The New Ohio Data Protection Act & What it Means for Your Company’s Safety
For businesses who implement security measures, Ohio becomes the first state in the nation to implement a law that affords a data breach safe harbor - the Ohio Data Protection Act.
Not a week goes by without hearing about a new data breach. It’s becoming common knowledge that companies, both small and large, are facing the tough reality that it is no longer a matter of if, but really when a company will be affected by a data breach.
Over the years, lawmakers have struggled with constructing effective methods to strengthen the cybersecurity of organizations without mandating one-size-fits-all requirements, which makes it challenging. At the beginning of November, Senate Bill 220, also known as the Ohio Data Protection Act, was enacted into law in the state of Ohio—which represents the first law that accomplishes that goal.
Business entities are prime targets…and victims, of computer-network penetration and data theft. In addition to hackers, businesses also face significant threats originating from inside the organization as well.
Data breach incidents have increased in recent years both in frequency and severity. Attacks are becoming more sophisticated – from ransomware to phishing attacks, identify and data theft and more. Often, the financial consequences of a data breach are catastrophic especially considering the cost of potential downtime for the business. In addition to the loss of time and money caused by a breach, reputation is also another factor that is affected. Businesses may choose to steer clear of utilizing a vendor or partner who has had a significant breach.
The easiest way to get in front of a breach and work to prevent one from happening is to have a strategy in place to protect your business. Now, with the help of Ohio’s new Data Protection Act, there are even legal incentives for putting those safeguard policies in place.
What is the Ohio Data Protection Act?
To incentivize companies to adopt appropriate cybersecurity protections, Ohio enacted the Data Protection Act (DPA). Specifically, the law gives companies a safe harbor against data breach claims for companies who implement, maintain, and comply with one of several industry-recognized cybersecurity programs.
The major benefit of being a compliant business is the new affirmative defense to legal claims that frequently result from cybersecurity breaches. In the event of an attack, a DPA compliant business can assert DPA compliance as a defense to any claim resulting from the breach, which could save businesses from the costs of court judgments and prolonged litigation. This way, companies can use compliance with an established, credible, written policy as a shield against cybersecurity claims in the state of Ohio.
Included in the text of the DPA, it states the act does not “create a minimum cybersecurity standard that must be achieved” or “impose liability upon businesses that do not obtain or maintain practices in compliance with the act.” Instead, the DPA endeavors “to be an incentive and to encourage businesses to achieve a higher level of cybersecurity through voluntary action.”
How to Qualify
In order to qualify for the safe harbor (Senate Bill 220), a business must implement a written cybersecurity program that:
- Protects the security and confidentiality of personal information
- Protects against anticipated threats or hazards to the security or integrity of personal information
- Protect against unauthorized access to and acquisition of data
The scale and scope of the company’s cybersecurity program should be based on these factors:
- The company’s size and complexity
- The nature and scope of its activities
- The sensitivity of the personal information maintained by the company
- The cost and availability of tools to improve information security
- The resources available to the company
The Act also requires each cybersecurity program to “reasonably conform” to one of the following frameworks:
- National Institute of Standards and Technology’s (NIST) Cybersecurity Framework
- NIST Special Publication 800-171 or Special Publications 800-53 and 800-53a
- Federal Risk and Authorization Management Program’s (FedRAMP) Security Assessment Framework
- Center for Internet Security’s Critical Security Controls for Effective Cyber Defense
- International Organization for Standardization (ISO)/International Electrotechnical Commission’s (IEC) 27000 Family – Information Security Management Systems Standards
- For businesses that accept payment cards – must also comply with the Payment Card Industry’s Data Security Standards (PCI-DSS) in addition to one of the frameworks listed above
The DPA is the first law in the country to provide incentives to businesses to implement certain cybersecurity controls through the utilization of an affirmative defense to liability in the wake of a data breach. With that said, these laws will be a work in progress. The act does not provide any additional information yet, regarding how a company can successfully establish that its cybersecurity plan “reasonably conforms” with one of the listed frameworks. However, this cybersecurity law is a new opening for organizations of all sizes who want to limit their liability in case of a data breach, and this work is still providing great value to companies – you can’t go wrong with making the effort to be more secure in your business and establish better policies.
How Interlink Can Help
Implementing a robust cybersecurity management program can effectively minimize the risk of falling victim to an attack…but it can be a big job if you don’t know where to start or what to do next. Interlink’s consultants are experts in security and compliance – we have the knowledge and experience to help you devise a plan. Contact us today to see how we can help you on the path to achieving the protection the DPA promises.
Interested in learning more? View our similar blog: ON-DEMAND WEBINAR | Security on a Tight Budget.
About the author
Matt Scherocman brings more than 15 years of experience in the information technology industry to Interlink. His experience includes both the system integrator and manufacturer sides of the business. During his time at the Microsoft Corporation he was responsible for all the Large Account Reseller (LAR) relationships in the four-state Heartland Area of Michigan, Ohio, Kentucky, and Tennessee. Prior to Microsoft, Scherocman led a Cincinnati -based IT consulting company to grow 5000% and become a Microsoft Worldwide Partner of the Year. He is actively involved in the strategic vision and operation decisions of the company including finance, selling strategy and marketing. Matt holds a Bachelor of Science in Business degree from Miami University and is a Certified Expert in Microsoft licensing including speaking engagements at both Microsoft's Worldwide Partner Conference and Channel Partner Summit. He is a frequent contributor to leading industry publications.
How Office 365 Advanced Threat Protection’s New Anti-Impersonation Features Help Defend Against Phishing Attacks
3 Ways Microsoft’s Compliance Manager Helps Meet Regulatory and Data Protection Requirements
Stay Ahead of the Evolving Threat Landscape with Office 365 Advanced Threat Protection (ATP)
Welcome to the Interlink Cloud Blog
By subscribing to the blog, you will be notified whenever a new blog post is created on the site.
All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
- April 2023 (2)
- March 2023 (7)
- February 2023 (2)
- January 2023 (4)
- December 2022 (2)
- November 2022 (3)
- October 2022 (1)
- September 2022 (3)
- August 2022 (5)
- July 2022 (2)
- June 2022 (8)
- May 2022 (2)
- April 2022 (2)
- January 2022 (4)
- November 2021 (2)
- October 2021 (5)
- September 2021 (1)
- August 2021 (4)
- July 2021 (5)
- June 2021 (2)