transaction taking place will
block—to the most recent one. Each block
be published and linked to a published The guidance states that ‘anonymisation
contains a hash pointer as a link to a previous
public key that represents a particular results from processing personal data in
block, a timestamp and transaction data.
user. That key is encrypted so that no- order to irreversibly prevent identification.’
one who views the blockchain would be Data controllers must have regard to all
able to directly identify the individual or means likely reasonably to be used for
corporate entity that represents the user. identification (either by the controller or
any third party). Because hashing permits
However, the re-use of the public key enables
records to be linked, hashing will generally be
individuals to be singled out by reference
Public key/Private key on a bitcoin transaction Ƀ = Bitcoin
to their public key, even if they cannot be
considered a pseudonymisation technique,
not an anonymisation technique. This
directly identified. Indeed the very purpose
high standard will continue to apply under
Gold Clothes of the public key is to single out the authors
Transaction 2
the European General Data Protection
of a given transaction, to ensure that
Regulation 2016/679 (GDPR).
transactions are attributed to the correct
Transaction 1 25Ƀ 5Ƀ people. The public key, when associated with Encrypted personal data can often still be
an individual, will likely qualify as personal traced back to a person if enough effort is put
data for the purposes of European data into it by experts or someone holds the key to
protection legislation. Some newer blockchain decryption. Therefore, encrypted data will often
technologies permit the public key not to be qualify as personal data and not as anonymous
Public key used Alice uses the
to confirm that same bitcoin published, which may alter the analysis. data. This means that in most instances the
-25Ƀ -5Ƀ
Alice Alice has used address and Alice privacy rules will be applicable to at least some
the correct public key for When the public key is visible, it could be
private key Transaction 2
of the data involved in blockchain systems.
possible to attain information that enables
an individual to be identified, either
Alice’s because it is held by the service provider
Bitcoin wallet
or because someone is able to connect a
containing her
Bitcoin address public key to an individual or organisation, The public key, when associated
(for example, through their IP address with an individual, will likely qualify
100Ƀ 75Ƀ 70Ƀ 70Ƀ or its connection with a website). At that
point, all transactions that the relevant as personal data.
Public key Private key Public key Private key
(known only to Alice) (identifiable individual has made are publicly available.
through Alice’s
transactions)
Elements of
Bitcoin address
8 Hogan Lovells A guide to blockchain and data protection 9

Article 29 Working Party considers in


Recent case law on the Hashing its Opinion 05/2014 that hashing is
a technique of pseudonymisation,
concept of personal data technology not anonymisation.

Blockchain technology relies on hashing, Opinion 05/2014 that hashing is a technique


The Court of Justice of the European The German Federal Court of Justice which consists of generating a code of a fixed of pseudonymisation, not anonymisation.
Union (CJEU) issued its final judgment referred the case to the CJEU asking: length for a given piece of digital information, According to the Article 29 Working Party,
in Case C-582/14 Patrick Breyer v regardless of its length. Hashing is important it is sufficient for a hash to permit records
Bundesrepublik Deutschland on 19 October a) whether dynamic IP addresses of because it permits someone to verify, by to be linked – the working group speaks of
2016 relating to dynamic IP addresses. website visitors constitute personal recalculating the hash that a given piece of “linkability” – for a piece of information to
data for website operators; and digital information is identical to the digital constitute personal data. Consequently a hash
The court’s assessment of what constitutes
b) whether a specific data protection information that was originally hashed. This that represents a person’s ID card or medical
‘personal data’ in this judgment will have a
provision of the German Telemedia Act, permits document authentication – proof record would likely be considered personal
general impact on how to define ‘personal
that basically precludes a justification that a given document is the same one as the data even though the hash itself is impossible
data’ in a blockchain environment. The GDPR
based on legitimate interests (Article 7(f) one that was originally hashed. This is an to reverse engineer into the original personal
has not changed the definition of personal
of the Directive), is in line with EU-law. important feature of many blockchain systems. information. By contrast, a hash that represents
data, so the conclusions in the Breyer case will
a bill of lading would not be considered
continue to apply in the context of the GDPR. The CJEU decided that dynamic IP addresses A hash cannot be reverse-engineered to
personal data, but for reasons linked to the
collected by an online media service provider discover the original document. The process
The CJEU ruled that dynamic IP addresses bill of lading, not to the hash as the bill of
only constitute personal data if the possibility only works in one direction, from the original
(temporary IP addresses assigned to a computing lading does not contain personal data.
to combine the address with data necessary document to the hash. Yet in spite of this,
device when it is connected to a network) may
to identify the user of a website held by a third the Article 29 Working Party considers in its
constitute ‘personal data’ even where only a
third party (in this case an internet service party (i.e. user’s internet service provider)
provider) has the additional data necessary constitutes a mean “likely reasonably to be used
Input
to identify the individual – but only under to identify” the individual or by a third party.
certain circumstances. The possibility of The court emphasised, in accordance Transaction A Transaction B Transaction C Transaction D
combining the data with this additional data with the opinion of the Advocate General, Transaction A
must constitute a “means likely reasonably that this would not be the case:
to be used to identify” the individual (the
court assumed such means for Germany). “if the identification of the data subject was
Hash value Hash value Hash value Hash value
prohibited by law or practically impossible Any length of data
#A #B #C #D
Patrick Breyer, a German national, took legal on account of the fact that it requires a
action against the Federal Republic of Germany disproportionate effort in terms of time, cost
as the operator of publicly accessible websites and man-power, so that the risk of identification Output #a
on which German public institutions supply appears in reality to be insignificant.”
topical information. He sought, based on data
The CJEU therefore assumed, subject Hash value Merkle tree Hash value
protection law, a prohibitory injunction against #DFCD #AB #CD
to the final assessment of the referring 24D9AEFE
the Federal Republic of Germany, as the website- 93B9
operator, because it stores IP addresses of visitors German Federal Court of Justice, that:
to their websites for cyber security reasons.
“the online media services provider has the
Unique hash value
means which may likely reasonably be used Timestamp
in order to identify the data subject, with
of fixed length Block 10# + Combined hash value #ABCD + nonce
the assistance of other persons, namely the
competent authority and the internet service Block 11

provider, on the basis of the IP addresses stored.” Block 10

Block 09

Block 08
10 Hogan Lovells A guide to blockchain and data protection 11

In a cross-border decentralised

Who is the data More than one party may


qualify as controller for one
Jurisdiction and blockchain environment, applicable
law will likely have to be analysed on
controller? category of processing. applicable law a transaction by transaction basis.

Usually when looking at data protection Under the GDPR, the obligations will not Blockchain may involve various computers have no establishment in the EU and do
compliance issues, the first step is only be directed at controllers, but also at that are located in different countries. It may not target EU residents. In a cross-border
to identify the roles of the different data processors. A data processor processes therefore not be immediately clear which rules decentralised blockchain environment,
parties involved. We need to ask: personal data on behalf of the controller. As the of which jurisdiction should be complied with. applicable law will likely have to be analysed
applicable requirements depend on whether on a transaction by transaction basis.
a) who are the data controllers (those As of 25 May 2018, applicability of the
a party is controller or processor for a certain
who determine the purposes and European privacy rules is expanded for Since data protection choice of law rules
category of processing, it remains important to
manner of processing, and have controllers without an establishment are different from contract choice of law
carefully assess the privacy roles of the parties
primary legal responsibility for in the EU. The GDPR applies to such rules, the data protection law applicable
involved with a blockchain network. Since
data protection compliance)? controllers if the processing concerns: to a transaction may not correspond to
many parties and processing categories may
the contractual law. Unlike contract law,
b) who are the data processors (those who be concerned, this may be a challenging task. a) the offering of goods or services to data
data protection law cannot be chosen by
process on behalf of the data controllers)? subjects in the EU (paid and unpaid); and
At one level, a blockchain network may the parties. The applicable law depends on
This is challenging in a distributed be compared to a decentralised cloud b) the monitoring of their behaviour as far as factors listed in Article 3 of the GDPR.
ledger scenario. computing system, whereby the operator their behaviour takes place within the EU.
Given the cross-border nature of blockchain,
of the cloud system is the data processor,
More than one party may qualify as Applicable law and jurisdiction are complicated and the GDPR’s broad territorial reach,
and the people uploading data to the cloud
controller for one category of processing (co- by the fact that a single blockchain system European data protection rules are likely to
are the data controllers. However, for many
controllership). Thus, more than one party may involve multiple data controllers apply to many blockchain-based transactions
blockchain systems, there is no central
to a blockchain network may be responsible located around the world, some of whom that have little or no connection to Europe.
operator or administrator of the system.
for compliance with the relevant privacy The system is operated by all its users
requirements. It will then depend on the in a peer-to-peer network environment.
sort of co-controllership at hand as to which This may mean that every participant
party should comply with which privacy in the blockchain is a data controller for
requirements. Governance agreements will
be needed among participants to define
himself, and a data processor for others.
Applicable law and jurisdiction
the responsibilities of each participant. are complicated by the fact that
a single blockchain system may
involve multiple data controllers
located around the world
European data protection
rules are likely to apply to
many blockchain-based
transactions that have little
or no connection to Europe.

Increased
enforcement
Under the GDPR, increased enforcement
– fines of up to EUR 20 million or
4% of the worldwide turnover of a
company – means the importance of
privacy compliance will only grow.

However, it will be difficult to apply the


enforcement provisions of the GDPR to
public blockchains which are not owned or
controlled by any individual person or firm.
14 Hogan Lovells A guide to blockchain and data protection 15

Data protection principles Right to erasure

As is the case in many cloud environments, Because of the great variety of uses, data One of the design features of blockchain d) The personal data was unlawfully processed
administrators of blockchain will not and configurations, generic blockchains will architecture is that transaction records (i.e. otherwise in breach of the GDPR).
necessarily know whether personal data not be able to build in privacy protections cannot be changed or deleted after-the-fact. A
subsequent transaction can always annul the e) The personal data has to be erased in order
are present on the blockchain, let alone adapted to the kind of data processed. At best,
first transaction, but the first transaction will to comply with a legal obligation.
whether the data are sensitive. As noted governance rules can regulate users of the
above, the blockchain will show hashes blockchain to respect data protection laws remain in the chain. f) The personal data is processed in relation
pointing to previous blocks, transaction when they upload personal data onto the to the offer of information society services
The GDPR recognises a right to erasure. The
data that may be encrypted and/or a hash blockchain. For special-purpose blockchains to a child.
broad principle underpinning this right is to
pointing to data stored off the chain. such as the MedRec system, governance rules
enable an individual to request the deletion Does erasure mean erasure?
can be much more developed, for example
For example, the MedRec blockchain, a or removal of personal data where there is no
by prohibiting users from uploading actual What constitutes “erasure” is still open to
system developed for managing patient compelling reason for its continued processing.
medical records to the blockchain itself. debate. Some data protection authorities have
medical records that uses the Ethereum
blockchain, allows management of sensitive Two main features of the blockchain are: When does the right to erasure apply? found that irreversible encryption constitutes
data – patient medical records – but the The right to erasure does not provide an erasure. In a blockchain environment, erasure
records themselves continue to be stored a) information transiting through the is technically impossible because the system
absolute ‘right to be forgotten’. Individuals
in hospital databases, off the chain. In the blockchain is visible to every node; and is designed to prevent it. However, smart
have a right to have personal data erased and to
case of MedRec, the system is designed for prevent processing in specific circumstances: contracts will contain mechanisms governing
b) information cannot be removed
medical records, so the designers of the system access rights. Therefore the smart contract
from the blockchain.
will not only know that personal data are a) Where the personal data is no longer can be used to revoke all access rights, thereby
involved, but also that the data are sensitive. These features clearly conflict with the necessary in relation to the purpose for making the content invisible to others, albeit
principle of data minimisation and the which it was originally collected/processed. not erased.
In many cases, a generic blockchain will be storage limitation. Indeed, making data
used by participants to register many different b) When the individual withdraws consent.
visible to every node could be considered
kinds of documents and transactions, involving excessive while perpetual storage of the c) W
 hen the individual objects to the processing
both non-personal data and personal data. data on the blockchain is clearly difficult to and there is no overriding legitimate interest
Like a social network, a generic blockchain reconcile with the storage limitation rules. for continuing the processing.
can host any kind of data uploaded by users.

Perpetual storage of data The right to erasure does


is difficult to reconcile with not provide an absolute
storage limitation rules ‘right to be forgotten’.
16 Hogan Lovells A guide to blockchain and data protection 17

Variety of Non-Permissioned
vs. Permissioned Blockchains
Hyperledger
Hyperledger is a hub for open industrial
blockchain systems With non-permissioned blockchain
applications, all parties are in principle
blockchain development; it is not a
company, a cryptocurrency, or a blockchain.
free to add information to the blockchain. Hyperledger provides technical knowledge,
With permissioned blockchain, on software frameworks and contacts to
the other hand, access is restricted. In industries and developers. The platform
this way, trusted intermediaries are aims to “create an enterprise-grade, open
There is no single model for blockchain systems. “Off-Chain” reintroduced into the system, which source distributed ledger framework and
Unlike the Internet, blockchain has no single impacts the allocation of control over it. code base” as well as creating, promoting
There have recently been some experiments
set of standards, meaning that the technology and maintaining an open infrastructure.
made on public blockchains by introducing
can be deployed in an almost infinite variety The party that determines the means and
“off-chain” mechanisms to store the confidential Hyperledger incubates and promotes a
of configurations. Each project will therefore the purposes for the processing should
information separately on another system range of business blockchain technologies,
have to be analysed on its own distinct merits. ensure that the privacy rules are taken into
with access control restrictions. To protect including distributed ledger frameworks,
account, meaning the choice between non-
Private vs. Public blockchains data and manage storage on the blockchain, smart contract engines, client libraries,
permissioned and permissioned control
some solutions use only a hash of personally graphical interfaces, utility libraries and
From a privacy perspective, it matters also influences which parties should
identifiable information (PII), which serves sample applications. One of the distributed
greatly whether the blockchain is generally comply with what privacy requirements.
as a reference point and link to an off-chain frameworks is called Hyperledger Fabric
accessible or only accessible to parties PII database. Storing information “off-
that are members of a closed group. For (“HLF”), which is an open-source project
chain” provides privacy of the transaction within the Hyperledger umbrella project. HLF
instance, this may influence the assessment details. The “off-chain” system can be set
of whether data is transferred to countries is a modular, general-purpose, permissioned
up to restrict access to the transaction blockchain system, which can also be seen as a
that do not ensure adequate protection. details to authorised parties only. distributed operating system for permissioned
On another level, it is possible that each party to However, storing information “off-chain” blockchains. (Source: www.hyperledger.org)
the blockchain network only has “access” to part also negates a number of the advantages of
of the information stored via the blockchain. using blockchain. The blockchain can no
As each party has its own copy of the entire longer be a single, shared source of truth
blockchain, restricted access is achieved via and in most cases both counterparties will
encryption. Depending on how this is given be required to maintain their own records.
substance, it may help to ensure compliance
with the relevant privacy requirements. “Sidechains”
Similar to debates in the cloud industry, Unlike “off-chain”, which generally stores
blockchain will raise the questions of the chosen information on a traditional
whether making a copy of a hash in, for network, but at the expense of the benefits
of using a blockchain, a “sidechain” is a Permissioned
example, Singapore means that data has Off-chain vs. Non-
been “transferred” to Singapore for purposes parallel blockchain. It sits alongside the permissioned
of data protection law. In some sense, primary blockchain, serving multiple users
data put on a public blockchain is similar and generally persisting permanently. The
Zero
to data posted to the public internet. degree of confidentiality and privacy provided Public vs.
Knowledge
for transactions that take place on sidechains private
Proofs
The reasoning in the CJEU’s Bodil Lindvist depends on what technology the sidechain uses.
case (C 101/01) may apply to the question
of transfer. The CJEU held that it cannot be These sidechains are independent. If they fail
or are hacked, they won’t damage other chains. Side chains
presumed that the word “transfer”, which
is not actually defined in the Directive, So damage will be limited within that chain.
was intended to cover the loading by an This has allowed people to use sidechains
individual of data onto an Internet page. to experiment with pre-release versions of
blockchain technologies and sidechains with
different permissions to the primary blockchain.
18 Hogan Lovells

ZKPs permit users to hide


the sender’s address, the
receiver’s address and the
transaction amount.
R3 Zero Knowledge Proofs
R3 is the largest consortium of global financial A zero knowledge proof (“ZKP”) is a
institutions working on developing commercial cryptographic technique which allows two
applications for the distributed ledger parties (a prover and a verifier) to prove that
technology. R3 has its own proprietary ledger a proposition is true, without revealing any
that can be used to develop applications, and information about that thing apart from it
it also supports an infrastructure network being true. A zk-SNARK (zero-knowledge
for financial services firms and technology Succinct Non-Interactive Arguments of
companies wanting to build their own Knowledge) is a ZKP that proves some
ledger-based applications and services. computation fact about data without
actually revealing the data. Zk-SNARKS
The blockchain technology that R3 is are the underlying cryptographic tool used
currently developing is a distributed ledger for verifying transactions in Zcash. This is
platform designed specifically for financial done while still protecting users’ privacy.
services, called Corda. The Corda network
is permissioned, with access controlled by a Zcash can be described as an encrypted
doorman. Communication between nodes is open, permissionless, replicated ledger.
point-to-point, instead of relying on global It is a cryptographic protocol for putting
broadcasts. Each network has a doorman private data on a public blockchain. Zcash
service that enforces rules regarding the uses zk-SNARKS to encrypt all of the data
information that nodes must provide and the and only gives decryption keys to authorised
know-your-customer processes that they must parties. Previously this could not be done
complete before being admitted to the network. on a public blockchain because if everything
was encrypted it would prevent miners
from checking to see if transactions were
valid. However ZKPs made this possible by
allowing the creator of a transaction to make
a proof that the transaction is true without
Access to Corda network is revealing the sender’s address, the receiver’s
controlled by a doorman. address and the transaction amount.

ZKPs and blockchains complement each


other – a blockchain is used to make sure
the entire network can agree on some
state that may or may not be encrypted,
whereas ZKPs allow you to be certain
about some properties in that state.
20 Hogan Lovells A guide to blockchain and data protection 21

Analysis of the Blockchain data protection


different systems impact assessments

Understanding the data on a traditional In addition, after a public key and the associated Under the GDPR a data protection impact design and default, to ensure that the system
(Bitcoin/Ethereum) blockchain. transactions are identified, there is no way assessment is required for processing, which does not pose a risk to the rights and liberties
to ‘erase’ the information as this information is likely to present a high risk to the rights and of individuals. A data protection impact
On each block of the blockchain there are
is now part of the blockchain and public freedoms of natural persons. Blockchain projects assessment will be required, particularly
two types of data: 1) a header that includes a
knowledge. With Bitcoin, the public key must be can be roughly divided into three categories: where the type of data involved is risky.
date stamp, the identity of the source of the
visible to avoid double spend issues and means
data (an address), and the previous block’s – Specialised blockchain systems designed As noted above, determining which law
that we are able to track transfers (ie. able to
header hash, called ‘the pointer’; and 2) the to process essentially non-personal applies will be challenging for systems that
see bitcoins coming in and bitcoins going out).
payload, which is the data to be stored. data, such as bills of lading, letters of process data from several continents.
Understanding the data on new blockchain credit, or diamond certificates;
The header is not encrypted, only the payload Non-specialised blockchains are likely to
is normally encrypted. The hash in the header technologies
– Specialised blockchain systems designed put the onus of compliance on the users
is of earlier blocks to create the immutable As mentioned above, some technologies to process personal data, such as proof of themselves, through terms of use that:
chain of blocks. The payload is generally a permit a greater degree of anonymity. identification, or even sensitive personal
description of the document (metadata) and Whether the degree of anonymity satisfies data such as medical records; a) prohibit posting of certain kinds
the hash representing the actual document. European standards under the CJEU’s Breyer of personal data; and
decision and the Article 29 Working Party – Non-specialised blockchain systems that
A smart contract would operate as follows: when can be used to process any form of data. b) r equire users to have consent or
Opinion is another matter. For example, Dash another legal basis for processing.
X wants to upload a new document description
encrypts public keys. While new blockchain A data protection impact assessment is likely
to the blockchain, the smart contract will create The data protection impact assessment
technologies using zero knowledge proofs - to be required for the second category of
a transaction by combining a description of the will need a robust technical analysis to
can verify transactions without details of the blockchain system, where processing personal
document and its hash to form a payload and show that the security of the system is at
transaction itself. However, the work involved data is the purpose of the system. In that case,
add a header. The header plus payload equals a least as robust, if not more robust, than
developing a proof is extensive and has regulators will expect the system to build in
transaction and a validated transaction equals traditional cloud-based systems.
significant computation costs. As a result, there privacy protections, via data protection by
a block. Upon validation of the block, the smart
are scalability challenges with these tools.
contract would then send the document itself to
the Y database system for storage. We assume The alternative could be to use a new public
that the Y database is off the blockchain and key, with the same private key for each
has limited access through the use of passwords transaction. However, this must be done
which can be time sensitive. The blockchain properly, would only be possible for some
transaction will be proof that the document public keys and would involve a key issuing
was uploaded at a given time, and anyone will authority (centralised, although there may be a
be able to verify that the document held in the number of these) that generates a different key
off-chain database is the same document as the for each transaction from a core private key.
one referred to in the blockchain transaction.
The mapping between the core key and
If using blockchain technology similar to Bitcoin transaction keys is never revealed to the other
or Ethereum, which are both public, open, participants – they only see the individual
transparent blockchains, where all transaction transactions keys. This is the approach being
details are visible on the blockchain, i.e. you can developed and used by Hyperledger Fabric.
see the public key, then we could identify an
individual by their transactions, assuming that
they use the same public key for each transaction.
22 Hogan Lovells A guide to blockchain and data protection 23

Hogan Lovells Engage:


Blockchain contacts blockchain tool
Take advantage of blockchain’s huge potential and
disruptive impact, while avoiding falling foul of ever-
developing regulatory and legal requirements.

Lewis Cohen
Partner, New York The Hogan Lovells Engage: Blockchain Toolkit lets you:
+1 212 918 3663
lewis.cohen@hoganlovells.com – investigate the different ways blockchain can be used
– see where the new technology is shaking up industries
Christian Mammen – track unfolding legal and regulatory approaches across jurisdictions
Partner, San Francisco
+1 415 374 2325 – use interactive functionality to download reports and share information
chris.mammen@hoganlovells.com
Get started now by registering on:

Winston Maxwell hlengage.com/blockchain


Partner, Paris
+33 1 53 67 48 47
winston.maxwell@hoganlovells.com

Theodore Mlynar
Partner, New York
+1 212 918 3272
ted.mlynar@hoganlovells.com

Mark Parsons
Partner, Hong Kong
+852 2840 5033
mark.parsons@hoganlovells.com

John Salmon
Partner, London
+44 20 7296 5071
john.salmon@hoganlovells.com
Alicante
Amsterdam
Baltimore
Beijing
Birmingham
Boston
Brussels
Budapest
Caracas
Colorado Springs
Denver
Dubai
Dusseldorf
Frankfurt
Hamburg
Hanoi
Ho Chi Minh City
Hong Kong
Houston
Jakarta
Johannesburg
London
Los Angeles
Louisville
Luxembourg
Madrid
Mexico City
Miami
Milan
Minneapolis
Monterrey
Moscow
Munich
New York
Northern Virginia
Paris
Perth
Philadelphia
Rio de Janeiro
Rome
San Francisco
São Paulo
Shanghai
Shanghai FTZ
Silicon Valley
Singapore
www.hoganlovells.com
Sydney
Tokyo “Hogan Lovells” or the “firm” is an international legal practice that includes Hogan Lovells
International LLP, Hogan Lovells US LLP and their affiliated businesses.
Ulaanbaatar
The word “partner” is used to describe a partner or member of Hogan Lovells
Warsaw International LLP, Hogan Lovells US LLP or any of their affiliated entities or any employee
or consultant with equivalent standing. Certain individuals, who are designated as
Washington, D.C. partners, but who are not members of Hogan Lovells International LLP, do not hold
qualifications equivalent to members.
Zagreb For more information about Hogan Lovells, the partners and their qualifications, see
www. hoganlovells.com.
Where case studies are included, results achieved do not guarantee similar outcomes
Our offices for other clients. Attorney advertising. Images of people may feature current or former
lawyers and employees at Hogan Lovells or models not connected with the firm.
Associated offices © Hogan Lovells 2016. All rights reserved. 11931_C4_0917

S-ar putea să vă placă și