The University of Texas System Administration maintains the UT System Administration website as a public service. The following statement applies only to members of the general public and is intended to address concerns about the types of information gathered from the public and how that information is used. Employees of UT System Administration should refer to Business Procedures Memorandum 53-02-96, which outlines System Administration's internal policy for the use and protection of information resources.
Since UT System Administration is a public institution, the information we collect may be subject to public disclosure under the Texas Public Information Act (Chapter 552 of the Texas Government Code).
I. Information Collected and Stored Automatically
A "cookie" is a small file containing information that is placed on a user's computer by a web server. Typically, these files are used to enhance the user's experience of the site, to help users move between pages in a database, or to customize information for a user. UT System Administration servers do not store personally identifiable information in cookies from pages intended for use by the general public.
Information stored in cookies by UT System Administration web servers is used for internal purposes only. It is not used in any way that would disclose personally identifiable information to outside parties unless System Administration is legally required to do so.
Logs and Network Monitoring
System Administration maintains log files of all access to its site and also monitors network traffic for the purposes of site management and security. This information is used to help diagnose problems with the server and to carry out other administrative tasks. Log analysis tools are also used to create summary statistics to determine which information is of most interest to users, to identify system problem areas, or to help determine technical requirements.
The following information is collected in these files:
1. Hostname: the hostname, site name, username, and IP address of the computer requesting access to the site
2. User-Agent: the type of browser, its version, and the operating system of the computer requesting access (e.g., Netscape 4 for Windows, IE 4 for Macintosh, etc.)
3. Referrer: the web page the user came from
4. System date: the date and time on the server at the time of access
Full request: the exact request the user made
5. Status: the status code the server returned, e.g., fulfilled request, file not found
6. Content length: the size, in bytes, of the file sent to the user
7. Method: the request method used by the browser (e.g., post, get)
8. Universal Resource Identifier (URI): the location of the particular resource requested. (More commonly known as a URL.)
9. Query string of the URI: anything after a question mark in a URI. For example, if a keyword search has been requested, the search word will appear in the query string.
10. Protocol: the technical protocol and version used, i.e., http 1.0, ftp, etc.
The above information is not used in any way that would reveal personally identifying information to outside parties unless System Administration is legally required to do so. Web server logs are scheduled for regular destruction in accordance with the rules and regulations of the Texas State Library and Archives Commission.
II. Information Collected by Email and Forms
UT System Administration collects the e-mail address of those individuals who communicate with us via e-mail or who give us their e-mail address. UT System Administration collects information that is voluntarily or automatically provided by those individuals who communicate with us via e-mail, who open and interact with our e-mails by, for example, following embedded links or who submit forms embedded in the e-mail or linked to our website.
If a member of the general public sends System Administration an e-mail message or fills out an e-mail or web-based form with a question or comment that contains personally identifying information, that information will only be used for the purposes for which the form is intended, to respond to the question or comment, and to analyze trends. The message or form may be redirected to another government agency or person who is better able to respond to the question or comment. UT System Administration does not market such information. UT System Administration does not use such information in any way that would reveal personally identifying information to outside parties unless we are legally required to do so.
III. Notice About Information Laws and Practices
With few exceptions, you are entitled on your request to be informed about the information UT System Administration collects about you. Under Sections 552.021 and 552.023 of the Texas Government Code, you are entitled to receive and review the information. Under Section 559.004 of the Texas Government Code, you are entitled to have UT System Administration correct information about you that is held by us and that is incorrect, in accordance with the procedures set forth in University of Texas System Policy 139, "Texas Public Information Act.". 
The information that UT System Administration collects will be retained and maintained as required by Texas records retention laws (Section 441.180 et seq. of the Texas Government Code) and rules. Different types of information are kept for different periods of time.
This site contains links to other sites outside of System Administration. UT System Administration is not responsible for the privacy practices or the content of such websites.
This site has security measures in place to protect from loss, misuse and alteration of the information under the control of System Administration.
Contacting System Administration
If there are any questions about this privacy statement, the practices of this site, or dealings with this website, contact: email@example.com