RMWBH Law – A Full Service Law FirmRMWBH Law – A Full Service Law FirmRMWBH Law – A Full Service Law FirmRMWBH Law – A Full Service Law Firm
  • HOME
  • OUR FIRM
    • MISSION, VISION AND VALUES
    • BOARD CERTIFIED ATTORNEYS
    • LOCATIONS
  • ATTORNEYS
  • PRACTICE AREAS
    • COMMUNITY ASSOCIATION LAW
    • CONSTRUCTION LAW
    • CORPORATE, SECURITIES, AND BUSINESS LAW
    • CYBER RISK
    • LABOR AND EMPLOYMENT
    • LITIGATION
      • APPELLATE
      • ARBITRATION
      • COMMERCIAL LITIGATION
      • INSURANCE DEFENSE
      • FIDUCIARY LITIGATION
      • PROFESSIONAL LIABILITY
    • REAL ESTATE PRACTICE
      • LAND USE
      • REAL ESTATE DEVELOPMENT
      • REAL ESTATE FINANCING
      • REAL ESTATE TRANSACTION
  • PUBLICATIONS
    • BLOG
      • CORPORATE LAW BLOG
      • PROPERTY OWNERS ASSOCIATION BLOG
      • REAL ESTATE BLOG
    • COMMUNITY ASSOCIATION NEWSLETTER
    • IN THE NEWS
    • WEBINARS
    • SINGLE-FAMILY PROPERTY CODE BOOK
    • CONDOMINIUM PROPERTY CODE BOOK
  • EDUCATION
  • CAREERS
  • CONTACT US
  • MAKE A PAYMENT
NextPrevious

Cybersecurity and PII in POAs

By Eric Tonsul | Community Association Newsletter, Community Associations, HOA, Property Owners Association | Comments are Closed | 5 February, 2024 | 0

The advance of technology has had a great impact on the way businesses perform their day-to-day functions. Emerging software and other technology enhancements have increased efficiency and performance across a multitude of industries, but it has opened up new vulnerabilities to cyberattacks. Property owners associations (POAs) and management companies are particularly vulnerable due to their lack of a strong IT structure and the amount of sensitive homeowner Personal Identifying Information (PII) held throughout their systems. POAs should be preparing for the eventuality of a cyberattack by understanding what defines PII, the laws Texas has relating to cyberattacks and the potential ramifications for the organizations attacked, as well as steps that can be taken to protect PII and prevent cyberattacks.

What is PII?

Personal identifying information are the identifiers associated with individuals that governments assign and organizations collect to help separate records. In Texas, PII is defined by Sec. 521.002 of the Business and Commerce Code to include:

  • A person’s name, social security number, date of birth, or government-issued identification number;
  • mother’s maiden name;
  • unique biometric data, including the individual’s fingerprint, voice print, and retina or iris image;
  • unique electronic identification number, address, or routing code; and
  • telecommunication access device as defined by Section 32.51, Penal Code.
  • An individual’s first name or first initial and last name in combination with any one or more of the following items, if the name and the items are not encrypted:
    • Social security number;
    • Driver’s license number or government-issued identification number; or
    • Account number or credit or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account; or
  • Information that identifies an individual and relates to:
    • The physical or mental health or condition of the individual;
    • The provision of health care to the individual; or
    • Payment for the provision of health care to the individual

Texas Laws for PII

Should a breach of PII occur, Texas has outlined notice requirements in Sec. 521.053 of the Business and Commerce Code for organizations to give to the person(s) whose data was compromised. The notice must be given no later than 60 days after the data breach, and the notice is defined as: written notice to person’s last known address, electronic notice, i.e., email address, or notice as provided by Subsection (f) of 521.053.

Sec. 521.002(f)  would most likely not apply to individual POAs, but it could apply to larger management companies should a major cybersecurity attack occur. Subsection (f) states if the person required to give notice under Subsection (b) or (c) demonstrates that the cost of providing notice would exceed $250,000, the number of affected persons exceeds 500,000, or the person does not have sufficient contact information, the notice may be given by:

(1)  electronic mail, if the person has electronic mail addresses for the affected persons;

(2)  conspicuous posting of the notice on the person’s website; or

(3)  notice published in or broadcast on major statewide media.

Notice may be delayed at the request of law enforcement to not compromise an ongoing investigation.

Along with detailing how the notice should be sent to the person(s) affected by the cybersecurity breach, 521.053(i) also details how the Texas Attorney General is required to be notified as soon as practically possible, but no later than 30 days if more than 250 Texas residents are affected. The notice must be submitted using an online form, which can be found at this website, and the notice must include the following:

(1)  a detailed description of the nature and circumstances of the breach or the use of sensitive personal information acquired as a result of the breach;

(2)  the number of residents of this state affected by the breach at the time of notification;

(3)  the number of affected residents that have been sent a disclosure of the breach by mail or other direct method of communication at the time of notification;

(4)  the measures taken by the person regarding the breach;

(5)  any measures the person intends to take regarding the breach after the notification under this subsection; and

(6)  information regarding whether law enforcement is engaged in investigating the breach.

Failure to abide by the notice requirements can result in extensive financial penalties. The state may issue civil penalties up to $100 per record for each consecutive day effective notice, as outlined by Sec. 521.053(b) is not completed. Total penalties may not exceed $250,000 for all individuals in a single breach.

Cybersecurity for POAs

If the risk of sizeable civil penalties is not enough to persuade readers to update their cybersecurity plan, how about the cost of the data breach alone? On average, an organization affected by a cybersecurity attack where PII was stolen will pay an average of $150 PER RECORD. With individual POAs holding thousands of records, and management companies holding hundreds of thousands, the potential costs for a significant cyber security data breach of PII could be into the millions of dollars. This type of cost could be crippling for both the POA and management company. That is why having an effective cybersecurity plan with policies and procedures in place for those handling sensitive PII is crucial.

These plans can vary from POA to POA and management company to management company, but including training that teaches the user how to recognize the difference between spam, phishing and social engineering attacks can be effective because it reinforces best practices, highlights cybersecurity risks and users learn how to recognize threats and stop the threat from becoming a data breach.

In addition, having policies in place that require routine password changes and/or two factor authentication on software holding PII can help reduce the threat of a cybersecurity breach.

As technology and the use of technology evolves in the coming years, cybersecurity attacks and threats to PII are becoming more sophisticated. POAs and management companies will need to prepare for the inevitability that an attempted data breach will occur. By putting plans into place and working with your insurance brokers to ensure the appropriate levels of cybersecurity coverage are in place, you can ensure that the PII is secure and the POA is protected.

cybersecurity, eric tonsul, pii, pii laws
Avatar photo

Eric Tonsul

Eric Tonsul is a Shareholder in the firm’s Real Estate section as a leader of the Community Association Team. His practice includes representation of land developers, community associations, condominium associations and other common interest communities. Eric is Board Certified in Property Owners Association Law by the Texas Board of Legal Specialization. Eric graduated from South Texas College of Law in 2000.

More posts by Eric Tonsul

Related Posts

  • The Basics of the ACC

    By Eric Tonsul | Comments are Closed

    Warmer temps are finally here and after hours of scrolling through garden setups and DIY videos on TikTok, homeowners may be feeling inspired to add on or remodel the exterior of their homes and updateRead more

  • Why You Should Not Wait to Begin Collections

    By Cliff Davis | Comments are Closed

    Assessments form the financial lifeblood of a property owners association (“POA”). In the event that an owner does not pay their assessments, the results can be detrimental to the long-term health of the POA. Therefore,Read more

  • Tips to Make the Annual Meeting a Success

    By Cliff Davis | Comments are Closed

    The end of the year is quickly approaching and for many POAs that means the annual meeting is upcoming. The annual meeting provides members the opportunity to come together, hear from their directors on theRead more

  • Can a POA Take Action Against Hoarders?

    By Ashley Koirtyohann | Comments are Closed

    Many POAs have questions about how they can address hoarding by a homeowner in the community. Unfortunately, the best path forward is not always clear. In addition to the limitations of a POA’s governing documents,Read more

  • Pitfalls of the POA Assessment Collection Process

    By Noelle Hicks | Comments are Closed

    The lifeblood of all types of property owners associations (POAs) is the collection of monthly, quarterly, or annual assessments.  Assessments pay for things such as common area maintenance and insurance, amenities like pools, gyms andRead more

NextPrevious

Subscribe to Our Email Updates

Recent Posts

  • Is This the Right Price for POA Vendor Contracts?
  • The Art of Being a POA Board Member
  • Fannie Mae & Freddie Mac’s New Regulations Require Condos to Raise Assessments
  • The Basics of the ACC
  • POA Law 101: The Texas Property Code Chapters That Community Managers and Board Members Need to Know
Copyright 2026 RMWBH PC | All Rights Reserved | Terms & Conditions | Privacy Statement
  • HOME
  • OUR FIRM
    • MISSION, VISION AND VALUES
    • BOARD CERTIFIED ATTORNEYS
    • LOCATIONS
  • ATTORNEYS
  • PRACTICE AREAS
    • COMMUNITY ASSOCIATION LAW
    • CONSTRUCTION LAW
    • CORPORATE, SECURITIES, AND BUSINESS LAW
    • CYBER RISK
    • LABOR AND EMPLOYMENT
    • LITIGATION
      • APPELLATE
      • ARBITRATION
      • COMMERCIAL LITIGATION
      • INSURANCE DEFENSE
      • FIDUCIARY LITIGATION
      • PROFESSIONAL LIABILITY
    • REAL ESTATE PRACTICE
      • LAND USE
      • REAL ESTATE DEVELOPMENT
      • REAL ESTATE FINANCING
      • REAL ESTATE TRANSACTION
  • PUBLICATIONS
    • BLOG
      • CORPORATE LAW BLOG
      • PROPERTY OWNERS ASSOCIATION BLOG
      • REAL ESTATE BLOG
    • COMMUNITY ASSOCIATION NEWSLETTER
    • IN THE NEWS
    • WEBINARS
    • SINGLE-FAMILY PROPERTY CODE BOOK
    • CONDOMINIUM PROPERTY CODE BOOK
  • EDUCATION
  • CAREERS
  • CONTACT US
  • MAKE A PAYMENT
RMWBH Law – A Full Service Law Firm
XWe use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information | Read More
DECLINEACCEPTCookie settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
Save & Accept
Powered by CookieYes Logo