When you visit the City of Yonkers Web site, we use automated tools to log information about each visit. We process this information in the aggregate to determine site performance issues, such as popular pages, most frequently downloaded forms, and other site performance characteristics. This information does not identify you personally. We do not track or record information about individuals and their visits.
While every effort is made to keep information provided over the internet accurate and up-to-date, the City of Yonkers does not certify the authenticity or accuracy of such information. No warranties, express or implied, are provided for the content, records and/or mapping data herein, or for their use or interpretation by the User.
The City of Yonkers, its elected officials, officers, employees, and agents assume no legal responsibilities for the information or accuracy contained in this data, including any action taken from reliance on any information contained herein and shall have no liability for any damages, losses, costs, or expenses, including, but not limited to attorney's fees, arising from the use or misuse of the information provided herein. The User's use thereof shall constitute an agreement by the User to release the City of Yonkers, its elected officials, officers, employees and agents from such liability.
By using this information, the User is stating that the above Disclaimer has been read
and that he/she has full understanding and is in agreement with the contents.
Third Party Links
The City of Yonkers website may contain links to local, state and federal government agencies and to other web sites. The inclusion of such links does not constitute an endorsement of the destination web site nor the content, viewpoint, accuracy, opinions, policies, products or site accessibility. Nor does any linkage between the City of Yonkers and a third party web site imply sponsorship of that web site.
Website Security Policy
We attempt to ensure that the City of Yonkers Web site remains available to all users by employing software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.