State and Federal Cybersecurity Related Laws
Cuyahoga County – Administrative Code and Ordinances
- Officials: Roster of Officials (cuyahogacounty.us)
- Organizational Chart: Organizational Chart (cuyahogacounty.us)
- Administrative Rules: Chapter 113- Administrative Rules (cuyahogacounty.us)
- Ethics: Title 4- Ethics (cuyahogacounty.us)
- Personal Policies and Procedures: Chapter 302- Personnel Policies & Procedures (cuyahogacounty.us) – Section 302.01
- Risk Management Procedures: Chapter 507- Risk Management Procedures (cuyahogacounty.us)
- Department of Information Technology – County Code and Authority: Chapter 202- County Executive and Departments (cuyahogacounty.us) – Section 202.15
- Department of Information Technology – Purchasing: Chapter 501- Contracts and Purchasing Procedures (cuyahogacounty.us) – Section 501.11
- Technology Advisory Committee (TAC): The primary forum to ensure that proposed IT related purchases, contracts and services comply with current IT standards and strategy adopted by Cuyahoga County. TAC directs the utilization of technology based on current and emerging industry growth in alignment with the County’s operational, business, and strategic objectives – more information: Cuyahoga County Boards & Commissions
- Electronic Equipment and Communication Policy (Acceptable Use): Chapter 302- Personnel Policies & Procedures (cuyahogacounty.us) – Section 302.03
- Public Records: Chapter 106- Public Records (cuyahogacounty.us)
- Records Commission: Cuyahoga County Boards & Commissions
- Electronic Delivery and Signature: Chapter 110- Electronic Delivery and Execution of Legislation, Contracts, and other Instruments and Documents (cuyahogacounty.us)
- Consumer Protection: Chapter 1301- Consumer Protection (cuyahogacounty.us)
- Audit Committee: Audit Committee - Cuyahoga County Boards & Commissions
State of Ohio – Laws and Directives
- Data Breach: Private disclosure of security breach of computerized personal information data Section 1349.19 - Ohio Revised Code | Ohio Laws
- Personally Identifiable Information (PII): Chapter 1347 - Ohio Revised Code | Ohio Laws
- Ohio Data Protection Act (Safe Harbor): Chapter 1354 - Ohio Revised Code | Ohio Laws
- Ohio Bar References: Ohio’s Data Protection Act (ohiobar.org)
- Recognized Cybersecurity Frameworks: NIST 800-171, NIST 800-53, FedRAMP, CIS Critical Security Controls, ISO-27000 Family, HIPAA security requirements, GLBA, FISMA, HITECH, and PCI-DSS; as defined in Section 1354.03 - Ohio Revised Code | Ohio Laws
- Uniform Electronic Transactions Act: Related to blockchain technology for electronic records Chapter 1306 - Ohio Revised Code | Ohio Laws
- Public Records Law: Section 149.33 - Ohio Revised Code | Ohio Laws
- Ohio Sunshine References: Sunshine Laws - Ohio Attorney General Dave Yost
- Case Law:
- Data Privacy - Templeton v. Fred. W. Albrecht Grocery Co.
Federal – Laws and Directives
- The National Cyber Incident Response Plan (NCIRP): The NCIRP describes a national approach to dealing with cyber incidents; addresses the important role that the private sector, state and local governments, and multiple federal agencies play in responding to incidents and how the actions of all fit together for an integrated response.
- Cyber Incident Reporting Act of 2022: The Cyber Incident Reporting Act imposes four primary reporting and related requirements on “covered entities” in the event of a “covered cyber incident” or a ransomware payment.
- Presidential Policy Directive - Critical Infrastructure and Resilience (PPD-21): An infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure into 16 specific sectors.
- Executive Order 13636 (Improving Critical Infrastructure Cybersecurity): Directed the Executive Branch to (1) Develop a technology-neutral voluntary cybersecurity framework, (2) Promote and incentivize the adoption of cybersecurity practices, (3) Increase the volume, timeliness and quality of cyber threat information sharing, (4) Incorporate strong privacy and civil liberties protections into every initiative to secure our critical infrastructure, and (5) Explore the use of existing regulation to promote cyber security.
- Cybersecurity Enhancement Act of 2014: Mends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.
- NIST Cybersecurity Framework (CSF): Recognizing the national and economic security of the United States depends on the reliable function of critical infrastructure, the President issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. The Order directed NIST to work with stakeholders to develop a voluntary framework – based on existing standards, guidelines, and practices - for reducing cyber risks to critical infrastructure. The Cybersecurity Enhancement Act of 2014 reinforced NIST’s EO 13636 role.
- CISA Emergency and Binding Directives: Develops and oversees the implementation of “binding operational directives” and “emergency directives,” which require action on the part of certain federal agencies in the civilian Executive Branch.
- Fair Credit Reporting Act: Protects information collected by consumer reporting agencies such as credit bureaus, medical information companies and tenant screening services.
- Children’s Online Privacy Protection Rule (COPPA): Imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.
- Traffic Light Protocol (TLP) Sharing Threat Information: Facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).
- Rules for Commercial Email – CAN SPAM ACT: Sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.
- Computer Fraud and abuse Act (CFAA): A United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. The law prohibits accessing a computer without authorization, or in excess of authorization. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.
- Freedom of Information Act: The basic function of the Freedom of Information Act is to ensure informed citizens, vital to the functioning of a democratic society.
- Health Insurance Portability and Accountability Act of 1996 (HIPAA): Federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule - more information on HIPAA
- Sarbanes-Oxley Act of 2002: The Act contains provisions affecting corporate governance, risk management, auditing, and financial reporting of public companies, including provisions intended to deter and punish corporate accounting fraud and corruption – more information on the Sarbanes-Oxley Act
- Gramm-Leach-Bililey Act (GLBA): Requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
How could we make it better? Leaving an email can assist us in troubleshooting the issue.
Thank you for your feedback
Your feedback means a lot to us. We use it to improve the experience of all of our users.