The Comptroller of Public Accounts, its divisions, and its associated companies (CPA or "we") values and protects the public's (your) privacy and places strict controls on the gathering and use of sensitive information and confidential information. Sensitive information and confidential information are not disclosed, made available, or otherwise used for purposes other than those specified at the time of collection, except with your consent or as authorized by law or regulation.
As a public agency, some information is required to be made available to the public via our websites, the Texas Data Portal, or in response to an open records request. However, CPA understands the importance of maintaining your privacy and will make every attempt to maintain your trust and confidence regarding the collection and use of your non-public sensitive and confidential information.
Pursuant to Texas Government Code §2054.134, CPA's websites are compatible with:
Mobile and Tablet:
The voluntary disclosure of sensitive information or confidential information to CPA, whether solicited or unsolicited, via physical or electronic means constitutes your consent to the collection and disclosure of the information by CPA for the purposes for which the information was disclosed to CPA, as was reasonably ascertainable from the nature and terms of the disclosure, including collection and disclosure for the purpose of validating your identity.
CPA's websites collect and store information each time you access them to enable us to measure the total number of visitors, and certain non-personal statistical information. This helps us make our websites more accessible and useful to visitors.
If you browse through our sites reading, printing, or downloading information, no sensitive information and no confidential information about you is collected.
The information we collect when you visit CPA's sites may include:
To better serve you and protect access to your information, CPA sites may use multifactor authentication (MFA) to enhance the security of your account(s)/information accessed via our sites. By using our MFA service(s), you may be required to supply an email address or phone number in order for us to deliver security verification codes to you. We will not disclose this information to third parties (except permitted by law) without your express written consent.
When you use our sites and services CPA does not actively collect, maintain, or disseminate biometric or geolocation information obtained from global positioning system technology, individual contact tracing, or biometric identifier collection technology.
If you communicate with CPA by sending an email, your email address may be retained for further communication with you in connection with processing your request or as provided by law. Do not send any sensitive or confidential information in the body of, or as an attachment to, an electronic mail message unless the data is adequately encrypted. Data sent via email is not inherently secured or encrypted. Any information contained in an email message or attachment may be retained and stored by CPA pursuant to the applicable retention period or as provided by law and may be provided to other state agencies to better serve your needs.
In addition, CPA collects the email addresses of those individuals who voluntarily provide their email address on our site(s) and on other platforms, such as Facebook.
Further, email addresses and other volunteered information may be used to send news, notices, and other information to those who request it on a strictly opt-in basis. Email addresses may also be used to serve interest-based ads on other platforms, such as Facebook.
In the spirit of open, transparent government, CPA makes use of social media tools (e.g. Facebook, Twitter, YouTube, etc.) to keep the public informed of news, economic updates, and other announcements.
Any comments or posts made to a social media forum maintained by CPA may be subject to release to the public as required by the Texas Public Information Act (PIA).
Users of these social media services are bound by the terms of service and user agreements for the platform.
CPA gathers your information through lawful means. Any subsequent use of the information is limited to purposes consistent with the purpose(s) given at the time of collection.
Texas law provides that all information collected or maintained by CPA is subject to the Texas Public Information Act. CPA is required to disclose information requested by the public under the PIA unless the information is excepted from disclosure by the PIA or other applicable law or regulation.
You are responsible for protecting the confidentiality of any user ID, password, or PIN used to access CPA websites. If you give your user ID, password, or PIN to anyone else, they will be able to access your sensitive and confidential information.
CPA does not sell your information to any third party. CPA does not distribute to or share your information with any non-governmental third party without your consent or as authorized by law or regulation. Employees will only use sensitive and confidential information submitted by you on a need-to-know basis to provide information or services, or carry out the duties of our agency.
Further, we will not disclose information we collect from you to third parties without your permission except to the extent necessary including:
It is possible to opt-out of data collection by common third parties by visiting:
Information collected by or provided to CPA will be retained and maintained as required by law or regulation such as Texas Government Code Section 441.180 et seq. Different types of information are required to be kept for different periods of time.
CPA stores or uses sensitive and confidential information submitted by you only for the time necessary. Confidential information is destroyed via purging, magnetic degaussing/erasing, shredding, and/or other means of authorized confidential destruction when no longer required and to prevent unauthorized access or use of the data. Regularly scheduled archiving, purging, and proper disposal of records and information is a standard practice throughout CPA.
CPA's public facing websites and systems, as well as internal systems, have reasonable security measures in place to protect against the loss, misuse, and alteration of your data and information that is under our control. Interactive applications and forms that collect transaction payments, sensitive or confidential information are encrypted using privacy and security safeguards such as Transport Layer Security (TLS) or similar technology.
Appropriate computer, network, and Internet technical security controls at the employee and departmental level prevent unauthorized access to information voluntarily provided by you. Some of these security controls are password and user identification verification, data encryption, confidential transmissions, secure storage areas, and audit trails. CPA employees are educated regarding the requirements of working with sensitive and confidential information as well as the consequences of misuse.
With few exceptions, you have the right to request, receive, and review your information with CPA. You are also entitled to have us correct any information about you in our possession that may be incorrect.
To request your information from CPA for review, please submit your request via one of the methods listed below and ensure your request includes enough description and detail so we may accurately identify and locate your information.
|Online||FYI Open Records Tool|
Open Records Section
Comptroller of Public Accounts
P.O. Box 13528
Austin, TX 78711-3528
Open Records Section
Comptroller of Public Accounts
111 E. 17th St.
LBJ State Office Bldg., Ste. 210
Austin, TX 78701
To request a correction of incorrect information about yourself, submit your request via one of the methods listed above or directly via our site for common changes listed below.
For filing taxes:
If you require special accommodation pursuant to the Americans with Disabilities Act, please contact our Workplace Accommodations Coordinator at 512-475-3560.
If you have questions, comments, or concerns about CPA's Privacy and Security Policy, please contact Information Security's Privacy Office:
Comptroller of Public Accounts
P.O. Box 13528, Capital Station
Austin, TX 78711-3528
CPA's websites contain links to other websites for your information and convenience. CPA has no control over the privacy practices or the content of such other websites. Please review the privacy information provided by these sites.
The responsibility for the content and accuracy of information on sites accessed by linking from our websites rests with the entities providing the information. This includes any responsibility for updating information upon which visitors may rely.
The inclusion of links from our sites to others does not imply any endorsement by CPA of any product, service, or vendor. Any mention of products, services, or vendors is for informational purposes only.
Information on CPA's sites is public domain and may be copied and used as permitted by law, with the exception of pictures, official symbols, and registered service marked names and logos. While CPA attempts to maintain a high degree of accuracy, we will not be held liable for errors or omissions that may occur.
CPA is not an operator of websites or online services directed at children under 13 years of age and does not knowingly collect sensitive and confidential information from children without parental consent. Users are cautioned, however, that the collection of sensitive and confidential information via an interactive application or email will be treated as though it was submitted by an adult, and may, unless exempted from access by federal or state law, be subject to public access. CPA strongly encourages parents and teachers to be involved in children's Internet activities, and to provide guidance whenever children are asked to provide sensitive and confidential information online.
|Application Programming Interface (API)||A set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of communication between various software components.|
|Confidential Information||Information typically excepted from public disclosure, whether specified in law or through a decision by the Open Records division of the Texas Attorney General's office. This includes Sensitive Personal Information (SPI), as defined by Texas Business and Commerce Code Section 521.|
|Cookie||A small piece of data sent from a website and stored in the user's web browser while the user is browsing it. Cookies can be disabled by adjusting the browser settings. If the cookies are disabled in the browser, certain parts of our website might not be accessible.|
|Internet Protocol (IP) Address||A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.|
|Internet Service Provider (ISP)||An organization that provides services for accessing, using, or participating in the Internet.|
|Multifactor Authentication (MFA)||More than one factor of authentication i.e., something you know (e.g., a User ID in combination with a password), something you have (e.g., an ID badge or a cryptographic key), something you are (e.g., a fingerprint or other biometric data).|
|Public Information||Information available to the public freely and without reservation. Such information requires no authentication and is freely distributable by all agency personnel.|
|Regulated Information||Information typically controlled by federal or state regulation or other third-party agreement. This information may be confidential, sensitive, or public, but is subject to additional controls regarding its protection or disclosure.|
|Sensitive Information||Information that may be subject to public release under an open records request. The information should be vetted and verified before release. This includes Personal Identifying Information (PII), as defined by Texas Business and Commerce Code Section 521.|
|Short Message Service (SMS)||A text messaging service component of most telephone, Internet, and mobile device systems, which uses standardized communication protocols that let mobile devices exchange short text messages.|
|Software Development Kit (SDK)||A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.|
|Transport Layer Security (TLS)||The standard security technology for establishing an encrypted link between two or more communicating computer applications such as web browsers and servers, email, instant messaging, and voice over IP (VoIP). This link ensures the privacy and integrity of all data passed between the computer applications.|
In 2015, the Texas Legislature passed House Bill 855, which requires state agencies to publish a list of the three most commonly used Web browsers on their websites. The Texas Comptroller’s most commonly used Web browsers are Google Chrome, Microsoft Internet Explorer and Apple Safari.