Texas Integrated Grant Reporting

COMMUNITY DEVELOPMENT & REVITALIZATION

THE TEXAS GENERAL LAND OFFICE - GEORGE P. BUSH, COMMISSIONER

This site allows Subrecipients and other participants in the CDR Grants Relief program to self-manage Applications, Contracts and Projects and submit trouble tickets and cases


Terms and Conditions of Usage
Please read the following Terms and Conditions ("Terms and Conditions") carefully before using the Texas Integrated Grant Reporting (TIGR) System. Any access to and use of this portal are strictly conditioned upon the acceptance of and compliance with these Terms and Conditions. By accessing and/or using TIGR, user agrees to be bound by these Terms and Conditions in their entirety and without exception. USE OF THE TIGR SYSTEM CONSTITUTES CONSENT TO ALL OF THE TERMS AND CONDITIONS OF USE PRESENTED BELOW.

You are using the TIGR System which has been provided by the State of Texas for official authorized use only. The TIGR System has been provided in order to streamline grant reporting using both state and federal data, some of which may be classified as Personally Identifiable Information (“PII”). All data contained within TIGR is owned by the State of Texas and/or the US Government and may be monitored, intercepted, recorded, read, copied, or captured in any manner and disclosed in any manner by authorized personnel. The TIGR system does not, in any way, present system users any right to privacy as the Texas General Land Office, the Office of the Attorney General of the United States, and/or any affiliates to either may monitor accessor’s policies and practices to ensure compliance under the law. The TIGR system includes security measures (e.g., authentication and controls) solely for the protection of the data contained herein and not to benefit the privacy of the user. USE OF THIS SYSTEM BY ANY USER, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO THIS MONITORING, INTERCEPTION, RECORDING, READING, COPYING, OR CAPTURING and DISCLOSURE.
All data contained within the TIGR system may only be used in a manner that is consistent with all applicable state and federal laws including the Privacy Act of 1974 and all implementing regulations. By using the TIGR system, user agrees that he/she shall implement and maintain any and all safeguards necessary to ensure the confidentiality and integrity of that data herein and is aware that any unauthorized use is subject to penalty under state and federal law. Any attempts to upload or change information; to defeat or circumvent security features; or to utilize this system for anything other than its intended purposes are prohibited and may result in prosecution under the Computer Fraud and Abuse Act of 1986 or other applicable statutes and regulations. If monitoring of the TIGR system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including information about the user, may be provided to law enforcement officials.