Privacy & Security Policy

The George Bush School of Government and Public Service, a Texas A&M University college, maintains this website as a public service. The following is the privacy policy for this website.

The Bush School of Government and Public Service follows the State of Texas State Website Linking and Privacy Policy.


This website contains links to other websites. We are not responsible for the privacy practices or content of such websites.


We do not use cookies to collect information, and cookies used on our website are used to enhance user experience or to track session time-outs. We do, however, use third-party analytic services that may or may not use cookies in their collection of data.

Personally Identifying Information

Personal information that you provide via e-mail or through other online means such as a Web form will be used only for purposes necessary to serve your needs. This may involve redirecting your inquiry or comment to another person or department better suited to meeting your needs.

Server Logs

We use log analysis tools to create summary statistics. These statistics help assess trends, determine technical requirements, and identify system performance or problem areas. This information may also be used for site security purposes, to ensure the service remains available to users, to detect unauthorized attempts to upload or change information, and discern misuse of resources that might otherwise cause damage. Unauthorized attempts to upload information or change information located on servers administered by the Bush School are strictly prohibited and may be punishable under the Texas Penal Code Chapters 33 (Computer Crimes) or 33A (Telecommunications Crimes). Examples of the types of information collected in our logs include:

  • User Client hostname - The hostname (or IP address if DNS is disabled) of the user/client requesting access.
  • http header, "user-agent" - The user-agent information includes the type of browser, its version, and the operating system it's running on.
  • http header, "referrer" - The referrer specifies the page from which the client accessed the current page.
  • System date - The date and time of the user/client request.
  • Full request - The exact request the user/client made.
  • Content length - The content length, in bytes, of the document sent to the user/client.
  • Method - The request method used.
  • Universal Resource Identifier (URI) - The location of a resource on the server.
  • Query string of the URI - Anything after the question mark in a URI.
  • Protocol - The transport protocol and version used.

Access to Information

Except for education records governed by FERPA, all information collected from this website, including the summary server log information, emails sent to the website, and information collected from web-based forms, may be subject to the Texas Public Information Act. This means that while TAMU does not actively share information, in some cases may be compelled by law to release information gathered from its web servers.

The Texas Public Information Act, with a few exceptions, gives you the right to be informed about the information that this website collects about you. It also gives you the right to request a copy of that information, and to have the university correct any of that information that is wrong. You may request to receive and review any of that information, or request corrections to it, by contacting the TAMU Public Information Officer or the TAMU Office of Open Records, 1181 TAMU, College Station, Texas, 77843-1181, at 979-862-7777.


Extensive security measures consistent with the Texas Administrative Code (TAC) "Information Security Standards" and TAMU Rules and Standard Administrative Procedures have been employed to protect against unauthorized access, disclosure, modification, or destruction of information under our control, as well as the loss, misuse, or alteration of this website and/or associated electronic information resources. The information resources that support this site undergo an annual information security risk assessment via the Information Security Awareness Assessment and Compliance (ISAAC) system. The ISAAC system is used to assess the security posture of information systems and measure compliance with information security standards.