Home
%3CLINGO-SUB%20id%3D%22lingo-sub-482899%22%20slang%3D%22en-US%22%3EHow%20Microsoft%20can%20help%20organizations%20differentiate%20with%20the%20new%20Ohio%20Data%20Protection%20Act%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482899%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EToday%E2%80%99s%20post%20was%20written%20by%20Alonzo%20Barber%2C%20Senior%20Attorney%20-%20Corporate%2C%20External%2C%20and%20Legal%20Affairs%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOhio%20recently%20enacted%20the%20Ohio%20Data%20Protection%20Act%20(%E2%80%9CODPA%E2%80%9D)%2C%20the%20first%20legislation%20of%20its%20kind%20in%20the%20United%20States.%26nbsp%3B%20The%20law%20provides%20a%20comprehensive%20legal%20incentive%20for%20cybersecurity%20investment%20and%20may%20be%20a%20game%20changer%20to%20the%20technology%20and%20legal%20landscape%20for%20Ohio%20businesses.%20The%20Ohio%20State%20and%20Cleveland%20Marshall%20Schools%20of%20Law%20%3CA%20href%3D%22https%3A%2F%2Fmoritzlaw.osu.edu%2Fdata-and-governance%2Fwp-content%2Fuploads%2Fsites%2F105%2F2019%2F03%2Fcybersecurity-whitepaper-32819F-1.pdf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epublished%20a%20white%20paper%20analysis%20of%20the%20ODPA%3C%2FA%3E.%26nbsp%3B%20The%20whitepaper%20specifically%20calls%20out%20the%20important%20role%20that%20cloud%20service%20providers%2C%20like%20Microsoft%2C%20can%20play%20to%20enable%20businesses%20to%20avail%20themselves%20of%20the%20benefits%20of%20the%20ODPA%20through%20a%20shared%20responsibility%20model%20for%20protecting%20data.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20response%20to%20the%20white%20paper%20provides%20an%20overview%20of%20Microsoft%E2%80%99s%20commitment%20to%20compliance%2C%20privacy%20and%20security%20of%20our%20customer%E2%80%99s%20data.%20Also%20included%20below%20are%20highlights%20to%20several%20tools%20and%20resources%20that%20Information%20Technology%20Professionals%20can%20use%20to%20build%20and%20manage%20a%20robust%20cyber%20security%20framework%20within%20their%20organization%20to%20allow%20them%20to%20take%20full%20advantage%20of%20the%20protections%20under%20the%20ODPA.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EWhat%20is%20the%20ODPA%3C%2FU%3E%3C%2FP%3E%0A%3CP%3EThe%20Ohio%20Data%20Protection%20Act%20is%20unique%20among%20state%20laws%20seeking%20to%20improve%20data%20security.%20Instead%20of%20setting%20minimum%20cybersecurity%20standards%20or%20imposing%20new%20penalties%2C%20the%20ODPA%20provides%20an%20incentive%20for%20businesses%20to%20create%2C%20maintain%2C%20and%20comply%20with%20a%20cybersecurity%20program%20that%20conforms%20to%20industry%20best%20practices.%26nbsp%3B%20The%20law%20does%20this%20by%20providing%20an%20affirmative%20defense%20for%20tort%20claims%20arising%20out%20of%20a%20data%20breach%2C%20brought%20in%20an%20Ohio%20court%20or%20under%20Ohio%20law%2C%20if%20that%20business%20can%20show%20reasonable%20conformity%20to%20one%20of%20the%20ten%20cyber%20security%20frameworks%20enumerated%20in%20the%20legislation%3CA%20name%3D%22_ftnref1%22%20href%3D%22https%3A%2F%2Fmicrosoft-my.sharepoint.com%2Fpersonal%2Falonzob_microsoft_com%2FDocuments%2FEPG%2FTraining%2520resources%2FOhio%2520Whitepaper%2520Response%2520final%2520-%2520for%2520Compliance%2520Blog.docx%23_ftn1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%5B1%5D%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EAt%20a%20basic%20level%2C%20a%20company%20must%20create%2C%20maintain%2C%20and%20demonstrate%20compliance%20with%20a%20written%20cybersecurity%20program%20that%20includes%20administrative%2C%20technical%2C%20and%20physical%20safeguards%20to%20protect%20data.%26nbsp%3B%20ODPA%20offers%20a%20company%20flexibility%20to%20select%20appropriate%20safeguards%20by%20taking%20into%20account%20several%20factors%2C%20including%20the%20resources%20available%20to%20the%20company%20and%20the%20risk%20level%20associated%20with%20the%20protected%20information%20the%20company%20maintains%20in%20its%20systems.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EMoving%20your%20data%20to%20the%20Microsoft%20Cloud%20moves%20your%20company%20closer%20to%20compliance%20with%20ODPA%3C%2FU%3E%3C%2FP%3E%0A%3CP%3EWhen%20businesses%20trust%20their%20enterprise%20data%20to%20cloud%20service%20providers%2C%20the%20business%20and%20the%20service%20provider%20share%20responsibility%20to%20protect%20the%20data.%26nbsp%3B%20The%20business%20never%20fully%20relinquishes%20ultimate%20responsibility%20for%20the%20security%20and%20protection%20of%20the%20data.%26nbsp%3B%20However%2C%20when%20an%20organization%20moves%20workloads%20to%20the%20cloud%2C%20the%20business%20can%20take%20advantage%20of%20the%20service%20provider%E2%80%99s%20compliance%20profile%20to%20satisfy%20many%20of%20the%20compliance%20obligations%20required%20on%20the%20ODPA.%26nbsp%3B%20Microsoft%20has%20a%20compliance%20profile%20that%20meets%20or%20exceeds%20hundreds%20of%20global%20security%20and%20data%20protection%20standards%20and%20regulations%2C%20including%20%3CEM%3Eall%3C%2FEM%3E%20of%20the%20security%20frameworks%20listed%20in%20ODPA%3CA%20name%3D%22_ftnref2%22%20href%3D%22https%3A%2F%2Fmicrosoft-my.sharepoint.com%2Fpersonal%2Falonzob_microsoft_com%2FDocuments%2FEPG%2FTraining%2520resources%2FOhio%2520Whitepaper%2520Response%2520final%2520-%2520for%2520Compliance%2520Blog.docx%23_ftn2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%5B2%5D%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CU%3EMicrosoft%20assists%20your%20company%20with%20managing%20your%20compliance%20program%3C%2FU%3E%3C%2FP%3E%0A%3CP%3EUnder%20the%20ODPA%2C%20Ohio%20businesses%20must%20demonstrate%20adherence%20to%20an%20appropriate%20data%20security%20program%20within%20their%20organization%20that%20reasonably%20confirms%20with%20the%20stated%20security%20frameworks%20set%20forth%20in%20the%20Act.%26nbsp%3B%20Microsoft%20offers%20several%20tools%20and%20resources%20to%20assist%20our%20customers%20in%20managing%20internal%20controls%20for%20protecting%20their%20data%20that%20our%20customers%20can%20use%20to%20demonstrate%20they%20adhere%20to%20a%20data%20security%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Trust%20Center%3A%20%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Ftrustcenter%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Ftrustcenter%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Trust%20Center%20provides%20a%20holistic%20view%20into%20how%20Microsoft%20addresses%20privacy%2C%20security%20and%20compliance%20across%20all%20of%20its%20cloud%20products%20and%20services.%20%26nbsp%3BThe%20Trust%20Center%20is%20also%20the%20repository%20for%20various%20tools%20and%20resources%20to%20educate%20consumers%20on%20how%20Microsoft%20instills%20trust%20in%20our%20cloud.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EService%20Trust%20Portal%3A%20%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fservicetrust.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fservicetrust.microsoft.com%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Service%20Trust%20Portal%20provides%20customers%20with%20a%20variety%20of%20content%2C%20tools%2C%20third-party%20audit%20reports%2C%20and%20other%20resources%20about%20Microsoft%20security%2C%20privacy%20and%20compliance%20practices.%20Microsoft%20makes%20available%20independent%20third-party%20audit%20reports%20of%20our%20online%20services%2C%20and%20information%20about%20how%20they%20can%20help%20your%20organization%20maintain%20and%20track%20compliance%20with%20standards%2C%20laws%2C%20and%20regulations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECompliance%20Manager%3A%20%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fservicetrust.microsoft.com%2FComplianceManager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fservicetrust.microsoft.com%2FComplianceManager%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EWith%20the%20free%20Microsoft%20Compliance%20Manager%20tool%2C%20compliance%20and%20Information%20Technology%20Professionals%20are%20able%20to%20interactively%20track%20the%20various%20controls%20for%20a%20specific%20regulation%20or%20security%20framework%20and%20identify%20which%20controls%20Microsoft%E2%80%99s%20cloud%20satisfies%20along%20with%20those%20controls%20that%20will%20be%20managed%20by%20the%20customer.%26nbsp%3B%20Compliance%20Manager%20also%20offers%20templates%20for%20establishing%20and%20documenting%20internal%20compliance%20processes.%26nbsp%3B%20Customers%20can%20also%20perform%20their%20own%20security%20risk%20assessment%20via%20Compliance%20Manager%20and%20benchmark%20results%20against%20other%20businesses.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEnterprise%20Mobility%20and%20Security%20website%3A%20%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EMicrosoft%20Enterprise%20Mobility%20and%20Security%20(EMS)%20is%20an%20intelligent%20mobility%20management%20and%20security%20platform.%20It%20helps%20protect%20and%20secure%20your%20organization%20and%20empowers%20your%20employees%20to%20work%20in%20new%20and%20flexible%20ways.%26nbsp%3B%20This%20service%20also%20provides%20a%20single%20view%20into%20the%20controls%20you%20will%20use%20to%20manage%20the%20spectrum%20of%20security%2C%20including%20threat%20management%2C%20data%20governance%2C%20and%20search%20and%20investigation.%20EMS%20increases%20the%20security%20features%20of%20Windows%2010%20and%20Office%20365%20and%20extends%20them%20to%20your%20entire%20environment%20including%20third-party%20investments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20name%3D%22_ftn1%22%20href%3D%22https%3A%2F%2Fmicrosoft-my.sharepoint.com%2Fpersonal%2Falonzob_microsoft_com%2FDocuments%2FEPG%2FTraining%2520resources%2FOhio%2520Whitepaper%2520Response%2520final%2520-%2520for%2520Compliance%2520Blog.docx%23_ftnref1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%5B1%5D%3C%2FA%3E%20NIST%20Framework%20for%20Improving%20Critical%20Infrastructure%20Cybersecurity%20(NIST%20CSF)%3B%20NIST%20Special%20Publication%20800-171%3B%20NIST%20Special%20Publications%20800-53%20and%20800-53a%3B%20FedRAMP%20Security%20Assessment%20Framework%20(FedRAMP%20SAF)%3B%20Center%20for%20Internet%20Security%E2%80%99s%20%E2%80%9CCritical%20Security%20Controls%20for%20Effective%20Cyber%20Defense%E2%80%9D%20(CIS%20Controls)%3B%20ISO%2FIEC%2027000%20Family%20-%20Information%20Security%20Management%20Systems%26nbsp%3B%20(ISO%2027000%20Family)%3B%20Health%20Insurance%20Portability%20and%20Accountability%20Ace%20security%20requirements%20(HIPAA)%3B%20Gramm-Leach-Bliley%20Act%20Title%20V%20(GLBA)%3B%20Federal%20Information%20Security%20Modernization%20Act%20of%202014%20(FISMA)%3B%20and%20Health%20Information%20Technology%20for%20Economic%20and%20Clinical%20Health%20Act%20(HITECH).%3C%2FP%3E%0A%3CP%3E%3CA%20name%3D%22_ftn2%22%20href%3D%22https%3A%2F%2Fmicrosoft-my.sharepoint.com%2Fpersonal%2Falonzob_microsoft_com%2FDocuments%2FEPG%2FTraining%2520resources%2FOhio%2520Whitepaper%2520Response%2520final%2520-%2520for%2520Compliance%2520Blog.docx%23_ftnref2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%5B2%5D%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Ftrustcenter%2Fcompliance%2Fcomplianceofferings%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Ftrustcenter%2Fcompliance%2Fcomplianceofferings%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-482899%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20State%20of%20Ohio%20recently%20passed%20legislations%20to%20enhance%20the%20cyber%20security%20landscape%20in%20the%20state.%20This%20post%20provides%20an%20overview%20of%20Microsoft%E2%80%99s%20commitment%20to%20compliance%2C%20privacy%20and%20security%20of%20our%20customer%E2%80%99s%20data%20along%20with%20various%20tools%20and%20resources%20that%20Information%20Technology%20Professionals%20can%20use%20to%20take%20full%20advantage%20of%20the%20protections%20under%20the%20Ohio%20Act.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-482899%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20Security%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Today’s post was written by Alonzo Barber, Senior Attorney - Corporate, External, and Legal Affairs

 

Ohio recently enacted the Ohio Data Protection Act (“ODPA”), the first legislation of its kind in the United States.  The law provides a comprehensive legal incentive for cybersecurity investment and may be a game changer to the technology and legal landscape for Ohio businesses. The Ohio State and Cleveland Marshall Schools of Law published a white paper analysis of the ODPA.  The whitepaper specifically calls out the important role that cloud service providers, like Microsoft, can play to enable businesses to avail themselves of the benefits of the ODPA through a shared responsibility model for protecting data. 

 

This response to the white paper provides an overview of Microsoft’s commitment to compliance, privacy and security of our customer’s data. Also included below are highlights to several tools and resources that Information Technology Professionals can use to build and manage a robust cyber security framework within their organization to allow them to take full advantage of the protections under the ODPA.

 

What is the ODPA

The Ohio Data Protection Act is unique among state laws seeking to improve data security. Instead of setting minimum cybersecurity standards or imposing new penalties, the ODPA provides an incentive for businesses to create, maintain, and comply with a cybersecurity program that conforms to industry best practices.  The law does this by providing an affirmative defense for tort claims arising out of a data breach, brought in an Ohio court or under Ohio law, if that business can show reasonable conformity to one of the ten cyber security frameworks enumerated in the legislation[1].

At a basic level, a company must create, maintain, and demonstrate compliance with a written cybersecurity program that includes administrative, technical, and physical safeguards to protect data.  ODPA offers a company flexibility to select appropriate safeguards by taking into account several factors, including the resources available to the company and the risk level associated with the protected information the company maintains in its systems.

 

Moving your data to the Microsoft Cloud moves your company closer to compliance with ODPA

When businesses trust their enterprise data to cloud service providers, the business and the service provider share responsibility to protect the data.  The business never fully relinquishes ultimate responsibility for the security and protection of the data.  However, when an organization moves workloads to the cloud, the business can take advantage of the service provider’s compliance profile to satisfy many of the compliance obligations required on the ODPA.  Microsoft has a compliance profile that meets or exceeds hundreds of global security and data protection standards and regulations, including all of the security frameworks listed in ODPA[2]

 

Microsoft assists your company with managing your compliance program

Under the ODPA, Ohio businesses must demonstrate adherence to an appropriate data security program within their organization that reasonably confirms with the stated security frameworks set forth in the Act.  Microsoft offers several tools and resources to assist our customers in managing internal controls for protecting their data that our customers can use to demonstrate they adhere to a data security program.

 

Microsoft Trust Center: https://www.microsoft.com/en-us/trustcenter

The Microsoft Trust Center provides a holistic view into how Microsoft addresses privacy, security and compliance across all of its cloud products and services.  The Trust Center is also the repository for various tools and resources to educate consumers on how Microsoft instills trust in our cloud. 

 

Service Trust Portal: https://servicetrust.microsoft.com/

The Microsoft Service Trust Portal provides customers with a variety of content, tools, third-party audit reports, and other resources about Microsoft security, privacy and compliance practices. Microsoft makes available independent third-party audit reports of our online services, and information about how they can help your organization maintain and track compliance with standards, laws, and regulations.

 

Compliance Manager: https://servicetrust.microsoft.com/ComplianceManager

With the free Microsoft Compliance Manager tool, compliance and Information Technology Professionals are able to interactively track the various controls for a specific regulation or security framework and identify which controls Microsoft’s cloud satisfies along with those controls that will be managed by the customer.  Compliance Manager also offers templates for establishing and documenting internal compliance processes.  Customers can also perform their own security risk assessment via Compliance Manager and benchmark results against other businesses. 

 

Enterprise Mobility and Security website: https://www.microsoft.com/en-us/enterprise-mobility-security

Microsoft Enterprise Mobility and Security (EMS) is an intelligent mobility management and security platform. It helps protect and secure your organization and empowers your employees to work in new and flexible ways.  This service also provides a single view into the controls you will use to manage the spectrum of security, including threat management, data governance, and search and investigation. EMS increases the security features of Windows 10 and Office 365 and extends them to your entire environment including third-party investments.

 

[1] NIST Framework for Improving Critical Infrastructure Cybersecurity (NIST CSF); NIST Special Publication 800-171; NIST Special Publications 800-53 and 800-53a; FedRAMP Security Assessment Framework (FedRAMP SAF); Center for Internet Security’s “Critical Security Controls for Effective Cyber Defense” (CIS Controls); ISO/IEC 27000 Family - Information Security Management Systems  (ISO 27000 Family); Health Insurance Portability and Accountability Ace security requirements (HIPAA); Gramm-Leach-Bliley Act Title V (GLBA); Federal Information Security Modernization Act of 2014 (FISMA); and Health Information Technology for Economic and Clinical Health Act (HITECH).

[2] https://www.microsoft.com/en-us/trustcenter/compliance/complianceofferings