Primer on DPDPA (India) & Data Privacy
This primer translates statutory requirements into implementable controls and organises obligations, rights, governance, incident response, sector contexts, and cross-border considerations into a single operating view.
Launch Readiness ChecklistOverview
DPDPA essentialsThe Act applies to processing in India and to processing outside India that is connected with offering goods or services to individuals in India. A Data Fiduciary determines purposes and means; a Data Processor acts on documented instructions.
- Personal Data (PDP) and Special Personal Data (SPDP) should be identified in each system and across vendor chains.
- Sectoral overlays (RBI, IRDAI, MeitY) prevail if stricter—maintain a living law register.
- Children (<18): heightened safeguards; no profiling/targeted ads; verifiable parental consent.
Use valid consent or a recognised legitimate use. For each purpose, record the legal basis, necessity test, and compensating safeguards.
- Consent is itemised, unbundled, and revocable with parity; artefacts are immutable and auditable.
- For legitimate uses (employment/emergency), keep an interpretation memo with harm analysis.
Core Obligations
Operate-ready- Layered, just-in-time notices (multilingual) with a versioned repository.
- Dark-pattern-free UX; non-essential processing is opt-in only.
- Canonical RoPA linking systems → purposes → retention → transfers → vendors.
- DPAs must cover purpose limitation, sub-processor approvals, audit rights, breach SLAs, and end-of-contract deletion/return.
- Tier vendors by risk; collect SOC 2/ISO 27001/PCI evidence; track remediation from DDQs.
- Baseline: MFA, least-privilege, encryption in transit/at rest, monitoring, and tested vulnerability management.
- Retention schedules per dataset; deletion evidence; litigation-hold alignment.
Data Principal Rights
15-day SLAOperate a predictable workflow that preserves timelines and evidence:
- ID/authority checks → federated searches → standard redaction → response pack.
- Ticketing with SLA timers; DPO escalation on exemptions; formal closure letters with rationale.
Governance and Evidence Management
Audit-readyDomain | Control | Evidence |
---|---|---|
Notices & Consent | Itemised and withdrawable | Consent logs, UI captures, version history |
DSAR | Tracked to a 15-day SLA | Ticket exports, response letters, redaction policy |
Vendors | DPA executed and assessed | Signed DPAs, DDQs, remediation proofs |
Security | MFA, encryption, monitoring | Policies, configurations, audit reports |
Retention | Schedules and deletion | Deletion logs, holds, approvals |
Run quarterly assurance. Attach artefacts to controls to maintain regulator-ready posture.
Sector Playbooks
Contextualised- Catalogue PDP/SPDP across storefront, payment, CRM; map to purpose; capture consent.
- Dark-pattern tests; immutable consent artefacts with timestamp and UI text.
- Segment PCI; tokenise cards; joint vendor breach drills.
- Retention matrices for orders/logs/audiences; record deletion proof.
SPDP handling, e-consent per episode, segregated HIMS/LIS, priority response for incidents involving diagnosis codes.
Telemetry policies; DPIAs for monitoring; minimise camera analytics; firmware update trails; controls on cross-border telemetry.
Incident Response
Time-critical- Detect → contain → eradicate → recover with pre-approved procedures; maintain an evidence log.
- 72-hour checkpoint to evaluate notifications; prepare regulator pack and user comms in parallel.
Use discovery time, SPDP impact, containment state, and cross-border effects; document rationale for notify/no-notify.
Cross-Border Transfers
India ↔ WorldTheme | GDPR | DPDPA |
---|---|---|
Legal bases | Consent, contract, or legitimate interest | Consent and legitimate uses |
Children | Parental consent (age varies) | <18; profiling/targeted ads restricted |
Cross-border | Adequacy, SCCs, BCRs | Negative-list + contractual safeguards + onward-transfer control |
Templates & Generators
Actionable- DPO mandate, independence, reporting lines.
- RoPA with purposes & data-flow maps.
- Itemised, withdrawable consent; immutable artefacts.
- Layered notices with version control & languages.
- DSAR SOP + tooling + evidence; 15-day SLA.
- DPAs + TPRM with remediation tracking.
- Security baseline (authn, encryption, logging, IR).
- Children’s data: age gates, profiling restrictions.
- Retention schedules; deletion proofs.
- Breach playbook; notification logic; regulator templates.
Use to drive a 90-day remediation sprint—prioritise high-risk, low-effort items.
- Context & purpose; necessity & proportionality.
- Risks → mitigations → residual risk sign-off.
- Review triggers (features/geo changes).
Training
EnablementConcise tracks for executives, engineers, HR, and marketing; collect attestations and store completion proofs for audit readiness.
DPDPA Readiness – Launch Checklist
- Governance: DPO appointed; charter; cross-functional privacy council.
- Law Register: Act, rules, FAQs, sector overlays; owners; change log.
- RoPA: Systems → purposes → data elements → retention → transfers → vendors.
- Consent & Notices: Itemised consent; layered notices; artefact store.
- Rights: DSAR tooling; redaction/exemptions; 15-day SLA.
- Vendors: DPAs; tiering; security attestations; remediation.
- Security: MFA, encryption, logging; IR tests.
- Children: Age gates; profiling off; parental consent.
- Retention: Schedules; deletion automation; holds.
- Incident: Playbook; regulator/user comms; table-top tests.
Objective: audit-ready posture within 90 days by prioritising high-risk/high-impact controls. Method: execute checklist, produce artefacts, and lock a quarterly assurance cycle.
Domain | Decision | What Good Looks Like | Evidence |
---|---|---|---|
Governance | DPO mandate & council | Authority; no conflicts; cross-functional cadence | Charter, org chart, minutes |
Consent/Notices | Itemised, withdrawable | Dark-pattern-free UX | Artefact store, UI captures |
Rights | 15-day SLA | Search orchestration & redaction | Tickets, letters, audit trail |
Vendors | DPA + TPRM | Risk-tiering & remediation | Signed DPAs, DDQs, plans |
Security | Baseline enforced | MFA, encryption, monitoring | Configs, reports |
Retention | Schedules live | Deletion automation + holds | Logs, approvals |
- Governance (10): DPO; independence; council; policy stack; budget; risk register; KPIs; escalation; training; annual report.
- Law Register (7): Act; rules/FAQs; sector circulars; control mapping; update owners; change log; opinions archive.
- RoPA (8): systems census; purpose catalog; PDP/SPDP inventory; transfers; retention; vendor linkages; lawful basis; reviews.
- Notices & Consent (10): layered; JIT; multilingual; granularity; withdraw parity; cookie/SDK; dark-pattern tests; artefact hashing; child-specific; change mgmt.
- Rights/DSAR (10): intake; ID checks; searches; dedupe; redaction SOP; exemptions; timers; QA; closure letters; evidence export.
- Vendors/TPRM (10): inventory; tiering; DPA baseline; sub-processors; security attestations; data location; breach SLAs; audit rights; remediation; offboarding deletion proof.
- Security (12): MFA; PAM; encryption; keys; logging/SIEM; vuln mgmt; secure SDLC; segmentation; backup drills; EDR; runbooks; tabletops.
- Children (8): age gating; parental consent; profiling/ads off; guardian rights; minimisation; retention minima; audits; reporting.
- Retention (8): schedules; bases; automation; archival; holds; exception register; restore-to-delete tests; sign-off.
- Incident (12): RACI; detect; contain; eradicate; recover; harm; notify logic; regulator pack; user comms; forensics; lessons; hardening.
- Cross-Border (8): negative-list; contracts; onward control; attestations; residency; DPIA triggers; jurisdiction; periodic review.
- Training (6): role tracks; exec brief; engineering; HR/marketing; attestations; re-cert cadence.
DPDPA Theme | Control | Artefact |
---|---|---|
Consent | Itemised/withdrawable | Consent log, UI screenshots |
Rights | SLA & exemptions | Tickets, playbook, letters |
Children | Parental consent | Age-gate records, consent proofs |
Security | Baseline enforced | Configs, reports, test results |
Vendors | DPA + assessments | Signed DPA, DDQ, remediation |
Retention | Deletion & holds | Logs, approvals |
Attach artefacts as appendices when sending externally.