Emergency Breach Response Plan

Texas SB2610 Compliant • NIST Framework-Based

PRINT THIS • FILL IT OUT • KEEP IT ACCESSIBLE (NOT JUST ON YOUR COMPUTER)

This plan provides Safe Harbor Protection under Texas SB2610

BUSINESS BASICS
TEXAS SB2610 SAFE HARBOR COMPLIANCE

To qualify for protection from punitive damages, complete this section:

SB2610 Requirement:

Maintain documentation that your cybersecurity program was in place at the time of any breach. This form serves as part of that documentation.

CRITICAL PASSWORDS & ACCESS
EMERGENCY CONTACTS (Call in this order)

1. Trusted Tech Person/IT Support:

2. Business Insurance Agent (Cyber Insurance):

3. Business Attorney:

4. Bank/Financial Institution:

BACKUP INFORMATION
Test your backups quarterly!

A backup you haven't tested is a backup you don't have.

CUSTOMER/CLIENT DATA INVENTORY
BREACH RESPONSE PROCEDURE (NIST Framework-Based)
STEP 1: IMMEDIATE CONTAINMENT (First 0-2 hours)
  1. DISCONNECT affected devices from internet/network. Take photos of any ransom messages or suspicious activity. DO NOT pay ransoms without consulting professionals.
  2. CALL your emergency contacts in order listed above. Document who you called and when.
  3. Preserve evidence. Do not delete anything. Take screenshots, save logs, note what you observed.
  4. Document the incident - Write down everything: when discovered, what happened, who discovered it, what systems affected.
  5. Change passwords for critical accounts from a clean, unaffected device.
Do NOT:

Delete files, restart systems (unless instructed by IT), communicate publicly about breach, or attempt to "fix it yourself" without professional help.

STEP 2: ASSESSMENT & NOTIFICATION (First 24-72 hours)
  1. Work with your IT support/cybersecurity consultant to determine:
    • What data was accessed or stolen?
    • How many customers/clients are affected?
    • How did the breach occur?
    • What systems are compromised?
  2. File insurance claim with your cyber insurance provider (if applicable).
  3. Determine legal obligations:
    • If 250+ Texas residents affected: Report to TX Attorney General within 30 days
    • Notify affected individuals within 60 days
    • Check other state requirements if you have customers in multiple states
    • Industry-specific requirements (HIPAA, PCI-DSS, etc.)
  4. Consider law enforcement notification: Contact FBI Internet Crime Complaint Center (IC3) at www.ic3.gov or call local FBI field office.
  5. Prepare internal communications for employees about the incident and their role in response.
STEP 3: RECOVERY & REMEDIATION (Days to weeks)
  1. Eliminate the threat: Remove malware, close vulnerabilities, rebuild compromised systems from clean backups.
  2. Restore operations: Bring systems back online in order of priority, verify they're clean before reconnecting to network.
  3. Notify affected individuals (if required) - Include:
    • What happened and when
    • What information was involved
    • What you're doing about it
    • What they should do (credit monitoring, password changes, etc.)
    • Contact information for questions
  4. Monitor for further compromise: Watch for unusual activity for at least 90 days.
  5. Fulfill all legal notification requirements within required timeframes.

TEXAS BREACH NOTIFICATION CHECKLIST

STEP 4: POST-INCIDENT REVIEW (Within 30 days after recovery)
  1. Conduct lessons-learned meeting with response team:
    • What worked well?
    • What didn't work?
    • What should we do differently?
    • What gaps did we discover?
  2. Update security controls: Implement improvements to prevent similar incidents.
  3. Update this plan based on lessons learned.
  4. Update cybersecurity program documentation (required for SB2610 compliance).
  5. Conduct employee training on new procedures or identified weaknesses.
  6. Document the entire incident and response for future reference and compliance purposes.
  7. Review and update cyber insurance coverage if needed.
IMPORTANT RESOURCES
FBI Internet Crime Complaint Center (IC3): https://www.ic3.gov
NIST Cybersecurity Resources for Small Business: https://www.nist.gov/itl/smallbusinesscyber
Texas Identity Theft Enforcement and Protection Act (ITEPA):

Texas Business & Commerce Code § 521.001 et seq.

US-CERT (Cybersecurity & Infrastructure Security Agency): https://www.cisa.gov/report
24/7 Hotline: 1-888-282-0870
ACKNOWLEDGMENT
REVIEW & UPDATE THIS PLAN:
  • Annually (at minimum)
  • After any security incident
  • When personnel changes occur
  • When systems or processes change significantly
  • When laws or regulations change
Next scheduled review date:
CHECKLIST AFTER COMPLETING THIS FORM: