Browse Definitions :
Definition

data protection officer (DPO)

A data protection officer (DPO) is an enterprise security position tasked with ensuring that data management and handling are compliant with the European Union’s General Data Protection Regulations (GDPR).

A DPO is tasked with enforcing the regulations of the GDPR and is also responsible for the general strategy for the protection of data. In cases where a data subject must be contacted by law, a DPO would make the contact.

The GDPR necessitates a DPO for the oversight of any company handling large amounts of EU citizens' private data. The GDPR does not mandate any specific certifications for DPOs but does require that they are experts in data protection practice and law. DPOs are required to be experts in data processing and knowledgeable about the protection required for the type of data handled. A DPO can come from a company’s existing staff, and a single officer may work for a company’s related institutions as well.

The responsibilities of a DPO include:

  • Training management and staff (including possible outsourced data entry staff) on data protection regulation requirements.
  • Assessing compliance requirements adherence and addressing infractions.
  • Serving as a contact to GDPR supervisors.
  • Tracking performance and advising on likely results of data protection measures.
  • Maintaining records of data protection efforts and the reasons they were implemented, in case of public request.
  • Informing data subjects about how their data is being used, protection measures safeguarding their data and their right to be forgotten.

Although the United Kingdom is set to leave the EU in March 2019, GDPR requirements will have to be followed when dealing with EU citizens' data. Companies will be required hire a DPO before the GDPR is effective in May 2018. Hiring sooner is advisable to get the most qualified individuals, as demand will increase as the deadline looms nearer.

This was last updated in October 2017

Continue Reading About data protection officer (DPO)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • attack vector

    An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close