Rule 1: Basic Provisions |
Allows for adaptable implementation approach
- Final rules may have modifications, but no major changes anticipated.
|
- Effective Implementation of the Act has to be done in accordance with these rules
|
Rule 2: Definitions |
- Rules are appendix to the Act henceforth definition given in the Act shall be followed.
|
- Context-specific interpretations allowed
|
Rule 3: Privacy Notice |
To establish fundamental requirements for privacy notifications:
- Must be independent and easily understandable to ensure transparency and accountability
- Requires itemized description and clear purpose
- Must cover both website and app platforms
- Withdrawal of consent mechanism to be updated in the Privacy Notice.
|
- Privacy Notice cannot be clubbed as part of terms and conditions.
- Itemized description of personal data with a clear purpose in a tabular form along with
list of goods and services should be considered while formation of Privacy notice.
- Update website and application with communication link for exercising data principal
rights along with withdrawal mechanism and grievance redressal.
|
Rule 4 r/w Schedule 1: Consent Manager (CM) |
Mandatory requirement of Consent Manager
- Minimum financial requirement of 2 crores
- Must obtain independent registration.
- Must be interoperable between CM and Data Principal
- Required to maintain consent records for 7 years
- Must develop website/app for service access
- Regular audits as per Board requirements
|
- Establish framework for consent management
- Define interoperable requirements for CMs
- Consent managers to act as registered intermediaries to data fiduciaries.
- Consent manager will be dealing independently with consent and withdrawal of consent for
an organisation.
- Consent manager to manage and document, the records of consent.
|
Rule 5 r/w Schedule 2 & 7: Government Data Processing |
- Guidelines for data processing by government and its entities.
- Limited to legal purposes and public fund usage
- Must maintain data accuracy
- Requires transparency in data usage
- Mandatory security measures
|
- Only government and its instrumentalities are exempted and dealing with government
does not perse exempt an organisation from its compliance obligations under the DPDPA.
|
Rule 6: Security Safeguards |
- Advanced encryption protocols required
- Access control systems shall be in place
- Comprehensive monitoring capabilities
- Regular backup procedures
- Detailed logging requirements
|
- Organisations to update and review existing privacy and security frameworks.
- Implementation of reasonable security measures for preventing data breach, the rules
specify a list of minimum safeguards requiring Fiduciaries to contractually obligate
processors to ensure Data Security
|
Rule 7 Data Breach Management |
- Notify within 72-hour of the breach to the board and affected DPs
- Must provide: Breach description
- Must provide potential consequence
- Remedial measures taken
- Safety measures should be implemented
- Business contact information to be provided
|
- Organisations to develop and enforce DPDPA compliant data breach procedures.
- Organisations to establish mechanism to notify Data Principals and Data Protection Board
in case of a Data Breach within the stipulated timeline.
|
Rule 8 r/w Schedule 3: Data Retention |
- 48-hour advance notice required before data deletion
- Schedule 3 guidelines to be followed
- Clear data retention purpose documentation required
- Statutory requirements must be met
|
- • Data Fiduciary to ensure establishment of Data Retention and Data Deletion for active
and inactive users’ as per the procedure notified in the draft rules.
- Establish procedure to ensure that Data Principal is served with the Privacy Notice at
least 48 hours prior to the Data Deletion.
|
Rule 9: Contact Information |
- DPO contact details to be made available on website/app
- For response mechanism either DPO or any person who is able to answer on behalf of
Data Fiduciary should be appointed
|
- If applicable, Data Fiduciary to appoint Data Protection Officer (DPO)
- Data Fiduciary to publish the business contact information of the DPO on its website or
application.
- Data Fiduciary to establish response mechanism and it shall also publish business
contact information of the DPO.
|
Rule 10:Child/Disability Consent
|
- Verifiable parental consent mechanisms
- Digital authentication systems
- Guardian verification protocols
|
- Data Fiduciary to ensure that age gating and age verification is completed.
- Data Fiduciary to ensure due diligence is done by either using voluntary submission of
data or government aggregators.
|
Rule 11 r/w Schedule 4: Child Data Exemptions |
Exempted Sectors include:
- Educational institution
- Healthcare provider
- To follow Safety monitoring protocols
|
- Classes of Data Fiduciary specified under Schedule 4 do not enjoy blanket right to
process any kind of Personal Data rather they can process data only for specified
purpose as mentioned in the rules.
|
Rule 12: Significant data fiduciary |
Obligations of Significant Data Fiduciaries:
- Annual impact assessment
- Algorithmic accountability
- Domestic data processing restrictions
- Regular audit requirements
- This requirement only applies to specific categories of Personal Data that will be
designated by the Central Government
|
|
Rule 13: Data Principal Rights |
Data Retention for Children:
- Clear identification protocols
- Structured grievance resolution
- Nomination rights
- Standardized mechanisms for execution of rights
- Details of the means and purpose to be notified on the website or application.
|
- Data Fiduciary to update their Privacy Notice using simple language to explain what data
you collect and purpose of such collection.
- Create a dedicated Data Principal rights section on the website or application
including step by step guide for making requests and providing multiple contact options
(email, phone, form etc.)
- Maintain detailed records of all Data Principals’ request and to keep logs of all
actions taken on such requests.
|
Rule 14: International Transfer |
Cross-border data handling:
- Compliance to be done in accordance with Central Government
- Foreign state sharing protocols to be followed
|
- Data Fiduciary to map all international data flows and identify which transfers
involve Indian customer data and document where the data is going and who receives it.
- Monitor Government notification and set up a process to verify compliance before each
transfer.
- Regular review of international data sharing agreements
- Check for latest government order before initiating new international data transfers
as requirements may vary according to transferee country.
|
Rule 15 r/w Schedule 2:Research Exemption |
|
- Create clear policies separating exempt vs non-exempt data processing
|
Rule 16 to 22 r/w Schedule 5 & 6: Board Composition and Operations with Appeals
|
Board Composition:
- Search committee protocols
- Appointment procedures
Board framework:
- Remote Operations
- Meeting procedures
- Decision-making protocols
- Staff appointment conditions
- Digital filing requirement Fee payment protocols Tribunal operations
Appeal Procedure
- Appeals to be directed to TDSAT.
|
|
Rule 22 r/w Schedule 7: Information Requests |
Government authority:
- Information request by Central Government for sovereignty, integrity and National
security of the State
|
- Data Fiduciary to furnish such information with authorized signatory as may be called
for.
- Data Fiduciaries to ensure not to disclose the information except with previous
permission in writing of authorized person of the State.
|