Report a security issue
Updated 1 month ago
Are you a guest?Contact our Customer Service team
Legal & Security
- Why you need to complete the Know Your Partner (KYP) form
- Making Pulse even more secure
- What you need to know about online security and social engineering
- Online Security Awareness: Phishing
- Preventing unauthorized use of your account
- What is 2-factor authentication (2FA)?
- Requirements and regulations for surveillance devices
- Digital event security standards
- Guidelines for room key access
- Keeping your property safe and clean
- Equipping your home property with safety devices, safety kits, and emergency plans
- Protecting your home property with security devices
- Partner Liability Insurance
- Identifying and acting on potential human trafficking of refugees from Ukraine
- Report a security issue
- Online security awareness: malware
- Local laws and regulations
- How do I remove a property or end my partnership with Booking.com?
- My property is under new ownership. What should I do?
- Booking.com Animal Welfare Standards for accommodation partners
- Booking.com Animal Welfare Standards for experience partners
- Where can I find my General Delivery Terms (GDT)?
- Complying with European Union consumer law
- Mandatory host type (professional/private) assessment
- How does parity work?
- Our values and guidelines
- Offer transparency and clarity through simpler policies
- Our Supplier Code of Conduct
- [EN-US] Meeting legal requirements for tourist accommodation in French Polynesia
- Understanding Force Majeure
- Handling emergency closures
- VAT and tax withholding legislation in Mexico
- Understanding short-term rentals
- Short-term rentals: FAQs
- Everything you need to know about DAC7
Reading time: 1.5 minutes Highlight: For digital events, Booking.com doesn’t ask for payment info or important credentials (e.g. Extranet passwords), and event communications...
What's phishing? Phishing is pretending to be someone else to steal money, data, or data to earn money. Phishing is the most common way that organizational breaches occur. What do...