A. Information Provided by Researchers
Information Voluntarily Provided by You
When you register for an account with Texas Data Repository, we collect your name, email address, and (optionally) institution and position. Additionally, if the guestbook feature is activated for a particular dataset, any information filled out in the guestbook is made available to the Texas Data Repository administrator, dataset manager, and dataset curator.
Information Collected Through Your Use of the Texas Data Repository Application
When you access this web site, our web server software generates log files of the IP address of your computer. These web server logs are retained on a temporary basis and then deleted from our systems. When you download a file from Texas Data Repository, our software collects user account data such as your name, username, email, institution and position if provided (or the session ID data for guest users) and accompanying download data such as the time of the download. This information is then made available to the Dataverse collection administrator, dataset manager, and dataset curator of the file.
B. Use of Information and Data
We use your IP address and files you access to help diagnose problems with our server and to administer our web site by identifying:
- which parts of our site are most heavily used; and
- which portion of our audience comes from within the TDL network.
We also use this information to tailor site content to user needs and to generate aggregate statistical reports. We do not disclose site usage by individual users.
With the exception of the data collected during downloads, which are made available only to the file owner, we do not share any personally identifiable information we gather or develop about our users to any third parties for any purpose unless required by law. Any reports we may share externally would use unidentifiable, aggregated data.
This site has security measures in place to protect the loss, misuse and alteration of the information under our control. See the Information Security policy for more detailed outlines.