Privacy Policy

4Play Jeep is serious about protecting your personal information. You can always browse our site without providing any personal information.

Personal Records
We do not keep your private information recorded anywhere on our computers -- save for invoices -- and credit card or other such information is never distributed, revealed, or sold for any reason whatsoever.

While doing business with you, we may have to gather certain information, such as your name, vehicle, and home or email addresses. We will not sell, rent, trade or give away individual, personally identifiable information entered on this site to any third party. We collect such information so that we can process orders, personalize your shopping experience, or send you the latest product news and other useful material. If you do not wish to receive further material from 4Play Jeep, you can simply respond to our email or otherwise tell us that you do not want to receive future communications.


4Play Jeep also collects credit card information from you to process purchases from the site. Streamline, a leader in online credit card transactions and security, is used for credit card processing. Whenever you transmit credit card information and other personal information through our site, the numbers and letters are scrambled using encryption technology, making it nearly impossible for the information to be stolen or intercepted. To protect your security, we do not allow you to store your credit card number from session to session. 


4Play Jeep, like most Web sites, uses a feature of your browser to set a "cookie" on your computer. We cannot tell your name or any personal information about you based solely on the cookie. Unless you specifically tell us your name and other identifying information, we will never know who you are. All the cookie tells us is what functions you perform when you are on the site so that we can keep track of your transaction. A cookie also helps 4Play Jeep, note particular traffic patterns on the site so that we can improve what we offer. Every browser allows you to reject cookies or to choose which cookies you will accept. Rejecting cookies, however, may sometimes interfere with your ability to use all the features and benefits of our site.

Third Parties

On occasion, we provide non-personal, aggregate information about our users to third parties such as manufacturers and business partners. For example, we may inform a tire manufacturer about what other products its users buy. This information will not identify any user personally.

Outside Links

4Play Jeep, may offer links to other sites. Any time you click on a link and are transported to another site, you should be aware that the other site may have a different privacy policy than 4Play Jeep. We cannot control the policies of other sites.


This privacy policy is subject to change at the sole discretion of 4Play Jeep. When we modify it, we will post the changes in a revised policy statement.

Phishing and Identity Theft: Protecting Yourself

Similar to how a pickpocket might lift personal valuables, online fraud is essentially information theft. The difference is that identity theft could occur entirely unbeknownst to you, and remain that way for a considerable amount of time while a criminal wreaks havoc on your financial circumstances.

While websites have a responsibility to provide a safe and secure experience, the users themselves should also keep in mind a fair amount of responsibility with regard to the way they surf. After all, the cities may provide roads and motorways with signs and traffic lights to guide you safely, but getting to your destination also requires you to drive with discretion, right? The same sensibilities apply to the Internet as well.

Basic Facts About Phishing

The premise behind phishing is for criminals to steal your personal information through some sort of fraudulent medium, usually fake e-mails or websites. Even information as simple as a social security number, birth date, or street address can result in identity theft.

 Phishing E-mails

Here are some tips on what to look out for, and how to deal with them accordingly:

  • Pay attention to the e-mail sender. Sometimes the return address will come from a source unrelated to the company mentioned. Other times, the address will use a well-known company name, but send the message from a webmail account like hotmail or gmail. These are obvious indicators.
  • Phishing e-mails will use well-reputed company names as a cover. Commonly used names are PayPal, Ebay, Credit Card Companies, or Banks. If in doubt as to whether an e-mail is legitimate, forward it to customer service department of the actual company and have them confirm that the e-mail is genuine.
  • Oftentimes, e-mail messages will attempt to create a sense of urgency by threatening account suspension or imploring you to confirm account information lest some severe consequence take place. Don't be fooled by these tactics.
  • Watch out for obvious spelling and grammatical errors, or overuse of capitalization or exclamation points. These are immediately identifiable telltale signs.
  • Note that most companies will not ask for any personal information in an e-mail message, including social security, credit card, tax ID, and PIN numbers, credit card security codes, passwords, and your mother's maiden name.
  • Beware of any attachments or links in e-mail messages, as they may carry potentially threatening materials.
  • For links embedded in a message, check the web address and make sure it clearly states the address of the company being mentioned.
  • Never go to a website address that is an IP address - in other words, an address that is a series of numbers separated by periods (e.g.
  • Do not "unsubscribe" from e-mails when the message does not come from a trusted source, as this could be another attempt to try to have you click on links to disreputable websites.
  • The best and fastest way to deal with phishing e-mails is to simply recognize them, leave them closed, and delete them.

Phishing Websites

Phishing websites use the same basic premise as phishing e-mails, except that criminals will go as far as to erect a fake website of some sort that asks you to submit personal information.

Criminals exercise considerable creativity for website fraud. On one hand, they may erect a fake e-commerce site and get you to submit your credit card information. In other instances, the site may merely be a tool designed to install spyware or other foreign programs into your computer.

Here are some tips on what to look out for, and how to deal with them accordingly:

  • Many phishing websites operate under the guise of a well-reputed company or seller. Other times, the design and function of the site are convincing enough to lure you into a false sense of security.
  • For e-commerce sites, make sure that you are shopping with a trusted seller who is certified with some form of data encryption os Secure Socket Layer (SSL) system to protect your information. Most legitimate sites will display an authentic seal from VeriSign or another internet security company indicating that a site is protected.
  • An easy way to check for SSL encryption is to look for the web address that begins with "https" as opposed to just "http" on billing entry pages. This signifies that the website employs SSL protection and your purchase is secure.
  • Also look for the padlock icon in the far right side of the address bar, which indicates that you are operating in a secure website.
  • If you are uncertain about the reputability of a website, check site reviews from places like, or even conduct a background check at the Better Business Bureau website to confirm legitimacy.

Secure Credit Card Payments
Hype Digital Media