The County of Sutter has developed and established policies that balance an individual's right to privacy with the public's right to access government records under the state of California's Freedom of Information Act and the California Public Records Act.
County of Sutter (County) policies exist to ensure that government is open and that the public has a right to access appropriate data and information in possession by the County government. At the same time, there are exceptions to the disclosure of data and information provided by County policies, and State and Federal laws. These exceptions include the privacy of individuals.
During your visit to the County's website, information that is not readily identifiable to an individual (non-personal in nature) may be automatically collected and stored.
Only personal information that is voluntarily provided, through such activities as sending an e-mail or submitting an online form, may be collected. If you choose not to participate in these activities, your choice will in no way affect your ability to use any other feature of the County's website.
We strive to protect personally identifiable information by collecting only information necessary to deliver our services. All information that may be collected at this site becomes public record that may be subject to inspection and copying by the public, unless an exemption in law exists. For instance, if personal information is requested or volunteered, County rules and regulations or the Federal Privacy Act of 1974 may protect it from disclosure.
Security Policy Summary
Security measures have been integrated into the design, implementation, and ongoing practices of the entire County operating environment as part of its continuing commitment to risk management.
The County provides this website and the information it contains as a public service. This system is monitored to ensure proper operation, to verify the functioning of applicable security features, and for comparable purposes. Anyone using this system expressly consents to such monitoring.
Unauthorized attempts to modify any information stored on this system, to defeat or circumvent security features, or to utilize this system for other than its intended purposes are prohibited and may result in criminal prosecution.
Detailed Policy Pages