I Need IT Support Now
Texas Cybersecurity
Shane

Texas SB 2610: The Cybersecurity Safe Harbor Every Houston SMB Should Know About

The Texas Law That Makes Cybersecurity A Business Strategy – Punitive Damage Protection For Businesses That Prepare Before The Breach

Texas SB 2610 Cybersecurity Safe Harbor: What Houston SMBs Need to Know | CinchOps
Texas Cybersecurity Legislation
Texas SB 2610: The Cybersecurity Safe Harbor Every Houston SMB Should Know About

A new Texas law shields businesses from punitive damages in breach lawsuits - but only if you qualify before an incident happens.

TL;DR
Texas SB 2610, effective September 1, 2025, protects businesses under 250 employees from punitive damages in data breach lawsuits - but only if they maintain a compliant cybersecurity program before a breach occurs. Requirements scale by company size.

Texas SB 2610 cybersecurity safe harbor law went into effect on September 1, 2025, and it changes the liability math for every small business in the Houston metro area that handles personal data. Governor Greg Abbott signed the bill on June 20, 2025, after it passed the Texas Senate unanimously (31-0) and cleared the House with strong bipartisan support.

The law is straightforward: if your business has fewer than 250 employees and you maintain a qualifying cybersecurity program, you're shielded from exemplary (punitive) damages in data breach lawsuits. If you don't have a qualifying program in place, you remain fully exposed to damages that can - and do - put small companies out of business.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.

Key point: SB 2610 is a "carrot, not a stick." It doesn't impose new cybersecurity requirements. It rewards businesses that proactively invest in cybersecurity with legal protection they didn't have before. Texas is the 6th state with safe harbor protections, joining Ohio, Utah, Connecticut, Iowa, and Tennessee. If you're already working with a managed IT provider on cybersecurity basics, you may already be closer to compliance than you think.
📜
What Is Texas SB 2610?
A cybersecurity safe harbor law that adds Chapter 542 to the Texas Business & Commerce Code.

Texas SB 2610 creates a legal safe harbor that prohibits plaintiffs from recovering exemplary damages in lawsuits arising from data breaches - but only when the business can demonstrate it had a compliant cybersecurity program running at the time of the incident. The bill was authored by Senator Cesar J. Blanco and co-sponsored by Senator Kelly Hancock.

Think of it this way. Two identical Houston businesses get hit by the same type of ransomware attack. Both lose customer data. One had documented cybersecurity policies, employee training, and a recognized framework in place. The other had a firewall and good intentions. In a lawsuit, the first business is shielded from punitive damages. The second one isn't.

That difference can be worth hundreds of thousands of dollars - or more. Punitive damages often exceed actual damages by significant multiples. For a 50-person company, that gap can be the difference between surviving an incident and closing the doors.

Why This Matters for Houston SMBs

Data breach class action lawsuits aren't just targeting Fortune 500 companies anymore. Plaintiffs' attorneys are filing against small and mid-sized businesses, even when a breach affects a relatively small number of people. Cybercrime cost Texas $1 billion in 2023. Small businesses face 43% of all cyberattacks. In my 30 years working in IT the pattern is always the same: businesses don't take security seriously until after an incident. SB 2610 gives you a financial reason to act before that happens.

🏢
Who Qualifies for SB 2610 Protection?
Three criteria determine whether your business can claim safe harbor.

SB 2610 safe harbor protection applies to Texas business entities that meet all three of these conditions:

  • Fewer than 250 employees. This covers the vast majority of Houston-area businesses - from a 12-person law firm in Sugar Land to a 180-employee construction company in Katy.
  • Owns or licenses computerized data containing sensitive personal information. If you store employee Social Security numbers, customer financial data, health records, or government-issued ID numbers in digital form, this applies to you.
  • Had a compliant cybersecurity program implemented and maintained at the time of the breach. This is the critical qualifier. You cannot implement a program after an incident and claim retroactive protection.

If your business collects, stores, or manages data tied to individuals - whether those are customers, patients, employees, or vendors - SB 2610 probably applies to your operations. The question is whether you're positioned to claim the protection it offers.

🔒

What Counts as Sensitive Personal Information?

Under Texas law, sensitive personal information includes unencrypted digital data that combines a person's name with: Social Security numbers, driver's license or government ID numbers, financial account numbers with access credentials, or health-related information (diagnoses, treatment records, payment data). Public records and legally public information are excluded.

Houston businesses in industries like legal services, CPA/accounting, and wealth management handle this type of data every day.

📊
Tiered Cybersecurity Requirements by Business Size
SB 2610 scales expectations to match your company's resources and capacity.

One of the smartest aspects of SB 2610 is its tiered approach. The law recognizes that a 15-person accounting practice in Cypress doesn't have the same IT resources as a 200-employee manufacturing company in West Houston. Requirements are matched to what's realistic for each size category.

Tier 1

Fewer Than 20 Employees

Simplified requirements focused on foundational security practices that don't require dedicated IT staff.

  • Documented password policies
  • Employee cybersecurity training
  • Basic data protection protocols
  • Written security policies
Tier 2

20-99 Employees

Moderate requirements aligned with CIS Controls Implementation Group 1 - a practical set of prioritized security actions.

  • CIS Controls IG1 implementation
  • Asset inventory and management
  • Vulnerability management
  • Access control enforcement
  • Security monitoring basics
Tier 3

100-249 Employees

Full compliance with a recognized industry cybersecurity framework appropriate to your operations.

  • NIST, ISO 27001, CIS, or equivalent
  • Full framework implementation
  • Regular risk assessments
  • Incident response planning
  • Continuous monitoring and review

Even the simplest tier requires documented safeguards and active training. "We have antivirus software" is not a cybersecurity program. We see this at least twice a month with businesses in the Katy and Sugar Land area - they assume basic IT tools equal compliance, and they're wrong.

🔧
Approved Cybersecurity Frameworks Under SB 2610
The law recognizes several industry-standard frameworks for compliance.

For businesses with 100-249 employees (or any business choosing to adopt a full framework), SB 2610 lists specific recognized frameworks. The program must conform to at least one of these:

  • NIST Cybersecurity Framework (CSF) - The most widely adopted general-purpose framework, and a strong choice for Houston-area businesses of all types
  • NIST SP 800-171 and NIST SP 800-53/800-53a - More detailed controls, common with government contractors
  • CIS Critical Security Controls - Practical, prioritized actions with clear implementation groups
  • ISO/IEC 27000-series - Globally recognized information security management standards
  • FedRAMP Security Assessment Framework - Required for cloud service providers working with federal agencies
  • HITRUST CSF - Common in healthcare and financial services
  • Secure Controls Framework (SCF) - A meta-framework mapping to multiple standards
  • SOC 2 Framework - Trust services criteria covering security, availability, and confidentiality

Businesses already subject to HIPAA, Gramm-Leach-Bliley (GLBA), FISMA, HITECH, or PCI DSS will qualify if they maintain current compliance with those standards. If your CPA firm in Richmond is already handling GLBA requirements, or your medical practice in Missouri City is HIPAA-compliant, you may already meet the threshold.

Framework Updates: What You Need to Know

When a recognized framework publishes an update, SB 2610 gives businesses time to adapt. You must update your cybersecurity program by whichever comes later: the published implementation date in the updated standard, or one year from the date the update is published. This is a reasonable grace period that prevents businesses from falling out of compliance overnight.

⚠️
What SB 2610 Does Not Protect Against
The safe harbor has clear boundaries every business owner should understand.

SB 2610 is not a get-out-of-jail-free card. It specifically shields businesses from exemplary (punitive) damages only. You're still fully exposed to several categories of liability and enforcement:

  • Compensatory damages - Real losses including breach notification costs, data recovery expenses, credit monitoring services, and direct financial losses suffered by affected individuals
  • Texas Attorney General enforcement - The AG retains full authority to investigate and pursue legal or equitable remedies under Texas law
  • Federal regulatory investigations - FTC enforcement actions and other federal agency penalties remain unaffected
  • Breach notification requirements - Texas Business & Commerce Code Section 521.053 still requires timely notification of affected individuals
  • Class action certification - SB 2610 explicitly states it does not affect the certification of a class action lawsuit
  • Court injunctions - Courts can still issue injunctive relief requiring specific actions or changes

Existing penalties of $2,000 to $50,000 per violation for notification failures also remain in effect. SB 2610 removes one specific - but potentially devastating - category of financial exposure. The rest of the liability picture stays the same.

💡

Documentation Is Everything

If a breach happens and you end up in court, you'll need to prove your cybersecurity program was active and compliant before the incident. That means maintaining dated policies and procedures, evidence of implementation with timestamps, training completion records, risk assessment reports, audit logs, and vendor assessment documentation. Without this paper trail, you can't credibly claim safe harbor protection. A managed cybersecurity provider handles this documentation as part of ongoing service delivery.

🎯
How to Qualify for SB 2610 Protection
Practical steps to position your Houston business for safe harbor compliance.

Getting compliant isn't a one-weekend project, but it doesn't need to be a six-figure consulting engagement either. For most Houston-area SMBs in the 10-100 employee range, the path is clear and manageable with the right support.

Step 1: Determine Your Tier

Count your employees and identify which tier applies to your business. This determines the minimum standard you need to meet. A 35-person engineering firm in The Woodlands falls into Tier 2 (CIS Controls IG1). A 150-employee construction company in Katy needs a full framework under Tier 3.

Step 2: Assess Your Current Posture

Run a gap analysis against the framework that matches your tier. Where do you already have controls in place? Where are the gaps? If you've been working with an IT provider, you may have more coverage than you realize. If you haven't, this step gives you the honest picture.

Step 3: Implement the Gaps

Prioritize the missing controls based on risk. Don't try to do everything at once - start with the highest-impact items: multi-factor authentication, employee training, documented access controls, regular patching, and encrypted backups. These cover the most common attack vectors that hit small businesses.

Step 4: Document Everything

Written policies. Training records. Configuration screenshots. Audit logs. Risk assessment reports. Date every document. Version-control every update. This is the evidence that proves your program existed before a breach - and without it, safe harbor means nothing.

Step 5: Maintain and Update Continuously

A cybersecurity program that was compliant in 2025 won't necessarily pass review in 2027. Threats change. Frameworks get updated. Review your program at least annually, and update it when your framework publishes revisions or when your business changes significantly.

Business Size Framework Required Key Controls Typical Timeline
Under 20 Simplified requirements Password policies, security training 2-4 weeks
20-99 CIS Controls IG1 Asset inventory, access controls, patching, monitoring 4-8 weeks
100-249 NIST CSF, ISO 27001, CIS, SOC 2, or equivalent Full framework with risk assessments, incident response, continuous monitoring 2-4 months

How CinchOps Can Help

SB 2610 is exactly the kind of law that turns a reactive IT conversation into a strategic business decision. For Houston-area businesses with 10 to 200 employees, having the right managed IT partner means the difference between qualifying for safe harbor protection and hoping you never get sued.

  • Cybersecurity gap assessments to evaluate your current posture against SB 2610 tier requirements and identify exactly what needs attention
  • Framework implementation - from CIS Controls IG1 for smaller businesses to full NIST CSF deployment for companies approaching the 250-employee threshold
  • Documented policies and procedures that meet the evidentiary standard for safe harbor - timestamped, version-controlled, and audit-ready
  • Employee cybersecurity training programs that satisfy compliance requirements across all three tiers and actually reduce the risk of human-error breaches
  • Continuous monitoring and patch management to keep your program current as frameworks evolve and new threats emerge
  • Incident response planning that prepares your team for breach scenarios while documenting your preparedness for legal protection
  • Ongoing compliance documentation maintained as part of regular service delivery, so you're always ready to demonstrate safe harbor eligibility

Businesses across Houston, Katy, Sugar Land, Cypress, The Woodlands, and the broader West Houston corridor should treat SB 2610 compliance as a priority - not because it's required, but because the legal and financial protection it offers is too significant to ignore. Contact CinchOps at 281-269-6506 or visit cinchops.com/contact to schedule an SB 2610 readiness assessment.

Frequently Asked Questions

What is Texas SB 2610 and what protection does it offer small businesses?

Texas SB 2610 is a cybersecurity safe harbor law that took effect September 1, 2025. It shields businesses with fewer than 250 employees from exemplary (punitive) damages in data breach lawsuits, provided the business had a compliant cybersecurity program in place at the time of the breach. It does not protect against compensatory damages, regulatory penalties, or attorney general enforcement.

What cybersecurity framework does my Houston business need for SB 2610 compliance?

Requirements scale by business size. Companies with fewer than 20 employees need documented password policies and cybersecurity training. Businesses with 20-99 employees must implement CIS Controls Implementation Group 1. Companies with 100-249 employees must adopt a full recognized framework such as NIST Cybersecurity Framework, ISO 27001, CIS Critical Security Controls, SOC 2, or HITRUST CSF.

Can my business qualify for SB 2610 safe harbor protection after a data breach occurs?

No. SB 2610 safe harbor protection only applies if your cybersecurity program was implemented and maintained before the breach occurred. You cannot retroactively qualify by implementing controls after an incident. The law requires documented evidence that your program was active and compliant at the time of the breach.

Does SB 2610 apply to businesses outside of Texas?

SB 2610 applies to business entities operating in Texas. Data breaches affecting Texas residents can trigger lawsuits filed in Texas courts, even against out-of-state businesses. National vendors are increasingly adopting SB 2610-aligned cybersecurity standards to compete for Texas business and reduce multi-state litigation risk.

What types of data does SB 2610 cover as sensitive personal information?

Under Texas law, sensitive personal information includes unencrypted digital data combining a person's name with Social Security numbers, driver's license or government ID numbers, financial account numbers with access credentials, or health-related information including diagnoses, treatment records, and payment data. Publicly available records are excluded from this definition.

Sources

Discover More

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506