Truck Addict Off Road takes great care in making sure that your shopping experience with us is safe. As you browse our site, we are constantly working to ensure that your personal information is secure and private.

From phishing scams to viruses to spam e-mails and more, Internet threats are always increasing and without a proper understanding of what to look out for with regard to security and privacy, becoming a victim can be just a few misguided clicks away.

Truck Addict Off Road greatly appreciates your continued business and we settle for nothing less than a safe, convenient and altogether enjoyable shopping experience.

Should you have any questions, comments or concerns about our site, please feel free to contact our us.

Privacy Policy

See our in-depth privacy policy for our terms and conditions on the confidentiality of your private information, as well as our commitment to making respect for your privacy a top priority.

Privacy Policy

Your privacy is important to us. To best serve your shopping needs, we endeavor to provide products, services and offers of value to you. We're able to present meaningful offers to you through the information we collect from our interactions with you, from other customers and from other parties. The following discloses our information gathering and dissemination practices for this website:


We collect certain information when you visit to improve the quality of your experience. The information that we collect depends upon where you travel within our site. Anytime that you visit our site to browse, read or download information, we collect and store the name of the domain and host from which you access the Internet (for example,,, etc…); the Internet protocol (IP) address of the computer you are using; the browser software you use and your operating system; the date and time you access our site; and the Internet address of the website from which you linked directly to our site. We use this information to measure the number of visitors to areas of our site and to help us make our site more useful and interesting to our visitors.


We use "cookies" on our site to enable you to save your Jeep information and to expedite any future orders. A "cookie" is a small text file that a website can place on your computer's hard drive in order, for example, to collect information about your activities on the site or to make it possible for you to use an online "shopping cart" to keep track of items you wish to purchase. The cookie transmits this information back to the website's computer, which, generally speaking, is the only computer that can read it. Most consumers do not know that "cookies" are being placed on their computers when they visit websites. If you want to know when this happens, or to prevent it from happening, you can set your browser to warn you when a website attempts to place a "cookie" on your computer. Our site relies upon the use of cookies to enhance your shopping experience, but our cookies do not contain nor track your personally identifiable information.

Online Registration Request

If you choose to purchase a product from us, we will collect your personally identifiable information, such as your name, email address, billing postal address, shipping postal address, telephone number, credit card number and expiration date ("Purchase Information") in order to properly process your purchase. You may not modify or remove your Purchase Information - even if you cancel or return your product order - as it is necessary to maintain a record of your initial product purchase.


We run contests on our site in which we ask visitors for contact information (like email address). We use contact data from our contests to send users information about our company and promotional material from some of our partners. The customer's contact information is also used to contact the visitor when necessary and shared with other companies who may want to contact our visitors. Users may opt-out of receiving future mailings; see the choice/opt-out section below. We use vehicle identification and make and model information to tailor the visitor's experience at our site, showing them content that we think they might be interested in and displaying the content according to their preferences.

Links to other sites

This site contains links to other sites. is not responsible for the privacy practices or the content of such linked Web sites.

Printing Errors

Although every effort is made to keep our catalog and website error free, mistakes sometimes occur. We are not responsible for typographical and or technical errors. Price and shipping rates are subject to change without notice.

How Can I Opt Out of Receiving Further Communication?

To be removed from your Catalog Mailing List: You can contact us by mail at the address listed above and let us know which specific catalog you wish to stop receiving. We will make every effort to implement any choice you make as soon as possible, but you should allow approximately three months for mailing change requests to be fully implemented.

To unsubscribe from an email List: Simply send an email, subject line: REMOVE.

Internet Security: How Protects Your Information

A safe and secure shopping experience becomes a foregone conclusion with the implementation of sophisticated security features and protective measures on the website.

Internet Security

PCI Compliance

As the online marketplace has bloomed, consistent internet security from site to site is an issue that needs to be clearly defined and fundamentally solid to provide a safe environment in which consumers can shop.

For this reason, Payment Card Industry (PCI) compliance was created by credit card companies like Visa, Mastercard, Discover, American Express and others as a base set of rules and security measures that sites need to follow in order to allow for a safe shopping environment. fully complies with the set of PCI data security standards to ensure a safe shopping experience for our customers and also help promote internet safety throughout the internet.

Network Solutions Secure Socket Layer (SSL) Certificate Authentication

Every order is processed using the Network Solutions encryption technology to secure your identity. utilizes an intensely elaborate data encryption system using 128-bit Secure Socket Layer (SSL) technology. All browsers that shop at are required to enable 128-bit encryption to ensure a safe shopping experience.

As a constant reminder that your shopping experience on either or any other e-commerce website is safe, look for the Network Solutions logo indicating a valid SSL certification. Click on the Network Solutions icon to confirm complete data encryption and verification of the seller’s identity.

Advanced Firewall Technology

We prevent unauthorized access to account information through a sophisticated combination of hardware, software and personnel. Our rigid firewall keeps potential intruders out of our secure network of computers.

Fraud Detection

Each order from our website undergoes personalized review to detect instances of unauthorized credit card usage.

Phishing and Identity Theft: Protecting Yourself

As part of Truck Addict Off Road dedication to internet safety, see our tips, facts and general hints to assist with protecting your information during surfing and shopping, whether on our site or anywhere else.

Phishing and Identity Theft

Similar to how a pickpocket might lift personal valuables, online fraud is essentially information theft. The difference is that identity theft could occur entirely unbeknownst to you and remain that way for a considerable amount of time while a criminal wreaks havoc on your financial circumstances.

While websites have a responsibility to provide a safe and secure experience, the users themselves should also keep in mind a fair amount of responsibility with regard to the way they surf. After all, the cities may provide roads and highways with signs and stoplights to guide you safely, but getting to your destination also requires you to drive with discretion, right? The same sensibilities apply to the Internet as well.

Basic Facts About Phishing

The premise behind phishing is for criminals to steal your personal information through some sort of fraudulent medium, usually fake e-mails or websites. Even information as simple as a social security number, birth date, or street address can result in identity theft.

Phishing E-mails

Here are some tips on what to look out for and how to deal with them accordingly:

  • Pay attention to the email sender. Sometimes the return address will come from a source unrelated to the company mentioned. Other times, the address will use a well-known company name, but send the message from a webmail account like hotmail or gmail. These are obvious indicators.
  • Phishing e-mails will use well-reputed company names as a cover. Commonly used names are PayPal, Ebay, credit card companies, or banks. If in doubt as to whether an email is legitimate, forward it to customer service department of the actual company and have them confirm that the email is genuine.
  • Oftentimes, email messages will attempt to create a sense of urgency by threatening account suspension or imploring you to confirm account information lest some severe consequence take place. Don't be fooled by these tactics.
  • Watch out for obvious spelling and grammatical errors, or overuse of capitalization or exclamation points. These are immediately identifiable telltale signs.
  • Note that most companies will not ask for any personal information in an email message, including social security, credit card, tax ID and PIN numbers, credit card security codes, passwords and your mother's maiden name.
  • Beware of any attachments or links in email messages, as they may carry potentially threatening materials.
  • For links embedded in a message, check the web address and make sure it clearly states the address of the company being mentioned.
  • Never go to a website address that is an IP address - in other words, an address that is a series of numbers separated by periods (e.g.
  • Do not "unsubscribe" from e-mails when the message does not come from a trusted source, as this could be another attempt to try to have you click on links to disreputable websites.
  • The best and fastest way to deal with phishing e-mails is to simply recognize them, leave them closed and delete them.

Phishing Websites

Phishing websites use the same basic premise as phishing e-mails, except that criminals will go as far as to erect a fake website of some sort that asks you to submit personal information.

Criminals exercise considerable creativity for website fraud. On one hand, they may erect a fake e-commerce site and get you to submit your credit card information. In other instances, the site may merely be a tool designed to install spyware or other foreign programs into your computer.

Here are some tips on what to look out for and how to deal with them accordingly:

  • Many phishing websites operate under the guise of a well-reputed company or seller. Other times, the design and function of the site are convincing enough to lure you into a false sense of security.
  • For e-commerce sites, make sure that you are shopping with a trusted seller who is certified with some form of data encryption or Secure Socket Layer (SSL) system to protect your information. Most legitimate sites will display an authentic seal from Network Solutions or another internet security company indicating that a site is protected.
  • An easy way to check for SSL encryption is to look for the web address that begins with "https" as opposed to just "http" on billing entry pages. This signifies that the website employs SSL protection and your purchase is secure.
  • Also look for the padlock icon in the far right side of the address bar, which indicates that you are operating in a secure website.
  • If you are uncertain about the reputability of a website, check site reviews from places like, or even conduct a background check at the Better Business Bureau website to confirm legitimacy.