Nexigen: Your Guide in Ohio Data Protection Compliance

Table of Contents

By /Published On: August 9th, 2023/Categories: Cyber Security, fortinet/2 min read/

Share This Story, Choose Your Platform!

If you’re collaborating with an IT service provider like Nexigen, rest assured that you don’t need to be an expert in current data protection regulations—we’ve got that covered for you. However, it’s crucial to understand the requirements of Ohio’s Safe Harbor Act to ensure that your cyber security insurance contract aligns with “reasonable” cyber security controls.

Back in 2018, the State of Ohio introduced the Ohio Data Protection Act (SB 220), also known as the Safe Harbor Act, which mandates businesses to establish and maintain “reasonable” cyber security controls. Utah and Connecticut followed suit in 2021.

The primary aim of this act is to safeguard the security and integrity of personal information against potential threats and unauthorized access, which could lead to identity theft.

Tech Beacon highlights that the law’s protections are specifically limited to certain types of tort claims. Even businesses with robust cyber security programs may remain susceptible to statutory violations such as data breach notification requirements or contract-based claims.

According to Tech Republic, the law allows businesses to choose a suitable framework based on their unique needs.

The Ohio law requires cyber security programs to be adequate considering factors like available resources, business size and complexity, nature of activities, sensitivity of information, and tools’ cost and availability to enhance security.

Compliance in Action

So, what does this mean in simple terms?

Eric Thal, Managed IT & Cybersecurity Manager at Blue Technologies, Inc., highlighted in a SmartBusiness article that aligning with established frameworks like The National Institute of Standards and Technology (NIST) Cybersecurity Framework triggers safe harbor protection. Your company doesn’t need to be flawless, but it should demonstrate good intent to adhere to a recognized framework.

Thal emphasized that implementing multi-factor authentication (MFA) adds an extra layer of security. Endpoint detection and response (EDR) solutions are essential for breach prevention and monitoring, while third-party email security solutions guard against suspicious emails.

Investing in security awareness training, well-practiced incident response plans, and annual tabletop exercises empower employees and ensure preparedness. Penetration tests, conducted by third-party experts, provide an unbiased evaluation of security measures in alignment with NIST guidelines.

The Cost of Noncompliance

Failure to adhere to Safe Harbor Act guidelines exposes companies to legal repercussions and reputational damage in the event of a breach. Financial consequences, loss of credit card processing abilities, and reduced insurance coverage eligibility are potential outcomes. Furthermore, damage to brand reputation has tangible effects on the bottom line.

The journey toward cyber security is ongoing. Partnering with a trusted third-party provider like Nexigen ensures compliance with regulatory requirements. An experienced IT partner monitors changes in laws and takes necessary actions, guaranteeing your business’s security and compliance.

With Nexigen, you can focus on your core operations while we ensure that your data protection is up to date. We keep watch and adapt as regulations evolve.

Request Your Free Consultation

Want to learn more about integrating Nexigen IT support services for your business?

  • Schedule a 30-minute consultation with our expert team

  • Review your personalized IT roadmap

  • Refine services and add-ons to finalize your predictable, no-waste plan

  • Breathe. You’ve got IT under control.

Complete the form below, and we’ll be in touch to schedule a free assessment.

First Name(Required)
This field is for validation purposes and should be left unchanged.