Samba TV uses personal data to make TV better. Learn more about how we personalize your TV experience and protect your privacy.
Samba TV’s Privacy Principles:
We understand that your data belongs to you and no one else. At the heart of all Samba TV’s products and services is our commitment to protecting your data and giving you complete control over its use. This is why we handle your data with the same care we would expect our own data to be handled Our six Privacy by adhering to the following principles:
Your Choice, Always
Samba TV’s relationship with the consumer always starts with providing a clear-cut choice to opt-in or opt-out of using our services, and providing equally clear-cut controls to change or tailor this choice at any time.
We are boldly transparent about how Samba TV and the consumer both benefit when you choose to opt in to our services.
Enabling the Perfect TV Experience
We only collect information that is necessary to enhance and improve the consumer’s TV experience. As a result, we offer our products and services without requiring that consumers provide us with their name, phone number, home, email or work address.
We Protect your Data
Once a consumer has entrusted their data with us, we actively defend it with appropriate safeguards.
You are in Complete Control
We ensure our data processing and operations support your ability to access your data or have it deleted.
Samba does not expect you to take our word for it. We subject our data protection program to third-party audits, and received certifications that confirm the soundness of our practices.
ePrivacy has awarded Samba TV a seal of compliance after an audit and confirmation that our practices comply with the General Data Protection Regulation or GDPR.
PRIVO has awarded Samba TV Safe Harbor status under COPPA based on an audit and resulting certification that our practices comply with the Children’s Online Privacy Protection Act.
Samba TV has been audited and is certified as ISO/IEC 27001 compliant. ISO/IEC 27001 specifies a set of best practices for an information security management system (ISMS), and identifies the security controls to implement it.