Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11/9/2016
03:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

75,000 Data Protection Officers Needed By 2018 To Handle EU Law

US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.

The world only has about 18 months to find 75,000 data protection officers (DPOs).

According to the International Association of Privacy Professionals (IAPP), that's how many DPOs it will take to meet the mandates of the European Union's General Data Protection Regulation (GDPR) which goes into effect in May 2018 -- and two-thirds of them won't even be inside the EU.

The rigorous new privacy and security regulation mandates that public authorities and some companies must have a DPO, who is, by law, independent from the organization that funds the position. Data "controllers" or "processors," must designate a DPO if they conduct "regular and systemic monitoring of data subjects on a large scale," or if they do "processing on a large scale of special categories of data."

"Appointing a data protection officer is just the beginning," said IAPP VP of research and education Omer Tene, in a statement. "Organizations will need to ensure DPOs are well qualified and trained in the growing body of knowledge of the privacy profession, including law, technology and data management best practices.” 

Dark Reading's all-day virtual event Nov. 15 offers an in-depth look at myths surrounding data defense and how to put business on a more effective security path. 

 

The DPO requirement is just one of many components of the GDPR, which is much fiercer than earlier laws protecting European citizens' data privacy or any privacy laws in the US. The limitations on data use are stricter, the penalties for noncompliance are steeper, and the number of organizations that will have to comply are more numerous. For example, it's estimated that twice as many American companies will have to comply with GDPR than complied with the now-defunct Safe Harbor.

IAPP estimates that 9,000 US organizations will have to have a DPO to comply with the GDPR mandate. (More than just that 9,000 will have to comply with lesser elements of the law.) As the EU's largest trading partner, the US will need the most DPOs, but not far behind is China (7,568). Switzerland (3,682), Russia (3,068), and Turkey (2,045), which also need thousands apiece.

This demand for data protection officers, however, may not actually create new jobs. Nine out of 10 IAPP members surveyed said they would reassign an existing internal employee to take this position -- either making their current head of privacy the DPO or training someone else to do it.

The authors of the report acknowledge, however, that there may be a bias in this survey, because the respondents are already members of a privacy professionals organization, and thus their organizations' privacy departments are relatively mature. 

Mature or not, a separate GDPR readiness study released today by AvePoint and CIPL found that most organizations have a lot of work to do between now and May 2018. Three-quarters of organizations do not yet comply with the new GDPR requirements about consent (users granting consent for how data controllers and processors can use their personal data); 44% do not have procedures in place to identify and tag personal data, sensitive data, or other confidential information; and 39% of organizations do not understand the full lifecycle of the personal data that they hold. 

Nearly half of the respondents to the AvePoint/CIPL survey still have not yet decided if they will increase staff or budget to handle new GDPR requirements. Thirty percent have determined they will not invest in any new resources. However, 22.7% reported they were increasing headcount, 20.6% increasing internal budget, and 16.3 % adding external counsel budget. 

Related content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DougP559
50%
50%
DougP559,
User Rank: Apprentice
11/11/2016 | 6:26:05 PM
Re: If You Have European Customers...
Great article. You might also want to read another article. Do a Google search on "If You Have European Customers" because there are lots of other things to consider.

 
NicholasMeyler
100%
0%
NicholasMeyler,
User Rank: Apprentice
11/11/2016 | 6:11:59 PM
"Tokenization" Security Solutions for GDRP
Great article!  I have been working in this arena, lately, focused on these looming changes and trying to find potential buyers for Data and Privacy Security IP solutions which are now available and will provide multiple business models as solutions that can immediately be implemented.  This are available only through Nicholas Meyler and Wingate Dunross, Inc., currently.  Please feel free to contact me if interested.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8423
PUBLISHED: 2020-04-02
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
CVE-2019-14868
PUBLISHED: 2020-04-02
In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those env...
CVE-2019-20635
PUBLISHED: 2020-04-02
codeBeamer before 9.5.0-RC3 does not properly restrict the ability to execute custom Java code and access the Java class loader via computed fields.
CVE-2020-11452
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 includes functionality to allow users to import files or data from external resources such as URLs or databases. By providing an external URL under attacker control, it's possible to send requests to external resources (aka SSRF) or leak files from the local system using the f...
CVE-2020-11453
PUBLISHED: 2020-04-02
Microstrategy Web 10.4 is vulnerable to Server-Side Request Forgery in the Test Web Service functionality exposed through the path /MicroStrategyWS/. The functionality requires no authentication and, while it is not possible to pass parameters in the SSRF request, it is still possible to exploit it ...