Go back

DPDPA Compliance in Practice: Obligations and Breach Risk

Murugavel Muthu | 2026-04-30



DPDPA Compliance in Practice: Obligations and  Breach Risk

Introduction

Understanding DPDPA in theory is one thing. Actually implementing it across your organisation is something else entirely.

In Part 1, we covered the foundation — what the law is, what personal data means, and how the three consent paths work. In this article, we go deeper into the parts of DPDPA that have the most direct operational impact: how consent decisions flow through your tech stack, the five legal obligations the law places on your business, your customers' enforceable rights, what a real data breach looks like, the penalty structure, and the phased roadmap you need to follow.

This is the implementation half of the guide.


Section 1: The Technical Architecture of Consent Management

Most businesses treat DPDPA as a legal problem. In practice, it is equally a technical one. A consent decision made by a user in a cookie banner must flow correctly through every layer of your technology stack in real time. If any layer fails to honour that decision even if your banner looks compliant you are non-compliant.

Layer 1 — Frontend (What Users See). This is where consent begins. The Cookie Banner (CMP Widget) must present all categories clearly, avoid pre-ticked boxes or dark patterns, and make "Reject All" as prominent as "Accept All." The Preference Centre linked in your footer is where users change or withdraw consent later. Google Tag Manager sits here too, acting as the gatekeeper that fires or blocks scripts based on live consent state.

Layer 2 — Consent API (What Stores Decisions). This layer is invisible to users but is the operational backbone of compliance. The Consent Management Database stores each user's preferences. The User Preference API writes those preferences in real time and signals changes downstream. The Consent Audit Log timestamped records of every acceptance, rejection, and withdrawal is your evidence if the DPBI investigates. The Data Retention Engine auto-deletes personal data when retention periods expire.

Layer 3 — Backend Systems (What Processes Data). Analytics tools must only fire when consent is granted. CRM platforms must have DSAR and unsubscribe flows built in. Data warehouses must enforce retention policies at the storage level. All third-party processors must have signed Data Processing Agreements.

The governing principle across all three layers: no layer can bypass the Consent API. Consent decisions must propagate downstream in real time, and every system in your stack must be configured to respect them.

How Data Flows — From Collection to Deletion

DPDPA applies at every stage of your data lifecycle. Collection begins the moment a form is submitted or a cookie fires. Consent must be captured at that point with a specific, stated purpose. Storage must be encrypted at rest and in transit, with role-based access controls. Processing must stay within the stated purpose data collected for order fulfilment cannot be used for marketing. Sharing with processors requires a DPA in place. Deletion must be automated and comprehensive not just the primary database, but backups, analytics tools, email platforms, and data warehouses.


Section 2: Consent Manager Registration — The November 2026 Deadline

One of the most significant new requirements under DPDP Rules 2025 is mandatory Consent Manager registration with the DPBI  and the deadline is November 2026. Many businesses have not yet planned for this.

A Consent Manager is a registered, DPBI-approved entity that acts as a single point of contact for users to give, manage, and withdraw consent across multiple platforms. Four requirements apply: it must be registered with the DPBI, it must be interoperable using standardised DPBI-approved protocols, it must provide users a single dashboard to view and withdraw all consents, and it must maintain complete audit trails available to the DPBI on request.

Your action plan is straightforward. Evaluate your current CMP vendor for DPBI eligibility now. Select and deploy a DPBI-eligible CMP by Q3 2026. Meet the registration deadline in November 2026. Then audit consent logs quarterly as an ongoing practice.

From November 2026, only DPBI-registered Consent Managers can legally fulfil consent obligations under DPDP Rules 2025. Operating without registration after that date is a direct violation.


Section 3: The 5 Core Legal Obligations

Every Data Fiduciary — any business that collects and processes personal data of Indian citizens has five legal obligations under DPDPA. These are not guidelines. They are requirements.

Obligation 1 — Get Clear Consent. Consent must be free, specific, and informed. "Free" means no coercion. "Specific" means you stated exactly what data you are collecting and why. "Informed" means the user had enough information to make a real decision. Pre-ticked boxes, consent buried in terms and conditions, and consent obtained as a condition of service access are all invalid.

Obligation 2 — Data Minimisation. Collect only what is genuinely necessary for the stated purpose. If you run a newsletter and collect a phone number you never use that is a violation. Every data collection form, API payload, and analytics event in your product needs to be audited for necessity.

Obligation 3 — Purpose Limitation. Data collected for one purpose cannot be used for another without fresh consent. Purchase history collected for order fulfilment cannot feed a personalisation engine without specific consent. Registration data collected for service delivery cannot build a marketing audience. Every new use requires a new specific consent.

Obligation 4 — Data Security. Section 8(5) requires "reasonable security safeguards" to prevent personal data breaches. In practice this means encryption at rest and in transit, role-based access controls, audit logging of all access events, regular vulnerability assessments, and a documented incident response plan. This provision carries the highest penalty in DPDPA ₹250 Crore and is where technical security controls have the most direct compliance value.

Obligation 5 — Data Erasure. When a purpose is fulfilled, when consent is withdrawn, or when a user requests deletion you must delete the data. Not archive it, not anonymise it. Delete it across all systems. Manual erasure processes will fail at scale. Automated retention policies and deletion pipelines are the only reliable approach.


Section 4: Your Customers' Rights Under DPDPA

DPDPA does not just place obligations on businesses. It grants six specific, enforceable rights to individuals, and you are legally required to fulfil them.

The Right to Access allows a user to ask what personal data you hold about them and why. The Right to Correction allows them to demand that inaccurate or outdated information be fixed across all systems. The Right to Erasure the "Right to be Forgotten" requires deletion across every system where that data exists, not just the primary database. The Right to Withdraw Consent must be as simple as giving consent in the first place  if acceptance required one click, withdrawal cannot require five menus. The Right to Grievance Redressal allows users to file complaints with your DPO and then directly with the DPBI no regulator needs to initiate proceedings on their behalf. The Right to Nominate allows users to appoint someone to exercise their data rights on their behalf, for example in the event of death or incapacitation. This provision has no direct equivalent in GDPR.

Operationalising these rights requires a DSAR pipeline a system for receiving requests, verifying identities, locating data across all systems, fulfilling requests within required timeframes, and logging every transaction for compliance purposes.


Section 5: Significant Data Fiduciaries and Children's Data

Not all Data Fiduciaries carry identical obligations. The Central Government can classify certain businesses as Significant Data Fiduciaries (SDFs) based on the scale or sensitivity of data they handle large volumes of personal data, sensitive categories like health or financial data, platforms with national security implications, or platforms influencing democratic discourse.

SDFs face four additional requirements: a Data Protection Officer based in India, periodic Data Protection Impact Assessments, mandatory algorithmic audits of automated decision-making systems, and stricter cross-border transfer controls. International data transfers are only permitted to countries the Central Government has notified as approved. If you use global SaaS platforms AWS, Google Cloud, Salesforce  assess whether their data residency options and contractual safeguards are adequate.

Children's data carries the strictest protections in DPDPA. Anyone under 18 is a child stricter than GDPR's threshold of 16 in most European jurisdictions. Three absolute rules apply: verifiable parental consent is required before collecting any data from a child (not a checkbox verified consent), behavioural tracking of children is prohibited entirely, and targeted advertising based on personal data directed at under-18s is explicitly prohibited. The penalty for violations involving children's data is up to ₹200 Crore. "We didn't know they were a child" is not a defence age verification is your responsibility.


Section 6: What a Data Breach Looks Like — and What It Costs

Most people picture a breach as a sophisticated cyberattack. The reality under DPDPA is more common and more preventable. A wrong email recipient — an employee accidentally sends a customer spreadsheet to the wrong person — is a breach. A vendor compromise — an analytics platform or CRM you use gets hacked and your data is exposed — is a breach and you are liable. A misconfigured database left publicly accessible for hours is a breach. A ransomware attack that exfiltrates data before you can respond is a breach.

In every scenario, you must notify both the DPBI and affected users promptly. Failure to notify is a separate violation carrying up to ₹200 Crore, on top of the original breach penalty.

DPDPA's penalty structure by violation type:

Violation

Maximum Penalty

Data security breach — Section 8(5)

₹250 Crore

Children's data violation

₹200 Crore

Failure to notify a breach

₹200 Crore

Non-fulfilment of user rights

₹50 Crore

Other violations

₹50 Crore

Penalties are cumulative. A single incident could attract multiple categories simultaneously.

For prioritisation: fix the absence of a cookie consent banner and privacy policy immediately — these are the first items a DPBI investigation examines. Address a missing breach response plan and absent vendor DPAs within 30 days. A missing data retention policy and DPO appointment (if you are an SDF) should be resolved within 90 days.


Section 7: Where to Implement and Your Action Roadmap

DPDPA compliance touches every function in your organisation that handles personal data. On your website: cookie consent banner, privacy policy, preference centre link in the footer, and purpose disclosure on all forms. In your mobile app: launch consent screen, push notification opt-in, location permission explanation, and in-app privacy settings. In your email and CRM: unsubscribe in every email, consent at sign-up, re-consent for new purposes, and DND registry compliance. In your backend APIs: consent check before every data write, DSAR pipeline, right-to-delete automation, and retention scheduler. In engineering: no PII in logs, encryption at rest and in transit, DPIA before new data features, and DPA requirements in processor contracts. In your organisation: appoint a DPO, run employee training, sign vendor DPAs, and build a breach response runbook before you need it.

The compliance roadmap aligns to the actual enforcement timeline:

Phase 1 — Now. The DPBI is operational. Map all personal data you collect, appoint an internal data champion, audit existing consent mechanisms, and review vendor DPAs.

Phase 2 — By November 2026. Select a DPBI-eligible CMP, deploy certified consent management across all platforms, implement withdrawal flows, and finalise all vendor DPAs.

Phase 3 — By May 2027. All substantive obligations must be fully operational. DSAR pipeline tested and live. DPO appointed if you are an SDF. Algorithmic audits completed.

Ongoing. Quarterly compliance audits. Annual DPIA refresh. Annual breach response drills. Monitor the approved country list for cross-border transfers.


Section 8: How COSGrid Helps You Meet Section 8(5)

The highest-penalty provision in DPDPA — Section 8(5)'s requirement for "reasonable security safeguards" — is fundamentally a technical problem that demands the right security infrastructure across access controls, network, and endpoints.

MicroZAccess (Zero Trust Network Access) enforces identity-verified, least-privilege access to every data system only the right person, on the right device, under the right conditions, can reach personal data. Every access is logged, creating the audit trail DPDPA requires. 83% of data breaches involve compromised credentials. MicroZAccess eliminates that as an entry point.

COSGrid Network Security (Threat Detection and Segmentation) applies network micro-segmentation so that even if one system is compromised, an attacker cannot move laterally to your customer database. Real-time detection and automated containment stop exfiltration before it completes. SOC-ready audit logs satisfy DPBI reporting requirements.

Device Management (Endpoint Data Protection) enforces encryption on all company devices, enables remote wipe for lost or stolen devices containing personal data, and applies DLP policies that prevent bulk data exfiltration. 68% of data breaches originate at endpoints this is the layer most organisations underinvest in until after an incident.


Conclusion

DPDPA compliance is not a one-time project. It is an ongoing organisational capability  the ability to collect data with genuine consent, process it within stated purposes, protect it with appropriate security controls, fulfil user rights when exercised, and respond effectively when something goes wrong.

The organisations that build this capability now will carry it as a competitive advantage not just a compliance status. In a market where data breaches are public events and consumer trust is hard to rebuild, demonstrating responsible data practices is a differentiator.

The DPBI is operational. The enforcement clock is running. Start with the critical gaps and build towards the full roadmap.

 

 



Our Blogs