Save or Share this Report

For Security & Risk Professionals

Job Description: Chief Privacy Officer

October 9, 2014

Primary author headshot

Authors

Why Read This Report

Customers around the globe have become highly sensitive to how organizations track, use, and store their personal data. As a result, a plethora of often-conflicting privacy laws has emerged in almost every country. As both privacy laws and data volumes explode, it's becoming an increasingly difficult task to both comply with regulations and prevent privacy infringements while supporting business innovation and expansion. The chief privacy officer (CPO) will weigh in not only on data security and privacy issues relating to customer data but also on corporate and employee data and agreements with third-party business partners. It's a role with great importance and influence as privacy issues and corporate responsibility dominate discussions regarding data collection, storage, and use. We designed this report to help security and risk (S&R) executives hire this increasingly important role in the organization. Since the chief information security officer (CISO) must work hand in hand with the CPO, S&R executives must help define the role responsibilities and job description and play a major role in candidate selection.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Privacy Is Not A Part-Time Job — You Need A CPO
  • The CPO Is A Business Leader
  • Hiring A CPO
  • WHAT IT MEANS

  • Plug Into Privacy To Better Manage Complexity And Data Security
  • Supplemental Material
  • Related Research Documents

Recommended Research