Texas SB 2610: The Cybersecurity Safe Harbor Every Houston SMB Should Know About
The Texas Law That Makes Cybersecurity A Business Strategy – Punitive Damage Protection For Businesses That Prepare Before The Breach
A new Texas law shields businesses from punitive damages in breach lawsuits - but only if you qualify before an incident happens.
Texas SB 2610 cybersecurity safe harbor law went into effect on September 1, 2025, and it changes the liability math for every small business in the Houston metro area that handles personal data. Governor Greg Abbott signed the bill on June 20, 2025, after it passed the Texas Senate unanimously (31-0) and cleared the House with strong bipartisan support.
The law is straightforward: if your business has fewer than 250 employees and you maintain a qualifying cybersecurity program, you're shielded from exemplary (punitive) damages in data breach lawsuits. If you don't have a qualifying program in place, you remain fully exposed to damages that can - and do - put small companies out of business.
CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.
Texas SB 2610 creates a legal safe harbor that prohibits plaintiffs from recovering exemplary damages in lawsuits arising from data breaches - but only when the business can demonstrate it had a compliant cybersecurity program running at the time of the incident. The bill was authored by Senator Cesar J. Blanco and co-sponsored by Senator Kelly Hancock.
Think of it this way. Two identical Houston businesses get hit by the same type of ransomware attack. Both lose customer data. One had documented cybersecurity policies, employee training, and a recognized framework in place. The other had a firewall and good intentions. In a lawsuit, the first business is shielded from punitive damages. The second one isn't.
That difference can be worth hundreds of thousands of dollars - or more. Punitive damages often exceed actual damages by significant multiples. For a 50-person company, that gap can be the difference between surviving an incident and closing the doors.
Why This Matters for Houston SMBs
Data breach class action lawsuits aren't just targeting Fortune 500 companies anymore. Plaintiffs' attorneys are filing against small and mid-sized businesses, even when a breach affects a relatively small number of people. Cybercrime cost Texas $1 billion in 2023. Small businesses face 43% of all cyberattacks. In my 30 years working in IT the pattern is always the same: businesses don't take security seriously until after an incident. SB 2610 gives you a financial reason to act before that happens.
SB 2610 safe harbor protection applies to Texas business entities that meet all three of these conditions:
- Fewer than 250 employees. This covers the vast majority of Houston-area businesses - from a 12-person law firm in Sugar Land to a 180-employee construction company in Katy.
- Owns or licenses computerized data containing sensitive personal information. If you store employee Social Security numbers, customer financial data, health records, or government-issued ID numbers in digital form, this applies to you.
- Had a compliant cybersecurity program implemented and maintained at the time of the breach. This is the critical qualifier. You cannot implement a program after an incident and claim retroactive protection.
If your business collects, stores, or manages data tied to individuals - whether those are customers, patients, employees, or vendors - SB 2610 probably applies to your operations. The question is whether you're positioned to claim the protection it offers.
What Counts as Sensitive Personal Information?
Under Texas law, sensitive personal information includes unencrypted digital data that combines a person's name with: Social Security numbers, driver's license or government ID numbers, financial account numbers with access credentials, or health-related information (diagnoses, treatment records, payment data). Public records and legally public information are excluded.
Houston businesses in industries like legal services, CPA/accounting, and wealth management handle this type of data every day.
One of the smartest aspects of SB 2610 is its tiered approach. The law recognizes that a 15-person accounting practice in Cypress doesn't have the same IT resources as a 200-employee manufacturing company in West Houston. Requirements are matched to what's realistic for each size category.
Fewer Than 20 Employees
Simplified requirements focused on foundational security practices that don't require dedicated IT staff.
- Documented password policies
- Employee cybersecurity training
- Basic data protection protocols
- Written security policies
20-99 Employees
Moderate requirements aligned with CIS Controls Implementation Group 1 - a practical set of prioritized security actions.
- CIS Controls IG1 implementation
- Asset inventory and management
- Vulnerability management
- Access control enforcement
- Security monitoring basics
100-249 Employees
Full compliance with a recognized industry cybersecurity framework appropriate to your operations.
- NIST, ISO 27001, CIS, or equivalent
- Full framework implementation
- Regular risk assessments
- Incident response planning
- Continuous monitoring and review
Even the simplest tier requires documented safeguards and active training. "We have antivirus software" is not a cybersecurity program. We see this at least twice a month with businesses in the Katy and Sugar Land area - they assume basic IT tools equal compliance, and they're wrong.
For businesses with 100-249 employees (or any business choosing to adopt a full framework), SB 2610 lists specific recognized frameworks. The program must conform to at least one of these:
- NIST Cybersecurity Framework (CSF) - The most widely adopted general-purpose framework, and a strong choice for Houston-area businesses of all types
- NIST SP 800-171 and NIST SP 800-53/800-53a - More detailed controls, common with government contractors
- CIS Critical Security Controls - Practical, prioritized actions with clear implementation groups
- ISO/IEC 27000-series - Globally recognized information security management standards
- FedRAMP Security Assessment Framework - Required for cloud service providers working with federal agencies
- HITRUST CSF - Common in healthcare and financial services
- Secure Controls Framework (SCF) - A meta-framework mapping to multiple standards
- SOC 2 Framework - Trust services criteria covering security, availability, and confidentiality
Businesses already subject to HIPAA, Gramm-Leach-Bliley (GLBA), FISMA, HITECH, or PCI DSS will qualify if they maintain current compliance with those standards. If your CPA firm in Richmond is already handling GLBA requirements, or your medical practice in Missouri City is HIPAA-compliant, you may already meet the threshold.
Framework Updates: What You Need to Know
When a recognized framework publishes an update, SB 2610 gives businesses time to adapt. You must update your cybersecurity program by whichever comes later: the published implementation date in the updated standard, or one year from the date the update is published. This is a reasonable grace period that prevents businesses from falling out of compliance overnight.
SB 2610 is not a get-out-of-jail-free card. It specifically shields businesses from exemplary (punitive) damages only. You're still fully exposed to several categories of liability and enforcement:
- Compensatory damages - Real losses including breach notification costs, data recovery expenses, credit monitoring services, and direct financial losses suffered by affected individuals
- Texas Attorney General enforcement - The AG retains full authority to investigate and pursue legal or equitable remedies under Texas law
- Federal regulatory investigations - FTC enforcement actions and other federal agency penalties remain unaffected
- Breach notification requirements - Texas Business & Commerce Code Section 521.053 still requires timely notification of affected individuals
- Class action certification - SB 2610 explicitly states it does not affect the certification of a class action lawsuit
- Court injunctions - Courts can still issue injunctive relief requiring specific actions or changes
Existing penalties of $2,000 to $50,000 per violation for notification failures also remain in effect. SB 2610 removes one specific - but potentially devastating - category of financial exposure. The rest of the liability picture stays the same.
Documentation Is Everything
If a breach happens and you end up in court, you'll need to prove your cybersecurity program was active and compliant before the incident. That means maintaining dated policies and procedures, evidence of implementation with timestamps, training completion records, risk assessment reports, audit logs, and vendor assessment documentation. Without this paper trail, you can't credibly claim safe harbor protection. A managed cybersecurity provider handles this documentation as part of ongoing service delivery.
Getting compliant isn't a one-weekend project, but it doesn't need to be a six-figure consulting engagement either. For most Houston-area SMBs in the 10-100 employee range, the path is clear and manageable with the right support.
Step 1: Determine Your Tier
Count your employees and identify which tier applies to your business. This determines the minimum standard you need to meet. A 35-person engineering firm in The Woodlands falls into Tier 2 (CIS Controls IG1). A 150-employee construction company in Katy needs a full framework under Tier 3.
Step 2: Assess Your Current Posture
Run a gap analysis against the framework that matches your tier. Where do you already have controls in place? Where are the gaps? If you've been working with an IT provider, you may have more coverage than you realize. If you haven't, this step gives you the honest picture.
Step 3: Implement the Gaps
Prioritize the missing controls based on risk. Don't try to do everything at once - start with the highest-impact items: multi-factor authentication, employee training, documented access controls, regular patching, and encrypted backups. These cover the most common attack vectors that hit small businesses.
Step 4: Document Everything
Written policies. Training records. Configuration screenshots. Audit logs. Risk assessment reports. Date every document. Version-control every update. This is the evidence that proves your program existed before a breach - and without it, safe harbor means nothing.
Step 5: Maintain and Update Continuously
A cybersecurity program that was compliant in 2025 won't necessarily pass review in 2027. Threats change. Frameworks get updated. Review your program at least annually, and update it when your framework publishes revisions or when your business changes significantly.
| Business Size | Framework Required | Key Controls | Typical Timeline |
|---|---|---|---|
| Under 20 | Simplified requirements | Password policies, security training | 2-4 weeks |
| 20-99 | CIS Controls IG1 | Asset inventory, access controls, patching, monitoring | 4-8 weeks |
| 100-249 | NIST CSF, ISO 27001, CIS, SOC 2, or equivalent | Full framework with risk assessments, incident response, continuous monitoring | 2-4 months |
How CinchOps Can Help
SB 2610 is exactly the kind of law that turns a reactive IT conversation into a strategic business decision. For Houston-area businesses with 10 to 200 employees, having the right managed IT partner means the difference between qualifying for safe harbor protection and hoping you never get sued.
- Cybersecurity gap assessments to evaluate your current posture against SB 2610 tier requirements and identify exactly what needs attention
- Framework implementation - from CIS Controls IG1 for smaller businesses to full NIST CSF deployment for companies approaching the 250-employee threshold
- Documented policies and procedures that meet the evidentiary standard for safe harbor - timestamped, version-controlled, and audit-ready
- Employee cybersecurity training programs that satisfy compliance requirements across all three tiers and actually reduce the risk of human-error breaches
- Continuous monitoring and patch management to keep your program current as frameworks evolve and new threats emerge
- Incident response planning that prepares your team for breach scenarios while documenting your preparedness for legal protection
- Ongoing compliance documentation maintained as part of regular service delivery, so you're always ready to demonstrate safe harbor eligibility
Businesses across Houston, Katy, Sugar Land, Cypress, The Woodlands, and the broader West Houston corridor should treat SB 2610 compliance as a priority - not because it's required, but because the legal and financial protection it offers is too significant to ignore. Contact CinchOps at 281-269-6506 or visit cinchops.com/contact to schedule an SB 2610 readiness assessment.
Frequently Asked Questions
What is Texas SB 2610 and what protection does it offer small businesses?
Texas SB 2610 is a cybersecurity safe harbor law that took effect September 1, 2025. It shields businesses with fewer than 250 employees from exemplary (punitive) damages in data breach lawsuits, provided the business had a compliant cybersecurity program in place at the time of the breach. It does not protect against compensatory damages, regulatory penalties, or attorney general enforcement.
What cybersecurity framework does my Houston business need for SB 2610 compliance?
Requirements scale by business size. Companies with fewer than 20 employees need documented password policies and cybersecurity training. Businesses with 20-99 employees must implement CIS Controls Implementation Group 1. Companies with 100-249 employees must adopt a full recognized framework such as NIST Cybersecurity Framework, ISO 27001, CIS Critical Security Controls, SOC 2, or HITRUST CSF.
Can my business qualify for SB 2610 safe harbor protection after a data breach occurs?
No. SB 2610 safe harbor protection only applies if your cybersecurity program was implemented and maintained before the breach occurred. You cannot retroactively qualify by implementing controls after an incident. The law requires documented evidence that your program was active and compliant at the time of the breach.
Does SB 2610 apply to businesses outside of Texas?
SB 2610 applies to business entities operating in Texas. Data breaches affecting Texas residents can trigger lawsuits filed in Texas courts, even against out-of-state businesses. National vendors are increasingly adopting SB 2610-aligned cybersecurity standards to compete for Texas business and reduce multi-state litigation risk.
What types of data does SB 2610 cover as sensitive personal information?
Under Texas law, sensitive personal information includes unencrypted digital data combining a person's name with Social Security numbers, driver's license or government ID numbers, financial account numbers with access credentials, or health-related information including diagnoses, treatment records, and payment data. Publicly available records are excluded from this definition.
Sources
- Texas SB 2610 bill text, 89th Legislature - Texas Legislature Online
- SB 2610 bill status and vote records - LegiScan
- SB 2610 analysis for Texas businesses - Bridgepoint Consulting
- SB 2610 qualification requirements and compliance guidance - GCS Technologies
- SB 2610 insights for managed service providers - Todyl
- Texas cybersecurity safe harbor for SMBs - HIPAA Journal