The Federal Election Commission (FEC) offers some of its public data in machine readable format via an Application Programming Interface (API). The FEC API is a RESTful web service supporting full-text and field-specific searches on FEC data. The FEC operates openFEC.
We encourage you to consume and use the API to discover new and innovative uses for FEC data. To maintain the availability of openFEC to serve FEC.gov and API users, we must place restrictions on how this data is accessed and used.
This acceptable use policy sets out a list of acceptable and unacceptable conduct for using openFEC, in addition to the restrictions imposed by the terms of service. If we believe a violation of the policy is deliberate, repeated or presents a credible risk of harm to other users, the API or any third parties, we may suspend or terminate your access. If there is any inconsistency between this acceptable use policy and the terms of service, the terms of service will take priority to the extent of the inconsistency.
The FEC may update this acceptable use policy at any time. Updates will be made available on FEC.gov.
- comply with terms of service, including the terms of this acceptable use policy;
- comply with all applicable laws and governmental regulations;
- keep keys and all other login information confidential;
- monitor and control all activity conducted through your key in connection with openAPI; and
- promptly notify us if you become aware of or reasonably suspect any illegal or unauthorized activity involving your keys.
- prevent other users, including but not limited to FEC.gov, from accessing openFEC;
- overload openFEC;
- materially reduce the speed of openFEC for other users, including but limited to FEC.gov;
- share, transfer or otherwise provide access to key designated for you to another person;
- attempt to gain unauthorized access to openFEC or related systems or networks or to defeat, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection or monitoring mechanisms of the API;
- engage in activity that incites or encourages violence or hatred against individuals or groups;
- impersonate any person or entity;
- create keys in bulk;
- send unsolicited communications, promotions or advertisements, or spam;
- send altered, deceptive or false source-identifying information, including "spoofing" or "phishing"; or
- authorize, permit, enable, induce or encourage any third party to do any of the above.