89R9729 SCR-D
 
  By: Blanco S.B. No. 2610
 
 
 
A BILL TO BE ENTITLED
 
AN ACT
  relating to civil liability of business entities in connection with
  a breach of system security.
         BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
         SECTION 1.  Subtitle C, Title 11, Business & Commerce Code,
  is amended by adding Chapter 542 to read as follows:
  CHAPTER 542.  CYBERSECURITY PROGRAM
         Sec. 542.001.  DEFINITIONS. In this chapter:
               (1)  "Breach of system security" has the meaning
  assigned by Section 521.053.
               (2)  "Personal identifying information" and "sensitive
  personal information" have the meanings assigned by Section
  521.002.
         Sec. 542.002.  APPLICABILITY OF CHAPTER. This chapter
  applies to a business entity in this state that owns or licenses
  computerized data that includes sensitive personal information. 
         Sec. 542.003.  LIABILITY FOR DATA BREACH. If a business
  entity fails to implement reasonable cybersecurity controls and
  that failure results in a breach of system security, the business
  entity is liable to a person whose sensitive personal information
  was stolen in the breach and who suffered economic harm as a result
  of the theft of the information.
         Sec. 542.004.  INDUSTRY STANDARD CYBERSECURITY PROGRAM. (a)  
  For purposes of Section 542.003, a business entity has implemented
  reasonable cybersecurity controls if the entity has created and
  maintained a cybersecurity program:
               (1)  that contains administrative, technical, and
  physical safeguards for the protection of personal identifying
  information and sensitive personal information; 
               (2)  that conforms to an industry recognized
  cybersecurity framework as described by Subsection (b); 
               (3)  that is designed to:
                     (A)  protect the security of personal identifying
  information and sensitive personal information;
                     (B)  protect against any threat or hazard to the
  integrity of personal identifying information and sensitive
  personal information; and
                     (C)  protect against unauthorized access to or
  acquisition of personal identifying information and sensitive
  personal information that would result in a material risk of
  identity theft or other fraud to the individual to whom the
  information relates; and
               (4)  the scale and scope of which meets the
  requirements of Subsection (d).
         (b)  A cybersecurity program under this section conforms to
  an industry recognized cybersecurity framework for purposes of this
  section if the program conforms to:
               (1)  a current version of or any combination of current
  versions of the following, as determined by the Department of
  Public Safety:
                     (A)  the Framework for Improving Critical
  Infrastructure Cybersecurity published by the National Institute
  of Standards and Technology (NIST);
                     (B)  the NIST's special publication 800-171;
                     (C)  the NIST's special publications 800-53 and
  800-53a;
                     (D)  the Federal Risk and Authorization
  Management Program's FedRAMP Security Assessment Framework;
                     (E)  the Center for Internet Security Critical
  Security Controls for Effective Cyber Defense;
                     (F)  the ISO/IEC 27000-series information
  security standards published by the International Organization for
  Standardization and the International Electrotechnical Commission;
                     (G)  the Health Information Trust Alliance's
  Common Security Framework;
                     (H)  the Secure Controls Framework;
                     (I)  the Service Organization Control Type 2
  Framework; or
                     (J)  other similar frameworks or standards of the
  cybersecurity industry;
               (2)  if the business entity is subject to its
  requirements, the current version of the following, as determined
  by the Department of Public Safety:
                     (A)  the Health Insurance Portability and
  Accountability Act of 1996 (42 U.S.C. Section 1320d et seq.);
                     (B)  Title V, Gramm-Leach-Bliley Act (15 U.S.C.
  Section 6801 et seq.);
                     (C)  the Federal Information Security
  Modernization Act of 2014 (Pub. L. No. 113-283); or
                     (D)  the Health Information Technology for
  Economic and Clinical Health Act (Division A, Title XIII, and
  Division B, Title IV, Pub. L. No. 111-5); and
               (3)  if applicable to the business entity, a current
  version of the Payment Card Industry Data Security Standard, as
  determined by the Department of Public Safety.
         (c)  If any standard described by Subsection (b)(1) is
  published and updated, a business entity's cybersecurity program
  continues to meet the requirements of a program under this section
  if the entity updates the program to meet the updated standard not
  later than the 180th day after the date on which the standard is
  published.
         (d)  The scale and scope of a cybersecurity program under
  this section must be based on:
               (1)  the size and complexity of the business entity;
               (2)  the nature and scope of the activities of the
  business entity;
               (3)  the sensitivity of the personal identifying
  information or sensitive personal information; and
               (4)  the cost and availability of tools to improve
  information security and reduce vulnerabilities.
         Sec. 542.005.  AUTHORITY OF ATTORNEY GENERAL NOT AFFECTED.
  This chapter may not be construed to limit the authority of the
  attorney general to seek any legal or equitable remedy under the
  laws of this state.
         Sec. 542.006.  CLASS ACTION CERTIFICATION NOT AFFECTED.
  This chapter does not affect the certification of an action as a
  class action.
         SECTION 2.  Section 542.003, Business & Commerce Code, as
  added by this Act, applies only to a cause of action that accrues on
  or after the effective date of this Act.
         SECTION 3.  This Act takes effect September 1, 2025.