Introduction
The Digital Personal Data Protection Act, 2023 requires businesses to demonstrate practical control over personal data. Compliance is not limited to having a privacy policy. A business should be able to show how personal data is collected, used, shared, secured, retained, deleted, and how Data Principal rights are handled.
This checklist sets out the key legal and operational controls that businesses should typically assess under the DPDP framework.
1. Applicability and Classification
Legal basis: Sections 2, 3, 10 and 17, DPDP Act, 2023
The first step is to identify how the organisation fits within the DPDP framework. Most businesses collecting customer, employee, vendor, or website user data will qualify as Data Fiduciaries if they decide the purpose and means of processing personal data.
The organisation should check:
Section 17 exemptions should be used cautiously. They are limited in scope, and most private businesses, startups, SaaS platforms, and service providers should not assume that exemptions apply without clear legal reasoning.
2. Governance, Accountability and Internal Responsibility
Legal basis: Sections 8 and 10, DPDP Act, 2023
DPDP compliance requires clear internal ownership. A business should know who is responsible for consent management, data access, breach response, vendor oversight, retention, deletion, and grievance handling.
The organisation should ensure:
For Significant Data Fiduciaries, the framework should also include an independent data auditor, periodic compliance audits, Data Protection Impact Assessments, and corrective action tracking.
3. Data Mapping, Inventory and Processing Records
Legal basis: Section 8, DPDP Act, 2023
A business cannot comply with DPDP obligations unless it knows what personal data it holds, where it is stored, and how it moves. Data mapping supports consent management, erasure requests, breach response, vendor governance, and audit readiness.
The data inventory should cover:
The inventory should be updated whenever new tools, vendors, data fields, processing purposes, or integrations are introduced.
4. Consent and Privacy Notice Compliance
Legal basis: Sections 6 and 7, DPDP Act, 2023; Rule 3, DPDP Rules, 2025
Consent under Section 6 must be free, specific, informed, unconditional, and unambiguous. The privacy notice should therefore be clear, standalone, and not hidden inside general terms and conditions.
The notice should clearly state:
Where the user base is multilingual, the notice should generally be made available in relevant languages so that Data Principals can meaningfully understand the purpose and scope of processing.
The organisation should avoid pre-ticked boxes, bundled consent, implied consent, passive acceptance, and vague purpose wording. Withdrawal of consent under Section 6(4) should be as easy as giving consent.
Consent records should be maintained to show the date, purpose, notice version, and withdrawal history. Where the processing purpose materially changes, fresh notice and, where required, fresh consent should be obtained.
5. Data Principal Rights Compliance
Legal basis: Sections 11 to 14, DPDP Act, 2023
The DPDP Act gives individuals enforceable rights over their personal data. These rights must be supported by working processes, not only mentioned in the privacy policy.
The organisation should enable:
For erasure requests, the organisation should consider user-centric safeguards where appropriate, such as prior notice or an opportunity to retain or export data before deletion. This should be treated as good compliance practice, not as a rigid timeline unless specifically prescribed.
For nomination, systems should allow designation of a nominee, verification of nominee identity, and activation of nominee rights upon death or incapacity of the Data Principal.
All requests and responses should be logged with the date of request, verification steps, action taken, and closure status.
6. Security Safeguards and Technical Controls
Legal basis: Section 8(5), DPDP Act, 2023; Rule 6, DPDP Rules, 2025
Section 8(5) requires Data Fiduciaries to implement reasonable security safeguards to prevent personal data breaches. These safeguards should be proportionate to the nature, volume, and sensitivity of personal data processed.
The organisation should implement:
Security controls should also extend to processors, vendors, cloud systems, APIs, and SaaS tools where personal data is handled.
7. Personal Data Breach Notification and Incident Response
Legal basis: Section 8(6), DPDP Act, 2023; DPDP Rules; CERT-In Directions where applicable
A personal data breach may include unauthorised access, accidental disclosure, alteration, loss, or destruction of personal data. Breach notification should be made without delay in the prescribed manner.
The organisation should maintain a breach response workflow covering:
Internal escalation timelines should be defined for the security team, legal/compliance team, DPO or grievance officer, senior management, and vendor teams.
The organisation should maintain incident logs, root cause analysis, affected data records, mitigation steps, user notification records, and regulatory communication records. Where applicable, incident response should also align with CERT-In reporting obligations for covered cyber incidents.
8. Data Retention, Erasure and Logging
Legal basis: Section 8(7), DPDP Act, 2023; DPDP Rules, 2025
Personal data should not be retained indefinitely. Under Section 8(7), a Data Fiduciary is required to erase personal data once the purpose of collection is fulfilled or consent is withdrawn, unless retention is necessary for compliance with law.
The organisation should define:
Retention policies should apply across primary systems, backups, logs, cloud tools, SaaS platforms, and third-party processors.
Logs should generally be retained for a reasonable and defensible period, depending on regulatory expectations, audit needs, cybersecurity requirements, and business risk. Log retention should not become a way to retain personal data indefinitely without justification.
9. Third-Party Processors and Vendor Governance
Legal basis: Section 8(2), DPDP Act, 2023; Rule 6(f), DPDP Rules, 2025
A Data Fiduciary remains responsible for personal data even when processing is carried out by a vendor or Data Processor. This makes vendor governance a core part of DPDP compliance.
Before onboarding a vendor, the organisation should conduct due diligence on:
Vendor contracts should include:
Vendor controls should not stop at contract signing. Organisations should periodically review high-risk vendors, especially where vendors handle large volumes of personal data, children’s data, financial data, health data, or data used for profiling or automated processing.
10. Children’s Data Protection
Legal basis: Section 9, DPDP Act, 2023
Children’s data is a high-priority compliance area under the DPDP Act. A child is generally treated as a person below 18 years of age, and processing such data requires stricter safeguards.
The organisation should ensure:
The organisation should restrict or avoid:
If AI systems, recommendation engines, or automated decision-making tools interact with children’s data, the organisation should assess whether such systems may affect children’s privacy, autonomy, safety, or rights.
11. Cross-Border Data Transfers
Legal basis: Section 16, DPDP Act, 2023
Cross-border transfers should be reviewed carefully, especially where data is stored or processed through foreign cloud services, SaaS tools, support teams, or overseas group entities.
The organisation should identify:
Transfers should be assessed against applicable government notifications and restrictions under Section 16. Where required, organisations should use contractual safeguards to ensure that foreign recipients maintain appropriate data protection and security standards.
The organisation should also maintain records of cross-border transfers, including the purpose of transfer, nature of data transferred, recipient entity, and safeguards applied.
12. Significant Data Fiduciary Obligations
Legal basis: Section 10, DPDP Act, 2023
Significant Data Fiduciaries are subject to enhanced compliance obligations. Even where formal designation has not yet occurred, organisations that process high volumes of personal data or use high-risk technologies should begin readiness planning.
An SDF framework should include:
Where the organisation uses AI, profiling, algorithmic systems, or automated decision-making, it should conduct risk assessments to evaluate whether such processing may adversely affect Data Principal rights.
DPIAs should generally assess:
Audit findings should be documented and linked to practical remediation steps, not merely stored as compliance records.
13. Training, Awareness and Internal Compliance Culture
Legal basis: Section 8, DPDP Act, 2023
DPDP compliance depends heavily on people and processes. Even strong policies can fail if employees do not understand how personal data should be handled.
The organisation should provide privacy and data protection training for:
Training should cover consent, Data Principal rights, breach reporting, vendor handling, data minimisation, security practices, and internal escalation procedures.
Training records should be maintained to show participation, completion, and coverage. In practice, this helps demonstrate that privacy compliance is embedded into organisational operations and not limited to legal documentation.
14. Transparency, Reporting and Public Accountability
Legal basis: Sections 6, 8 and 13, DPDP Act, 2023
Transparency is central to DPDP compliance. A business should ensure that Data Principals can easily understand how their personal data is processed and how they can exercise their rights.
The organisation should maintain and publish an updated privacy notice or privacy policy covering:
The organisation should also maintain internal documentation to demonstrate:
As a good compliance practice, larger organisations may publish periodic privacy or accountability summaries covering key privacy controls, audits, breach response readiness, and governance improvements. This should be done carefully and without disclosing sensitive security or personal data details.
15. Audit Readiness, Monitoring and Evidence Management
Legal basis: Sections 8 and 10, DPDP Act, 2023; Rule 6, DPDP Rules, 2025
DPDP compliance should be demonstrable through records, logs, reports, and internal controls. A business should be able to show not only that policies exist, but that they are actively followed.
The organisation should maintain audit-ready records of:
Monitoring should be continuous rather than occasional. Businesses should periodically review access controls, consent flows, vendor performance, breach readiness, retention practices, and grievance handling.
Logs should be retained for a reasonable and defensible period, depending on regulatory expectations, cybersecurity requirements, audit needs, and business risk. However, log retention should not result in unnecessary or indefinite storage of personal data.
16. Common Implementation Gaps
Practical compliance risk areas
Many organisations appear compliant on paper but face risk because controls are not implemented properly in practice. This section should be included because it makes the checklist more practical and useful for businesses.
Common gaps include:
This section helps businesses understand that DPDP compliance is not only about legal drafting. It also depends on whether systems, vendors, employees, and internal workflows actually support the obligations.
17. Penalties, Enforcement Risk and Regulatory Consequences
Legal basis: Schedule of Penalties, DPDP Act, 2023
The DPDP Act provides significant financial penalties for non-compliance. Businesses should treat privacy failures as legal, operational, and reputational risks.
Key penalty exposure may include:
Penalty assessment may typically consider factors such as the nature and gravity of the breach, duration of non-compliance, repeated failures, mitigation steps taken, and whether the organisation acted responsibly after discovering the issue.
Apart from monetary penalties, regulatory action may also affect business operations. In serious cases, organisations may face directions relating to processing restrictions, deletion of unlawfully processed data, or other corrective measures.