Checking Inventory For Your Order. Please Wait...

Log In

If you already have an account, log in.

Sign up for a Free Account

It's quick and easy.

Call Us (800) 480-8994

SHOP PARTSby department
  • Shop By Brand 600+ High Quality Brands
  • Shop By Category
    • Accessories
    • Auto Body
    • Car Care
    • Mobile Electronics
    • Performance
    • Replacement
    • Tires & Wheels
FIND PARTSthat fit your vehicle
Year
SELECT A YEAR
Make
SELECT MAKE
Model
SELECT MODEL
Submodel
SELECT SUBMODEL
Engine
SELECT ENGINE

MY GARAGE

 

Match products that fit your vehicle!

Choose a year for your vehicle.

  • Your Garage is Empty. Try Adding a Vehicle First.

Fechar

Vehicle added to your garage!

Come back to the garage to access and manage saved vehicles.

Home > Store Policies > Privacy Policy

PRIVACY POLICY

AutoPartsNetwork.com's Privacy Policy

AutoPartsNetwork.com together with its related and affiliated entities, (collectively "APN", "we", "our" or "us") is committed to protecting the privacy of our online visitors. In compliance with Federal and State Law, industry standards and administrative regulations, this privacy policy discloses the privacy practices governing our collection and use of information submitted by you ("you", "your" or the "user") to APN through this website. We want you to know that we take our legal and ethical responsibilities regarding your privacy seriously. Therefore, we abide the following privacy policy.

Information Collection & Use

Registration

We restrict access to nonpublic personal information about you to those employees and other parties who must use that information to provide products and services to you. Their right to further disclose and use the information is limited by our company policies, applicable law and nondisclosure agreement agreements where applicable. We also maintain physical, electronic and procedural safeguards in compliance with applicable laws and regulations to guard your nonpublic personal information. In the event that we are compelled to involuntarily disclose any of your information, we will act on the advice of counsel should our records be subpoenaed or otherwise sought through legal means.

When using this website, you may opt to complete our registration form and you may create a user name and password. This involves your disclosure of contact information (such as name and email address). We use this information to contact you about the services on our site in which you have expressed interest.

If you do not want your nonpublic personal information disclosed to nonaffiliated third parties, you may "opt out" of those disclosures, meaning that you may tell us not to make those disclosures (other than those disclosures permitted by law even if you do opt out). If you opt out, we will not disclose this information to nonaffiliated third parties to independently market products or services to you, but we may include their offers in billing statements and other routine communications that we send you in connection with servicing your business relationship with us. To opt out, simply reply by email to ChiefPrivacyOfficer@AutoPartsNetwork.com and type "opt out" in the subject line. Once you opt out, there is no need to do so again for the same business relationship. You may also call us at 1-800-480-8994 to opt out.

You also have the option to provide demographic information (such as income level and gender); we encourage you to submit this information so we can provide you a more personalized experience on our site. For example, by using this information we can provide you with newsletters, updates and e-mails regarding matters which are relevant and useful to you.

We are the sole owner of the information collected on our site. We collect personally identifiable information from our users at several different points on our Website.

Orders

If you purchase a product or service from us, we request certain personally identifiable information from you on our order form. You must provide contact information (such as name, email and shipping address) and financial information (such as credit card number and expiration date).

We use this information for billing purposes and to fill your orders. If we have trouble processing an order, we will use this information to contact you. Additionally, if you so choose, you may receive updates from our site.

Application Forms

If you apply for any of our products, those of our affiliates or simply request information regarding products promoted on our site, we require that you provide certain personally identifiable information, including your name, address, phone number, credit card number and sometimes your Social Security number. This information is necessary to process your application and to contact you.

Social Security Numbers

On a strictly necessary basis, we do, at times, require your social security number when providing services. When you enter your social security number on our registration order form or application form, we encrypt it using secure socket layer technology (SSL).

Surveys or Contests

We may provide you the opportunity to participate in contests or surveys on our site. If you participate, we will request certain personally identifiable information from you. Participation in these surveys or contests is completely voluntary and therefore you have a choice whether or not to disclose this information. The requested information typically includes contact information (such as name and shipping address) and demographic information (such as zip code).

This information is used to notify contest winners, track traffic, personalize user experience and keep our customers up to date regarding company and industry news. We sometimes use third party service providers to conduct these surveys or contests. They are prohibited from using our users' personally identifiable information for any other purpose. We will not share the personally identifiable information you provide through a contest or survey with other third parties unless we give you prior notice and choice to refuse.

Tell-A-Friend

If you choose to use our referral service to tell a friend about our site, we will ask you for your friend's name and email address. We will automatically send your friend a one-time email inviting him or her to visit the site. We store this information for the sole purpose of sending this one-time email and tracking the success of our referral program. Our email will contain an easy opportunity for your friend to contact us to request that we remove this information from our database.

How Collected Information is Used

Aside from the ways mentioned above, we sometimes use your personally identifiable information in many ways, including sending you promotional materials, and sharing your information with third parties so that they can send you promotional materials. (By "promotional materials," we mean communications that directly promote the use of websites, or the purchase of products or services.) However, you may "opt-out" of certain uses of your personal information by simply contacting us as indicated below.

Communications from the Site

Special Offers and Updates

We will occasionally send you information on products, services, special deals and promotions. You can sign up for these types of emails on our registration page.

Out of respect for your privacy, we present the option not to receive these types of communications. Please see the "Choice and Opt-out" section for further details.

Newsletters/Promotional Updates

If you wish to subscribe to our newsletter(s) and promotional updates, we will use your name and email address to send the newsletter to you. Out of respect for your privacy, we provide you with a way to unsubscribe. Please see the "Choice and Opt-out" section.

Service-related Announcements

We will send you strictly service-related announcements on rare occasions when it is necessary to do so. For instance, if our service is temporarily suspended for maintenance, we might send you an email notification.

Generally, you may not opt-out of these communications, which are not promotional in nature. If you do not wish to receive them, you have the option to deactivate your account to opt-out of these communications. Please see "Choice and Opt-out."

Customer Service

Based upon the personally identifiable information you provide us, we will send you a welcoming email to verify your username and password. We will also communicate with you in response to your inquiries, to provide the services you request and to manage your account. We will communicate with you by email or telephone, in accordance with your wishes.

Profile

We store information that we collect through cookies, log files, clear gifs and/or third party sources to create a "profile" of your preferences. We tie your personally identifiable information and your purchasing history to information in the profile in order to provide tailored promotions and marketing offers and to improve the content of the site for you.

We sometimes share your profile with other third parties who, according to your history with us, may provide useful opportunities to you.

Supplementation of Information

In order to provide certain services to you, we may on occasion supplement the personal information you submitted to us with information from third party sources.

Enhancement of Profile Information

We purchase marketing data from third parties and add it to our existing user database to better target our advertising and to provide customers with pertinent offers. To enrich profiles of individual customers, we tie this information to the personally identifiable information they have provided.

Information Sharing and Disclosure

Aggregate Information (non-personally identifiable)

We share aggregated demographic information about our user base with our partners and advertisers. This information does not identify individual users. We do not link aggregate user data with personally identifiable information.

Personally Identifiable Information

Although we share demographic information for the purposes of assisting you meet your needs and interests, we do not share personally identifiable information with third parties. We provide opt-out opportunities with regard to all information sharing practices.

Agents

We may contract with an outside shipping company to promulgate correspondence and packages as well as a credit card processing company to bill you for goods and services. These companies do not retain, share, store or use personally identifiable information for any other purposes.

Service Providers

We use other third parties to provide certain clerical and information processing and shipping services on our site. When you sign up for our services, we will share only as much information as is necessary for the provision of those services.

These third parties are prohibited from using your personally identifiable information for any other purpose.

Legal Disclaimer

We reserve the right to disclose your personally identifiable information as required by law and when we believe that disclosure is necessary to protect our rights and/or to comply with a judicial proceeding, court order or legal process served on our website.

Choice/Opt-out

We provide you the opportunity to 'opt-out' of having your personally identifiable information used for certain purposes. For example, if you purchase a product/service but do not wish to receive any additional marketing material from us, you can indicate your preference on our order form.

If you no longer wish to receive our newsletter and promotional communications, you may opt-out by following the instructions in each newsletter or communication or by emailing or calling us per the information on our contact page.

You will be notified when your personal information is collected by any third party that is not our agent/service provider, so you can make an informed choice as to whether or not to share your information with that party.

Opting Out

If you do not want your nonpublic personal information disclosed to nonaffiliated third parties, you may "opt out" of those disclosures, meaning you may tell us not to make those disclosures (other than those disclosures permitted by law even if you do opt out). If you opt out, we will not disclose this information to nonaffiliated third parties to independently market products or services to you. However, we may include their offers in billing statements and other routine communications we use in conducting business. To opt out, simply reply by email to ChiefPrivacyOfficer@AutoPartsNetwork.com and type "opt out" in the subject line of the email. Once you opt out, there is no need to do so again for the same business relationship. You may also call us at 1-800-480-8994 to opt out.

Log Files

As is true of most websites, we gather certain information automatically and store it in log files. This information includes internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp and click stream data.

We use this information, which does not identify individual users, to analyze trends, administer the site, track users' movements on the site and gather demographic information about our user base as a whole.

We do not link this automatically collected data to personally identifiable information.

Cookies

A cookie is a small text file that is stored on a user's computer for record-keeping purposes. We do not link the information we store in cookies to any personally identifiable information you submit when on our site.

We use session ID cookies, which expire when you close your browser, to make it easier for you to navigate our site.

We can, at your choosing, set a persistent cookie to store your password, so you don't have to enter it more than once. Persistent cookies also enable us to track and target the interests of users to enhance the user experience.

If you reject cookies, you may still use our site, but your ability to use some areas of our site, such as contests or surveys, will be limited.

Some of our business partners (e.g., advertisers) use cookies on our site. We have no access to or control over these cookies. This privacy statement covers the use of our cookies only and does not cover the use of cookies by any advertisers.

Clear Gifs (Web Beacons/Web Bugs)

We employ a software technology called clear gifs (a.k.a. Web Beacons/Web Bugs) that help us better manage site content by informing us what content is effective. Clear gifs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of web users. In contrast to cookies, which are stored on a user's computer hard drive, clear gifs are embedded invisibly on web pages and are about the size of a period. We do not tie the information gathered by clear gifs to our customers' personally identifiable information.

We use clear gifs in our HTML-based emails to let us know which emails have been opened by recipients. This allows us to gauge the effectiveness of certain communications and our marketing campaigns. If you would like to opt-out of these emails, please see "Choice and Opt-out."

Third Party Advertisers

The ads appearing on this website are delivered to users by our advertising partner. We share website usage information about users with reputable third parties for the purpose of targeting our Internet banner advertisements. The information collected and shared is not personally identifiable.

Links to Other Sites

This website contains links to other sites that are not owned or controlled by us. Please be aware that we are not responsible for the privacy practices of such other sites.

We encourage you to be aware when you leave our site and to read the privacy statements of each and every website that collects personally identifiable information.

This privacy statement applies only to information collected by this website.

Co-branded sites

We may, in certain circumstances, co-brand with "partners and affiliates." These business-to-business relationships are helpful to us and to you as they afford all concerned with greater product and service opportunities. We always provide opt-out opportunities regarding the sharing of your information with such partners and affiliates. Please note the sites linked to our site are governed by their own privacy policies, which may or may not match the standards set by our company.

Bulletin Boards/Chat Rooms

If you use a bulletin board or chat room on this site, you should be aware that any personally identifiable information you submit can be read, collected or used by others, and could be used to send you unsolicited messages. We are not responsible for the personally identifiable information you choose to submit in these forums. We hereby reserve the right to terminate services of those who use these services in a manner inconsistent with the policies articulated herein as well as those articulated in our terms of use page.

Access to Personally Identifiable Information

If your personally identifiable information changes, or if you no longer desire our service, you may update, delete or deactivate your account on our member information page. You may also contact our Customer Support by email, by phone or postal mail.

Security

The security of your personal information is important to us. When you enter sensitive information (such as credit card number and/or social security number) on our registration or order forms, we encrypt that information using secure socket layer technology (SSL).

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, while we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.

If you have any questions about security on our website, feel free to email us.

Business Transitions

In the event we go through a business transaction, such as a merger, acquisition by another company or sale of all or a portion of its assets, your personally identifiable information will likely be among the assets transferred. You will be notified via email and/or a prominent notice on our website for 30 days of any such change in ownership or control of your personal information.

Changes in this Privacy Statement

We will not jeopardize your privacy. However, if we decide to change our privacy policy, we will post those changes to this privacy statement, the homepage and other places we deem appropriate so that you are aware of what information we collect, how we use it and under what circumstances, if any, we disclose it.

We reserve the right to modify this privacy statement at any time, so please review it frequently. If we make material changes to this policy, we will notify you here, by email or by means of a notice on our home page.

Contact Us

If you have any questions or suggestions regarding our privacy policy, please contact us at: ChiefPrivacyOfficer@AutoPartsNetwork.com or 1-800-480-8994.

Privacy Security Program (GLBSR - INFORMATION, DATA AND PRIVACY)

Preamble

In light of prevalent and ever-increasing security threats to databases and networks that often result in identity theft and other crimes, the state and federal governments, in addition to e-commerce and trade industry groups, have put into place a quilt of protective laws, regulations and standards to battle the modern day outlaws. In furtherance of our ongoing program of corporate responsibility and compliance with these laws, regulations and standards, we hereby institute this Gramm Leach Bliley Safeguards Rule Information, Data and Privacy Security Policy. Failure to achieve and maintain compliance may not only result in very serious legal consequences, but also in terrible harm to innocents. It is in this context that we implement the following Information, Data and Privacy Security Policy.

Legal Compliance

We have to contend with a number of laws, regulations and standards comprehending: marketing communications, children's privacy, financial privacy, credit reporting and personal privacy. Many agencies play a role with regard to these laws. The FTC is the major enforcer in this arena.

American and European privacy and information security laws, and this policy, rest on respect for an individual's (or a legal entity's) right to expect that personally identifiable information (that which can be used to harm the owner by identity theft or otherwise) which has been conveyed to another (such as our company) will remain secure and private from unauthorized, malicious outlaws or even those who would be given to discriminate against the owner. Under the Gramm-Leach Bliley Act our company must honor this right and may not disclose the information entrusted to our care to any third party UNLESS the owner, after notice, expressly agrees to allow us to share the information.

Employees shall take note of the following applicable laws under which we have corporate accountability.

  1. The Fair Credit Reporting Act (FCRA) and its amendment The Fair and Accurate Credit Transactions Act or 2003 regulates any company that uses or collects "consumer reports." Consumer reports contain credit reports, information regarding character, reputation, and mode of living and insurance eligibility. Since we "collect and/or use" credit reports, we are subject to this law. Under FCRA we must maintain accurate, reasonably current and complete third party data for substantive decision making by others in need of the information. The party who the information identifies has a right to be notified when the information we have is used to make a negative decision about him; the information must only be used properly. Violations are enforced by the FTC, the State Attorney General, as well as by civil suit. Non-compliance with this law can result in criminal and civil penalties in the amount of actual damages plus statutory damages of at least $1,000.00 per violation and at least $2,500.00 for willful violations. All users, such as our company, of consumer information, must have a "permissible purpose" under The FRCA to obtain a consumer report. We must certify to the Consumer Reporting Agency that we are requesting the information for one of the following permissible purposes:
    • Court Order;
    • At Consumer's Request;
    • Credit Application;
    • Employment Applications – with consent;
    • Insurance Applications;
    • Legitimate Business Needs;
    • Account Reviews;
    • Licensure Requirements;
    • Investigation of Investors;
    • State and Local Government Agents For Child Support Issues;
    • Creditors and Insurers may obtain consumer reports for the purpose of making prescreened unsolicited offers of credit or insurance.
  2. The Gramm Leach Bliley Act (GLBA) addresses privacy breaches in the form of information sales between financial institutions to telemarketing firms. GLBA provides privacy and data/information security by empowering the FTC, federal banking regulators and state insurance regulators to make, enforce and adjudicate rules with both civil and criminal remedies for non-compliance. A great variety of business types must be GLBA compliant; for example: mortgage companies, insurance providers, securities firms, debt settlement firms, payment settlement firms, credit counselors and even check cashing services. In other words, any company significantly engaged in financial activities is a financial institution under GLBA and must be compliant. Therefore, our company must remain compliant. GLBA specifically covers non-public personal information (NPI). This is defined by that which is provided by the consumer to a financial institution, results from a transaction or service or is obtained by some other method by the financial institution. GLBA requires us to safeguard the NPI, which means that we must securely store NPI; notify consumers about our policies regarding information sharing; give consumers an opportunity to opt out of sharing their NPI; refrain from disclosing NPI to non-affiliated third party marketers other than a CRA (Consumer Reporting Agency); and comply with all regulatory standards established by governing authorities which protect the security and confidentiality of NPI and protect against security threats and unauthorized access to or certain uses of records or information. GLBA requires us to have a security plan in place to protect NPI. This is known as the GLB Safeguards Rule (GLBSR) of 2003. The GLBSR applies to paper and electronic records. Under the GLBSR we are required to develop and implement a comprehensive Information Security Program. This program must contain "administrative (e.g. personnel), technical (e.g. encryption/access control/software) and physical (e.g. infrastructure/disaster recovery/environment)" safeguards to protect the confidentiality, security and integrity of NPI. Our Safeguard Program must not only protect the security and integrity of the NPI in our care, but it must also anticipate threats to same. Under this program we are required to: designate an employee to coordinate the safeguards; continually identify and assess risks; continually test our safeguards; diligently evaluate service providers who may have access to our NPI; evaluate and adjust the program dynamically in accord with changes in our business or practices.
  3. Florida Statute 817.5681 – Breach of Security Concerning Confidential Personal Information in Third-Party Possession; Administrative Penalties requires us to protect NPI as well. NPI is defined by state law as an individual's name in combination with any one or more of her social security number, driver license number, financial account numbers, credit card numbers with security codes or passwords, debit card numbers with security codes or passwords or any combination of the above numbers or information which would afford an unauthorized person access to the owner's private information. Should a breach of our GLBSR program occur, we are obligated to notify the subjects who are reasonably believed to have had their NPI compromised within 45 days of our ascertainment of said breach. A breach is defined as the unauthorized access to unencrypted NPI. The notification is subject to postponement for: law enforcement's investigation, or to any measures necessary to determine the presence, nature and scope of the breach and restore integrity to the system.

Administrative Security

Administration of this GLBSR Program will be a team effort involving top management, Information Security and Privacy Law Counsel, IT personnel, Accounting and the program administrator (The Team). Under this, our GLBSR Program, we hereby appoint Charles J. Bonfiglio as our Chief Privacy and Information Officer (CPIO). The CPIO shall be responsible administering and coordinating the actions necessary for the implementation of the GLBSR Program. He will arrange for continuing maintenance, security updates and communication between IT personnel, the database manager, contractors and legal compliance counsel and daily program compliance by personnel. We also obligate ourselves to the selection of appropriate and trustworthy contractors and personnel.

The CPIO, with the assistance of The Team, shall perform an annual self-audit of network security, potential threats, necessary updates and equipment reliability. The annual information security and privacy audit shall inquire specifically as to:

  1. Is the database secure? This inquiry looks at whether the daily database backup is/are securely stored in a device to which access is restricted. Additionally, the account lockout protocol should be updated annually. Users who attempt to log in and get the password wrong three times should be locked out until they communicate with the CPIO. If they do not communicate with the CPIO that they were trying to log in, an event may be in progress and an investigation by the team should be initiated. Default passwords shall be avoided. Oscanner is a software device commonly used by hackers to learn default passwords. In this vein, many retail software programs contain easily accessible default passwords, which must be changed. The audit personnel, knowing that passwords by themselves are not sufficient to protect systems and the information stored on them, should look for two-factor authentication such as RSA, SecureID, Identix, Biometric authentication or digital certificates. These force users to not only have their password, but also to produce a second form of authentication. Finally, real security testing should be implemented. This can be done by loading a laptop with appropriate software, which will only be on the network during security testing like a fire alarm. Our IT personnel will be responsible for setting up such a machine and ensuring that backup storage is encrypted.
  2. Is the network physically secure? The physical security should be tested without employee awareness of the test. Are computers being left on? Are doors being left unlocked? Are passwords taped to keyboards? Can we gain access to machines by posing as IT contractors, telephone repair or maintenance/janitorial personnel? Who has access to alarm codes? Can equipment such as laptops be stolen – one laptop machine stolen at Boeing resulted in over 160,000 identities being stolen. Traveling personnel should be required to lock up laptops in hotel room safes or locking luggage. All laptops should have PC LoJack installed on it. Does the auditor observe unattended machines? Once an unauthorized person has access to an unattended machine he can use a flash drive to load the "Logmein.com" software with his account information to establish an inside-out connection. A breach like this could be disastrous for our company and should be thoroughly tested.
  3. Remote Access? "Logmein" and "GoToMyPC" allow access to firewall protected machines. Once a hacker loads this software on a machine inside the network by the method mentioned in "B" above, it can be accessed from outside the network by a hacker. The software literally allows remote control of an internal machine from the outside. By using this software, hackers can pass through firewalls. The question here is whether use of remote access is strictly limited to selectively authorized personnel. So this area must be thoroughly tested.
  4. Observe and Test Employees and Contractors. Many security breaches have occurred as inside jobs at companies like Bank of America, Commerce Bank and Wachovia. To prevent this from happening it is essential for us to constantly test, audit and update our monitoring of employee and contractor access and use of our network and information database. Internal controls should be examined. Employee and contractor activity should be observed. Unusual activity should be scrutinized. An outside agency should be retained to ascertain vulnerability to insider breaches or negligence. Ask whether Blackberries and PDAs are password protected. Ascertain that only business devices are used and only for business purposes.

Physical Security & Technical Security

Pursuant to this program, we hereby commit our company to maintain continuing updates through our IT personnel, legal counsel and contract service personnel. Toward these ends, it shall be our duty to continually identify and assess risks to our clients' information entrusted to our care. We will monitor risks and test our system in light of ongoing risk. We will continue to keep pace and deploy emerging encryption, firewall, anti-virus, anti-spyware technologies and software. We are committed to the maintenance of a closed network perimeter. Passwords will be continually changed every thirty days and shall contain random combinations of numbers and letters. Passwords shall not be stored nor left in writing where they can be found by potentially unscrupulous individuals. Wireless elements shall not, until further notice, be a part of our network.

Any transmission of data will be encrypted. We use data encryption/decryption and signature techniques to ensure that the data is understood only by the intended recipients and that the senders of information are genuine. We also use, as mentioned herein, accounts, passwords and access control. Each employee/user must have a digital identity that has been set up by the IT personnel. Same shall be updated by password changes and personnel records as required herein.

Only authorized personnel shall be allowed access to our computers. Doors shall be locked at all times the computers are unattended. Any computer and/or computer equipment, which can be shut off during non-use, shall be shut off. We shall maintain an appropriate and secure collocation site for our database to maintain data/information integrity and security. We shall maintain an appropriate security system directly linked to local law enforcement and emergency personnel in furtherance of protecting our physical perimeter.

We are aware that former employees may represent potential threats to our clients' information and our network security. Therefore, we will automatically freeze all accounts and access available to an employee immediately prior to notification of termination is communicated to the employee. Employees will sign non-disclosure agreements as part of the hiring process. Prior to hiring we shall conduct full background checks of personnel in furtherance of assurance of the quality and trustworthiness of our employees as well as giving us a capability of contacting employees subsequent to their departure.

Implementation

Information security and privacy protection is of paramount import to our clients and our company. A breach could devastate a client, several clients and our company. However, implementation of the foregoing program will go a long way toward securing the administrative, technological and physical aspects of our network as well as our company's future. Upon approval by corporate authorities, this program should be provided, on a need to know basis, only to the corporate officers appointed CPIO. The CPIO shall then assemble The Team, which should be brought together for an initial meeting. The Team should keep this program on-hand in a secure location.

Communications between Team members shall be confidential and compartmentalized from the rest of the organization. The CPIO should write a letter to the entire organization introducing herself in her new role and expressing in general terms that her role has been created as part of a program securing the company's information assets and the clients' privacy interests. Personnel should also be advised that any person in our organization who observes a breach or even a potential breach should notify the CPIO notified immediately.

Summation

We expressly acknowledge the value of our information assets and our clients' privacy interests as well as the laws and regulations, which are in place to protect them. In compliance under these laws and regulations we have developed, and hereby implement, the aforementioned GLBSR Program. Any questions or concerns shall be directed initially to Charles J. Bonfiglio CPIO and then to The Team if necessary.

Click a store policy link below to learn more

Terms and Conditions

For general terms and conditions regarding AutoPartsNetwork.com, please click the link below

Return Policy

We want you to be completely satisfied and if you are ever not, we make it simple to request returns or exchanges.

Shipping Policy

Whether shipping to any of our 50 United States or across the globe, we work fast to get your products out the door quickly.

Warranty Policy

We only offer high quality products manufactured by reputable industry leaders. View our warranty page for more info.

Privacy Policy

We are totally committed to protecting the privacy of each and every member of our online e-commerce community.

Payment Options

We make your shopping experience better by accepting various payments options through our highly secure processing system.

Trademarks

Auto Parts Network® and its affiliate brands are the trademarks of their respective owners. For more on our trademarks click link below.