- Feature Links
- Online Payments & Registrations
- Privacy Policy
Privacy Policy
The privacy, confidence, and trust of individuals who visit the City of Brookings website are important to us. No personal information is collected unless provided by an individual while participating in an online activity that requests the information.
The City only collects the personal information necessary to provide the information or services requested by an individual. "Personal information" refers to any information relating to an identified or identifiable individual who is the subject of the information. This is the same information that an individual might provide when visiting a City office and includes such items as an individual's name, credit card number, address, phone number or other contact information. The information you enter allows you to log into our site, request information, and make purchases.
The City uses the collected information to respond appropriately to requests. E-mail or other informational requests sent to the City website may be maintained or forwarded to the appropriate department in order to respond to the request.
The City contracts with a company to process credit card payments. When payment is made the individual is redirected to their secure website. The City has verified that the third party is PCI compliant. The City does not collect or have access to your full credit card number.
Other than as described above, the personal information is not shared, sold or rented to third parties.
We also collect information to help us understand how people are using the City website, so we can continually improve our services. The information collected is not associated with any specific individual, and no attempt is made to profile individuals who browse the City website.
Any survey information is used for the intended purpose of the survey.
The City of Brookings is committed to the security of the information that is either available from or collected by the City's website. The City continues to safeguard the integrity of its information technology and computing infrastructure, included but not limited to: authentication, monitoring, auditing and encryption.