The State of Colorado aligns to the Web Content Accessibility Guidelines (WCAG) 2.0, adopted as a Technical Standard by the Governor’s Office of Information Technology (OIT) on April 26, 2018.
- Section 508 of the U.S. Rehabilitation Act of 1973
- C.R.S. 24-85-104, ARTICLE 85. "INFORMATION TECHNOLOGY ACCESS FOR INDIVIDUALS WHO ARE BLIND OR VISUALLY IMPAIRED"
- State of Colorado Technical Standard TS-OEA-001: Technology Accessibility for Persons with Disabilities
- State of Colorado Technical Standard TS-OEA-002: Technology Accessibility for Web Content and Applications
- https://www.w3.org/ for comprehensive WCAG 2.0 standards
If you have any questions or concerns, please contact firstname.lastname@example.org
This notice addresses collection, use of and access to information that may be obtained through use of the Colorado home page. This notice covers the following topics:
“Personal Information” is information about a natural person that is readily identifiable to that specific individual. Personal information includes such things as an individual’s name, address, phone number, or email address.
We collect no personal information about you unless you voluntarily participate in an activity that asks for information. If you choose not to participate in these activities, your choice will not affect your ability to use any other features of our web site.
If personal information is requested on the web site or volunteered by the user, state and federal law may protect it. However, this information is a public record once you provide it, and may be subject to public inspection and copying if not protected by federal or state law.
Furthermore, the information contained in many kinds of documents filed with the State of Colorado is electronically stored and may be made accessible to the public through the State of Colorado’s web site. Except where disclosure is protected by law, the information that is electronically stored may be purchased by private individuals and entities.
Users are cautioned that the collection of personal information requested from or volunteered by children on-line or by email will be treated the same as information given by an adult, and may be subject to public access.
We may collect some information about your visit to our web site. This information may include:
- The Internet Protocol Address and domain name used but not the email address. The Internet Protocol Address is a numerical identifier assigned either to your Internet Service Provider or directly to your computer. We use the Internet Protocol Address to direct Internet traffic to you.
- The type of browser you used.
- The date and time that you visited this site.
- The web pages or services you accessed at this site.
The information we collect or store is used to improve the content of our web services and to help us understand how people are using our services.
If during your visit to our site you send an email to us, the following information will be collected:
- The email address you used in sending the email.
- The contents of the email.
We use your email to respond appropriately. This may be to respond to you, to address issues you identify, to further improve our web site, or to forward the email to another agency for appropriate action.
To better serve our users we may use “cookies” to customize your browsing experience with us. Cookies are simple text files stored on your computer by your web browser. They provide a method of distinguishing among visitors to our web site.
Colorado.gov adheres to five main security standards:
- Sarbanes-Oxley – Legislation passed in 2002 to establish corporate accountability for financial transactions.
- Payment Card Industry Data Security Standards – Developed for members, merchants and service providers that transmit, store or process payment card information.
- Cybertrust Enterprise Security Management Program – A comprehensive security assessment program aimed at identifying vulnerabilities at all levels. The Program is comprised of 186 Essential Practice controls, which each have a minimum verification method NICUSA, Colorado.gov's parent company, and its subsidiaries use to secure their environments. The five principle verification methods are: policy review, attestation by qualified authority, demonstration, inspection, and testing.
- State Security Standards – The Technology Security Policy details the statewide IT policy that applies to all state agencies, CRS 24-37.5-102(5). Core policies addressed are: privacy, interoperability, infrastructure, lifecycle management, project management, and aggregation.
- NICUSA Policies – Colorado.gov evaluates and modifies security standards based on vast experience and knowledge from the other NICUSA portals in 34 states.