TUMA Privacy Policy

Last updated: 12 - November - 2025

1. Introduction

Money Transfer International Ltd (“MTI”, trading as “Tuma”, “we”, “us”, “our”) is authorised and regulated by the Financial Conduct Authority (FCA) as a Small Payment Institution (FRN 828633) under the Payment Services Regulations 2017.

MTI is committed to complying with the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, ensuring all processing of personal data follows the principles of lawfulness, fairness, transparency, purpose limitation, data minimisation, accuracy, storage limitation, integrity and confidentiality, and accountability (Article 5 UK GDPR).

This Privacy Policy explains:

  • what information we collect;
  • how and why we process it;
  • the lawful bases for each activity;
  • how we secure, retain, and share it; and
  • what rights you have under data-protection law.

By creating an account or using the Tuma/MTI website, app, or related services, you acknowledge that you have read this Privacy Policy.

Definition

“Personal Data” means any information relating to an identified or identifiable natural person (“Data Subject”). An identifiable natural person is one who can be identified, directly or indirectly, by reference to an identifier such as a name, identification number, location data, an online identifier, or factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that person.

“Special Category Data” means Personal Data revealing or relating to racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic or biometric data processed for the purpose of uniquely identifying an individual, health data, or data concerning a person’s sex life or sexual orientation. Special Category Data requires enhanced protection under the UK GDPR.

“Controller” means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of Personal Data.

“Processor” means a natural or legal person, public authority, agency, or other body which processes Personal Data on behalf of the Controller and in accordance with the Controller’s instructions.

“Automated Decision-Making” means a decision made about an individual solely by automated means, without meaningful human involvement, including any automated processing or profiling that produces legal effects concerning the individual or similarly significantly affects them.

“Data Transfer” means the disclosure, transmission, copying, or making available of Personal Data to a recipient located outside the United Kingdom, or to an international organisation, by physical, electronic, or other means as governed by Chapter V of the UK GDPR.

“Tuma Platform” means the digital ecosystem operated by TUMA for the provision of money remittance and associated services, including its systems, applications, websites, software, databases, interfaces, and any related technological infrastructure used to process or store Personal Data.

“MLRO” or “Money Laundering Reporting Officer” means the individual formally appointed by the organisation to oversee Anti-Money Laundering (AML) compliance, receive and assess internal Suspicious Activity Reports (SARs), and act as the primary liaison with relevant regulatory and law enforcement authorities.

2. Identity of the Controller and Scope

Data Controller: Money Transfer International Ltd (MTI)

Registered jurisdiction: United Kingdom

Contact Email: privacy@tuma.com

Support Email: support@tuma.com

Tuma processes personal data both in the United Kingdom and through authorised employees in Kenya. MTI (UK) remains the primary controller; MTI (Kenya) operates solely as a processor acting under MTI (UK)’s documented instructions pursuant to Article 28 UK GDPR. This Policy applies to all senders, recipients, vendors, partners, and third-party processors engaged with Tuma’s payment and remittance services.

3. How We Use Your Data

Overview

We process your personal data in a variety of ways in order to deliver, maintain and enhance our remittance services, comply with regulatory obligations, protect you and us from fraud, and communicate with you. All processing is subject to the principles in Article 5 of the UK GDPR and the requirement that we have a lawful basis under Article 6 UK GDPR (or Article 9 where special categories apply).

3.1 Service Delivery & Account Management

  • We use your data to register and onboard you as a customer, to verify your identity, fulfil transactional requests (sending and receiving funds), provide customer support, account administration and service updates. (Lawful basis: Article 6(1)(b) UK GDPR — processing necessary for performance of a contract you have with us.)
  • When you act as a sender, you will receive in-app notifications confirming transfer status. When you act as a recipient, you will receive SMS notifications once the funds are available.
  • We process payment and transaction details (sender bank or pay-bill account, recipient details, purpose of payment, amounts) to execute your instruc­tions and to maintain records.

3.2 Compliance with Legal Obligations

  • We process data to satisfy our obligations under the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017 and related legislation (e.g., the Proceeds of Crime Act 2002, the Terrorism Act 2000). This includes customer due-diligence checks (Reg. 27 MLR 2017), ongoing monitoring, record-keeping (Reg. 40 MLR 2017) and submission of Suspicious Activity Reports (SARs). (Lawful basis: Article 6(1)(c) UK GDPR — processing necessary for compliance with a legal obligation.)
  • Machine learning and algorithmic risk-scoring systems analyse thousands of data points (device metadata, IP/VPN detection, transaction‐behaviour) to flag high-risk transactions — however any final decision (such as blocking a transaction) is reviewed by a human operator in compliance with Article 22 UK GDPR (automated decisions subject to safeguards).

3.3 Fraud Prevention, Risk Assessment & Analytics

  • We use your data for fraud detection, risk scoring, anomaly-detection, system improvement and operational resilience. These activities are necessary in our legitimate interests to protect our business and customers. (Lawful basis: Article 6(1)(f) UK GDPR — legitimate interests, balanced against your rights and freedoms.)
  • We collect and analyse clickstream data, device metadata, app usage, geolocation, time-of-transaction, and other indicators to enhance the security of the platform, identify misuse, and optimise user experience.
  • We may create aggregate, pseudonymised datasets for internal reporting, trend analysis and service optimisation; no individual is re-identified in these analytics unless required for investigation.

3.4 Marketing & Communications

  • We may use your contact details and engagement data to send you information about our services, updates, promotions and referral programmes (once the referral programme is in force). This is done with your consent or where permitted under legitimate interests (e.g., marketing to existing customers). (Lawful basis: Article 6(1)(a) – consent; or Article 6(1)(f) – legitimate interests.)
  • You have the right to withdraw your consent at any time by opting out; once you do, we will cease further marketing communications.
  • We do not sell your personal data to third-parties for marketing purposes.

3.5 Auditing, Internal Governance & Legal Defense

  • We use your data for internal auditing, regulatory reporting, quality assurance, compliance investigations and legal claims (including defence of disputes). These may include reviewing transaction logs, access logs, anomaly reports, vendor performance data, staff access records. This supports our compliance with the FCA Handbook (SYSC 6.3) and our accountability obligations under Article 24 UK GDPR. (Lawful basis: Article 6(1)(f) UK GDPR.)
  • In circumstances where you request deletion or restriction of processing, we may suspend limited processes while verifying your identity and assessing legal retention obligations.

4. Legal & Regulatory Basis

4.1 Overview of Applicable Legal Framework

This section summarises the legal regimes relevant to our processing, the lawful bases for processing under the UK GDPR, and how they apply to our service.

  • The UK GDPR and Data Protection Act 2018 establish the general rules for lawful processing of personal data (Articles 5–6, 12–23, 24–33, 44–46).
  • The Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer) Regulations 2017 impose detailed obligations on regulated firms to verify customers, monitor transactions, maintain records and report suspicious activity.
  • The Proceeds of Crime Act 2002 and the Terrorism Act 2000 include criminal offence and disclosure regimes, including powers to require cooperation with competent authorities.
  • The Payment Services Regulations 2017 require payment-service providers to maintain appropriate records, handle transfers properly, and protect customer funds.
  • The FCA Handbook (particularly SYSC 6.3) sets out systems and controls requirements for firms subject to FCA regulation.
  • The Privacy and Electronic Communications Regulations 2003 (PECR) regulate the use of cookies and electronic marketing communications.

4.2 Lawful Bases for Processing (Article 6 UK GDPR)

Purpose of ProcessingLawful BasisExplanation
Onboarding, KYC, execution of transfersArticle 6(1)(b) – Contractual necessityWithout processing, we cannot fulfil our contractual obligations to you.
AML/CTF compliance, regulatory reportingArticle 6(1)(c) – Legal obligationWe are required by law to process certain data to comply with AML/CTF rules and keep records.
Fraud prevention, security, analytics, service improvementArticle 6(1)(f) – Legitimate interestsWe have a legitimate interest in protecting our systems and users, provided we balance this against your rights.
Marketing communications (with consent)Article 6(1)(a) – ConsentWhere required, we will seek your explicit consent before processing for marketing.
Vital interests (rare cases)Article 6(1)(d) – Vital interestsIn limited scenarios where an individual’s life or well-being is at risk, personal data may be processed to protect those interests.

4.3 Special Category Data & Automated Decisions

  • Where we process special category data (implied by photo ID and biometric liveness data), we rely on Article 9(2)(g) UK GDPR (substantial public interest) along with appropriate safeguards. TUMA applies enhanced safeguards when processing biometric data, including:
    1. Collecting only biometric information necessary to verify identity and detect fraud;
    2. Storing biometric templates in encrypted form using industry-standard security measures;
    3. Restricting access to authorised personnel and approved verification partners only;
    4. Prohibiting the use of biometric data for marketing, profiling, or unrelated purposes;
    5. Ensuring that biometric data is stored separately from other identity documents whenever technically possible; and
    6. Conducting regular audits to confirm compliance with biometric-processing requirements.
  • Biometric data is retained only for the minimum period necessary to complete identity verification and fraud-prevention checks. Unless required for the detection or investigation of fraud, biometric templates are deleted shortly after verification has been successfully completed in accordance with TUMA’s retention schedule.
  • Automated decision-making (e.g., machine-learning risk-scoring) is used to flag transactions, but we ensure human review before any legally-significant decision (Article 22 UK GDPR). We inform you of the logic, significance and envisaged consequences in relevant cases.

4.4 Accountability, Governance & Documentation

  • In accordance with Article 24 and 30 UK GDPR, TUMA maintains records of processing activities, performs Data Protection Impact Assessments (DPIAs) where required (Articles 35–36), and implements organisational and technical measures to ensure and demonstrate compliance (Article 32).
  • Governance is overseen by the Privacy Team, the MLRO and the Compliance Officer, reporting to senior management and the FCA, in line with FCA SYSC 6.3.
  • Staff undertake mandatory training in data protection (UK GDPR), AML/CTF compliance and vendor management, ensuring our internal culture supports privacy and financial crime prevention.

5. Data Sharing & Disclosure

5.1 Purpose and Legal Basis

We share personal data only where it is necessary for service functionality, compliance with a legal obligation, or our legitimate interests in maintaining secure and efficient operations.

  • Contractual necessity (Article 6(1)(b) UK GDPR) – sharing data with payment partners, banks, or mobile money aggregators to execute user transactions.
  • Legal obligation (Article 6(1)(c)) – disclosure to regulators or law-enforcement authorities under the Money Laundering Regulations 2017, Proceeds of Crime Act 2002, Terrorism Act 2000, and Payment Services Regulations 2017.
  • Legitimate interests (Article 6(1)(f)) – use of secure service providers (cloud, SMS, email) essential to our operations, subject to data-minimisation and encryption controls.

5.2 Categories of Recipients

  1. Payment partners and financial institutions – UK and overseas banks, payment processors, mobile money operators and clearing networks that facilitate fund settlement and reconciliation. This includes partners located or operating in jurisdictions outside the UK such as Kenya, Tanzania, Uganda and other regions where cross-border remittances are executed. Personal Data may therefore be accessed by authorised personnel in those countries solely for transaction processing and settlement.
  2. Identity-verification and AML/CTF service providers – third-party KYC, sanctions-screening and fraud-monitoring systems acting as processors under Article 28 UK GDPR. Some of these service providers may process or access Personal Data from outside the UK, including providers based in the EEA, United States or other jurisdictions offering specialist screening, fraud-detection or biometric verification services.
  3. Technology and infrastructure partners – secure cloud-hosting environments and communication platforms (e.g., email/SMS gateways) operating within the UK. Certain cloud, analytics, or SMS gateway providers may rely on support teams or infrastructure located outside the UK, meaning Personal Data may be accessed from overseas locations for maintenance, routing or service continuity purposes.
  4. Regulators and competent authorities – the FCA, HMRC, NCA, law-enforcement bodies or courts, when legally required or to fulfil obligations under Reg. 40 MLR 2017 or POCA s.330. Where transactions involve overseas jurisdictions, we may also be required to cooperate with foreign regulators or law-enforcement agencies where legally permissible and strictly necessary for crime-prevention or regulatory compliance.
  5. Legal advisers and auditors – external professionals bound by confidentiality who support audits, dispute resolution or compliance reviews. In certain circumstances, audit or advisory teams may access Personal Data from outside the UK, subject always to confidentiality obligations and appropriate international transfer safeguards.

5.3 Scenarios for Lawful Disclosure

Data may be disclosed in specific situations, including but not limited to:

  • Responding to a court order, subpoena or production notice;
  • Cooperating with an FCA or HMRC investigation;
  • Reporting suspicious or fraudulent activity to the NCA;
  • Preventing or detecting an imminent financial crime;
  • Protecting the rights, property or safety of our users or the public.

These disclosures are consistent with Articles 6(1)(c) and 6(1)(f) UK GDPR and the relevant financial-crime statutes.

5.4 Safeguards and Data-Processing Agreements

  • All third-party processors are engaged under written Data-Processing Agreements (DPAs) that meet the requirements of Article 28(3) UK GDPR, obligating them to process data only on Tuma’s documented instructions, maintain confidentiality, and implement appropriate security measures.
  • Data shared externally is encrypted and minimised to the information strictly necessary for the purpose.
  • Access is role-based and logged; transfers are restricted to secure channels.
  • Tuma conducts vendor due-diligence and onboarding reviews to ensure suppliers remain compliant with UK data-protection and FCA standards.

5.5 Cross-Border Aspects

Where personal data is accessed by authorised Tuma staff in Kenya for processing or support, this is conducted under the UK International Data Transfer Agreement (IDTA) ensuring an equivalent level of protection (Articles 44–46 UK GDPR).

No data is shared with unrelated affiliates, and Tuma does not sell customer information to any third party.

6. International Data Transfers

6.1 General Principle (Articles 44–46 UK GDPR)

Tuma ensures that any transfer of personal data outside the United Kingdom takes place in compliance with Chapter V of the UK GDPR. Cross-border transfers are limited and occur only when necessary for operational or regulatory purposes. We apply appropriate safeguards to guarantee an equivalent level of protection to that required under UK law.

6.2 Transfers Within the Tuma Group

  • MTI (UK) is the Data Controller and MTI (Kenya) acts as a Data Processor for limited operational purposes such as compliance review, reconciliation, and customer-service support.
  • Access to personal data by MTI (Kenya) staff is strictly role-based and logged, and permissions are reviewed quarterly by the UK Compliance Team.
  • The processing is governed by a Group Data-Processing Agreement incorporating the UK International Data Transfer Agreement (IDTA), which provides contractual and technical guarantees consistent with Articles 46(2)(d) and 46(5) UK GDPR.

6.3 Transfers to Third-Party Processors

  • All third-party vendors that may access personal data from outside the UK are required to adopt the IDTA or the UK Addendum to the EU Standard Contractual Clauses (SCCs).
  • Before approving any transfer, Tuma performs a Transfer Risk Assessment evaluating destination-country laws, potential access by public authorities, and technical safeguards (encryption, pseudonymisation, audit logs).

6.4 Adequacy and Safeguards

Where the UK Government has issued an adequacy regulation confirming that a country ensures an adequate level of protection, transfers may rely on that basis (Article 45 UK GDPR). Where adequacy is absent, transfers rely on contractual clauses, technical safeguards, and organisational controls to ensure effective data protection and enforceable rights.

6.5 Rights and Transparency

International transfers do not affect your statutory rights under UK law. You may request further information on the applicable safeguards or obtain a copy of the relevant transfer mechanism by contacting privacy@tuma.com.

7. Data Retention

7.1 Principle of Storage Limitation (Article 5(1)(e) UK GDPR)

We retain personal data only for as long as necessary for the purposes for which it was collected and to satisfy legal, accounting, or regulatory requirements.

7.2 Statutory Retention Requirements

Under Regulation 40(2) of the Money Laundering Regulations 2017, we must retain customer due-diligence and transactional records for five years after the business relationship ends or the date of the transaction.

Other applicable legislation, such as the Payment Services Regulations 2017 and the Companies Act 2006, may require certain financial records to be maintained for audit purposes.

7.3 Dormant Storage and Restricted Access

  • During the retention period, personal data is held in a dormant, access-restricted state within secure UK-based servers.
  • Access is limited to authorised compliance or audit personnel responding to lawful requests or investigating customer complaints.

7.4 Anonymisation and Deletion

After the five-year period, Tuma applies an anonymisation and secure-deletion process:

  1. Personal identifiers are permanently removed or replaced with randomised tokens.
  2. All back-ups containing personal data are overwritten or cryptographically destroyed.
  3. Verification of deletion is recorded in our audit log in accordance with Article 30 UK GDPR (record of processing activities).

7.5 Customer-Initiated Deletion Requests

Customers may request deletion of their data once retention obligations have expired. Requests are reviewed under Articles 17 and 19 UK GDPR, except where data must be preserved for:

  • compliance with a legal obligation or order from an authority;
  • ongoing investigations or enforcement actions; or
  • establishment, exercise, or defence of legal claims.

8. Data Security

8.1 Security Governance and Legal Framework

Tuma is obliged under Article 32 UK GDPR and SYSC 6.3 FCA Handbook to implement technical and organisational measures appropriate to the risks of processing. Security controls are embedded across the company’s first and second lines of defence and are continuously reviewed through internal audit and compliance oversight.

8.2 Technical Measures

  • Encryption: All personal and transactional data is encrypted in transit (TLS 1.2 or higher) and at rest (AES-256 standard).
  • Network Protection: firewalls, intrusion-detection systems, and endpoint protection across our infrastructure.
  • Access Control: role-based permissions, two-factor and multi-factor authentication (2FA/MFA), and quarterly access reviews for both UK and Kenyan staff.
  • Segregation of Duties: administrative, compliance and development environments separated to limit insider risk.
  • Logging & Monitoring: system logs retained for forensic and compliance purposes, reviewed by the MLRO and IT Security Lead.

8.3 Organisational Measures

  • Training & Awareness: all employees complete mandatory GDPR and AML/CTF training during onboarding and refreshers annually.
  • Incident Response Plan: established procedures to identify, contain, investigate and remediate any data-security incident.
  • Breach Notification: in the event of a personal-data breach, Tuma will notify the Information Commissioner’s Office (ICO) without undue delay and, where feasible, within 72 hours of becoming aware (Article 33 UK GDPR). If the breach is likely to result in a high risk to individuals, we will also notify affected data subjects (Article 34 UK GDPR).
  • Audit & Oversight: the Compliance Team and MLRO review security controls quarterly; findings are escalated to senior management.

8.4 Vendor Security Assurance

  • External processors must demonstrate adherence to recognised standards (e.g., ISO 27001 or SOC 2 Type II) and maintain equivalent safeguards.
  • Contracts require immediate notification to Tuma of any breach or sub-processing change.
  • Vendor risk assessments are conducted before engagement and periodically thereafter, consistent with FCA SYSC 8 (Outsourcing).

8.5 User Responsibilities

Customers must protect their login credentials and immediately report suspected unauthorised access. Tuma will never request full card or password details via email or social media.

8.6 Continuous Improvement

Security measures are evaluated against evolving threats, regulatory guidance from the ICO and FCA, and international best practice (NCSC Cyber Essentials +). Updates are implemented through our quarterly governance reviews.

9. Your Rights

9.1 Overview

Under the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, every individual whose data we process (“data subject”) enjoys specific rights. Tuma fully recognises and facilitates these rights in accordance with Articles 12 to 23 UK GDPR, applying appropriate verification, response, and documentation procedures.

Requests are free of charge (except where repetitive or excessive) and can be submitted via privacy@tuma.com, in-app forms, or written correspondence. Tuma must respond within one month of receiving a valid request, extendable by a further two months for complex cases (Article 12(3)).

9.2 Your Individual Rights

  • a) Right to be Informed (Article 13–14 UK GDPR)

    You are entitled to clear, transparent information about how your data is collected, used, shared, and retained. This Privacy Policy fulfils that requirement.

    For the purposes of this Policy, the following categories of Personal Data may be collected and processed:

    • Identity Data - Includes full name, date of birth, gender, nationality, identification numbers, passport or national ID details, photos, and any other official identity information.
    • Contact Data - Includes phone numbers, email addresses, residential or postal address, E-Visa (find verification) and any other contact information provided by the Data Subject.
    • Financial Data - Includes bank account details, mobile money account numbers, payment instrument details, wallet identifiers, and other financial information used to facilitate transactions.
    • Transaction Data - Includes records of money transfers, transaction history, amounts sent or received, currencies, dates, purposes of transfer, sender and recipient details, reference numbers, and other information necessary for the execution and monitoring of transactions.
    • Device Data - Includes device identifiers, IP addresses, browser type, operating system, geolocation data, device settings, and other technical information collected when accessing or using the Tuma Platform.
    • Behavioural Data - Includes usage logs, activity patterns, clickstream data, interaction data, preferences, and behavioural insights derived from use of the Tuma Platform.
    • Biometric Data - Includes facial recognition data, liveness checks, or other biometric identifiers processed for identity verification in accordance with applicable law.
    • Communications Data - Includes chat logs, email correspondence, call logs, customer service interactions, and recordings or transcripts of communications where permitted by law.
    • AML/KYC Data - Includes information collected to comply with Anti-Money Laundering and Know Your Customer obligations such as sanctions screening results, PEP (Politically Exposed Person) checks, adverse media findings, risk scores, supporting documents, and verification results.
    • Profile Data - Includes customer profiles, account credentials, preferences, settings, eligibility assessments, risk classifications, and other derived or assigned information.
    • Marketing and Consent Data - Includes marketing preferences, opt-in/opt-out records, consent logs, and records of permissions granted for the processing of Personal Data.
  • b) Right of Access (Article 15)

    You may obtain confirmation of whether Tuma holds personal data about you and request a copy of that data. We provide details of processing purposes, data categories, recipients, retention periods, and safeguards for international transfers. If a request is manifestly unfounded or excessive, we may refuse it or charge a reasonable fee as permitted by Article 12(5).

  • c) Right to Rectification (Article 16)

    You can ask us to correct inaccurate or incomplete information — for example, an updated residential address, new identity document, or changed phone number. We will inform any third-party processors who hold incorrect information so they can correct their records.

  • d) Right to Erasure (“Right to be Forgotten”, Article 17)

    You can request deletion of your personal data where:

    • it is no longer required for its original purpose,
    • you withdraw consent (where consent was the basis), or
    • you successfully object to processing.

    We may decline deletion if processing remains necessary to:

    • comply with AML/CTF legal obligations,
    • meet record-keeping duties under Reg. 40 MLR 2017, or
    • establish or defend legal claims.
  • e) Right to Restriction of Processing (Article 18)

    You may request restriction where you contest data accuracy, the processing is unlawful but you oppose erasure, or we no longer need the data but you require it for legal purposes. During restriction, access to your data is suspended except for storage or legal use.

  • f) Right to Data Portability (Article 20)

    You can request a machine-readable copy (CSV/JSON) of personal data you provided, or ask us to transmit it to another controller, where processing is based on consent or contract and performed by automated means.

  • g) Right to Object (Article 21)

    You can object to processing based on our legitimate interests, such as analytics or marketing. If you object to marketing, we will immediately cease sending promotional communications.

  • h) Rights relating to Automated Decision-Making and Profiling (Article 22)

    Tuma’s automated risk-scoring and fraud-detection systems are designed to protect our customers and the financial system. No decision that produces legal or significant effects (e.g., permanent account closure) is made solely by automated means; all high-risk cases are subject to human review. You may request human intervention, express your viewpoint, or contest such decisions.

9.3 Verification and Security of Requests

To protect customers from impersonation or identity theft, Tuma must verify the identity of any person making a request before disclosing or altering data (Article 12(6) UK GDPR). Verification may include:

  • confirming account credentials, or
  • performing a secure liveness check using selfie verification.

9.4 Exercising Your Rights and Escalation

If you wish to exercise any of the above rights, contact privacy@tuma.com.

If you are dissatisfied with our response, you may escalate your complaint to the Information Commissioner’s Office (ICO):

  • Website: www.ico.org.uk
  • Phone: 0303 123 1113
  • Address: Wycliffe House, Water Lane, Wilmslow SK9 5AF

9.5 Children’s Data

TUMA does not onboard or provide services to individuals under the age of eighteen (18). All customers must be adults with full legal capacity to enter into financial and contractual arrangements.

TUMA does not knowingly collect or process Personal Data relating to children, except in limited circumstances where a minor may be a recipient of a remittance transaction. In such cases, only the minimum Personal Data necessary to facilitate the lawful transfer of funds shall be processed, and solely for the purpose of fulfilling the transaction.

When processing Personal Data relating to minors, TUMA shall implement enhanced safeguards, including:

  • Ensuring that any data collected about a minor is strictly limited, relevant, and necessary for the remittance transaction;
  • Verifying that the data is provided by an adult customer acting lawfully and in the minor’s best interests;
  • Limiting access to such data to authorised personnel only;
  • Avoiding any profiling, marketing, or automated decision-making concerning minors; and
  • Applying additional security, retention, and confidentiality controls in accordance with the UK GDPR and the Data Protection Act 2018.

TUMA does not use children’s data for marketing, analytics, or any secondary or unrelated purpose.

10. Cookies & Tracking

10.1 Regulatory Context

Our use of cookies and similar technologies complies with the Privacy and Electronic Communications (EC Directive) Regulations 2003 (PECR) and the UK GDPR.

Under Regulation 6 PECR, we must:

  1. Provide clear information on the purpose of cookies or similar tools, and
  2. Obtain consent before storing or accessing information on a user’s device, except for strictly-necessary cookies.

10.2 What Cookies Are

Cookies are small text files stored on your device to recognise your browser or app session. SDKs (Software Development Kits) perform similar functions within the mobile application environment.

10.3 Types of Cookies We Use

CategoryPurposeConsent Requirement
Essential CookiesEnable core functionality such as secure login, session maintenance, and fraud prevention.Not required (“strictly necessary”)
Analytics CookiesHelp us understand how visitors use our website and app — e.g., pages visited, session duration, device type — to improve usability and performance.Opt-in required under PECR Reg. 6
Functionality CookiesRemember user preferences (e.g., language or currency).Consent required
SDK Tracking ToolsCollect anonymised app performance and crash data to improve functionality.Consent required
Marketing/Advertising CookiesAllow us to deliver relevant in-product communications about Tuma’s own services.Consent required — no third-party ads

10.4 Analytics and Performance Tools

Tuma uses Google Analytics, Firebase SDK, and similar platforms for aggregated statistical insight. Data collected includes: time on page, navigation path, number of clicks, screen views, device model, operating system, IP-based region, and events triggered in-app.

These analytics are configured to anonymise IP addresses and do not track or store card or identity information.

10.5 Consent Mechanism

  • Upon first visiting our website or installing our app, you will see a cookie banner explaining categories of cookies used.
  • Non-essential cookies are disabled until you explicitly opt in by selecting “Accept” or enabling categories in settings.
  • You can withdraw consent or modify preferences at any time via our Cookie Settings panel or browser/app settings.

(Legal basis: Article 6(1)(a) UK GDPR – consent; Reg. 6 PECR.)

10.6 Managing and Deleting Cookies

You can:

  • use browser settings to block or delete cookies,
  • use “Do Not Track” browser options, or
  • reset app permissions.

Refusing cookies may affect certain features, but essential services (such as transaction execution) will remain available.

10.7 Data Security and Retention of Cookie Information

Cookie identifiers are pseudonymised and retained for a maximum of 13 months (consistent with ICO guidance). We do not use cookies to store sensitive financial, biometric, or identification information.

10.8 Further Information

For more on cookies and your choices, visit www.allaboutcookies.org or the ICO’s guidance on cookies and similar technologies.

11. Policy Updates & Communication

11.1 Purpose of this Section

Transparency requires that data subjects are informed whenever the controller makes material changes to how personal data is processed. In line with Article 12(1) UK GDPR, Tuma provides this section to describe how our Privacy Policy is maintained, reviewed, and communicated to users and stakeholders.

11.2 Review Cycle and Change Triggers

Tuma maintains a formal Privacy Policy review schedule consistent with its internal compliance calendar under FCA SYSC 6.3.7 R.

  • Quarterly Review: The Privacy Team and Compliance Officer review this Policy every three months to confirm continued compliance with data-protection, AML/CTF, and payment-service legislation.
  • Interim Updates: We will update the Policy whenever one or more of the following occur:
    • new or amended laws or regulatory guidance (e.g., ICO, FCA, HM Treasury, EU EDPB updates);
    • adoption of new technologies or vendors that materially alter how personal data is processed;
    • significant organisational changes, such as new group entities or changes in operational jurisdiction;
    • findings from internal audits, risk assessments, or data-protection impact assessments (DPIAs);
    • new user-facing functionality that requires additional data collection (e.g., referral programmes, marketing tools).

11.3 Version Control and Record Keeping

In compliance with Article 30 UK GDPR (records of processing activities) and Accountability Principle – Article 5(2), Tuma maintains version control logs for each iteration of this Privacy Policy. Each record includes:

  • version number (current v3.1);
  • effective date of publication;
  • summary of changes;
  • approval date by the Compliance Committee;
  • confirmation of review by the MLRO and Privacy Team.

Historic versions are archived securely for five years to demonstrate compliance and audit traceability.

11.4 Communication of Changes to Users

Tuma distinguishes between material and non-material updates:

  • Non-material updates (editorial, formatting, clarification) will take effect immediately upon posting to the website and app. We are not obliged to individually notify customers of such minor edits.
  • Material updates (affecting lawful bases, new categories of data, new purposes of processing, or transfers to new countries) will be announced through:
    • an in-app notification and/or website banner for at least 30 days following publication;
    • a concise summary of changes published alongside the new Policy.

Users are encouraged to review this Policy periodically to stay informed of how their data is handled.

(Legal reference: Articles 12, 13(3) UK GDPR – duty to inform data subjects of further processing; Recital 60 – changes to processing require renewed transparency.)

11.5 Accessibility and Language

  • The Privacy Policy is published publicly on both the Tuma website and within the Tuma mobile application, ensuring equal accessibility for all users, including those outside the UK.
  • A readable and legally-accurate English version is the controlling document. Translations may be provided for convenience but will not modify the legal interpretation of the English version.

(Compliance reference: Article 12(1) – information must be provided in a clear, concise, and easily accessible form.)

11.6 Stakeholder Communication and Training

Material policy changes trigger communication to:

  • Employees and contractors, who must confirm understanding through internal compliance acknowledgment tools;
  • Vendors and processors, through formal amendment notices to their Data-Processing Agreements (Article 28(3));
  • Regulators or auditors, if the change materially affects compliance posture or operational risk.

This ensures alignment with SYSC 6.3.8 R (senior-management responsibility for communication and training).

11.7 User Acceptance

By continuing to use the Tuma platform after a revised Privacy Policy becomes effective, you acknowledge that you have read and understood the updated version.

Where consent is the lawful basis for specific processing (e.g., marketing, cookies), we will request renewed consent if the update changes the nature of that processing.

11.8 Contact for Policy Updates

For clarification about past or upcoming Privacy Policy changes, users may contact the Tuma Privacy Team via privacy@tuma.com or the Compliance Team via support@tuma.com.

All correspondence is logged as part of Tuma’s accountability records under Article 24 UK GDPR.

11.9 Legal Effect and Jurisdiction

This Privacy Policy, including future updates, is governed by and construed in accordance with the laws of England and Wales.

Any disputes or proceedings arising from its interpretation or application shall fall under the exclusive jurisdiction of the courts of England and Wales.

12. Governance & Oversight

12.1 Accountability and Oversight Framework

Tuma maintains a comprehensive governance structure that integrates data-protection, anti-money-laundering (AML), and operational-risk controls. This framework implements the Accountability Principle under Articles 5(2) and 24 UK GDPR, requiring controllers to demonstrate ongoing compliance through documented policies, risk assessments, and training.

12.2 Roles and Responsibilities

  • Privacy Team: Oversees privacy-compliance implementation, responds to data-subject requests, and conducts periodic reviews.
  • Money Laundering Reporting Officer (MLRO): Identifies and reports suspicious activity to relevant authorities and ensures compliance with MLR 2017 and the Proceeds of Crime Act 2002.
  • Compliance Officer: Monitors adherence to FCA Handbook SYSC 6.3 (Systems and Controls), oversees vendor and outsourcing risk, and coordinates quarterly compliance reviews.
  • Senior Management: Receives periodic reports from Compliance and Privacy Teams, approves remediation plans, and ensures adequate resourcing.

12.3 Training and Awareness

All employees, contractors, and temporary staff must complete GDPR and AML/CTF training during onboarding and at least annually thereafter. Training modules include secure-data handling, recognising suspicious activity, incident reporting, and escalation procedures. Completion and comprehension are recorded in central training logs for FCA and ICO audit readiness.

12.4 Internal Controls and Auditing

  • Quarterly Access Reviews: Confirm that only authorised staff can access personal data.
  • Vendor Audits: Assess compliance of all processors with contractual security and confidentiality requirements (Article 28 UK GDPR; FCA SYSC 8).
  • Privacy Impact Assessments (DPIAs): Conducted for new technologies or major process changes (Articles 35–36 UK GDPR).
  • Audit Logs: Maintained for a minimum of five years to evidence compliance for FCA or ICO audits.

12.5 Reporting and Continuous Improvement

The Privacy Team, MLRO, and Compliance Officer meet quarterly to review privacy and AML metrics, breach reports, and audit findings. Action items are documented and tracked to completion. Outcomes may include updating policies, modifying vendor controls, or enhancing technical safeguards.

12.6 Alignment with Regulatory Guidance

Tuma’s governance model aligns with:

  • FCA Handbook SYSC 3.2 and 6.3, emphasising effective systems, controls, and senior-management accountability.
  • ICO Accountability Framework, embedding privacy-by-design, transparency, and proactive risk management.
  • HM Treasury AML/CTF Guidance for financial institutions operating as Payment Service Providers.
ChatWhatsApp