Texas 2025 89th Regular

Texas Senate Bill SB2610 Introduced / Bill

Filed 03/13/2025

Download
.pdf .doc .html
                    89R9729 SCR-D
 By: Blanco S.B. No. 2610




 A BILL TO BE ENTITLED
 AN ACT
 relating to civil liability of business entities in connection with
 a breach of system security.
 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
 SECTION 1.  Subtitle C, Title 11, Business & Commerce Code,
 is amended by adding Chapter 542 to read as follows:
 CHAPTER 542.  CYBERSECURITY PROGRAM
 Sec. 542.001.  DEFINITIONS. In this chapter:
 (1)  "Breach of system security" has the meaning
 assigned by Section 521.053.
 (2)  "Personal identifying information" and "sensitive
 personal information" have the meanings assigned by Section
 521.002.
 Sec. 542.002.  APPLICABILITY OF CHAPTER. This chapter
 applies to a business entity in this state that owns or licenses
 computerized data that includes sensitive personal information.
 Sec. 542.003.  LIABILITY FOR DATA BREACH. If a business
 entity fails to implement reasonable cybersecurity controls and
 that failure results in a breach of system security, the business
 entity is liable to a person whose sensitive personal information
 was stolen in the breach and who suffered economic harm as a result
 of the theft of the information.
 Sec. 542.004.  INDUSTRY STANDARD CYBERSECURITY PROGRAM. (a)
 For purposes of Section 542.003, a business entity has implemented
 reasonable cybersecurity controls if the entity has created and
 maintained a cybersecurity program:
 (1)  that contains administrative, technical, and
 physical safeguards for the protection of personal identifying
 information and sensitive personal information;
 (2)  that conforms to an industry recognized
 cybersecurity framework as described by Subsection (b);
 (3)  that is designed to:
 (A)  protect the security of personal identifying
 information and sensitive personal information;
 (B)  protect against any threat or hazard to the
 integrity of personal identifying information and sensitive
 personal information; and
 (C)  protect against unauthorized access to or
 acquisition of personal identifying information and sensitive
 personal information that would result in a material risk of
 identity theft or other fraud to the individual to whom the
 information relates; and
 (4)  the scale and scope of which meets the
 requirements of Subsection (d).
 (b)  A cybersecurity program under this section conforms to
 an industry recognized cybersecurity framework for purposes of this
 section if the program conforms to:
 (1)  a current version of or any combination of current
 versions of the following, as determined by the Department of
 Public Safety:
 (A)  the Framework for Improving Critical
 Infrastructure Cybersecurity published by the National Institute
 of Standards and Technology (NIST);
 (B)  the NIST's special publication 800-171;
 (C)  the NIST's special publications 800-53 and
 800-53a;
 (D)  the Federal Risk and Authorization
 Management Program's FedRAMP Security Assessment Framework;
 (E)  the Center for Internet Security Critical
 Security Controls for Effective Cyber Defense;
 (F)  the ISO/IEC 27000-series information
 security standards published by the International Organization for
 Standardization and the International Electrotechnical Commission;
 (G)  the Health Information Trust Alliance's
 Common Security Framework;
 (H)  the Secure Controls Framework;
 (I)  the Service Organization Control Type 2
 Framework; or
 (J)  other similar frameworks or standards of the
 cybersecurity industry;
 (2)  if the business entity is subject to its
 requirements, the current version of the following, as determined
 by the Department of Public Safety:
 (A)  the Health Insurance Portability and
 Accountability Act of 1996 (42 U.S.C. Section 1320d et seq.);
 (B)  Title V, Gramm-Leach-Bliley Act (15 U.S.C.
 Section 6801 et seq.);
 (C)  the Federal Information Security
 Modernization Act of 2014 (Pub. L. No. 113-283); or
 (D)  the Health Information Technology for
 Economic and Clinical Health Act (Division A, Title XIII, and
 Division B, Title IV, Pub. L. No. 111-5); and
 (3)  if applicable to the business entity, a current
 version of the Payment Card Industry Data Security Standard, as
 determined by the Department of Public Safety.
 (c)  If any standard described by Subsection (b)(1) is
 published and updated, a business entity's cybersecurity program
 continues to meet the requirements of a program under this section
 if the entity updates the program to meet the updated standard not
 later than the 180th day after the date on which the standard is
 published.
 (d)  The scale and scope of a cybersecurity program under
 this section must be based on:
 (1)  the size and complexity of the business entity;
 (2)  the nature and scope of the activities of the
 business entity;
 (3)  the sensitivity of the personal identifying
 information or sensitive personal information; and
 (4)  the cost and availability of tools to improve
 information security and reduce vulnerabilities.
 Sec. 542.005.  AUTHORITY OF ATTORNEY GENERAL NOT AFFECTED.
 This chapter may not be construed to limit the authority of the
 attorney general to seek any legal or equitable remedy under the
 laws of this state.
 Sec. 542.006.  CLASS ACTION CERTIFICATION NOT AFFECTED.
 This chapter does not affect the certification of an action as a
 class action.
 SECTION 2.  Section 542.003, Business & Commerce Code, as
 added by this Act, applies only to a cause of action that accrues on
 or after the effective date of this Act.
 SECTION 3.  This Act takes effect September 1, 2025.