Implementing EU Privacy Laws Requires 28,000 New Data Professionals

Companies across Europe will collectively need to appoint over 28,000 new data protection officers (DPOs) ahead the enforcement of the recently passed EU General Data Protection Regulation (GDPR) regulations in 2018, according to a new study.

The claims were made recently, on the 20 April, in a report by the International Association of Privacy Professionals (IAPP), which asserted that the sheer scale of the new requirements for data collection and processing in the EU means companies will have to appoint or contract a host of DPOs.  

The trade body cited Article 37 of GDPR, which requires controllers and processors of personal information (in both the public and private sector) to designate a data protection officer.

In particular those brands and agencies using programmatic advertising technologies will have to take heed of these warnings, as the same article also stipulates that this law applies to outfits whose “core activities” require “regular and systematic monitoring of data subjects on a large scale”.

The IAPP claims the GDPR regulations stipulate that DPOs in particular possess “expert knowledge of data protection law and practices”, plus the ability to fulfill the tasks designated under Article 39.

Key among the tasks of the touted 28,000 DPOs include: ensuring regulatory compliance; training staff on proper data handling; co-ordinating with regulators; plus an understanding of data processing risks.

The IAPP calculated the required number of DPOs based on an assessment of companies with a headcount of over 250 employees made available by Eurostat.

The Drum:

 

« Is Predictive Policing The Future?
As the Snowden Leaks Began… There Was "fear and panic" in The US Government. There Still Is. »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

A1QA

A1QA

A1QA specializes in the delivery of full-cycle software QA and application testing services.

Socama Group

Socama Group

Socama Group is an innovative firm providing high-value electronic payment and security solutions for enterprises and individuals.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.