|
|
|
A BILL TO BE ENTITLED
|
|
AN ACT
|
|
relating to civil liability of business entities in connection with |
|
a breach of system security. |
|
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
|
SECTION 1. Subtitle C, Title 11, Business & Commerce Code, |
|
is amended by adding Chapter 542 to read as follows: |
|
CHAPTER 542. CYBERSECURITY PROGRAM |
|
Sec. 542.001. DEFINITIONS. In this chapter: |
|
(1) "Breach of system security" has the meaning |
|
assigned by Section 521.053. |
|
(2) "Personal identifying information" and "sensitive |
|
personal information" have the meanings assigned by Section |
|
521.002. |
|
Sec. 542.002. APPLICABILITY OF CHAPTER. This chapter |
|
applies to a business entity in this state that owns or licenses |
|
computerized data that includes sensitive personal information. |
|
Sec. 542.003. LIABILITY FOR DATA BREACH. If a business |
|
entity fails to implement reasonable cybersecurity controls and |
|
that failure results in a breach of system security, the business |
|
entity is liable to a person whose sensitive personal information |
|
was stolen in the breach and who suffered economic harm as a result |
|
of the theft of the information. |
|
Sec. 542.004. INDUSTRY STANDARD CYBERSECURITY PROGRAM. (a) |
|
For purposes of Section 542.003, a business entity has implemented |
|
reasonable cybersecurity controls if the entity has created and |
|
maintained a cybersecurity program: |
|
(1) that contains administrative, technical, and |
|
physical safeguards for the protection of personal identifying |
|
information and sensitive personal information; |
|
(2) that conforms to an industry recognized |
|
cybersecurity framework as described by Subsection (b); |
|
(3) that is designed to: |
|
(A) protect the security of personal identifying |
|
information and sensitive personal information; |
|
(B) protect against any threat or hazard to the |
|
integrity of personal identifying information and sensitive |
|
personal information; and |
|
(C) protect against unauthorized access to or |
|
acquisition of personal identifying information and sensitive |
|
personal information that would result in a material risk of |
|
identity theft or other fraud to the individual to whom the |
|
information relates; and |
|
(4) the scale and scope of which meets the |
|
requirements of Subsection (d). |
|
(b) A cybersecurity program under this section conforms to |
|
an industry recognized cybersecurity framework for purposes of this |
|
section if the program conforms to: |
|
(1) a current version of or any combination of current |
|
versions of the following, as determined by the Department of |
|
Public Safety: |
|
(A) the Framework for Improving Critical |
|
Infrastructure Cybersecurity published by the National Institute |
|
of Standards and Technology (NIST); |
|
(B) the NIST's special publication 800-171; |
|
(C) the NIST's special publications 800-53 and |
|
800-53a; |
|
(D) the Federal Risk and Authorization |
|
Management Program's FedRAMP Security Assessment Framework; |
|
(E) the Center for Internet Security Critical |
|
Security Controls for Effective Cyber Defense; |
|
(F) the ISO/IEC 27000-series information |
|
security standards published by the International Organization for |
|
Standardization and the International Electrotechnical Commission; |
|
(G) the Health Information Trust Alliance's |
|
Common Security Framework; |
|
(H) the Secure Controls Framework; |
|
(I) the Service Organization Control Type 2 |
|
Framework; or |
|
(J) other similar frameworks or standards of the |
|
cybersecurity industry; |
|
(2) if the business entity is subject to its |
|
requirements, the current version of the following, as determined |
|
by the Department of Public Safety: |
|
(A) the Health Insurance Portability and |
|
Accountability Act of 1996 (42 U.S.C. Section 1320d et seq.); |
|
(B) Title V, Gramm-Leach-Bliley Act (15 U.S.C. |
|
Section 6801 et seq.); |
|
(C) the Federal Information Security |
|
Modernization Act of 2014 (Pub. L. No. 113-283); or |
|
(D) the Health Information Technology for |
|
Economic and Clinical Health Act (Division A, Title XIII, and |
|
Division B, Title IV, Pub. L. No. 111-5); and |
|
(3) if applicable to the business entity, a current |
|
version of the Payment Card Industry Data Security Standard, as |
|
determined by the Department of Public Safety. |
|
(c) If any standard described by Subsection (b)(1) is |
|
published and updated, a business entity's cybersecurity program |
|
continues to meet the requirements of a program under this section |
|
if the entity updates the program to meet the updated standard not |
|
later than the 180th day after the date on which the standard is |
|
published. |
|
(d) The scale and scope of a cybersecurity program under |
|
this section must be based on: |
|
(1) the size and complexity of the business entity; |
|
(2) the nature and scope of the activities of the |
|
business entity; |
|
(3) the sensitivity of the personal identifying |
|
information or sensitive personal information; and |
|
(4) the cost and availability of tools to improve |
|
information security and reduce vulnerabilities. |
|
Sec. 542.005. AUTHORITY OF ATTORNEY GENERAL NOT AFFECTED. |
|
This chapter may not be construed to limit the authority of the |
|
attorney general to seek any legal or equitable remedy under the |
|
laws of this state. |
|
Sec. 542.006. CLASS ACTION CERTIFICATION NOT AFFECTED. |
|
This chapter does not affect the certification of an action as a |
|
class action. |
|
SECTION 2. Section 542.003, Business & Commerce Code, as |
|
added by this Act, applies only to a cause of action that accrues on |
|
or after the effective date of this Act. |
|
SECTION 3. This Act takes effect September 1, 2025. |