Privacy policy

Privacy policy commitment, purpose & how we apply

Tripidays Egypt Tours' commitment to privacy

At Tripidays Egypt Tours, we understand the importance of maintaining the privacy and security of your personal information. This Privacy Policy outlines how we collect, use, and protect your information when you visit our website or book a tour with us.

Purpose of the policy

The purpose of this policy is to ensure that you are aware of how we use and protect your personal information and to provide you with the necessary information to make informed decisions about using our services.

How it applies to website visitors, clients, and other users

This policy applies to all website visitors, clients, and other users of our services. By using our website or booking a tour with us, you agree to the terms outlined in this Privacy Policy.

Information Collection

Personal Information

We may collect personal information from you when you visit our website, contact us for inquiries or book a tour with us. This information may include your name, email address, phone number, and any other relevant information.

Non-personal Information

We may also collect non-personal information such as your IP address, browser type, operating system, and other technical information when you visit our website. This information is used to improve our website’s functionality and enhance the user experience.

How information is collected

We may collect your personal and non-personal information through direct input, online forms, cookies, or third parties. Cookies are small text files that are placed on your computer’s hard drive to track usage of our website and remember your preferences.

Use of Collected Information

Service Delivery

Booking, payment processing, customer service, and communication purposes.

Marketing Purposes

To send you promotional emails, newsletters, and other marketing materials. You can opt out of these communications at any time.

Legal Compliance

We may use your information to comply with legal obligations or enforce our policies.

Improvement of Services

Analyzing website usage, feedback, and trends to improve our services.

Sharing of Information

Third-Party Sharing

In today’s interconnected world, third-party sharing plays a crucial role in enhancing customer experiences. Service providers such as airlines and hotels often collaborate with various third parties to streamline operations and offer added value to their clients. These collaborations can include sharing customer data with travel agencies for personalized booking options or partnering with local businesses to provide exclusive discounts to guests.

Payment processors also play a significant role in this ecosystem. They facilitate secure transactions between customers and service providers, enabling seamless payments for flights, accommodations, and other travel-related services. By sharing transaction data with relevant partners, payment processors help improve fraud detection, enhance customer support, and create more tailored offerings.

Ultimately, the effective sharing of information among service providers and payment processors not only simplifies the customer journey but also fosters trust and loyalty in the competitive travel industry.

Legal Obligations

In certain circumstances, sharing your information might be required by law or necessary for fraud prevention. Legal obligations may include responding to a court order, subpoena, or legal process initiated by a government authority. In cases where there are suspicions of illegal activities, fraud prevention measures necessitate sharing information with law enforcement agencies or relevant authorities to avert financial crimes and protect both the company and its customers from potential harm. Such sharing is conducted responsibly and in compliance with applicable laws and regulations, ensuring that privacy and security are upheld throughout the process.

Business Transfers

During mergers, acquisitions, or sales, the exchange of customer information becomes a critical aspect of the transaction. In these scenarios, information may be shared as part of the due diligence process, where the acquiring entity evaluates the assets, liabilities, and potential risks associated with the company being acquired.

This exchange must adhere to strict confidentiality agreements to protect sensitive data. After a merger or acquisition, customer information is typically transferred as part of the overall business assets, allowing the new entity to continue operations, maintain customer relationships, and integrate systems effectively. Such transfers are performed with transparency and in compliance with relevant data protection laws to ensure that customer privacy remains a top priority throughout the entire process.

Data Security

Measures Taken to Protect Personal Data

Encryption

Encryption plays a crucial role in safeguarding personal data by transforming it into a coded format that is unreadable to unauthorized individuals. This process ensures that even if data is intercepted during transmission, it remains protected from malicious entities. Our organization utilizes advanced encryption techniques, both for data at rest and data in transit, to uphold the confidentiality and security of customer information. By employing industry-standard encryption protocols, we effectively shield sensitive data from potential breaches and unauthorized access.

Secure Servers

The security of our servers is paramount in protecting personal data from cyber threats. We deploy a robust infrastructure of secure servers equipped with the latest security measures, including firewalls, intrusion detection systems, and regular security audits. These servers are located in data centers with high physical and digital security standards, ensuring that our customers’ data remains safe and protected from potential vulnerabilities.

Restricted Access

To further enhance data security, we implement strict access controls that limit data access to authorized personnel only. Employees are granted access based on their roles and responsibilities, ensuring that they can only access the information necessary to perform their duties. Additionally, regular access reviews and audits are conducted to maintain the integrity of these restrictions. By employing multi-factor authentication and comprehensive monitoring systems, we ensure that any unauthorized attempts to access personal data are promptly detected and addressed. In this way, restricted access serves as a critical layer of our data protection strategy, safeguarding customer information against unauthorized use.

Responsibilities of the user

Users play a critical role in safeguarding their personal information and must take proactive measures to secure their data. One of the primary responsibilities is to create strong, unique passwords for each online account. A strong password should include a combination of letters, numbers, and special characters, making it difficult to guess or crack. Users must change their passwords regularly and avoid using easily accessible information, such as birthdays or common phrases, as passwords.

Additionally, users should be vigilant against phishing attempts and refrain from clicking on suspicious links or providing confidential information to unverified sources. This includes being careful about sharing personal details on social media and verifying the authenticity of websites before entering sensitive information. Utilizing features like two-factor authentication further enhances security by adding an extra layer of protection against unauthorized access.

Finally, users should keep their software and devices updated to protect against vulnerabilities and ensure they are equipped with the latest security patches. By following these best practices, users can significantly reduce the risk of personal data breaches and contribute to a safer digital environment.

Cookies and Tracking

Right to access, update, or delete personal data

Websites commonly use cookies and other tracking technologies to personalize user experience, track user activity, and gather information for targeted advertising. While these technologies can provide convenience and personalization, they also raise concerns about privacy and data protection.

As a user, you have the right to access, update, or delete any personal data collected through cookies or tracking technologies. This includes the option to opt out of targeted advertising or disable cookies altogether. Most web browsers allow users to manage their cookie preferences and provide options for clearing browsing history and data.

Opt-out options for marketing communications

Marketing communications such as emails and newsletters may also collect personal data in addition to cookies and tracking technologies. Users should have the option to opt out of receiving these communications at any time. Websites should provide clear and easy-to-use opt-out options for users who do not wish to receive marketing materials.

Third-Party Links

Disclaimer regarding links to external websites

Users should be cautious when clicking on links to external websites, as they may contain content or policies that differ from the website they are currently browsing. External websites are not under the control of the current website, and users should review their privacy policies before providing any personal data.

Tripidays Egypt Tours is not responsible for the privacy practices of third-party sites

Users need to understand that Tripidays Egypt Tours is not responsible for the privacy practices of any third-party websites, including websites linked to our website or advertisements displayed on our website. Users should review the privacy policies of these third-party sites before providing any personal data.

Children's Privacy

Protecting children's privacy online

Tripidays Egypt Tours is committed to protecting the privacy of children online. Our website and services are not intended for use by children under the age of 18, and we do not knowingly collect personal information from anyone under the age of 18 without parental consent. If you believe a child under the age of 18 has provided us with.

Updates to Privacy Policy

How changes to the privacy policy will be communicated to users

We reserve the right to update this privacy policy at any time. If we make significant changes, we will notify users by posting a prominent notice on our website or by sending an email to registered users. Users should review this policy periodically for any updates.

The effective date of the current policy

This privacy policy is effective as of January 2018. By using our website and services, you agree to the terms outlined in this privacy policy. If you do not agree with the terms of this policy, please do not use our website or services.  However, we encourage users to reach out to us if they have any concerns or questions regarding our privacy practices. We are committed to protecting the privacy of all users and will do our best to address any issues that may arise.

Contact Information

How to Contact Us

If you have any questions or concerns regarding this privacy policy or our data handling practices, please do not hesitate to contact us. You can reach Tripidays Egypt Tours by:

Tripidays Egypt Tours

1157, BLD. No.1 Ministries Quarter Division, Sheraton, Cairo, Egypt

We are committed to addressing your questions and resolving any issues you may have regarding our privacy practices.

Our Partners

Popular attractions and highlights to visit in Egypt

Get special offers, and more from Tripidays Egypt Tours
Subscribe for updates & promotions