Custer County respects each individual website user’s right to privacy. Any personal information that is collected will not be disclosed to any third party except as required by applicable law. The purpose of this statement is to inform website users of the use of information that may be collected while they are visiting, using, accessing, browsing, surfing, or searching (all called “browsing” herein) this website.
Personally Identifiable Information
For the purpose of this statement, “personally identifiable information” means any identifiable information about any individual collected online, including:
- A first and last name.
- A residence or other physical address, including a street name and name of city or town.
- An e-mail address.
- A telephone number.
- A social security number.
- Unique identifying information that an Internet service provider or a government website operator collects and combines with any information described above.
- Residents and businesses are not routinely asked to provide personal information to browse, or while browsing Custer County’s website or to download information. Government agencies may request personally identified information from you in order to provide requested specialized services, but such information transfers are considered an in-person visit to a government office and will be treated as such.
Access to personally identifiable information in Montana located in public records at state and local levels of government is governed by Montana law. Information that is generally available under Montana law may be posted for electronic access through https://custercountymt.gov/ and associated departmental websites.
Aggregate information is data collected that may show trends or statistics about a website. Custer County’s website utilizes server logs and log analysis tools to create summary statistics about the use of the County’s website. These statistics are used for purposes such as assessing what information is of most interest to users, determining technical design specifications, and identifying system performance issues. This type of information does not reveal the identity of the individuals who have contributed to it.
Use of Constituent Email Addresses
E-mail addresses obtained as a result of any requests to the County’s website will not be sold or given to other private companies for marketing purposes. The information collected is subject to the access and confidentiality provisions of Montana law and Federal law. E-mail or other information requests sent to the County’s website may be maintained in order to respond to the request, forward that request to the appropriate agency, or communicate updates to the County’s website that may be of interest to citizens. Individuals will be provided with the ability to opt in at any time to receive communication regarding new service updates.
Data Security and Quality
Custer County is committed to data security and the data quality of personally identifiable information that is either available from or collected by governmental websites and has taken reasonable precautions to protect personally identifiable information from loss, misuse, or alteration. Any third parties responsible for this information are committed to the same principles, and also are required by contract to follow the same policies and guidelines as the County in protecting this information. Unless otherwise prohibited by Montana law or Federal law, rule or regulation, the individual is granted the ability to access and correct personally identifiable information whether or not the information inaccuracy was accidental or created by unauthorized access.
Various non-county websites may be linked through the main County website. Visitors to those sites are advised to check the privacy statements of these sites and be cautious about providing personally identifiable information without a clear understanding of how the information will be used.
For information security purposes, the computer systems that host Custer County and other County websites employ software programs to monitor network traffic to identify unauthorized attempts to compromise its devices. These attempts of theft or to cause damage are subject to legal action.