Unique Car Rental places the utmost importance on keeping the information of its users (who will be called “Users” from now on) private. Before you go any further, please make sure you’ve read and agreed to Unique Car Rental’s privacy policy, which will be called “Policy” from now on.
This Policy may change from time to time. If you keep using Unique Car Rental’s services after a change, that is taken to mean that you agree to the changes, so please check the Policy from time to time to see if it has been changed.
Please keep in mind that Unique Car Rental will sometimes ask users of this website for personal information. In this situation, personal information is kept safe and managed in the ways that are explained below.
Unique Car Rental collects and uses relevant personal information of Users in order to support and contact us purposes.
There will be hardware in vehicles that collects and sends information about how the vehicle is used. This is done to protect you from an accident or theft and to give you useful services and information, such as the information about other drivers.
Unique Car Rental is very careful with how it handles Users’ private information. Unique Car Rental also has ways to make sure that personal information is safe and can’t be accessed by the wrong people.
Please note that Unique Car Rental does not submit personal information to any third parties.
On certain pages, we use Cookies to provide our Users with superior information and service. Cookies are small data files that are transmitted to a user’s hard drive or memory via a web browser in order to identify them. Cookies do not transmit Unique Car Rental Users’ names, addresses, or telephone numbers. You can disable the Cookie function in your browser through its settings.
This website employs the SSL (Secure Sockets Layer) encryption standard. In addition, Unique Car Rental employs firewalls to safeguard data on its website. This technology significantly reduces the likelihood of unauthorised access to and modification of transmitted data in the event that it is intercepted. Even if transmitted data is intercepted, decoding the information requires the corresponding electronic key. Even though the number of electronic keys is limited, identifying the correct electronic key would require a considerable quantity of time and is therefore regarded as extremely challenging.