top of page


Intoxicating Travel Group LLC dba I Travel Group values your privacy. This policy outlines how we handle the personal information we collect from customers, advisors, reps, and vendors. It explains:

  • The types of personal information we gather

  • How we use and share the information

  • How do we protect and store the data


Information We Collect

We collect contact details, payment info, bookings, travel preferences, demographics, job application details, website content like photos survey responses, etc.

We get names, contact info, photos, specialties, etc. from our advisors and reps.

We automatically collect IP addresses, and browser/device info through cookies, web server logs, etc. when you use our sites.

How We Use Information

We use your information to:

  • Create profiles and accounts

  • Recommend advisors

  • Provide services like bookings and marketing

  • Communicate about offers and events

  • Manage inquiries and requests

  • Process claims

  • Recruit, evaluate, and onboard employees

  • Develop products and services

  • Conduct research and analysis

  • Prevent fraud and enforce policies

  • Comply with legal requirements

We seek consent as needed to process your personal information.


Sharing Information

We share information with vendors providing services for us. We may also disclose information to comply with laws, support legal matters, or prevent harm. We do not sell personal information.

Protecting Information

At I Travel Group, we understand the importance of safeguarding your personal information and are committed to protecting it from unauthorized access, alteration, disclosure, or destruction. Below, we outline the key measures we have implemented to ensure the security and privacy of your data:


  • Data Transmission: All data transmitted to and from our website is encrypted using industry-standard Secure Socket Layer (SSL) technology to create a secure connection between your device and our servers.

  • Data Storage: Sensitive information, such as payment details and personal identifiers, is encrypted at rest to prevent unauthorized access.


Access Controls

  • Limited Access: Access to your personal information is restricted to employees, contractors, and agents who need to know that information to process it for us. They are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.

  • Authentication: We employ robust authentication methods to ensure that only authorized users can access their accounts, including options for two-factor authentication (2FA) where applicable.


Monitoring and Response

  • Continuous Monitoring: Our security systems continuously monitor our infrastructure for signs of unauthorized access or potential security breaches. We have protocols in place to identify, respond to, and mitigate any potential security incidents promptly.

  • Regular Updates: We regularly update our security practices and infrastructure to address emerging threats and vulnerabilities.


Data Minimization and Retention

  • Need-to-Know Basis: We collect only the information necessary for fulfilling the purposes outlined in our Privacy Policy and retain it only for as long as necessary to fulfill these purposes, comply with legal obligations, resolve disputes, and enforce our agreements.

  • Anonymization: Where possible, we anonymize data to reduce the risks associated with data processing and storage.


Training and Awareness

  • Employee Training: We provide regular privacy and security training to our employees and contractors to ensure they understand the importance of protecting personal information and the specific practices we follow to secure it.


Partners and Third Parties

  • Vetting Process: We carefully vet all third parties that handle personal information on our behalf to ensure they follow comparable security and privacy practices.

  • Contracts: All third parties are bound by contractual obligations to ensure the confidentiality and security of the data they process for us.


Your Role in Data Security

While we take extensive measures to protect your information, the security of your data also depends on you. We encourage you to use strong passwords, enable two-factor authentication if available, and be vigilant against phishing attacks.

We transfer data globally, protecting it as described in our policies and per legal requirements.


Updating Your Information


We believe in giving you the ability to access and update your personal information. To review, update, or modify your information, please follow these steps:

  • Contact Us: please contact our support team at or through our support hotline at 1 (713)8539359. Our team will be happy to assist you in making the necessary updates.

Communication Preferences

You have the right to choose how we communicate with you. You can update your communication preferences at any time to control the types of messages you receive from us, including marketing communications, newsletters, and service updates. Here’s how you can update your preferences:

  • Email Preferences: Use the "Unsubscribe" link found in the footer of our emails to opt out of future emails. Alternatively, you can adjust your email preferences in your account settings.

  • Notifications: For mobile app users, you can manage push notifications in the app settings. For web notifications, adjust your browser settings to block or allow notifications from our site as desired.


Accessing Your Information

If you wish to access the personal information we hold about you, please send a request to We will provide you with the information within a reasonable timeframe, according to applicable privacy laws.


Deleting Your Information


If at any point you wish to delete your account and the personal information associated with it, please contact our support team. Note that some information might need to be retained for legal, security, or operational reasons.


Additional Privacy Controls

We are committed to offering you meaningful privacy choices. Depending on your location, you may have certain rights under applicable data protection laws, including the right to object to certain processing activities or to request a copy of your personal information. Please contact us for more information on these rights and how to exercise them.

For further details about how we collect, use, and protect your personal information, please refer to our full Privacy Policy.


Let us know if you have any privacy-related questions or concerns.

bottom of page