Peace of Mind

Privacy, security, and customer assurances

We operate within United States regulations and handle every quote request with transparency. The policies below explain how we collect and use data, the terms of every junk removal service, and how we protect your information.

Privacy Policy

Guitron Junk Removal collects the details you share through our contact assistant, phone calls, email, or social media. Typical information includes your name, phone number, email address, service location, preferred pickup window, and a short description of the materials you want removed.

  • We use your information to provide estimates, schedule pickups, confirm appointments, and deliver updates.
  • Details are stored in secure, access-controlled systems used exclusively by our internal team.
  • We never sell or trade personal information. Trusted vendors only receive the data needed to perform a requested service.
  • You can request access to, updates of, or deletion of your data by emailing guitronjunkremoval@gmail.com.

We retain service records only as long as required to comply with legal obligations and support customers.

Terms of Service

Estimates are based on the information provided at the time of booking. Final pricing may adjust on-site if the volume, weight, or access conditions differ from the original description.

  • All services are performed by insured professionals trained to protect your property and our team.
  • Hazardous materials (chemicals, paints, medical waste, etc.) must be disclosed in advance so we can recommend proper handling.
  • By scheduling a pickup you confirm you are authorized to dispose of the items and allow access to the service location.
  • Invoices are due at the time of service unless a written agreement defines different payment terms.

We strive to resolve concerns immediately. Contact us before your appointment if you need clarification about these terms.

Data safeguards

Access to customer records is limited to trained staff. We use encrypted communication tools when possible, routinely review permissions, and remove information that is no longer required for operational or regulatory purposes.