Facebook

Privacy Policy

Privacy Policy

Guangdong ShengJie Car Accessories Co., Ltd. Attaches great importance to the security of your personal information when using our website sjcar.net.We take the protection of your personal data seriously and will not disclose your personal information unless we obtain your consent or are required by law.  This statement will inform you what data we retain and discard as well as our security measures. This statement informs you about what data we maintain and discard, and our security measures.

How We Gather Information

Personal data is acquired exclusively through your direct interactions with us:

  • When you provide data to order or inquire about car accessories or services
  • When you submit a product request or inquiry via a form or email or message plug-in
  • Provide you with information about our products and services

Data Processing Framework

 All collected information resides within controlled environments:

  • Stored on secure servers managed by authorized processors bound by confidentiality agreements
  • Subject to cross-border transfer protocols (e.g., US-EU data flows) with equivalent protection measures
  • Never disclosed to external parties without explicit consent, barring legal mandates

Purpose-Driven Data Utilization

Your information enables essential functions:

1.Transaction Execution

  • Order fulfillment and logistics coordination
  • Secure payment processing via certified gateways

2.Experience Enhancement

  • Website optimization based on user behavior analytics
  • Customized product recommendations

3.Support Operations

  • Efficient response to service inquiries

Security of your personal information

  • We will keep your personal information securely and strictly, and will never trade, rent or sell it.
  • We will take reasonable and comprehensive security measures to fully protect the security of your personal information, whether it is data stored in electronic form in encrypted servers and computer systems (protected by technical means such as enterprise-level firewalls, SSL encryption protocols, anti-virus software and email filters), or documents stored in paper form in locked safes or archives (implementing physical security management such as borrowing registration and regular destruction), we will continuously optimize the security system through a combination of technical protection and system management to maximize information security.

 

GET A QUOTE

Welcome to contact us
Name*
Email*
Whatsapp/Phone
Message*
MOQ*
The total quantity of products you wish to order
We use Cookie to improve your online experience. By continuing browsing this website, we assume you agree our use of Cookie.