How We Protect the Information We Collect
The security and confidentiality of your personal information is important to us. We have implemented technical, administrative, and physical security measures to protect your personal information from unauthorized access or disclosure and improper use. For example, we use 256-bit Secure Sockets Layer (SSL) encryption to protect the data collection forms on the Site. In addition, access to your personal information is restricted in our offices. Only employees who need the personal information to perform a specific job (for example, a customer service representative) are granted access to personal information. All employees with access to personal information are kept up-to-date on our security and privacy practices. After a new policy is added, these employees are notified and/or reminded about the importance we place on privacy, and what they can do to enhance protection for our customers' personal information. In addition, the servers that we use to store personal information are kept in a secure, restricted access area.
It is important for you to protect against unauthorized access to your computer and to your account. Be sure to log out of your account or to close your browser after you have completed your visit to our Site.
Please note that despite our reasonable efforts, no security measure is ever perfect, so we cannot guarantee the security of your personal information.
Children’s Online Privacy Protection Act Compliance
We do not collect any information from anyone under 13 years of age. Our Site, products, and services are all directed to people who are over the age of 13. If you are under the age of 13, you are not authorized to use this Site.
Ownership of Information and Materials You Voluntarily Submit to Us Via the Site
Except as otherwise provided in any Terms and Conditions applicable to the Site, we are the sole owners of any information that you submit through the Site, and any photos, documents, works of authorship, or other items (“Contributed Materials”) that you voluntarily provide to us through the Site. We are not obliged to return any Contributed Materials to the person contributing them. We reserve the right to delete, modify, or create derivative works based on Contributed Materials prior to using them on the Site or for other purposes except where prohibited by copyright laws. Minors (someone under the age of 18) should not submit any Contributed Materials without the prior consent of their parent or legal guardian.
Biometric Information Security
We recognize the need to maintain the confidentiality of biometric data and understand that such data is unique to each individual. The data covered by this section may come from various types of workers performing tasks for us or on our behalf, including employees and independent contractors. The scope of this policy is intended to be comprehensive and includes our requirements for the security, storage, and protection of such information by us and our approved vendors, both on and off work premises.
For purposes of this policy, the following definitions apply:
- “Biometric Identifier” means data generated by the technological processing, measurement, or analysis of a worker’s biological, physical, or behavioral characteristics, which data can be processed for the purpose of uniquely identifying an individual. “Biometric Identifier” includes, for example:
- A fingerprint;
- A scan of hand geometry;
- A voiceprint;
- A scan or record of an eye retina or iris; or
- A facial map, facial geometry, or behavioral patterns or characteristics. Biometric Identifiers do not include, for example, demographic data, tattoo descriptions, or physical descriptions, such as height, weight, hair color, or eye color.
- “Biometric Data” means (a) one or more Biometric Identifiers that are used or intended to be used, singly or in combination with each other or with other personal information, for identification purposes, and (b) information based on one or more Biometric Identifiers used to identify an individual. In this policy, Biometric Identifiers and Biometric Data are collectively referred to as “Biometric Information.”
- “Encrypted” means the transformation of information through the use of an algorithm or other means to render information unreadable in accordance with standards established by the National Institute of Standards and Technology or other industry standard-setting body.
- “Security Breach” means a Security Incident for which notification to affected individuals and/or government agencies is required under applicable law.
- For purposes of this policy, “Security Incident” means (a) the loss or theft of, or attempted or successful unauthorized access to, or use, disclosure, acquisition, modification or destruction of, Biometric Information that is not Encrypted; or (b) interference with system operations in an information system containing Biometric Information that is not Encrypted, which interference materially compromises the confidentiality, integrity or availability of Biometric Information.
- “SIRT” means the Security Incident Response Team responsible for responding to Security Incidents. The members of the SIRT are designated in our Security Incident Response Plan.
Restrictions on the Acquisition of Biometric Information
We will not capture, collect, or otherwise obtain a person’s Biometric Information without first providing notice and obtaining consent. We will capture, collect, or otherwise obtain a person’s Biometric Information only when we have a legitimate business purpose for doing so.
Prohibition on the Sale of Biometric Information
We will not sell, lease, trade, or otherwise profit from a person’s Biometric Information.
Restrictions on Disclosure of Biometric Information
- We will not disclose or otherwise disseminate a person’s Biometric Information unless:
- The subject of the Biometric Information, or that person’s legally authorized representative, consents to the disclosure;
- The disclosure completes a financial transaction requested or authorized by the subject of the Biometric Information or that person’s legally authorized representative;
- The disclosure is required by state or federal law or municipal ordinance;
- The disclosure is required pursuant to a valid warrant or subpoena issued by a court of competent jurisdiction; or
- The data is subject to a legal hold or has been requested during discovery as part of an incident investigation, federal or state agency action, or lawsuit.
Security for Biometric Information
We will implement administrative, technical, and physical safeguards for Biometric Information in our possession that are at least as stringent as the safeguards we have implemented for our other confidential information. Biometric Information in electronic form will be secured when in storage and in transmission. Paper documents containing Biometric Information, when unattended, will be stored in a locked filing cabinet, storage area, or office. Only employees with a legitimate business need may access Biometric Information. Authorized employees should avoid creating paper documents containing Biometric Information whenever possible. No employee may disclose Biometric Information to any third party without prior authorization by our People Compliance Department and Data Privacy Office. Notwithstanding the foregoing, disclosures permitted in response to a valid warrant, subpoena, or discovery request, as described above, may be made by our Risk Management department without prior authorization from any other department or office.
Retention of Biometric Information
All Biometric Information will be permanently destroyed after the initial purpose for collecting or obtaining the Biometric Information has been satisfied or within two (2) years after the employee’s employment or independent contractor’s contract with us ends, whichever occurs first. We will suspend the destruction of Biometric Information when necessary to satisfy our duty to preserve information that would be discoverable in litigation.
Destruction of Biometric Information
Paper documents containing Biometric Information will be shredded or burned. Biometric Information in electronic form will be destroyed in a manner that renders the information irretrievable. Our People Team and Engineering and Technology department shall be responsible for destruction of such information at the completion of the retention period described above.
MapPoint Terms of Use and Privacy Statement
We use Microsoft MapPoint software which conforms to the following terms of use and privacy policy:
Microsoft MapPoint Terms of Use:
http://go.microsoft.com/fwlink/?LinkId=21969
Privacy Statement:
http://go.microsoft.com/fwlink/?LinkId=21970
Copyright Notice:
All Contents Copyright © 2025, J.B. Hunt Transport Services, Inc. and J.B. Hunt Transport, Inc. All rights reserved. All text, images, graphics, animation, videos, music, sounds and other materials on the Site are subject to the copyrights and other intellectual property rights of J.B. Hunt. J.B. Hunt owns the copyrights in the selection, coordination and arrangement of the materials on this site. These materials may not be copied for commercial use or distribution, nor may these materials be modified or reposted to other sites.