{"id":64971,"date":"2025-12-03T21:39:00","date_gmt":"2025-12-03T21:39:00","guid":{"rendered":"https:\/\/www.dinsmore.com\/?post_type=publications&#038;p=64971"},"modified":"2025-12-22T22:17:16","modified_gmt":"2025-12-22T22:17:16","slug":"ohio-law-imposes-new-cybersecurity-requirements-for-local-government","status":"publish","type":"publications","link":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/","title":{"rendered":"Ohio Law Imposes New Cybersecurity Requirements For Local Government"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"360\" src=\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg\" alt=\"plastic blocks with shields on them, one is yellow and has an exclamation point\" class=\"wp-image-64973\" srcset=\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg 1000w, https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg?resize=300,108 300w, https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg?resize=768,276 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>The worlds of local government and cybersecurity have officially collided. Recently implemented Ohio House Bill 96 requires every county, township, municipality and school district to adopt a formal cybersecurity program. As daunting as it sounds, don\u2019t worry, it\u2019s not quite the level of a cyber apocalypse. However, it is a sign that cybersecurity is constantly changing, and the days of \u201cset-it-and-forget-it\u201d IT security are a thing of the past. &nbsp;<\/p>\n\n\n\n<p><strong>What Does The Law Mean For Local Governments?<\/strong><\/p>\n\n\n\n<p>House Bill 96, now codified in Ohio Revised Code \u00a7 9.64, quietly slipped into law as part of the 2025 state budget. It established new requirements for certain government run entities that impose additional obligations and requirements in relation to cybersecurity and data privacy. In short, every \u201cpolitical subdivision\u201d (i.e., local government entity or school district) must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement a Cybersecurity Program<\/strong>\u00a0\u2013 Each political subdivision must \u201cdevelop and adopt a cybersecurity program that safeguards the political subdivision\u2019s data, information technology, and information technology resources to ensure availability, confidentiality, and integrity\u201d.\u00a0 The program must be consistent with generally accepted best practices, such as the NIST Cybersecurity Framework or the CIS Controls. The legislative authority of each political subdivision is responsible for formally adopting the cybersecurity program. This means that city council or a comparable legislative body should take the initiative to get ahead of the state\u2019s new requirements, or risk falling behind. Once adopted, the program should extend to all entities operating within the political subdivision, including systems managed by other office holders.<\/li>\n<\/ul>\n\n\n\n<p>Among other things, the program must incorporate the following core tenets:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Risk Identification<\/strong>\u00a0\u2013 The program must identify the critical functions and cybersecurity risks of the political subdivision.<\/li>\n\n\n\n<li><strong>Impact Assessment<\/strong>\u00a0\u2013 A political subdivision must assess cyber risks and identify potential impacts of a cybersecurity breach.<\/li>\n\n\n\n<li><strong>Training<\/strong>\u00a0\u2013 Employees will be expected to complete mandatory annual cybersecurity training.<\/li>\n\n\n\n<li><strong>Threat Detection<\/strong>\u00a0\u2013 The program must specify mechanisms to detect threats and cybersecurity events.<\/li>\n\n\n\n<li><strong>Infrastructure Repair and Maintenance<\/strong>\u00a0\u2013 The program should plan for recovery and continuity of operations and systems.<\/li>\n\n\n\n<li><strong>Incident Response<\/strong>\u00a0\u2013 And the subdivision should establish incident response procedures, including procedures for communication, incident analysis, containment and repair of infrastructure impacted by a cybersecurity incident.<a href=\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#_ftn1\">[1]<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Adhere to Incident Reporting Requirements<\/strong>\u00a0\u2013 In the event of a cybersecurity or ransomware incident, a political subdivision must:\n<ul class=\"wp-block-list\">\n<li>Report the incident to the Ohio Department of Public Safety (Division of Homeland Security &#8211; Ohio Cyber Integration Center)\u00a0<strong>within 7 days of discovering the incident<\/strong>.<\/li>\n\n\n\n<li>Report the incident to the Ohio Auditor of State\u00a0<strong>within 30 days of discovering the incident<\/strong>.<\/li>\n\n\n\n<li><strong>Adhere to Ransom-Payment Restrictions<\/strong>\u00a0\u2013 If a subdivision experiences a ransomware incident, it may\u00a0<strong>not\u00a0<\/strong>pay or comply with a ransom demand unless its legislative body (i.e., city council or school board) passes a formal resolution or ordinance stating the payment is in the best interest of the subdivision. The resolution must justify why payment is in the best interest of the jurisdiction pursuant to Ohio Revised Code \u00a7 9.64(B).<\/li>\n\n\n\n<li><strong>Impose Employee Training and Minimum Controls<\/strong>\u00a0\u2013 The law also requires political subdivisions to ensure employees receive cybersecurity awareness training. The good news is that the State is offering some great free resources to help entities get started. These free resources, offered through CyberOhio, can be found\u00a0<a href=\"https:\/\/cyber.ohio.gov\/priorities\/assisting-local-government-entities\/ohio-hb-96-new-cybersecurity-requirements-for-public-entities\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Maintain Confidentiality of Cybersecurity Records<\/strong>\u00a0\u2013 Records relating to the cybersecurity program, incident reports and cybersecurity-related procurement are to be treated as \u201csecurity records\u201d and are exempt from public-records disclosure under Ohio law.<\/li>\n<\/ul>\n\n\n\n<p>The new law applies to all data managed by political subdivisions, regardless of type or classification. This would include confidential information, personally identifiable information, sensitive personal information, public and non-confidential data, state-controlled or shared data. The law does not assign different levels of control for each data category, however more sensitive data, such as Social Security Numbers or Driver\u2019s Licenses, may require stronger safeguards consistent with the NIST Cybersecurity Framework and CIS Controls.<\/p>\n\n\n\n<p><strong>What Should Local Governments Do From A Legal Standpoint?<\/strong><\/p>\n\n\n\n<p>From a legal and compliance perspective, Ohio Revised Code \u00a7 9.64 creates a statutory duty of care for local governments in managing cyber risk. Non-compliance may expose a political subdivision to audit requirements, increased liability (including potential tort claims and exposure to class action lawsuits stemming from a data breach) or reputational risk. A well-documented cybersecurity program and incident response plan will serve as a mitigation tool in the instance of legal or regulatory scrutiny.<\/p>\n\n\n\n<p>From a practical standpoint, a political subdivision should consider taking the following actions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Take an Inventory<\/strong>\u00a0\u2013 Identification of systems, data and IT-infrastructure supporting critical services is an important first step in understanding the framework from which the political subdivision is working within.<\/li>\n\n\n\n<li><strong>Conduct a Risk Assessment<\/strong>\u00a0\u2013 Conducting a risk assessment will identify threats and vulnerabilities within a given system. A risk assessment will also help gage the potential impact of different types of security incidents.<\/li>\n\n\n\n<li><strong>Implement or Review a Compliance Program<\/strong>\u00a0\u2013 Adopting new and reviewing old policies, procedures, monitoring, detection, response and recovery controls aligned with NIST or CIS frameworks.<\/li>\n\n\n\n<li><strong>Implement an Incident Response Plan<\/strong>\u00a0\u2013 Putting an incident response plan in place that defines roles, responsibilities, communication channels, procedures for containment, remediation and restoration is the cornerstone of a cybersecurity program.<\/li>\n\n\n\n<li><strong>Conduct Training Sessions<\/strong>\u00a0\u2013 Requiring all employees to complete annual cybersecurity awareness training and periodic refreshers is a key component of complying with the new law.<\/li>\n\n\n\n<li><strong>Addressing Governance Procedures regarding Ransom Payments<\/strong>\u00a0\u2013 Taking preliminary measures within a political subdivision\u2019s legislative body to ensure the body understands the ransom-payment restriction requirement and instituting procedures for a resolution-approval process will help address the time-sensitive nature of a typical ransom incident.<\/li>\n\n\n\n<li><strong>Instituting Reporting Protocols<\/strong>\u00a0\u2013 Establishing internal procedures for notifying appropriate state officials, such as the Ohio State Auditor and the Ohio Department of Public Safety, within required timeframes should be a top priority.<\/li>\n\n\n\n<li><strong>Maintaining Documentation<\/strong>\u00a0\u2013 Ensuring that proper record keeping procedures are in place to document all policies, procedures and other measures taken by a political subdivision to comply with the law is key to showing a good-faith effort to meet the statute\u2019s obligations.<\/li>\n\n\n\n<li><strong>Reviewing Current Vendor Policies<\/strong>\u00a0\u2013 Assessing the current state of affairs with cybersecurity vendors and IT providers is a good idea to proactively loop in those trusted advisors to the change in state law. A Business Associate Agreement might be necessary to ensure compliance with all laws is met and exceeded.<\/li>\n<\/ul>\n\n\n\n<p>At the end of the day, proactive measures are the first and best line of defense against threat actors\u2014which is why they are strongly suggested by statute.<\/p>\n\n\n\n<p><strong>What to Expect Next<\/strong><\/p>\n\n\n\n<p>The law is currently in effect, but regulatory oversight and scrutiny is forthcoming. The Ohio Auditor of State has indicated (through webinars presented by CyberOhio) that county and city governments should have a program in place&nbsp;<strong>by January 1, 2026<\/strong>. For all other entities\u2014including school districts, the deadline&nbsp;<strong>will be July 1, 2026<\/strong>.<\/p>\n\n\n\n<p>The Ohio Auditor of State\u2019s office will be tasked with enforcing &nbsp;Ohio Revised Code \u00a79.64, where the office will conduct routine audit cycles to check whether a political subdivision has built and maintained a cybersecurity program meeting the law\u2019s core components and reporting requirements. An audit is not meant to be punitive, rather the Auditor may provide a corrective action plan that makes sense for a political subdivision based on its size and risk exposure. The Ohio Auditor of State is currently developing detailed compliance procedures which are anticipated to be released prior to the January 1, 2026 expected implementation date.<\/p>\n\n\n\n<p><strong>How Can Dinsmore Help?<\/strong><\/p>\n\n\n\n<p>The changes and mandatory implementation of a cybersecurity program as a result of Ohio House Bill 96 are sure to create compliance and implementation questions that are complex and difficult to navigate. Dinsmore\u2019s cybersecurity team has experience building out comprehensive and tailored cybersecurity programs and data privacy policies specific to each entity\u2019s needs. Dinsmore offers guidance to help businesses understand their obligations, ensure compliance and make informed decisions. We have a wealth of experience representing some of the largest municipalities in the state with respect to cybersecurity matters and help implement these changes confidently and effectively. Should you have any questions, please do not hesitate to contact our offices.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Resources for article:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.ohioschoolboards.org\/blogs\/legal-ledger\/new-cybersecurity-requirements-school-districts-ohios-budget-bill\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ohioschoolboards.org\/blogs\/legal-ledger\/new-cybersecurity-requirements-school-districts-ohios-budget-bill<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/player.cloudinary.com\/embed\/?cloud_name=stateofohio&amp;secure_distribution=dam.assets.ohio.gov&amp;private_cdn=true&amp;public_id=cyber.ohio.gov%2FMicrosoftTeams-video_1&amp;profile=cld-default\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/player.cloudinary.com\/embed\/?cloud_name=stateofohio&amp;secure_distribution=dam.assets.ohio.gov&amp;private_cdn=true&amp;public_id=cyber.ohio.gov%2FMicrosoftTeams-video_1&amp;profile=cld-default<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cyber.ohio.gov\/priorities\/assisting-local-government-entities\/ohio-hb-96-new-cybersecurity-requirements-for-public-entities\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cyber.ohio.gov\/priorities\/assisting-local-government-entities\/ohio-hb-96-new-cybersecurity-requirements-for-public-entities<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/homelandsecurity.ohio.gov\/ohio-cyber-integration-center\/reporting-guidance\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/homelandsecurity.ohio.gov\/ohio-cyber-integration-center\/reporting-guidance<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/ohioauditor.gov\/fraud\/cybersecurity-policy.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ohioauditor.gov\/fraud\/cybersecurity-policy.html<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/dam.assets.ohio.gov\/image\/upload\/cyber.ohio.gov\/New_Cyber_Law_Presentation.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dam.assets.ohio.gov\/image\/upload\/cyber.ohio.gov\/New_Cyber_Law_Presentation.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.saltycloud.com\/blog\/ohio-orc-9-64-political-subdivision-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.saltycloud.com\/blog\/ohio-orc-9-64-political-subdivision-cybersecurity\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.brickergraydon.com\/insights\/publications\/ohio-house-bill-96-ushers-in-new-era-of-cybersecurity-compliance-for-local-governments-and-school-districts\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.brickergraydon.com\/insights\/publications\/ohio-house-bill-96-ushers-in-new-era-of-cybersecurity-compliance-for-local-governments-and-school-districts<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/codes.ohio.gov\/ohio-revised-code\/section-9.64\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/codes.ohio.gov\/ohio-revised-code\/section-9.64<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><a href=\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#_ftnref1\">[1]<\/a>&nbsp;Ohio Revised Code \u00a7 9.64(A)(1) defines a \u201ccybersecurity incident\u201d as any of the following: (a) a substantial loss of confidentiality, integrity, or availability of a covered entity\u2019s information system or network; (b) a serious impact on the safety and resiliency of a covered entity\u2019s operational systems and processes; (c) a disruption of a covered entity\u2019s ability to engage in business or industrial operations, or deliver goods or services; or unauthorized access to an entity\u2019s information system or network, or nonpublic information contained therein, that is facilitated through or is caused by: (i) a compromise of a cloud service provider, managed service provider, or other third-party data hosting provider; or (ii) a supply chain compromise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The worlds of local government and cybersecurity have officially collided. Recently implemented Ohio House Bill 96 requires every county, township, municipality and school district to adopt a formal cybersecurity program. As daunting as it sounds, don\u2019t worry, it\u2019s not quite the level of a cyber apocalypse. However, it is a sign that cybersecurity is constantly\u2026<\/p>\n","protected":false},"author":8,"featured_media":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"publication-type":[12],"class_list":["post-64971","publications","type-publications","status-publish","format-standard","hentry","publication-type-legal-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ohio Law Imposes New Cybersecurity Requirements For Local Government - Dinsmore &amp; Shohl<\/title>\n<meta name=\"description\" content=\"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore &amp; Shohl LLP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ohio Law Imposes New Cybersecurity Requirements For Local Government\" \/>\n<meta property=\"og:description\" content=\"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore &amp; Shohl LLP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/\" \/>\n<meta property=\"og:site_name\" content=\"Dinsmore &amp; Shohl\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T22:17:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/\",\"url\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/\",\"name\":\"Ohio Law Imposes New Cybersecurity Requirements For Local Government - Dinsmore &amp; Shohl\",\"isPartOf\":{\"@id\":\"https:\/\/www.dinsmore.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg\",\"datePublished\":\"2025-12-03T21:39:00+00:00\",\"dateModified\":\"2025-12-22T22:17:16+00:00\",\"description\":\"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage\",\"url\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg\",\"contentUrl\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg\",\"width\":1000,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dinsmore.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ohio Law Imposes New Cybersecurity Requirements For Local Government\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dinsmore.com\/#website\",\"url\":\"https:\/\/www.dinsmore.com\/\",\"name\":\"Dinsmore & Shohl\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.dinsmore.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dinsmore.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dinsmore.com\/#organization\",\"name\":\"Dinsmore & Shohl\",\"url\":\"https:\/\/www.dinsmore.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg\",\"contentUrl\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg\",\"width\":413,\"height\":54,\"caption\":\"Dinsmore & Shohl\"},\"image\":{\"@id\":\"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ohio Law Imposes New Cybersecurity Requirements For Local Government - Dinsmore &amp; Shohl","description":"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/","og_locale":"en_US","og_type":"article","og_title":"Ohio Law Imposes New Cybersecurity Requirements For Local Government","og_description":"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","og_url":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/","og_site_name":"Dinsmore &amp; Shohl","article_modified_time":"2025-12-22T22:17:16+00:00","og_image":[{"width":1000,"height":360,"url":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/","url":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/","name":"Ohio Law Imposes New Cybersecurity Requirements For Local Government - Dinsmore &amp; Shohl","isPartOf":{"@id":"https:\/\/www.dinsmore.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage"},"image":{"@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg","datePublished":"2025-12-03T21:39:00+00:00","dateModified":"2025-12-22T22:17:16+00:00","description":"Ohio Law Imposes New Cybersecurity Requirements For Local Government Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","breadcrumb":{"@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#primaryimage","url":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg","contentUrl":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Ohio-cyber-Header.jpg","width":1000,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.dinsmore.com\/publications\/ohio-law-imposes-new-cybersecurity-requirements-for-local-government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dinsmore.com\/"},{"@type":"ListItem","position":2,"name":"Ohio Law Imposes New Cybersecurity Requirements For Local Government"}]},{"@type":"WebSite","@id":"https:\/\/www.dinsmore.com\/#website","url":"https:\/\/www.dinsmore.com\/","name":"Dinsmore & Shohl","description":"","publisher":{"@id":"https:\/\/www.dinsmore.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dinsmore.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dinsmore.com\/#organization","name":"Dinsmore & Shohl","url":"https:\/\/www.dinsmore.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg","contentUrl":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg","width":413,"height":54,"caption":"Dinsmore & Shohl"},"image":{"@id":"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/64971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications"}],"about":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/types\/publications"}],"author":[{"embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/users\/8"}],"version-history":[{"count":1,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/64971\/revisions"}],"predecessor-version":[{"id":64977,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/64971\/revisions\/64977"}],"wp:attachment":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/media?parent=64971"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/tags?post=64971"},{"taxonomy":"publication-type","embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publication-type?post=64971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}