Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11/9/2016
03:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

75,000 Data Protection Officers Needed By 2018 To Handle EU Law

US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.

The world only has about 18 months to find 75,000 data protection officers (DPOs).

According to the International Association of Privacy Professionals (IAPP), that's how many DPOs it will take to meet the mandates of the European Union's General Data Protection Regulation (GDPR) which goes into effect in May 2018 -- and two-thirds of them won't even be inside the EU.

The rigorous new privacy and security regulation mandates that public authorities and some companies must have a DPO, who is, by law, independent from the organization that funds the position. Data "controllers" or "processors," must designate a DPO if they conduct "regular and systemic monitoring of data subjects on a large scale," or if they do "processing on a large scale of special categories of data."

"Appointing a data protection officer is just the beginning," said IAPP VP of research and education Omer Tene, in a statement. "Organizations will need to ensure DPOs are well qualified and trained in the growing body of knowledge of the privacy profession, including law, technology and data management best practices.” 

Dark Reading's all-day virtual event Nov. 15 offers an in-depth look at myths surrounding data defense and how to put business on a more effective security path. 

 

The DPO requirement is just one of many components of the GDPR, which is much fiercer than earlier laws protecting European citizens' data privacy or any privacy laws in the US. The limitations on data use are stricter, the penalties for noncompliance are steeper, and the number of organizations that will have to comply are more numerous. For example, it's estimated that twice as many American companies will have to comply with GDPR than complied with the now-defunct Safe Harbor.

IAPP estimates that 9,000 US organizations will have to have a DPO to comply with the GDPR mandate. (More than just that 9,000 will have to comply with lesser elements of the law.) As the EU's largest trading partner, the US will need the most DPOs, but not far behind is China (7,568). Switzerland (3,682), Russia (3,068), and Turkey (2,045), which also need thousands apiece.

This demand for data protection officers, however, may not actually create new jobs. Nine out of 10 IAPP members surveyed said they would reassign an existing internal employee to take this position -- either making their current head of privacy the DPO or training someone else to do it.

The authors of the report acknowledge, however, that there may be a bias in this survey, because the respondents are already members of a privacy professionals organization, and thus their organizations' privacy departments are relatively mature. 

Mature or not, a separate GDPR readiness study released today by AvePoint and CIPL found that most organizations have a lot of work to do between now and May 2018. Three-quarters of organizations do not yet comply with the new GDPR requirements about consent (users granting consent for how data controllers and processors can use their personal data); 44% do not have procedures in place to identify and tag personal data, sensitive data, or other confidential information; and 39% of organizations do not understand the full lifecycle of the personal data that they hold. 

Nearly half of the respondents to the AvePoint/CIPL survey still have not yet decided if they will increase staff or budget to handle new GDPR requirements. Thirty percent have determined they will not invest in any new resources. However, 22.7% reported they were increasing headcount, 20.6% increasing internal budget, and 16.3 % adding external counsel budget. 

Related content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DougP559
50%
50%
DougP559,
User Rank: Apprentice
11/11/2016 | 6:26:05 PM
Re: If You Have European Customers...
Great article. You might also want to read another article. Do a Google search on "If You Have European Customers" because there are lots of other things to consider.

 
NicholasMeyler
100%
0%
NicholasMeyler,
User Rank: Apprentice
11/11/2016 | 6:11:59 PM
"Tokenization" Security Solutions for GDRP
Great article!  I have been working in this arena, lately, focused on these looming changes and trying to find potential buyers for Data and Privacy Security IP solutions which are now available and will provide multiple business models as solutions that can immediately be implemented.  This are available only through Nicholas Meyler and Wingate Dunross, Inc., currently.  Please feel free to contact me if interested.
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13623
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
CVE-2019-13624
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
CVE-2019-13625
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
CVE-2019-3571
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2019-6160
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.