Privacy Policy - Bookers International
Privacy Policy

Privacy Policy

Your Privacy Matters to Us

Bookers International LLC values your privacy and is committed to protecting the personal data of its customers, partners, and users. This Privacy Policy transparently explains how we collect, use, store, and protect your personal data.

By using our websites, platforms, services, or by purchasing any Bookers product, you agree to the practices described in this Policy.


1. Who We Are

Bookers International LLC is a company registered in the United States, specializing in experiences and services related to the Rio de Janeiro Carnival and tourism in Brazil, including:

  • Ticket packages
  • Tours and tourist experiences
  • Hotel reservations and accommodation packages
  • Transfers
  • Events
  • Complete traveler support

We operate internationally, serving clients from various countries, always with a focus on security, transparency, and excellence in service.


2. What Data We Collect

The data collected varies depending on the type of service contracted and the form of interaction with our channels. We may collect, among others:

a) Identification and Contact Data

  • Full name
  • Email
  • Phone number
  • Nationality
  • Date of birth
  • Identification document (when necessary for product pickup or security validations)

b) Purchase and Service-Related Data

  • Information about purchased ticket packages, tours, accommodations, transfers, and events
  • Dates, sectors, quantities, and contracted services
  • Purchase and reservation history

c) Payment Data

  • Processing is handled by third-party payment gateways, such as Stripe, or by bank transfer
  • We only store the first 4 and last 4 digits of the card, in encrypted form
  • We do not store complete credit card data

d) Browsing Data

  • IP address
  • Browser and device type
  • Pages accessed
  • Cookies and similar technologies

This data helps improve the user experience, security, and performance of our websites.

e) Sensitive Data (when applicable)

In specific situations and for security or operational requirement reasons, we may collect:

  • Facial biometrics, through verification platforms (e.g., Sumsub), for some clients only
  • Photo documents, in specific cases, such as in-person product pickup or identity validation

This data is treated with the highest level of security and only when strictly necessary.


3. How We Use Your Data

We use personal data to:

  • Process purchases and reservations for ticket packages, tours, hotels, accommodation packages, transfers, and events
  • Enable the provision of contracted services
  • Offer traveler support before, during, and after the experience
  • Comply with legal, tax, and regulatory obligations
  • Ensure security, fraud prevention, and identity validation
  • Improve our services, communication, and user experience

4. Data Sharing

Your data may be shared only when necessary, with:

  • Payment providers and financial institutions
  • Operational partners (hotels, tour operators, transfer companies, event organizers)
  • Verification and security platforms, when applicable
  • Public authorities, when required by law

We always seek to share only the strictly necessary data, with partners who adopt appropriate protection measures.


5. Data Storage and Retention

Personal data is kept:

  • Until a deletion request is made, when applicable
  • Or for the period necessary to comply with legal, regulatory, tax, security, or fraud prevention obligations

Data may be processed or stored outside the country of origin, including in the United States, always with adequate protection and security measures.


6. Cookies and Similar Technologies

6.1 What Are Cookies?

Cookies are small text files stored on your device that help us recognize you and improve your experience. We use different types of cookies for different purposes.

6.2 Types of Cookies We Use

6.2.1 Essential (Necessary) Cookies

These cookies are mandatory for the basic functioning of the site and do not require prior consent:

  • Authentication and Security: Keep your session active and protect against unauthorized access
  • Browsing Preferences: Remember your choices (language, currency, viewing preferences)
  • Critical Functionalities: Allow you to complete purchases and access your account

6.2.2 Analytics and Performance Cookies

These cookies help us understand how you use our site to improve the experience:

  • Google Analytics 4 (GA4): Collects information about pages visited, time spent, bounce rate, and user behavior. It helps us identify areas that need improvement
  • Microsoft Clarity: Monitors user interactions, clicks, scrolling, and mouse movements to optimize usability
  • Inspectlet: Records user sessions for behavior analysis and identification of technical issues

6.2.3 Marketing and Retargeting Cookies

These cookies allow us to show relevant ads based on your interests:

  • Facebook Pixel (v2.9.248): Tracks conversions, builds custom audiences, and allows retargeting of users who visited our site but did not complete a purchase. It shares data with Meta Platforms
  • Google Ads Pixel: Allows retargeting through Google Ads and helps measure the effectiveness of advertising campaigns
  • DoubleClick Floodlight: Tracks conversions and advertising campaigns

6.2.4 Third-Party Cookies

We also use:

  • Google Tag Manager: Manages the implementation of tracking tags and pixels
  • AdRoll: A retargeting platform that displays ads on other websites

6.3 Your Control Over Cookies

You can manage or disable cookies in several ways:

  1. Browser Settings: You can block or delete cookies in your browser settings (Chrome, Firefox, Safari, Edge)
  2. Tracking Opt-out: You can disable analytics and marketing cookies without affecting the site's functionality
  3. Third-Party Tools: You can use tools like Your Online Choices to manage advertising preferences

Important: Disabling essential cookies may prevent you from using certain site features.

6.4 Cookie Consent

When you first access our site, you will be asked to consent to the use of non-essential cookies. You can accept all, reject all, or customize your preferences.


7. Data Subject Rights

You have important rights over your personal data, in accordance with the General Data Protection Law (LGPD) and international regulations:

7.1 Recognized Rights

  • Right of Access: You can request and receive a copy of all personal data we hold about you
  • Right to Rectification: You can request the correction of inaccurate or incomplete data
  • Right to Erasure: You can request the deletion of your personal data, subject to legal limitations
  • Right to Portability: You can request that your data be transferred in a structured format to another service
  • Right to Object: You can object to the processing of your data for direct marketing purposes
  • Right to Information: You can request information about how your data is used and shared

7.2 Limitations

Some data may be retained even after a deletion request, when there is:

  • A legal or regulatory obligation (e.g., tax records, compliance with fraud prevention laws)
  • A contractual necessity (e.g., data needed to complete a transaction)
  • A proven legitimate interest (e.g., fraud prevention)

7.3 How to Exercise Your Rights

To exercise any of these rights, you must:

  1. Send a request by email to: info@bookersinternational.com
  2. Include in the request:
    • Your full name
    • Email associated with your account
    • A clear description of the right you wish to exercise
    • Any additional information that helps identify your data

7.4 Response Time

Bookers International is committed to responding to all data subject requests within 15 (fifteen) business days, as required by the General Data Protection Law (LGPD).

  • Counting: The 15 business days begin upon receipt of your complete request
  • Extension: In complex cases, we may request an extension of up to 10 additional business days, notifying you of the reason
  • Confirmation: You will receive a confirmation of receipt of your request within 2 business days

7.5 No Discrimination

You will not be discriminated against for exercising your rights. We will continue to offer the same services and prices, regardless of whether you exercise your privacy rights.


8. Information Security

Bookers International implements robust technical and organizational measures to protect your personal data against unauthorized access, loss, misuse, or improper disclosure.

8.1 Technical Security Measures

8.1.1 Encryption and Data Protection in Transit

  • HTTPS/TLS (Transport Layer Security): All data transmitted between your browser and our servers is encrypted using the HTTPS protocol with high-security SSL/TLS certificates
  • Cloudflare Protection: We use Cloudflare's security services, which include:
    • Web Application Firewall (WAF): Protects against common attacks (SQL injection, cross-site scripting, DDoS)
    • DDoS Protection: Defends against distributed denial-of-service attacks
    • Global CDN: Securely distributes content through global servers
    • Secure Cache: Reduces server load and improves performance while maintaining security

8.1.2 Encryption at Rest

  • Sensitive Data: Critical information (card numbers, identity documents) is stored encrypted in our databases
  • Encryption Keys: Managed securely and separately from the encrypted data

8.1.3 Authentication and Access Control

  • Account Validation: When you register, you receive a verification code via SMS or email PIN to confirm your identity
  • Access Control: Only authorized employees have access to personal data, based on operational need
  • Audit Logs: All access to sensitive data is logged and monitored

8.2 Secure Infrastructure

  • Cloud Hosting: We use infrastructure from trusted providers:
    • Amazon Web Services (AWS): For data processing and storage
    • Google Cloud: For analytics and backup services
    • DigitalOcean: For additional infrastructure support
  • Data Isolation: Your data is logically isolated from other customers
  • Automatic Backup: We perform regular backups to ensure recovery in case of incidents

8.3 Security Testing and Monitoring

  • Continuous Vulnerability Scanning: We conduct regular vulnerability scans on our infrastructure and applications
  • Tool Monitoring: We frequently analyze our tools and dependencies to identify and fix security vulnerabilities
  • Security Updates: We keep all systems, libraries, and frameworks updated with the latest security patches

8.4 Security Incident Response Procedure

Although Bookers International maintains high security standards, we recognize that incidents can occur. Our procedure is:

8.4.1 Detection and Containment

  1. Identification: Continuous monitoring detects suspicious activities or anomalies
  2. Isolation: Affected systems are immediately isolated to prevent propagation
  3. Containment: Immediate measures are taken to stop the incident

8.4.2 Investigation

  1. Forensic Analysis: The security team investigates the scope and nature of the incident
  2. Evidence Collection: Data is collected to understand how the incident occurred
  3. Determination of Affected Data: We identify which personal data was compromised

8.4.3 Notification

  1. Risk Assessment: We determine if there is a real risk to data subjects
  2. Notification to Affected Parties: If there is a risk, we notify affected users within 72 hours via email
  3. Notification to Authorities: We inform data protection authorities when required by law

8.4.4 Communication

  1. Transparency: We provide clear information about:
    • What happened
    • What data was affected
    • Measures taken to resolve the issue
    • Steps you should take to protect yourself
  2. Support: We offer additional support (e.g., credit monitoring, if applicable)

8.4.5 Continuous Improvement

  1. Post-Incident Analysis: We review the incident to identify improvements
  2. Implementation of Corrections: We implement measures to prevent similar incidents

8.5 User Responsibilities

To maintain the security of your account:

  • Strong Password: Use unique and complex passwords
  • Credential Protection: Never share your password or verification code
  • Secure Browsing: Use devices protected with updated antivirus software
  • Report Suspicions: Inform us immediately if you suspect unauthorized activity

9. Updates to This Policy

This Privacy Policy may be updated periodically to reflect changes in our practices, technologies, or legal requirements. We recommend reviewing this content regularly to stay informed about any changes.

When we make significant updates, we will notify you by email or through a notice on our website.


10. Contact

For questions, requests, or comments related to this Privacy Policy, please contact us:

📧 Email: info@bookersinternational.com

We will respond to all requests within 15 business days.


Your Privacy is Our Priority

Thank you for trusting Bookers International with your personal data. We are committed to maintaining the highest quality of data protection and transparency in all our operations.

Last Updated: January 2026