Select Page

New Texas Law Offers Cybersecurity Safe Harbor for Small Businesses

On June 20, 2025, Governor Greg Abbott signed Senate Bill 2610 into law, adding Texas to the growing roster of jurisdictions that extend a statutory “safe harbor” to businesses that adopt and maintain robust cybersecurity programs.  The new measure, which becomes effective on September 1, 2025, amends the Business and Commerce Code to provide businesses with fewer than 250 employees a shield against exemplary damages in civil litigation arising out of a data breach, provided that the organization can demonstrate compliance with the requirements set forth in the statute.  While S.B. 2610 does not insulate covered entities from compensatory damages or other forms of relief, the prospect of eliminating punitive-type exposure materially recalibrates litigation risk and, by extension, may influence the settlement posture of plaintiffs’ lawyers, insurers, and indemnified counterparties in the wake of a cyber incident.

To invoke the safe harbor, a qualifying organization that “owns or licenses” computerized personal identifying information or sensitive personal information must implement, document, and reasonably maintain a cybersecurity program that incorporates administrative, technical, and physical safeguards commensurate with the organization’s size, complexity, and resources.  The program must conform to an industry-recognized framework—examples expressly referenced in the bill include the National Institute of Standards and Technology (NIST) frameworks, the Center for Internet Security (CIS) Critical Security Controls, the Health Insurance Portability and Accountability Act (HIPAA) Security Rule (when otherwise applicable), and the Payment Card Industry Data Security Standard (PCI DSS)—and it must be designed to accomplish three core objectives: protecting the confidentiality, integrity, and availability of personal and sensitive data; detecting and mitigating threats or hazards that could compromise that information; and preventing unauthorized access or acquisition that would create a material risk of identity theft or other fraud for the affected individuals.

Recognizing that a “one-size-fits-all” mandate could impose unreasonable burdens on micro-enterprises, the Texas Legislature adopted a sliding-scale approach keyed to headcount.  Businesses with fewer than twenty employees may satisfy the statute by implementing baseline controls such as password policies and appropriate employee  cybersecurity training.  Organizations employing between twenty and ninety-nine individuals must implement the controls identified in CIS Controls Implementation Group 1, a curated subset of cybersecurity best practices designed for entities with modest IT resources.  Finally, companies with one hundred to two hundred forty-nine employees must adhere to a comprehensive, industry-recognized framework such as the NIST Cybersecurity Framework; an applicable federal framework such as the HIPAA Security standards when the entity is otherwise subject to HIPAA; or if applicable, PCI DSS when the entity processes cardholder data. Importantly, the program must be tailored to the organization’s operational profile and must be re-evaluated as material changes in risk, technology, or regulatory expectations occur.

S.B. 2610 distinguishes itself from other state safe harbor regimes in several ways.  The Utah Cybersecurity Affirmative Defense Act, for example, prohibits reliance on its safe harbor if the business had actual notice of a specific vulnerability, failed to act within a “reasonable” time, and that lapse precipitated a breach.  Texas imposes no analogous “actual notice” disqualifier, thereby affording a more forgiving pathway to protection so long as the baseline framework requirements remain in force.  By contrast, Ohio’s Cybersecurity Safe Harbor Act confers an affirmative defense to any tort claim alleging that failure to implement reasonable cybersecurity controls proximately caused a data breach.  Texas stopped short of that broader shield, limiting the defense to exemplary damages only—a legislative compromise that preserves the deterrent and compensatory functions of ordinary damages while rewarding organizations that invest in preventive controls.  Notably, the Texas statute also applies solely to small entities, whereas Ohio’s safe harbor extends to businesses of any size that adopt a recognized cybersecurity framework.

For small organizations operating in Texas, the new law offers both an incentive and a roadmap.  To maximize the protective value of the statute, covered entities should undertake a data inventory to confirm that the personal or sensitive information in their possession falls within the scope of the statute, assess current controls against the applicable framework benchmarks, remediate any identified gaps, and establish documented governance processes—policies, procedures, training programs, vendor management protocols, and incident response playbooks—that evidence ongoing compliance.  Because the safe harbor is contingent on the cybersecurity program being “reasonably designed” and “reasonably implemented,” mere adoption of a policy manual or purchase of off-the-shelf software will not suffice.  Continuous monitoring, periodic risk assessments, and board- or owner-level oversight will be essential to sustain eligibility. Although S.B. 2610 cannot eliminate all litigation or regulatory exposure stemming from a data breach, it materially enhances the risk-benefit calculus for small businesses willing to adopt recognized best practices.  Given the statute’s September 1, 2025, effective date, small organizations should engage counsel, cybersecurity professionals, and insurance advisors now to align their practices with the new statutory criteria and to preserve evidence of compliance that can be deployed defensively should a breach occur.  By operationalizing the framework requirements in advance, businesses can not only avail themselves of the new exemplary-damage shield but also materially reduce the likelihood and severity of a breach in the first instance.

HHS Office for Civil Rights Resolves Medical Practice Ransomware Cyberattack

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently issued its second-ever settlement for a ransomware...

Key Takeaways from DoorDash’s Settlement with the California Attorney General on Consumer Data Privacy

On February 20, 2025, the Securities and Exchange Commission (SEC) announced the formation of the Cyber and Emerging Technologies Unit (CETU), which...

CPPA to Resume Enforcement of CPRA Regulations

On February 9, 2024, the California Third Appellate District Court of Appeal made a significant ruling regarding the enforcement timeline of the...

NIST Releases SP 800-66r2: Implementing the HIPAA Security Rule

The National Institute of Standards and Technology (NIST) has recently published Special Publication 800-66r2, titled "Implementing the Health...

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

Warby Parker’s $1.5 Million HIPAA Penalty Highlights Critical Cybersecurity Obligations for Healthcare Entities

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has imposed a $1,500,000 civil money penalty against Warby Parker, Inc., following a cybersecurity breach that compromised the protected health information (PHI) of nearly 200,000 individuals. Between September and November 2018, unauthorized third parties exploited “credential stuffing” attacks—using credentials obtained from unrelated breaches—to access customer accounts. Subsequent similar breaches occurred in April 2020 and June 2022.This enforcement action underscores the necessity for organizations to proactively safeguard ePHI and comply with HIPAA Security Rule requirements to avoid substantial penalties and protect consumer trust.

Key Takeaways for Healthcare Entities:

  • Comprehensive Risk Analysis: Ensure your organization conducts thorough risk assessments to identify and address vulnerabilities in electronic PHI (ePHI) systems. HHS has recently taken a strict approach to scrutinizing the existence and substance of risk assessments. Therefore, it is important to ensure your risk assessment is carefully crafted to pass legal scrutiny. 

  • Robust Security Measures: Implement and regularly update security protocols to mitigate identified risks to ePHI.

  • Continuous Monitoring: Establish procedures for ongoing review of information system activities to detect and respond to unauthorized access promptly.

  • Credential Management: Be vigilant against credential stuffing attacks by enforcing strong password policies and multi-factor authentication.

Original Article: “HHS Office for Civil Rights Imposes a $1,500,000 Civil Money Penalty Against Warby Parker in HIPAA Cybersecurity Hacking Investigation,” HHS.gov, February 20, 2025, https://www.hhs.gov/about/news/2025/02/20/hhs-imposes-1500000-penalty-against-warby-parker-hipaa-hacking.html

New Texas Law Offers Cybersecurity Safe Harbor for Small Businesses

On June 20, 2025, Governor Greg Abbott signed Senate Bill 2610 into law, adding Texas to the growing roster of jurisdictions that extend a statutory...

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

Securing America’s Ports: Biden Administration Takes Action on Maritime Cybersecurity

The Biden administration is set to issue an Executive Order to enhance the cybersecurity of U.S. ports and bolster maritime security, supported by a...

Warby Parker’s $1.5 Million HIPAA Penalty Highlights Critical Cybersecurity Obligations for Healthcare Entities

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has imposed a $1,500,000 civil money penalty against Warby...

Colorado House Bill HB24-1130: Strengthening Biometric Data Protections

Colorado's commitment to enhancing data privacy reaches new heights with the proposed amendments introduced in House Bill HB24-1130. This bill seeks...

NIST Releases SP 800-66r2: Implementing the HIPAA Security Rule

The National Institute of Standards and Technology (NIST) has recently published Special Publication 800-66r2, titled “Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide.” This updated guidance provides valuable insights and recommendations for healthcare organizations seeking to comply with the HIPAA Security Rule.

The HIPAA Security Rule mandates that covered entities and business associates implement safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). Compliance with these requirements is essential for bolstering organizational resilience and ensuring the privacy and security of patient data.

NIST’s release of SP 800-66r2 underscores the importance of robust cybersecurity practices in healthcare organizations. By following the guidance outlined in this publication, covered entities and business associates can strengthen their security posture, mitigate risks, and ensure compliance with the HIPAA Security Rule. As threats to the confidentiality and integrity of ePHI continue to evolve, leveraging resources such as SP 800-66r2 is essential for safeguarding patient data and maintaining regulatory compliance.

Texas Data Privacy and Security Act – Part 1: Applicability 

In a digital era marred by big data monetization and weaponization and culminating in a renewed privacy awakening, Texas has taken a substantial...

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

LockBit Ransom Group Disrupted By Law Enforcement

The LockBit ransomware group has been successfully disrupted by law enforcement, marking a significant victory in the ongoing battle against...

Warby Parker’s $1.5 Million HIPAA Penalty Highlights Critical Cybersecurity Obligations for Healthcare Entities

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has imposed a $1,500,000 civil money penalty against Warby...

CPPA to Resume Enforcement of CPRA Regulations

On February 9, 2024, the California Third Appellate District Court of Appeal made a significant ruling regarding the enforcement timeline of the...

HHS Office for Civil Rights Resolves Medical Practice Ransomware Cyberattack

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently issued its second-ever settlement for a ransomware cyberattack. The incident involved a healthcare provider facing a ransomware attack, compromising the protected health information (PHI) of over 14,000 individuals. The settlement emphasizes the importance of implementing comprehensive cybersecurity measures to protect sensitive patient data. The healthcare provider agreed to pay a $40,000 settlement and implement a robust corrective action plan to enhance its cybersecurity posture and safeguard PHI. This resolution underscores the OCR’s growing expectations of full compliance with HIPAA Security Rule obligations and its commitment to enforcing HIPAA regulations and holding entities accountable for protecting patient information from cyber threats.

Ransomware attacks, where cybercriminals encrypt data and demand payment for its release, pose a grave threat to healthcare organizations and the patients they serve. These attacks not only disrupt critical healthcare services but also jeopardize patient confidentiality and privacy. The consequences of a successful ransomware attack can be devastating, resulting in financial losses, reputational damage, and, most importantly, compromised patient care.

As such, healthcare organizations must remain vigilant and proactive in defending against these malicious threats. Investing in robust cybersecurity measures is paramount in safeguarding healthcare data from ransomware attacks. This includes implementing strong encryption protocols, regularly updating security software, and conducting comprehensive employee training on cybersecurity best practices. Additionally, healthcare organizations should prioritize the adoption of multi-layered security solutions and employ advanced threat detection technologies to detect and mitigate potential threats before they escalate.

This HHS settlement clearly demonstrates that protecting healthcare data from ransomware attacks is not only a legal and ethical imperative but also essential for maintaining the integrity of patient care.

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

Key Takeaways from DoorDash’s Settlement with the California Attorney General on Consumer Data Privacy

On February 20, 2025, the Securities and Exchange Commission (SEC) announced the formation of the Cyber and Emerging Technologies Unit (CETU), which...

NIST Releases SP 800-66r2: Implementing the HIPAA Security Rule

The National Institute of Standards and Technology (NIST) has recently published Special Publication 800-66r2, titled "Implementing the Health...

Texas Data Privacy and Security Act – Part 1: Applicability 

In a digital era marred by big data monetization and weaponization and culminating in a renewed privacy awakening, Texas has taken a substantial...

LockBit Ransom Group Disrupted By Law Enforcement

The LockBit ransomware group has been successfully disrupted by law enforcement, marking a significant victory in the ongoing battle against...

Securing America’s Ports: Biden Administration Takes Action on Maritime Cybersecurity

The Biden administration is set to issue an Executive Order to enhance the cybersecurity of U.S. ports and bolster maritime security, supported by a $20 billion investment in port infrastructure. This initiative aims to fortify supply chains and domestic manufacturing capacity for safe and secure cranes. The complex Marine Transportation System, crucial for the nation’s $5.4 trillion economic activity, faces increasing cyber threats. The Executive Order will grant the Department of Homeland Security expanded authority to address maritime cyber threats and mandate reporting of cyber incidents endangering ports. The U.S. Coast Guard will issue directives on cyber risk management for cranes manufactured by China at strategic seaports. Proposed cybersecurity rules for the Marine Transportation System will establish minimum standards to mitigate cyber threats. Additionally, investments in port infrastructure will bring back U.S. manufacturing capacity, exemplifying the administration’s commitment to securing critical infrastructure and strengthening supply chains. These actions align with the administration’s broader efforts to invest in America’s economic and national security.

Texas Data Privacy and Security Act – Part 1: Applicability 

In a digital era marred by big data monetization and weaponization and culminating in a renewed privacy awakening, Texas has taken a substantial...

HHS Office for Civil Rights Resolves Medical Practice Ransomware Cyberattack

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently issued its second-ever settlement for a ransomware...

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

New Texas Law Offers Cybersecurity Safe Harbor for Small Businesses

On June 20, 2025, Governor Greg Abbott signed Senate Bill 2610 into law, adding Texas to the growing roster of jurisdictions that extend a statutory...

Colorado House Bill HB24-1130: Strengthening Biometric Data Protections

Colorado's commitment to enhancing data privacy reaches new heights with the proposed amendments introduced in House Bill HB24-1130. This bill seeks...

LockBit Ransom Group Disrupted By Law Enforcement

The LockBit ransomware group has been successfully disrupted by law enforcement, marking a significant victory in the ongoing battle against cybercrime. This notorious group, known for its extortion tactics, has caused immense damage to countless individuals and organizations.

Law enforcement agencies from around the world collaborated in a joint operation to dismantle the infrastructure of LockBit. This evnet sends a powerful message to cybercriminals that their activities will not go unpunished.

LockBit ransomware has been responsible for numerous high-profile attacks, targeting businesses and institutions of all sizes. Their sophisticated techniques and encryption methods have made it incredibly challenging for victims to regain control of their systems and data. As a result, the group has extorted significant sums of money from its victims, causing financial losses and reputational damage.

The takedown of LockBit not only prevents further harm to potential victims but also serves as a crucial deterrent to other cybercriminals. It demonstrates the commitment of law enforcement agencies to protect individuals, businesses, and society as a whole from the devastating impact of ransomware attacks.

While this achievement marks a significant step forward, it is essential to remain vigilant and take proactive measures to protect against future threats. Implementing robust cybersecurity measures, regularly backing up data, and staying informed about the latest trends in cybercrime are crucial steps every individual and organization should take.

 

CPPA to Resume Enforcement of CPRA Regulations

On February 9, 2024, the California Third Appellate District Court of Appeal made a significant ruling regarding the enforcement timeline of the...

FTC Settles Data Broker Settlement Banning Sale of Sensitive Location Data

Organizations that collect, use, purchase, or sell sensitive location data should remain cautious of its data practices and the recent FTC...

NIST Releases SP 800-66r2: Implementing the HIPAA Security Rule

The National Institute of Standards and Technology (NIST) has recently published Special Publication 800-66r2, titled "Implementing the Health...

New Jersey Enacts Privacy Law

On January 16, 2024, New Jersey became the first state in 2024 to join a growing list of states implementing comprehensive consumer data privacy...

Warby Parker’s $1.5 Million HIPAA Penalty Highlights Critical Cybersecurity Obligations for Healthcare Entities

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has imposed a $1,500,000 civil money penalty against Warby...