onlinegreece Ionian islands
Ionian islands
English Deutsch Italian Dutch Hungarian


All "on line" room reservations are guarantee through our reservation system. Any transaction is subject according to the Greek laws and regulations. Therefore, we will duly and diligently safeguard and protect the privacy and confidentiality of your personal details (including your credit card details).


- Personal information collection


During the on line reservation accommodation booking you will require to complete the following on line forms with the following information:

  • Names
  • Home or Office address
  • Email address (business or private)
  • Telephone Numbers (mobile, home or office)
  • Credit Card details (i.e. credit card type and number, CVC code, expiration date, credit card holder name)
  • Special Requests where available

All confirmed bookings will be reconfirmed to you by additional email to the email address you will provide us.


- Disclosure of all personal details


GREEK ISLANDS TRAVEL takes responsibility regarding your privacy, very seriously. All the information we request during the on line reservation procedure, is required in order to offer you a professional service.

We will only disclose your personal information to certain permitted third parties for the purposes of completing your booking through us, in order to provide you with the information or services you have requested.

Once more, in accordance with Greek personal data protection laws, our company follows strict security procedures to prevent personal data misuse and unauthorised access.


- Protect and secure your credit card information


In order to protect and safeguard the personal data provided to us, we have implemented and use appropriate business systems and procedures. Your credit card information is transmitted directly to a secure server protocol of Alpha Bank Greece (e-Commerce), which encrypts all your personal and credit card details. The encryption method used is the industry standard "Secure Socket Layer" (SSL) technology. In addition, they have implemented and use security procedures and technical and physical restrictions for accessing and using personal information. Only authorized employees are permitted to access personal information for performing their duties in respect of our services.

The server and network are protected by firewalls against unauthorized access and we have intrusion detection systems that monitor and detect unauthorized (attempts to) access to or misuse of the servers.