Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11/9/2016
03:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

75,000 Data Protection Officers Needed By 2018 To Handle EU Law

US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.

The world only has about 18 months to find 75,000 data protection officers (DPOs).

According to the International Association of Privacy Professionals (IAPP), that's how many DPOs it will take to meet the mandates of the European Union's General Data Protection Regulation (GDPR) which goes into effect in May 2018 -- and two-thirds of them won't even be inside the EU.

The rigorous new privacy and security regulation mandates that public authorities and some companies must have a DPO, who is, by law, independent from the organization that funds the position. Data "controllers" or "processors," must designate a DPO if they conduct "regular and systemic monitoring of data subjects on a large scale," or if they do "processing on a large scale of special categories of data."

"Appointing a data protection officer is just the beginning," said IAPP VP of research and education Omer Tene, in a statement. "Organizations will need to ensure DPOs are well qualified and trained in the growing body of knowledge of the privacy profession, including law, technology and data management best practices.” 

Dark Reading's all-day virtual event Nov. 15 offers an in-depth look at myths surrounding data defense and how to put business on a more effective security path. 

 

The DPO requirement is just one of many components of the GDPR, which is much fiercer than earlier laws protecting European citizens' data privacy or any privacy laws in the US. The limitations on data use are stricter, the penalties for noncompliance are steeper, and the number of organizations that will have to comply are more numerous. For example, it's estimated that twice as many American companies will have to comply with GDPR than complied with the now-defunct Safe Harbor.

IAPP estimates that 9,000 US organizations will have to have a DPO to comply with the GDPR mandate. (More than just that 9,000 will have to comply with lesser elements of the law.) As the EU's largest trading partner, the US will need the most DPOs, but not far behind is China (7,568). Switzerland (3,682), Russia (3,068), and Turkey (2,045), which also need thousands apiece.

This demand for data protection officers, however, may not actually create new jobs. Nine out of 10 IAPP members surveyed said they would reassign an existing internal employee to take this position -- either making their current head of privacy the DPO or training someone else to do it.

The authors of the report acknowledge, however, that there may be a bias in this survey, because the respondents are already members of a privacy professionals organization, and thus their organizations' privacy departments are relatively mature. 

Mature or not, a separate GDPR readiness study released today by AvePoint and CIPL found that most organizations have a lot of work to do between now and May 2018. Three-quarters of organizations do not yet comply with the new GDPR requirements about consent (users granting consent for how data controllers and processors can use their personal data); 44% do not have procedures in place to identify and tag personal data, sensitive data, or other confidential information; and 39% of organizations do not understand the full lifecycle of the personal data that they hold. 

Nearly half of the respondents to the AvePoint/CIPL survey still have not yet decided if they will increase staff or budget to handle new GDPR requirements. Thirty percent have determined they will not invest in any new resources. However, 22.7% reported they were increasing headcount, 20.6% increasing internal budget, and 16.3 % adding external counsel budget. 

Related content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DougP559
50%
50%
DougP559,
User Rank: Apprentice
11/11/2016 | 6:26:05 PM
Re: If You Have European Customers...
Great article. You might also want to read another article. Do a Google search on "If You Have European Customers" because there are lots of other things to consider.

 
NicholasMeyler
100%
0%
NicholasMeyler,
User Rank: Apprentice
11/11/2016 | 6:11:59 PM
"Tokenization" Security Solutions for GDRP
Great article!  I have been working in this arena, lately, focused on these looming changes and trying to find potential buyers for Data and Privacy Security IP solutions which are now available and will provide multiple business models as solutions that can immediately be implemented.  This are available only through Nicholas Meyler and Wingate Dunross, Inc., currently.  Please feel free to contact me if interested.
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16395
PUBLISHED: 2019-09-17
GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.
CVE-2019-16396
PUBLISHED: 2019-09-17
GnuCOBOL 2.2 has a use-after-free in the end_scope_of_program_name() function in cobc/parser.y via crafted COBOL source code.
CVE-2019-16199
PUBLISHED: 2019-09-17
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
CVE-2019-16391
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php.
CVE-2019-16392
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.