Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

The Ohio Data Protection Act and HIPAA Compliance

Every day, there seems to be a new headline about another organization whose data security has been breached. It’s happening to big and small entities — even ones you wouldn’t expect. As cyberattacks become more and more sophisticated, the need to have a strong data protection plan in place becomes even more necessary.

For years, lawmakers have struggled to implement effective procedures that actually change the way organizations approach data security planning. Ohio is changing the game. The state recently passed the Ohio Data Protection Act (DPA), which is the first law that accomplishes the goal of offering organizations strategic incentives to comply with recommended cybersecurity practices. This act offers safe harbor against data breach claims for companies who implement, maintain, and comply with one of several approved programs, designed to protect against data breaches.

In the event of a breach, a company that has complied with the DPA can assert DPA compliance as a defense to any claim that may come up. This could have monumental positive effects for that company, as data breaches are often the root of sunken reputations, breaks in client trust, lawsuits, and heavy financial stress.

How does a business qualify for the DPA?

In order to receive the safe harbor promised to businesses that comply, a business must implement a written cybersecurity program that adheres to the following guidelines:

  • Protects the security and confidentiality of personal information
  • Protects against potential threats or hazards to the security or integrity of personal information
  • Protects against unauthorized access to and acquisition of personal information that is likely to result in a material risk of identity theft or fraud

The DPA also provides that the scale and scope of the business’s cybersecurity protection program should correspond with the following factors:

  • The company’s size and complexity
  • The nature and scope of its activities
  • The sensitivity of the personal information maintained by the company
  • The cost and availability of tools to improve information security
  • The resources available to the company

How does this relate to HIPAA compliance?

One of the requirements to qualify for the DPA is that the organization’s cybersecurity program “reasonably conforms” to one of the following frameworks:

  • National Institute of Standards and Technology’s (NIST) Cybersecurity Framework
  • NIST Special Publication 800-171 or Special Publications 800-53 and 800-53a 
  • Federal Risk and Authorization Management Program’s (FedRAMP) Security Assessment Framework 
  • Center for Internet Security’s Critical Security Controls for Effective Cyber Defense
  • International Organization for Standardization (ISO)/International Electrotechnical Commission’s (IEC) 27000 Family — Information Security Management Systems Standards

If the business in question accepts payment in the form of cards, then in order to qualify for the DPA, they must also comply with the Payment Card Industry’s Data Security Standards (PCI-DSS), in addition to one of the generally applicable frameworks mentioned above.

Similarly, there are many companies that are subject to certain state or federally-mandated sector-specific laws. These companies may also rely on the affirmative defense if they can prove that their organization conforms with additional security requirements, like those identified in the Health Insurance Portability and Accountability Act (HIPAA), Title V of the Gramm-Leach-Bliley Act (GLBA), the Federal Information Security Modernization Act (FISMA), or the Health Information Technology for Economic and Clinical Health Act (HITECH). 

So, if your organization is one that is required to adhere to sector-specific laws, HIPAA compliance may be part of DPA compliance as well.

How can Total HIPAA help?

Here at Total HIPAA, data safety and security is of utmost importance to us. We are a team of professionals with the knowledge and expertise to guide you toward a plan that will not only help you protect your business’s data, but its reputation as well. With the help of Total HIPAA, you can minimize your risk for a data breach and better understand what you need to do to stay up to date with all relevant procedures. 

If you would like to know more about our online HIPAA training or our customized compliance solution, HIPAA Prime, email info@totalhipaa.com today. Or, get started here.

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.

Download Now

Let's keep in touch

Stay up to date on the latest HIPAA news, plus receive tons of free tools and info.

Navigating HIPAA Compliance in 2023

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document

Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Comparing HIPAA and NIST

Comparing HIPAA and NIST

In the ever-evolving landscape of data security and privacy, two key frameworks have emerged as significant players: HIPAA and NIST. Both emphasize the importance of safeguarding sensitive...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)