Texas 2025 - 89th Regular

Texas Senate Bill SB2610 Latest Draft

Bill / Engrossed Version Filed 04/30/2025

Download
.pdf .doc .html
                            By: Blanco, Hancock S.B. No. 2610




 A BILL TO BE ENTITLED
 AN ACT
 relating to a limitation on civil liability of business entities in
 connection with a breach of system security.
 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
 SECTION 1.  Subtitle C, Title 11, Business & Commerce Code,
 is amended by adding Chapter 542 to read as follows:
 CHAPTER 542. CYBERSECURITY PROGRAM
 Sec. 542.001.  DEFINITIONS. In this chapter:
 (1)  "Breach of system security" has the meaning
 assigned by Section 521.053.
 (2)  "Exemplary damages" has the meaning assigned by
 Section 41.001, Civil Practice and Remedies Code.
 (3)  "Personal identifying information" and "sensitive
 personal information" have the meanings assigned by Section
 521.002.
 Sec. 542.002.  APPLICABILITY OF CHAPTER. This chapter
 applies only to a business entity in this state that:
 (1)  has fewer than 250 employees; and
 (2)  owns or licenses computerized data that includes
 sensitive personal information.
 Sec. 542.003.  CYBERSECURITY PROGRAM SAFE HARBOR: EXEMPLARY
 DAMAGES PROHIBITED. Notwithstanding any other law, in an action
 arising from a breach of system security, a person harmed as a
 result of the breach may not recover exemplary damages from a
 business entity to which this chapter applies if the entity
 demonstrates that at the time of the breach the entity implemented
 and maintained a cybersecurity program in compliance with Section
 542.004.
 Sec. 542.004.  CYBERSECURITY PROGRAM. (a) For purposes of
 Section 542.003, a cybersecurity program must:
 (1)  contain administrative, technical, and physical
 safeguards for the protection of personal identifying information
 and sensitive personal information;
 (2)  conform to an industry-recognized cybersecurity
 framework as described by Subsection (b);
 (3)  be designed to:
 (A)  protect the security of personal identifying
 information and sensitive personal information;
 (B)  protect against any threat or hazard to the
 integrity of personal identifying information and sensitive
 personal information; and
 (C)  protect against unauthorized access to or
 acquisition of personal identifying information and sensitive
 personal information that would result in a material risk of
 identity theft or other fraud to the individual to whom the
 information relates; and
 (4)  with regard to the scale and scope, meet the
 following requirements:
 (A)  for a business entity with fewer than 20
 employees, simplified requirements, including password policies
 and appropriate employee cybersecurity training;
 (B)  for a business entity with at least 20
 employees but fewer than 100 employees, moderate requirements,
 including the requirements of the Center for Internet Security
 Controls Implementation Group 1; and
 (C)  for a business entity with at least 100
 employees but fewer than 250 employees, compliance with the
 requirements of Subsection (b).
 (b)  A cybersecurity program under this section conforms to
 an industry-recognized cybersecurity framework for purposes of
 this section if the program conforms to:
 (1)  a current version of or any combination of current
 versions of the following:
 (A)  the Framework for Improving Critical
 Infrastructure Cybersecurity published by the National Institute
 of Standards and Technology (NIST);
 (B)  the NIST's special publication 800-171;
 (C)  the NIST's special publications 800-53 and
 800-53a;
 (D)  the Federal Risk and Authorization
 Management Program's FedRAMP Security Assessment Framework;
 (E)  the Center for Internet Security Critical
 Security Controls for Effective Cyber Defense;
 (F)  the ISO/IEC 27000-series information
 security standards published by the International Organization for
 Standardization and the International Electrotechnical Commission;
 (G)  the Health Information Trust Alliance's
 Common Security Framework;
 (H)  the Secure Controls Framework;
 (I)  the Service Organization Control Type 2
 Framework; or
 (J)  other similar frameworks or standards of the
 cybersecurity industry;
 (2)  if the business entity is subject to its
 requirements, the current version of the following:
 (A)  the Health Insurance Portability and
 Accountability Act of 1996 (42 U.S.C. Section 1320d et seq.);
 (B)  Title V, Gramm-Leach-Bliley Act (15 U.S.C.
 Section 6801 et seq.);
 (C)  the Federal Information Security
 Modernization Act of 2014 (Pub. L. No. 113-283); or
 (D)  the Health Information Technology for
 Economic and Clinical Health Act (Division A, Title XIII, and
 Division B, Title IV, Pub. L. No. 111-5); and
 (3)  if applicable to the business entity, a current
 version of the Payment Card Industry Data Security Standard.
 (c)  If any standard described by Subsection (b)(1) is
 published and updated, a business entity's cybersecurity program
 continues to meet the requirements of a program under this section
 if the entity updates the program to meet the updated standard not
 later than the later of:
 (1)  the implementation date published in the updated
 standard; or
 (2)  the first anniversary of the date on which the
 updated standard is published.
 Sec. 542.005.  CONSTRUCTION OF CHAPTER; NO PRIVATE CAUSE OF
 ACTION.  This chapter may not be construed to create a private cause
 of action or change a common law or statutory duty.
 SECTION 2.  Section 542.003, Business & Commerce Code, as
 added by this Act, applies only to a cause of action that accrues on
 or after the effective date of this Act.
 SECTION 3.  This Act takes effect September 1, 2025.