Privacy Policy

Iosco County is dedicated to preserving your privacy and security while viewing our Web site. We strive to retrieve the minimum amount of information from our visitors that is necessary in order to provide various services and resources. This Privacy Statement outlines practices and procedures affecting visitors of our site. Iosco County reserves the right to revise these policies and the corresponding information on this page at any time without prior notice. Personal information may be required by law or in order for us to provide a requested service, however we do not capture personal information without visitors' permission.

Visitor Information Collection and Disclosure
For every visitor to our site, there are several common pieces of information that we do collect that are stored in logs. Internet Protocol (IP) address, browser type, operating system, the date and time of the visit, and the addresses to which a visitor linked during a visit to our Web site are all recorded. We cannot and do not associate any of this information with individual persons, distribute this information, or use it in any manner other than for statistical analysis in improving our site to better serve our visitors, or as may be required by law.

Use of Cookies
We do not use cookies to record any personal information. 

Links to Other Websites
The County web site may be linked from or to local, State and federal government agencies, and other websites. Iosco County does not endorse, ensure the accuracy of, or vouch for the safety and privacy of any linked site, nor does the County assume the responsibility for the content of these sites.

Intellectual Property
The content of this website is copyrighted, and contains some third party images/graphics that are used with permission. Users are notified, therefore, that one should presume the need to obtain permission from the copyright holder before reproducing or otherwise using images/graphics from this website.

Unauthorized Access
Unauthorized attempts to modify any information stored on this system, to defeat or circumvent security features, or to utilize this system for other that it’s intended purposes are prohibited and may result in criminal prosecution.