Every organization with an online presence needs to continuously think about its cybersecurity. The number of cyberattacks spiked significantly during the COVID-19 pandemic with an estimated global loss of nearly $1 trillion. These assaults are expected to keep increasing and some reports estimate that cybercrime will cost the world $10.5 trillion annually by 2025. Cyberattacks are very costly for companies not only in terms of monetary losses, but also in terms of reputational damage, lost time, and exposure to potential lawsuits.
Indeed, legislatures across the country have enacted a variety of laws to respond to the growing threat from cyberattacks. For example, over a number of years, all states have adopted notification laws that require companies to notify individuals of certain data breaches. Other legislatures have enacted regulations that require companies to meet certain cybersecurity standards.
Notably, there has also been a recent trend of legislatures considering or passing laws that incentivize companies to voluntarily take cybersecurity measures to prevent cyberattacks.
Specifically, a number of states have proposed safe harbors or affirmative defenses that shield companies from liability when they maintain a cybersecurity program that meet certain prescribed standards. Ohio, Utah and Connecticut are the first three states to adopt these safe harbors and similar bills have been proposed in other states.
Enacted Safe Harbors: Ohio, Connecticut and Utah
The laws enacted in Connecticut and Utah are generally modeled after Ohio’s statute. The Ohio statute provides an “affirmative defense” to companies with a prescribed written cybersecurity program that face tort claims arising out of a data breach. If proven by the company, the safe harbor would bar tort claims asserted against it. The defense applies only to tort claims related to allegations that the company failed to implement reasonable security controls. To invoke the affirmative defense, the company must “create, maintain and comply with a written cyber security program” that meets the following requirements:
The Utah affirmative defense differs in four respects. First, the Utah affirmative defense does not apply where the entity had actual notice of a security threat and failed to take remedial efforts to redress it. Second, the Utah statute is not expressly limited to tort claims. Instead, the law apparently applies to any claims alleging failure to implement reasonable security measures that results in a data breach. As such, the Utah affirmative defense may have broader applicability than the Ohio and Connecticut statutes, although this has not yet been tested.
Third, the Utah affirmative defense allows companies to comply with one or more of four approaches, rather than three. Specifically, a company can either comply with one of the three approaches covered by the Ohio statute or it can implement a “reasonable security program” that meets certain statutory requirements that are similar to the industry-recognized frameworks.
Finally, while Ohio and Connecticut require that companies “create, maintain and comply” with their cybersecurity program, the Utah statute requires that companies “creates, maintains and reasonably complies” with their cybersecurity program. The presence of the word “reasonably” could give a company an opportunity to assert their “reasonable compliance” under the Utah statute if their practices “reasonably” deviate from their written cybersecurity protocols.
The Connecticut statute also has three variations. First, unlike the Ohio or Utah law, the Connecticut statute offers a more limited protection by providing a safe harbor defense only against punitive damages for tort claims. Second, the Connecticut statute stipulates that the affirmative defense will not apply where the company’s failure to implement cybersecurity controls was the result of gross negligence or willful or wanton conduct. Finally, the Connecticut statute only provides a grace period of six months, rather than a full year as in the other two states, for companies to update their programs after a framework is amended.
Overall, all three statutes generally encourage companies to develop and maintain a cybersecurity program that conforms to industry standards.
Proposed Safe Harbors: Iowa, New Jersey, Georgia, and Illinois
Several states have proposed similar safe harbor laws. Specifically, Iowa and New Jersey both proposed similar bills in 2020, and Georgia and Illinois introduced legislation in 2021. While these proposals all provide an affirmative defense to companies with cybersecurity programs, the requirements vary between states. For example, the Georgia bill does not specifically list the industry standard frameworks that are referenced in the Ohio, Utah, and Connecticut acts. Instead, the Georgia bill requires a “reasonable” framework that takes into consideration the size and complexity of the company and sensitivity of the information protected. While this approach is integral to the industry standard frameworks in the other states’ laws, the Georgia bill apparently chose not to limit the choices to those particular frameworks.
Incentivizing Cybersecurity Practices
Overall, it is likely that states will continue to emphasize the importance of cybersecurity programs. Some laws could encourage stronger cybersecurity by providing an affirmative defense. Others could mandate certain cybersecurity practices without affording an explicit affirmative defense. No matter the specifics of a statute or even in the absence of a statute, companies will be well-served to implement an industry-recognized cybersecurity framework. Not only will the frameworks likely reduce the frequency or severity of data breaches, but they may also improve a company’s defense against alleged liability in the event a data breach does occur.
 Tonya Riley, The Cyber Security 202: Global losses from cybercrime skyrocketed to nearly $1 trillion in 2020, new report finds, Washington Post (Dec. 7, 2020), https://www.washingtonpost.com/politics/2020/12/07/cybersecurity-202-global-losses-cybercrime-skyrocketed-nearly-1-trillion-2020/
 Chuck Brooks, Alarming Cybersecurity Stats: What You Need to Know for 2021, Forbes (Mar. 3, 2021), https://www.forbes.com/sites/chuckbrooks/2021/03/02/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021/?sh=1a6d408e58d3
 Security Breach Notification Laws, NCSL (April 15, 2021), https://www.ncsl.org/research/telecommunications- and-information-technology/security-breach-notification-laws.aspx
 See, e.g., “Stop Hacks and Improve Electronic Data Security Act” (SHIELD ACT), N.Y. Gen. Bus. Law § 899-bb (effective March 21, 2020).
 Ohio Rev. Code Ann. § 1354.02 (effective date November 2, 2018).
 2021 CT H 6607, Public Act No. 21-119 (effective date October 1, 2021).
 Utah Code Ann. § 78B-4-703 (effective date May 5, 2021).
 Ohio Rev. Code Ann. § 1354.02(A)(1); Connecticut Public Act No. 21-119 § 5(b)
 Utah Code Ann. § 78B-4-702(1).
 Iowa S.F. 2073, https://www.legis.iowa.gov/legislation/BillBook?ba=SF%202073&ga=88
 2020 New Jersey S.B. 3062, https://www.njleg.state.nj.us/2020/Bills/S3500/3062_I1.HTM
 GA S.B. 52, https://www.legis.ga.gov/legislation/59139
 Illinois H.B. 3030, https://www.ilga.gov/legislation/BillStatus.asp?DocNum=3030&GAID=16&DocTypeID=HB&SessionID=110&GA=102/a>
Sign up for our newsletter and get the latest to your inbox.