Careers & People
11/9/2016
03:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

75,000 Data Protection Officers Needed By 2018 To Handle EU Law

US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.

The world only has about 18 months to find 75,000 data protection officers (DPOs).

According to the International Association of Privacy Professionals (IAPP), that's how many DPOs it will take to meet the mandates of the European Union's General Data Protection Regulation (GDPR) which goes into effect in May 2018 -- and two-thirds of them won't even be inside the EU.

The rigorous new privacy and security regulation mandates that public authorities and some companies must have a DPO, who is, by law, independent from the organization that funds the position. Data "controllers" or "processors," must designate a DPO if they conduct "regular and systemic monitoring of data subjects on a large scale," or if they do "processing on a large scale of special categories of data."

"Appointing a data protection officer is just the beginning," said IAPP VP of research and education Omer Tene, in a statement. "Organizations will need to ensure DPOs are well qualified and trained in the growing body of knowledge of the privacy profession, including law, technology and data management best practices.” 

Dark Reading's all-day virtual event Nov. 15 offers an in-depth look at myths surrounding data defense and how to put business on a more effective security path. 

 

The DPO requirement is just one of many components of the GDPR, which is much fiercer than earlier laws protecting European citizens' data privacy or any privacy laws in the US. The limitations on data use are stricter, the penalties for noncompliance are steeper, and the number of organizations that will have to comply are more numerous. For example, it's estimated that twice as many American companies will have to comply with GDPR than complied with the now-defunct Safe Harbor.

IAPP estimates that 9,000 US organizations will have to have a DPO to comply with the GDPR mandate. (More than just that 9,000 will have to comply with lesser elements of the law.) As the EU's largest trading partner, the US will need the most DPOs, but not far behind is China (7,568). Switzerland (3,682), Russia (3,068), and Turkey (2,045), which also need thousands apiece.

This demand for data protection officers, however, may not actually create new jobs. Nine out of 10 IAPP members surveyed said they would reassign an existing internal employee to take this position -- either making their current head of privacy the DPO or training someone else to do it.

The authors of the report acknowledge, however, that there may be a bias in this survey, because the respondents are already members of a privacy professionals organization, and thus their organizations' privacy departments are relatively mature. 

Mature or not, a separate GDPR readiness study released today by AvePoint and CIPL found that most organizations have a lot of work to do between now and May 2018. Three-quarters of organizations do not yet comply with the new GDPR requirements about consent (users granting consent for how data controllers and processors can use their personal data); 44% do not have procedures in place to identify and tag personal data, sensitive data, or other confidential information; and 39% of organizations do not understand the full lifecycle of the personal data that they hold. 

Nearly half of the respondents to the AvePoint/CIPL survey still have not yet decided if they will increase staff or budget to handle new GDPR requirements. Thirty percent have determined they will not invest in any new resources. However, 22.7% reported they were increasing headcount, 20.6% increasing internal budget, and 16.3 % adding external counsel budget. 

Related content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DougP559
50%
50%
DougP559,
User Rank: Apprentice
11/11/2016 | 6:26:05 PM
Re: If You Have European Customers...
Great article. You might also want to read another article. Do a Google search on "If You Have European Customers" because there are lots of other things to consider.

 
NicholasMeyler
100%
0%
NicholasMeyler,
User Rank: Apprentice
11/11/2016 | 6:11:59 PM
"Tokenization" Security Solutions for GDRP
Great article!  I have been working in this arena, lately, focused on these looming changes and trying to find potential buyers for Data and Privacy Security IP solutions which are now available and will provide multiple business models as solutions that can immediately be implemented.  This are available only through Nicholas Meyler and Wingate Dunross, Inc., currently.  Please feel free to contact me if interested.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.