Privacy and Security
Server Logs/Log Analysis Tools: The Texas Ethics Commission uses server logs and log analysis tools to create summary statistics about the use of this Web site. The summary statistics are used for purposes such as assessing what information is of most interest to users, determining technical design specifications, and identifying system performance or problem areas.
The following information is an example of the type of information that may be collected for this analysis:
User/client hostname - The hostname (or IP address, if DNS is disabled) of the user/client requesting access.
HTTP header, "user-agent" - The user-agent information includes the type of browser used, the browser version, and the operating system it is running on.
HTTP header, "referer" - The referer specifies the page from which the user/client accessed the current page.
- System date - The date and time of the user/client request.
- Full request - The exact request the user/client made.
- Status - The status code the server returned to the user/client.
Content length - The content length, in bytes, of the document sent to the user/client.
- Method - The request method used.
- Universal Resource Identifier (URI) - The location of a resource on the server.
- Query string of the URI - Anything after the question mark in a URI.
- Protocol - The transport protocol and version used.
For site management functions, information is collected for analysis and statistical purposes. This information is not reported or used in any manner that would reveal personally identifiable information, and will not be released to any outside parties unless required to do so under applicable law.
For site security purposes and to ensure that the site remains available to all users, the Commission uses software to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes. Unauthorized attempts to upload information or change information on this site are strictly prohibited and may be punishable under the Texas Penal Code Chapters 33 (Computer Crimes) or 33A (Telecommunications Crimes).
E-mail: If you send the Commission an electronic mail message with a question or comment that contains personally identifying information, or fill out a form that e-mails the Commission this information, please note that all information collected, assembled, or maintained under a law or ordinance or in connection with the transaction of official business by a governmental body is "public information" subject to the Texas Public Information Act, Government Code chapter 552.1
Information is presumed public unless expressly restricted by statute or judicial decision (see our Open Records Policy). In addition, the Commission may redirect your message to another government agency or person who is in a better position to answer your question.
Web-based forms: The Texas Ethics Commission may use Web-based forms for collecting survey results, for registration for training events, or in the administration of laws under the Commission's jurisdiction. Personally identifiable information collected from these forms is subject to the Texas Public Information Act, Government Code chapter 552.1
1 Documents or any additional evidence relating to the processing, preliminary review, informal hearing, or resolution of a sworn complaint or motion are not subject to the Texas Public Information Act, Government Code chapter 552. Gov't Code sec. 571.139(a); see also id. sec. 571.140.
Last Revision: February 8, 2007