OHIO HB 96
Security Requirements 101:
What the code Actually Wants From You
Ohio HB 96, requires local governments, including cities, counties, school districts, and libraries, to establish comprehensive, risk-based cybersecurity programs. The goal is to protect the confidentiality, integrity, and availability (CIA) of their systems and data against rising cyber threats.
Who Requires it?
🏛️ State Agencies
If you’re any part of Ohio’s state government, this is your rulebook. No exceptions.
🏘️ Local Government Entities
Cities, counties, and municipalities handling resident data need to pay attention.
🎓 Educational Institutions
Public schools and universities managing student and staff data.
Who is Impacted and What Are the Deadlines?
- January 1, 2026: Counties and cities are required to adopt a cybersecurity plan.
- July 1, 2026: School districts, libraries, and all other political subdivisions are required to adopt a cybersecurity plan.
The Six Core Components
- Risk Identification and Critical Functions: Identifying and assessing risks to essential systems and data.
- Threat Detection Mechanisms: Implementing tools and processes to detect potential cyber threats.
- Incident Response Procedure: Establishing a formal, documented plan for responding to security incidents.
- Infrastructure Repair and Maintenance: Creating procedures for restoring systems after an incident.
- Employee Training Requirements: Developing and implementing ongoing cybersecurity awareness training for all staff.
- Impact Assessment: Evaluating the potential impact of a cybersecurity event on the organization’s operations and data.
How We Can Help
We don’t just hand you a checklist and wish you luck. We partner with you to build security that actually works—for your team, your systems, and your peace of mind.
🔍 Compliance Gap Assessment
We’ll evaluate where you are versus where ORC 9.64 says you need to be. No judgment. Just clarity.
What You Get:
- Clear understanding of your current security posture
- Prioritized list of what needs attention
- Realistic timeline and budget estimates
- A plan you can actually follow
📋 Policy & Procedure Development
Those documented security policies ORC 9.64 requires? We’ll help you create them—written in language your team will actually understand and use.
What You Get:
- Customized security policies that fit your organization
- Clear procedures that make sense for your workflows
- Templates and documentation that auditors love
- Policies that protect you, not just check boxes
🛡️ Technical Security Implementation
From access controls to monitoring systems, we’ll make sure your technical safeguards match what ORC 9.64 requires.
What You Get:
- Multi-factor authentication setup
- Network security configuration
- Data encryption implementation
- Intrusion detection and monitoring
- Regular vulnerability assessments
👥 Staff Training Programs
Your team can’t follow rules they don’t understand. We create training that actually sticks—because we know how to talk to humans, not robots.
What You Get:
- Engaging security awareness training
- Role-specific guidance for different team members
- Phishing simulation and testing
- Ongoing education programs
- Documentation of training completion (for compliance proof)
📊 Ongoing Monitoring & Support
Compliance isn’t a destination—it’s a journey. We’ll be there with you, making sure your security stays current as threats evolve.
What You Get:
- 24/7 security monitoring
- Regular system updates and patches
- Quarterly compliance check-ins
- Incident response support
- Annual compliance reporting
Why Iler Networking & Computing?
We’re Local
We’re based in Ohio. We understand Ohio regulations. We know the local landscape, the specific challenges, and what works here.
We Speak Human
No jargon. No technobabble. Just clear explanations that make sense to real people doing real work.
We Care About Your Mission
Whether you’re a local government office, a nonprofit, or a business serving Ohio residents, you’re trying to do good work. We’re here to help you do it safely.
We’ve Been There
We’ve guided organizations through compliance. We know where people get stuck. We know the what actually works and the ones that create bigger problems.
The Cost of Non-Compliance
Legal Consequences:
- Potential fines and penalties
- Legal liability for data breaches
- Loss of contracts with state agencies
- Inability to bid on government projects
Operational Impact:
- Data breaches that shut down operations
- Loss of public trust
- Staff time spent responding to incidents instead of doing their jobs
- Forced system shutdowns during investigations
Financial Damage:
- Cost of breach response (often $50K-$500K+)
- Lost revenue during downtime
- Increased insurance premiums
- Potential lawsuits
- Cost of notifying affected individuals
Compare that to the cost of getting compliant now. It’s not even close.
Ready to Get Started?
Don’t wait until the deadline is breathing down your neck.
The organizations that thrive with Ohio HB 96 compliance are the ones that started early, built it right, and had a partner who understood both the regulations and their mission.



