Privacy Policy

Junk N My Trunk

Effective Date: January 1, 2025

Last Updated: January 1, 2025

1. Introduction and Scope

Junk N My Trunk ("Company," "we," "us," or "our") is committed to protecting the privacy and security of personal information collected from our customers, website visitors, and other individuals who interact with our junk removal services. This Privacy Policy explains how we collect, use, disclose, and safeguard your personal information in accordance with applicable privacy laws and regulations.

This Privacy Policy applies to all personal information collected through our website, mobile applications, phone communications, in-person interactions, service delivery, and any other means of communication or data collection related to our business operations. By using our services, visiting our website, or providing us with personal information, you acknowledge that you have read and understood this Privacy Policy and consent to the collection, use, and disclosure of your information as described herein.

We are committed to transparency in our data practices and maintaining the trust that our customers place in us. This Privacy Policy is designed to help you understand what information we collect, why we collect it, how we use it, and what choices you have regarding your personal information. We encourage you to read this Privacy Policy carefully and contact us if you have any questions or concerns.

Our privacy practices are designed to comply with applicable federal, state, and local privacy laws, including the California Consumer Privacy Act (CCPA), the General Data Protection Regulation (GDPR) where applicable, and other relevant privacy regulations. We regularly review and update our privacy practices to ensure ongoing compliance with evolving legal requirements and industry best practices.

This Privacy Policy may be updated from time to time to reflect changes in our business practices, legal requirements, or service offerings. We will notify you of material changes through our website, email communications, or other appropriate means. Your continued use of our services after such changes constitutes acceptance of the updated Privacy Policy.

2. Information We Collect

2.1 Personal Information Collected Directly

We collect personal information that you provide to us directly through various interactions with our services. This includes information provided when you request quotes, schedule services, create accounts, make payments, communicate with our customer service team, or otherwise engage with our business.

Contact Information: We collect your name, phone number, email address, and mailing address to facilitate service delivery, communication, and billing. This information is essential for scheduling appointments, providing service updates, sending invoices, and maintaining ongoing customer relationships.

Service Location Information: We collect detailed address information for properties where services are to be performed, including specific access instructions, gate codes, and other location-specific details necessary for our team to provide efficient service delivery.

Service Details: We collect information about the types and quantities of items to be removed, special handling requirements, preferred service dates and times, and other details necessary to provide accurate estimates and appropriate service delivery.

Payment Information: We collect payment card information, billing addresses, and other financial information necessary to process payments for our services. Payment information is processed through secure, PCI-compliant payment processors and is not stored on our internal systems.

Communication Records: We maintain records of phone calls, emails, text messages, and other communications with customers for quality assurance, training purposes, and to ensure accurate service delivery. These records help us resolve disputes, improve our services, and maintain consistent customer service standards.

2.2 Information Collected Automatically

When you visit our website or use our digital services, we automatically collect certain information about your device, browsing behavior, and interaction with our online platforms. This information helps us improve our website functionality, understand customer preferences, and provide better service experiences.

Website Usage Information: We collect information about your visits to our website, including pages viewed, time spent on pages, click patterns, search terms used, and referral sources. This information helps us understand how customers use our website and identify areas for improvement.

Device and Technical Information: We collect information about the devices you use to access our services, including IP addresses, browser types, operating systems, device identifiers, and mobile device information. This technical information helps us ensure compatibility and optimize performance across different platforms.

Location Information: With your consent, we may collect location information from your mobile device to provide location-based services, such as identifying your service area or providing directions to our team. Location information is only collected when necessary for service delivery and with appropriate user permissions.

Cookies and Tracking Technologies: We use cookies, web beacons, and similar tracking technologies to enhance your browsing experience, remember your preferences, and analyze website usage patterns. You can control cookie settings through your browser preferences, though disabling certain cookies may affect website functionality.


2.3 Information from Third Parties

We may receive personal information about you from third-party sources when necessary to provide our services or when you have authorized such sharing. This includes information from payment processors, service partners, and other legitimate business sources.

Payment Processors: We receive transaction information from payment processing companies to confirm payments, process refunds, and maintain accurate billing records. This information is limited to what is necessary for payment processing and financial record-keeping.

Service Partners: We may receive information from partner organizations, such as property management companies, contractors, or real estate professionals, when they arrange services on behalf of their clients. Such information sharing occurs only with appropriate authorization and for legitimate business purposes.

Public Records: We may supplement our customer information with publicly available information, such as property ownership records or business registration information, to verify service locations and ensure accurate service delivery.

Referral Sources: When customers are referred to us by friends, family members, or business associates, we may receive basic contact information and service requirements to facilitate the referral process and provide appropriate follow-up.

2.4 Sensitive Information

We do not intentionally collect sensitive personal information, such as social security numbers, financial account numbers (beyond payment processing), health information, or other highly sensitive data, unless specifically required for service delivery or legal compliance.

In cases where sensitive information is inadvertently collected or disclosed during service delivery, we implement appropriate safeguards to protect such information and limit its use to the specific purpose for which it was collected. Customers are encouraged to avoid sharing sensitive information unless specifically requested and necessary for service provision.

Any sensitive information that is collected is subject to enhanced security measures and is retained only for as long as necessary to fulfill the specific purpose for which it was collected or as required by applicable legal or regulatory requirements.

3. How We Use Your Information

3.1 Primary Service Purposes

The primary purpose for collecting personal information is to provide high-quality junk removal services to our customers. We use your information to schedule appointments, coordinate service delivery, communicate service updates, process payments, and ensure customer satisfaction throughout the service experience.

Service Delivery and Coordination: We use contact information and service details to schedule appointments, dispatch our teams, provide service updates, and coordinate access to service locations. This includes communicating arrival times, service modifications, and completion confirmations to ensure smooth service delivery.

Customer Communication: We use your contact information to respond to inquiries, provide service estimates, confirm appointments, send service reminders, and maintain ongoing communication throughout the customer relationship. This communication is essential for providing professional service and addressing customer needs promptly.

Billing and Payment Processing: We use personal and payment information to generate invoices, process payments, handle refunds, and maintain accurate financial records. This includes communicating payment confirmations, addressing billing inquiries, and managing account balances for commercial customers.

Quality Assurance and Improvement: We use customer feedback, service records, and communication history to monitor service quality, identify improvement opportunities, and ensure consistent service delivery standards across all customer interactions.

3.2 Business Operations and Administration

Beyond direct service delivery, we use personal information for various business operations that support our ability to provide reliable and professional services to all customers.

Customer Relationship Management: We maintain customer records to track service history, preferences, and special requirements, enabling us to provide personalized service and anticipate customer needs for future services. This historical information helps us deliver more efficient and tailored service experiences.

Scheduling and Resource Management: We use customer information and service requirements to optimize scheduling, allocate appropriate resources, and plan efficient service routes. This operational use of information helps us provide timely service while managing costs effectively.

Business Analytics and Planning: We analyze customer data in aggregate to understand service demand patterns, identify popular service areas, and make informed business decisions about resource allocation, service expansion, and operational improvements.

Legal and Regulatory Compliance: We use personal information as necessary to comply with applicable laws, regulations, and industry standards, including environmental regulations, business licensing requirements, and tax obligations.

3.3 Marketing and Customer Engagement

With appropriate consent and in accordance with applicable laws, we may use personal information for marketing and customer engagement purposes designed to inform customers about our services and provide value-added information.

Service Promotions and Updates: We may send information about new services, seasonal promotions, service area expansions, and other business updates that may be of interest to our customers. All marketing communications include clear opt-out mechanisms and respect customer preferences.

Educational Content: We may provide information about proper waste disposal, recycling opportunities, decluttering tips, and other educational content related to our services and environmental responsibility. This content is designed to provide value to customers beyond our direct service offerings.

Customer Surveys and Feedback: We may request customer feedback through surveys, reviews, or other feedback mechanisms to understand customer satisfaction, identify service improvements, and gather testimonials for marketing purposes. Participation in such activities is always voluntary.

Referral Programs: With customer consent, we may use customer information to facilitate referral programs, thank customers for referrals, and track the success of word-of-mouth marketing efforts.

3.4 Website and Digital Services

Information collected through our website and digital platforms is used to enhance user experience, improve website functionality, and provide better online services to our customers.

Website Optimization: We analyze website usage patterns to identify popular content, optimize page loading times, improve navigation, and enhance overall user experience. This analysis helps us make data-driven decisions about website improvements and content development.

Personalization: We may use information about your preferences and past interactions to personalize your experience on our website, including displaying relevant content, remembering your preferences, and streamlining the quote request process.

Technical Support: We use technical information about your device and browsing experience to troubleshoot issues, provide technical support, and ensure compatibility across different devices and browsers.

Security and Fraud Prevention: We use information about website usage patterns and user behavior to identify potential security threats, prevent fraudulent activities, and protect both our systems and customer information from unauthorized access.

3.5 Legal Basis for Processing

Our use of personal information is based on various legal grounds depending on the specific purpose and applicable legal requirements.

Contractual Necessity: Much of our information processing is necessary to fulfill our contractual obligations to provide junk removal services, including service delivery, communication, and payment processing.

Legitimate Business Interests: We process information based on legitimate business interests, such as improving our services, ensuring customer satisfaction, managing business operations, and protecting our business and customers from fraud or security threats.

Legal Compliance: We process information as necessary to comply with applicable laws, regulations, and legal obligations, including environmental regulations, tax requirements, and business licensing obligations.

Consent: For certain uses, such as marketing communications and optional services, we rely on explicit consent from customers. Consent can be withdrawn at any time through the mechanisms provided in our communications or by contacting us directly.

3.6 Automated Decision-Making

We may use automated systems to process certain types of information for operational efficiency and consistency, but we do not make significant decisions affecting customers solely through automated means without human oversight.

Scheduling Systems: We use automated systems to manage appointment scheduling, send service reminders, and coordinate team dispatching. These systems are designed to improve efficiency while maintaining the flexibility to accommodate special customer requirements.

Pricing Calculations: Our volume-based pricing may be calculated using standardized systems, but final pricing decisions always involve human assessment and customer approval before services are completed.

Communication Management: We use automated systems to manage customer communications, including email responses, appointment confirmations, and service updates. However, customers always have access to human customer service representatives for personalized assistance.

4. Information Sharing and Disclosure

4.1 General Sharing Principles

Junk N My Trunk does not sell, rent, or trade personal information to third parties for their marketing purposes. We share personal information only when necessary to provide our services, comply with legal obligations, or protect our legitimate business interests, and always in accordance with applicable privacy laws and this Privacy Policy.

Any sharing of personal information is conducted under appropriate agreements that require recipients to maintain the confidentiality and security of the information and use it only for the specified purposes. We regularly review our sharing practices to ensure they remain necessary, appropriate, and compliant with applicable legal requirements.

We are committed to transparency about our information sharing practices and will notify customers of any material changes to these practices through updates to this Privacy Policy or direct communication when appropriate.

4.2 Service Providers and Business Partners

We share personal information with trusted service providers and business partners who assist us in delivering our services and operating our business. These relationships are governed by strict contractual agreements that protect customer information and limit its use to specified business purposes.

Payment Processors: We share payment information with PCI-compliant payment processing companies to handle credit card transactions, electronic payments, and related financial services. These processors are required to maintain strict security standards and use the information solely for payment processing purposes.

Technology Service Providers: We share information with companies that provide website hosting, email services, customer relationship management systems, and other technology infrastructure necessary to operate our business. These providers are contractually obligated to protect customer information and use it only to provide the specified services.

Disposal and Recycling Partners: We may share limited information with licensed disposal facilities, recycling centers, and donation organizations to facilitate proper disposal and tracking of removed items. This sharing is limited to information necessary for waste management and environmental compliance purposes.

Professional Service Providers: We may share information with attorneys, accountants, insurance companies, and other professional service providers who assist with business operations, legal compliance, and risk management. These relationships are governed by professional confidentiality obligations and contractual protections.

4.3 Legal and Regulatory Disclosures

We may disclose personal information when required by law, legal process, or regulatory authorities, or when we believe in good faith that disclosure is necessary to protect our rights, property, or safety, or the rights, property, or safety of others.

Legal Compliance: We disclose information in response to valid legal requests, including subpoenas, court orders, search warrants, and other legal processes. We review all such requests to ensure they are legally valid and appropriately limited in scope before providing any information.

Regulatory Requirements: We may share information with environmental agencies, waste management authorities, and other regulatory bodies as required for compliance with applicable laws and regulations governing our business operations.

Law Enforcement: We cooperate with law enforcement agencies when required by law or when we believe disclosure is necessary to prevent illegal activities, protect public safety, or assist in criminal investigations. Such cooperation is conducted in accordance with applicable legal procedures and protections.

Emergency Situations: We may disclose information without prior consent in emergency situations where we believe disclosure is necessary to prevent imminent harm to individuals or property, such as situations involving hazardous materials or safety threats.

4.4 Business Transactions

In the event of a merger, acquisition, sale of assets, or other business transaction involving Junk N My Trunk, personal information may be transferred to the acquiring entity as part of the transaction. Any such transfer would be conducted in accordance with applicable privacy laws and with appropriate protections for customer information.

Due Diligence: During business transaction negotiations, we may share aggregated or anonymized information with potential buyers or partners for due diligence purposes. Personal information is not shared during preliminary discussions unless specifically required and with appropriate confidentiality protections.

Asset Transfer: If personal information is transferred as part of a business transaction, the acquiring entity would be required to honor the commitments made in this Privacy Policy or provide appropriate notice of any changes to privacy practices.

Bankruptcy or Insolvency: In the unlikely event of bankruptcy or insolvency proceedings, personal information may be considered a business asset subject to court oversight and applicable legal protections for customer information.

4.5 Consent-Based Sharing

With your explicit consent, we may share personal information for purposes beyond those described in this Privacy Policy. Such consent-based sharing is always voluntary and can be withdrawn at any time.

Referral Programs: With your consent, we may share your contact information with friends or family members who refer you to our services, or share your information with others when you participate in our referral programs.

Testimonials and Marketing: With your permission, we may use your name, location, and comments in testimonials, case studies, or other marketing materials. You have the right to withdraw consent for such use at any time.

Partner Services: We may offer services in partnership with other companies, such as storage solutions or cleaning services. Participation in such programs requires explicit consent and involves sharing relevant information with partner companies under appropriate confidentiality agreements.

4.6 Aggregated and Anonymized Information

We may share aggregated, anonymized, or de-identified information that cannot be used to identify individual customers. This information is used for business analytics, industry research, and other purposes that do not compromise individual privacy.

Industry Research: We may participate in industry studies or research projects by sharing anonymized information about service trends, customer preferences, and operational metrics. Such sharing helps advance industry knowledge while protecting individual privacy.

Business Analytics: We may share aggregated information with business partners, investors, or other stakeholders to demonstrate business performance, market trends, and operational efficiency without revealing individual customer information.

Public Reporting: We may include anonymized information in public reports about our environmental impact, community service, or business performance. Such reporting helps demonstrate our commitment to transparency and social responsibility.

5. Data Security and Protection

5.1 Security Commitment

Junk N My Trunk is committed to protecting the security and confidentiality of personal information through the implementation of appropriate technical, administrative, and physical safeguards. We recognize that the security of customer information is essential to maintaining trust and complying with applicable privacy laws and industry standards.

Our security program is designed to protect against unauthorized access, use, disclosure, alteration, and destruction of personal information. We regularly review and update our security measures to address evolving threats and maintain alignment with industry best practices and regulatory requirements.

While we implement robust security measures, we acknowledge that no security system is completely impenetrable. We are committed to promptly addressing any security incidents and communicating with affected customers in accordance with applicable legal requirements and our incident response procedures.

5.2 Technical Safeguards

We employ various technical security measures to protect personal information stored in our systems and transmitted through our networks. These measures are designed to prevent unauthorized access and ensure the integrity and confidentiality of customer information.

Encryption: We use industry-standard encryption protocols to protect sensitive information during transmission and storage. This includes SSL/TLS encryption for website communications and strong encryption for stored payment information and other sensitive data.

Access Controls: We implement role-based access controls that limit access to personal information to authorized personnel who need the information to perform their job functions. Access permissions are regularly reviewed and updated based on job responsibilities and business needs.

Network Security: Our networks are protected by firewalls, intrusion detection systems, and other security technologies designed to prevent unauthorized access and monitor for suspicious activities. We regularly update and patch our systems to address known security vulnerabilities.

Data Backup and Recovery: We maintain secure backup systems to protect against data loss and ensure business continuity. Backup systems are subject to the same security controls as primary systems and are regularly tested to ensure reliability.

5.3 Administrative Safeguards

Our administrative safeguards include policies, procedures, and training programs designed to ensure that personnel understand their responsibilities for protecting customer information and follow appropriate security practices.

Security Policies: We maintain comprehensive information security policies that define roles and responsibilities, establish security standards, and provide guidance for handling personal information. These policies are regularly reviewed and updated to reflect changes in technology, regulations, and business practices.

Employee Training: All employees receive training on privacy and security requirements, including proper handling of personal information, recognition of security threats, and incident reporting procedures. Training is provided during onboarding and updated regularly to address emerging threats and regulatory changes.

Background Checks: We conduct appropriate background checks for employees who have access to personal information, consistent with applicable laws and the sensitivity of the information they will handle.

Incident Response: We maintain incident response procedures that define how to identify, contain, investigate, and respond to security incidents. These procedures include notification requirements for customers and regulatory authorities when appropriate.

5.4 Physical Safeguards

We implement physical security measures to protect facilities, equipment, and records containing personal information from unauthorized access, theft, and environmental hazards.

Facility Security: Our offices and data storage facilities are protected by appropriate physical security measures, including access controls, surveillance systems, and environmental protections. Access to areas containing personal information is restricted to authorized personnel.

Equipment Security: Computers, servers, and other equipment containing personal information are secured against theft and unauthorized access through physical locks, cable locks, and other appropriate measures. Equipment is properly disposed of or sanitized when no longer needed.

Document Security: Physical documents containing personal information are stored in locked cabinets or secure areas with restricted access. Documents are properly disposed of through secure shredding or other appropriate destruction methods when no longer needed.

Mobile Device Security: Mobile devices used for business purposes are protected through password requirements, encryption, and remote wipe capabilities. Employees are trained on proper security practices for mobile devices and prohibited from storing sensitive information on personal devices.

5.5 Vendor and Third-Party Security

We require our service providers and business partners to implement appropriate security measures to protect personal information they process on our behalf. These requirements are documented in contractual agreements and monitored through ongoing oversight activities.

Vendor Assessment: We conduct security assessments of vendors and service providers who will have access to personal information, including review of their security policies, procedures, and certifications. We select vendors based on their ability to meet our security requirements.

Contractual Requirements: Our agreements with vendors include specific security requirements, including data protection obligations, incident notification requirements, and audit rights. Vendors are required to implement security measures that are at least as protective as our own standards.

Ongoing Monitoring: We monitor vendor compliance with security requirements through regular reviews, audits, and assessments. We work with vendors to address any identified security deficiencies and may terminate relationships with vendors who fail to meet our security standards.

5.6 Data Retention and Disposal

We retain personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, and meet legitimate business needs. We have established retention schedules and disposal procedures to ensure appropriate management of personal information throughout its lifecycle.

Retention Schedules: We maintain retention schedules that specify how long different types of personal information are retained based on legal requirements, business needs, and the sensitivity of the information. These schedules are regularly reviewed and updated to ensure they remain appropriate.

Secure Disposal: When personal information is no longer needed, it is securely disposed of through methods appropriate to the type of information and storage medium. This includes secure deletion of electronic files, shredding of paper documents, and physical destruction of storage devices.

Legal Holds: In cases where legal proceedings or regulatory investigations require preservation of information beyond normal retention periods, we implement legal holds to ensure appropriate preservation while maintaining security protections.

5.7 Security Incident Response

Despite our best efforts to protect personal information, security incidents may occur. We have established procedures to respond promptly and effectively to security incidents to minimize potential harm and comply with applicable notification requirements.

Incident Detection: We use various monitoring tools and procedures to detect potential security incidents, including automated alerts, log analysis, and employee reporting mechanisms. We investigate all potential incidents to determine their scope and impact.

Incident Containment: When a security incident is confirmed, we take immediate steps to contain the incident, prevent further unauthorized access, and preserve evidence for investigation. This may include isolating affected systems, changing passwords, and implementing additional security measures.

Notification Procedures: We notify affected customers and regulatory authorities of security incidents in accordance with applicable legal requirements. Notifications include information about the nature of the incident, the information involved, steps taken to address the incident, and measures customers can take to protect themselves.

Remediation and Prevention: Following a security incident, we conduct thorough investigations to identify root causes and implement corrective measures to prevent similar incidents in the future. This may include system updates, policy changes, additional training, or enhanced security controls.

6. Your Rights and Choices

6.1 Overview of Customer Rights

Junk N My Trunk respects your rights regarding your personal information and provides various mechanisms for you to exercise control over how your information is collected, used, and shared. Your rights may vary depending on your location and applicable privacy laws, including the California Consumer Privacy Act (CCPA), the General Data Protection Regulation (GDPR), and other applicable privacy regulations.

We are committed to facilitating the exercise of your privacy rights in a timely and transparent manner. We will respond to your requests within the timeframes required by applicable law and will not discriminate against you for exercising your privacy rights.

If you have questions about your rights or need assistance exercising them, please contact us using the information provided in Section 10 of this Privacy Policy. We may need to verify your identity before processing certain requests to protect your personal information from unauthorized access.

6.2 Right to Access and Information

You have the right to request information about the personal information we have collected about you, including the categories of information, the sources from which it was collected, the purposes for which it is used, and the categories of third parties with whom it is shared.

Access Requests: You may request access to the specific pieces of personal information we have collected about you. We will provide this information in a readily usable format and, when technically feasible, in a portable format that allows you to transmit the information to another entity.

Information Categories: Upon request, we will provide information about the categories of personal information we collect, the business or commercial purposes for collecting the information, and the categories of third parties with whom we share the information.

Collection Sources: We will inform you about the sources from which we collected your personal information, including whether it was collected directly from you, from third parties, or from publicly available sources.

Processing Purposes: We will explain the specific purposes for which we process your personal information, including both the business purposes and any commercial purposes for which the information is used.

6.3 Right to Correction and Update

You have the right to request correction of inaccurate personal information and to update information that has become outdated or incomplete. We encourage you to keep your information current to ensure we can provide the best possible service.

Correction Requests: If you believe that personal information we have about you is inaccurate, you may request that we correct the information. We will investigate your request and make appropriate corrections when we determine that the information is indeed inaccurate.

Update Procedures: You may update your contact information, service preferences, and other personal information by contacting our customer service team or, where available, through your online account. We encourage you to review and update your information regularly.

Verification Requirements: For security purposes, we may require verification of your identity before processing correction or update requests. This helps ensure that personal information is only modified by authorized individuals.

6.4 Right to Deletion

Subject to certain exceptions, you have the right to request deletion of personal information we have collected about you. We will honor deletion requests except where retention is necessary for specific legal, business, or operational purposes.

Deletion Scope: Deletion requests apply to personal information in our active systems and databases. We will also direct our service providers to delete your information from their systems, subject to their own legal and operational requirements.

Retention Exceptions: We may retain personal information despite a deletion request if retention is necessary to complete transactions, comply with legal obligations, detect security incidents, protect against fraudulent activity, or exercise free speech rights.

Backup Systems: Information in backup systems may not be immediately deleted but will be deleted in the ordinary course of backup system maintenance and refresh cycles, provided there are no legal or business requirements for longer retention.

Anonymization Option: In some cases, we may anonymize your personal information instead of deleting it, removing all identifiers that could be used to identify you while retaining the information for analytical or research purposes.

6.5 Right to Opt-Out

You have the right to opt out of certain uses and sharing of your personal information, including marketing communications and, where applicable, the sale of personal information to third parties.

Marketing Communications: You may opt out of receiving marketing emails, promotional materials, and other non-essential communications by using the unsubscribe links in our emails or by contacting our customer service team. You will continue to receive essential service-related communications.

Sale of Information: Junk N My Trunk does not sell personal information to third parties for monetary consideration. However, if our practices change in the future, we will provide clear opt-out mechanisms and honor all opt-out requests.

Targeted Advertising: You may opt out of targeted advertising by adjusting your browser settings, using industry opt-out tools, or contacting us directly. Note that opting out of targeted advertising does not mean you will stop seeing advertisements, but they may be less relevant to your interests.

Data Sharing: You may request that we limit sharing of your personal information with third parties beyond what is necessary for service delivery and legal compliance. We will honor such requests to the extent possible while maintaining our ability to provide services.

6.6 Right to Data Portability

Where technically feasible and required by applicable law, you have the right to receive your personal information in a structured, commonly used, and machine-readable format that allows you to transmit the information to another organization.

Portable Formats: We will provide your personal information in formats such as CSV, JSON, or other structured formats that can be easily imported into other systems. The specific format may depend on the type of information and technical capabilities.

Transmission Assistance: When technically feasible, we may be able to transmit your personal information directly to another organization at your request. This service may be subject to technical limitations and the cooperation of the receiving organization.

Scope Limitations: Data portability rights typically apply to information you have provided to us directly and information generated through your use of our services. It may not include all information in our systems, particularly information that involves third-party rights or proprietary business information.

6.7 Right to Object and Restrict Processing

You have the right to object to certain types of processing of your personal information and to request restrictions on how your information is used.

Processing Objections: You may object to processing of your personal information for direct marketing purposes, research purposes, or other activities based on legitimate interests. We will honor such objections unless we have compelling legitimate grounds for continued processing.

Processing Restrictions: You may request that we restrict processing of your personal information in certain circumstances, such as when you contest the accuracy of the information or object to processing while we evaluate your objection.

Automated Decision-Making: If we use automated decision-making processes that significantly affect you, you have the right to request human review of such decisions and to challenge the results of automated processing.

6.8 Exercising Your Rights

To exercise any of your privacy rights, please contact us using the methods described in Section 10 of this Privacy Policy. We have established procedures to handle privacy rights requests efficiently and in compliance with applicable legal requirements.

Request Verification: We may need to verify your identity before processing your request to protect your personal information from unauthorized access. Verification methods may include confirming information we have on file or requesting additional identification documents.

Response Timeframes: We will respond to your requests within the timeframes required by applicable law, typically within 30-45 days depending on the jurisdiction and type of request. We will notify you if we need additional time to process your request.

No Discrimination: We will not discriminate against you for exercising your privacy rights. This means we will not deny services, charge different prices, provide different service levels, or suggest that you will receive different treatment for exercising your rights.

Authorized Agents: You may designate an authorized agent to make privacy rights requests on your behalf. We may require verification of the agent's authority and your identity before processing requests submitted by authorized agents.

7. Data Retention

7.1 Retention Principles

Junk N My Trunk retains personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with applicable legal and regulatory requirements, and meet legitimate business needs. Our retention practices are designed to balance customer privacy interests with business and legal requirements.

We have established retention schedules that specify retention periods for different types of personal information based on the purpose for collection, legal requirements, and business needs. These schedules are regularly reviewed and updated to ensure they remain appropriate and compliant with applicable laws.

When personal information is no longer needed for its original purpose and there are no legal requirements for continued retention, we securely delete or anonymize the information in accordance with our data disposal procedures.

7.2 Retention Periods by Information Type

Customer Contact Information: We retain basic contact information (name, phone, email, address) for active customers throughout the duration of the customer relationship and for up to seven years after the last service to support potential warranty claims, tax obligations, and business records requirements.

Service Records: Information about services provided, including service dates, locations, items removed, and pricing, is retained for seven years to support business records requirements, tax obligations, and potential dispute resolution needs.

Payment Information: Payment card information is not stored in our systems but is processed through PCI-compliant payment processors. Payment transaction records are retained for seven years to support accounting, tax, and audit requirements.

Communication Records: Records of customer communications, including phone calls, emails, and service notes, are retained for three years to support customer service quality, training purposes, and dispute resolution.

Website Usage Information: Website analytics and usage information is typically retained for two years to support website optimization and business analysis, unless longer retention is required for security or fraud prevention purposes.

Marketing Information: Information collected for marketing purposes is retained until the customer opts out of marketing communications or for up to five years from the last customer interaction, whichever is shorter.

7.3 Legal and Regulatory Requirements

Certain types of information must be retained for specific periods to comply with applicable laws and regulations, including tax laws, environmental regulations, and business record requirements.

Tax Records: Information required for tax purposes is retained for at least seven years from the date of the last transaction or as required by applicable tax laws and regulations.

Environmental Compliance: Records related to waste disposal and environmental compliance are retained for periods specified by applicable environmental regulations, typically ranging from three to seven years.

Business Records: General business records, including customer contracts and service agreements, are retained for seven years to comply with business record retention requirements and support potential legal proceedings.

Regulatory Investigations: Information subject to regulatory investigations or legal proceedings may be retained beyond normal retention periods as required by legal holds or regulatory requirements.

7.4 Secure Disposal Procedures

When personal information reaches the end of its retention period, we implement secure disposal procedures to ensure the information cannot be recovered or reconstructed.

Electronic Data: Electronic files containing personal information are securely deleted using methods that overwrite the data multiple times to prevent recovery. Storage devices that cannot be securely wiped are physically destroyed.

Physical Documents: Paper documents containing personal information are shredded using cross-cut shredders or destroyed through secure document destruction services that provide certificates of destruction.

Backup Systems: Information in backup systems is deleted during regular backup refresh cycles or through specific deletion procedures when immediate removal is required for legal or customer request purposes.

8. Cookies and Tracking Technologies

8.1 Use of Cookies

Our website uses cookies and similar tracking technologies to enhance user experience, analyze website usage, and provide personalized content. Cookies are small text files stored on your device that help us remember your preferences and understand how you interact with our website.

Essential Cookies: We use essential cookies that are necessary for the basic functionality of our website, including session management, security features, and basic navigation. These cookies cannot be disabled without affecting website functionality.

Analytics Cookies: We use analytics cookies to understand how visitors use our website, including which pages are most popular, how long visitors stay on the site, and where visitors come from. This information helps us improve our website and services.

Preference Cookies: We use preference cookies to remember your settings and preferences, such as language preferences, location settings, and form information, to provide a more personalized experience.

Marketing Cookies: With your consent, we may use marketing cookies to track your browsing behavior across our website and other sites to provide targeted advertising and measure the effectiveness of our marketing campaigns.

8.2 Cookie Management

You can control cookie settings through your browser preferences and other tools. However, disabling certain cookies may affect the functionality and user experience of our website.

Browser Settings: Most web browsers allow you to control cookies through their settings, including options to block all cookies, block third-party cookies, or receive notifications when cookies are set.

Opt-Out Tools: You can use industry opt-out tools, such as the Digital Advertising Alliance's opt-out page, to opt out of targeted advertising cookies from participating companies.

Cookie Preferences: Where required by applicable law, we provide cookie preference centers that allow you to manage your cookie settings and consent to different types of cookies.

8.3 Other Tracking Technologies

In addition to cookies, we may use other tracking technologies to collect information about your use of our website and services.

Web Beacons: We may use web beacons (also called pixel tags or clear GIFs) to track email opens, measure the effectiveness of our communications, and gather usage statistics.

Local Storage: We may use local storage technologies, such as HTML5 local storage, to store information locally on your device for improved website performance and user experience.

Mobile Identifiers: Our mobile applications may use device identifiers and other mobile-specific tracking technologies to provide app functionality and analyze app usage.

9. Children's Privacy

Junk N My Trunk does not knowingly collect personal information from children under the age of 13, and our services are not directed to children. If we become aware that we have collected personal information from a child under 13, we will take steps to delete such information promptly.

Parents and guardians who believe that their child has provided personal information to us should contact us immediately using the contact information provided in Section 10. We will investigate such reports and take appropriate action to protect children's privacy.

Our website and services are designed for adult users who are seeking junk removal services for residential or commercial properties. We do not create content or features specifically intended to attract children.

10. Contact Information and Complaints

10.1 Privacy Contact Information

If you have questions about this Privacy Policy, want to exercise your privacy rights, or have concerns about our privacy practices, please contact us using the following information:

Junk N My Trunk

Privacy Officer

Phone: (763) 452-8452

Email: [email protected]

Business Hours: Available 24/7

When contacting us about privacy matters, please include your name, contact information, and a detailed description of your request or concern. We will respond to your inquiry as promptly as possible and within the timeframes required by applicable law.

10.2 Complaint Procedures

If you believe that we have not complied with this Privacy Policy or applicable privacy laws, you may file a complaint with us or with appropriate regulatory authorities.

Internal Complaints: We encourage you to contact us first with any privacy concerns so that we can attempt to resolve the issue directly. We take all privacy complaints seriously and will investigate and respond to complaints promptly.

Regulatory Complaints: You may also file complaints with applicable privacy regulatory authorities, such as state attorneys general, the Federal Trade Commission, or other relevant agencies depending on your location and the nature of your concern.

10.3 Updates to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our business practices, legal requirements, or service offerings. We will notify you of material changes through our website, email communications, or other appropriate means.

Effective Date: The effective date of this Privacy Policy is indicated at the top of the document. The "Last Updated" date reflects when the most recent changes were made.

Change Notifications: For material changes that significantly affect how we collect, use, or share personal information, we will provide prominent notice on our website and may send direct notifications to customers.


Continued Use: Your continued use of our services after changes to this Privacy Policy constitutes acceptance of the updated policy. If you do not agree with changes to the Privacy Policy, you should discontinue use of our services and contact us to discuss your options.


This Privacy Policy is effective as of the date indicated above and governs our collection, use, and disclosure of personal information from that date forward.

Junk N My Trunk Logo

JUNK N MY TRUNK

Junk Removal Company

Minneapolis-St. Paul's premier junk removal service. Fast, reliable, and eco-friendly junk removal for homes and businesses.

Our Services

Service Areas

Minneapolis

St. Paul

Bloomington

Eden Prairie

Minnetonka

Contact Us

Copyrights 2025 |  Junk N My Trunk | Privacy Policy | Terms of Service