bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,426 @@
1
+ # DPDPA — Data Fiduciary Obligations and Data Principal Rights
2
+
3
+ Deep-dive reference for compliance teams. All obligations cite the Act section AND the
4
+ implementing Rule where applicable. Rules references are to the DPDP Rules, 2025 (notified
5
+ 13 November 2025, effective 13 May 2027 unless phased earlier).
6
+
7
+ ---
8
+
9
+ ## Part A — Data Fiduciary Core Obligations (Section 8)
10
+
11
+ ### A.1 Notice Obligation (Section 5 + Rule 3)
12
+
13
+ **Trigger:** Before or at the time of requesting consent for any processing.
14
+
15
+ **Mandatory contents of notice (Rule 3(1)):**
16
+
17
+ | Element | Requirement |
18
+ |---------|-------------|
19
+ | Identity of Data Fiduciary | Full legal name and contact details |
20
+ | Categories of personal data | Description of the data sought to be collected |
21
+ | Specified purpose | Each purpose for which data will be processed — specific, not generic |
22
+ | Recipients | Categories of Processors and other Data Fiduciaries who will receive the data |
23
+ | Retention period | Duration for which data will be retained, or criteria used to determine it |
24
+ | Data Principal rights | Summary of rights under Sections 11–14 |
25
+ | Complaint mechanism | How to lodge a complaint with the Data Fiduciary and with the Board |
26
+ | Withdrawal procedure | How to withdraw consent and the consequences of withdrawal |
27
+
28
+ **Format requirements (Rule 3(2)):**
29
+ - **Plain language** — no legalese, jargon, or unnecessarily complex syntax
30
+ - **Standalone document** — cannot be buried in terms of service, privacy policy footnotes, or general conditions
31
+ - **Retrievable at any time** — must be accessible via the Data Fiduciary's platform or website at any point
32
+ - **Available in English and other languages** per the Eighth Schedule of the Constitution (Rule 3(3)) if the Data Principal requests translation
33
+
34
+ **Existing data (Section 5(2)):**
35
+ For data collected before commencement of the Act but still being processed:
36
+ - Fiduciaries must issue a notice of equivalent content
37
+ - Notice must be given within the prescribed period after commencement
38
+ - This is the "legacy data compliance" obligation — organisations should map all pre-Act data and prepare retrospective notices
39
+
40
+ **Common errors:**
41
+ - Embedding notice in general T&Cs — non-compliant
42
+ - Vague purposes such as "to improve services" — non-compliant
43
+ - Notice only available at registration, not retrievable afterwards — non-compliant
44
+ - Single notice covering multiple services without purpose separation — risk of invalid consent
45
+
46
+ ---
47
+
48
+ ### A.2 Consent Obligations (Section 6 + Rule 4)
49
+
50
+ **Validity standard:** Consent is valid ONLY if all five elements are present simultaneously:
51
+
52
+ | Element | What it means operationally |
53
+ |---------|----------------------------|
54
+ | Free | Not conditioned on acceptance of a service or product |
55
+ | Specific | For each distinct, identified purpose separately |
56
+ | Informed | Given after the Data Principal has received the Section 5 notice |
57
+ | Unconditional | No coercion, inducement, or consequence attached to refusal |
58
+ | Unambiguous | Clear affirmative action — no pre-ticked boxes, no silence as consent |
59
+
60
+ **Section 6(4) — Withdrawal:**
61
+ - Must be as easy to withdraw as it was to give
62
+ - One-click or equivalent in-app mechanism required where consent was given digitally
63
+ - Email-only withdrawal is likely insufficient if consent was given via a button click
64
+ - Prior lawful processing is not invalidated by later withdrawal
65
+ - Processing MUST stop promptly after withdrawal — no "grace periods" unless legally justified
66
+
67
+ **Section 6(5) — Burden of proof:**
68
+ The Data Fiduciary must be able to demonstrate that valid consent was obtained. This requires:
69
+ - Consent audit logs with timestamp, mechanism used, and content presented at time of consent
70
+ - Version control for notices — the notice version presented must be retrievable
71
+ - Linkage between consent record and the data processed under it
72
+
73
+ **Section 6(6):** Any consent obtained in violation of these requirements is **void ab initio** — the processing was unlawful from the start.
74
+
75
+ **Consent Manager (Section 6(3) + Rule 5):**
76
+ - A Consent Manager is a body corporate registered by the Board
77
+ - Data Principals may give, manage, review, and withdraw consent for multiple Data Fiduciaries through a single Consent Manager platform
78
+ - Consent Managers must maintain interoperability across registered Data Fiduciaries
79
+ - Engaging a Consent Manager does not absolve the Data Fiduciary of its consent validity obligations
80
+
81
+ ---
82
+
83
+ ### A.3 Data Quality Obligation (Section 8(2))
84
+
85
+ Data Fiduciaries must ensure personal data is:
86
+ - **Accurate** — free from errors that would affect Data Principals' interests
87
+ - **Complete** — not missing material information
88
+ - **Consistent** — aligned across systems when used for decisions or shared with other Fiduciaries
89
+
90
+ **Scope limitation:** This obligation applies specifically when the data will be:
91
+ 1. Used to make a decision affecting the Data Principal, or
92
+ 2. Disclosed to another Data Fiduciary
93
+
94
+ **Practical implication:** Data used solely for internal analytics that does not affect individual decisions has a lower data quality obligation. Data used for credit scoring, benefit eligibility, or shared with business partners has a higher obligation.
95
+
96
+ ---
97
+
98
+ ### A.4 Security Safeguards Obligation (Section 8(3) + Rule 7)
99
+
100
+ **Principle:** Appropriate technical and organisational measures to prevent personal data breaches.
101
+
102
+ **Rule 7 — Minimum security standards:**
103
+
104
+ | Safeguard Category | Specific Requirement |
105
+ |--------------------|---------------------|
106
+ | Encryption | Encrypt personal data at rest and in transit |
107
+ | Access controls | Role-based access; least-privilege principle |
108
+ | Access logging | Maintain logs of who accessed what data and when |
109
+ | Pseudonymisation | Where processing permits separation of identifying elements from operational data |
110
+ | System hardening | Regular patching, vulnerability assessment, hardening of ICT systems |
111
+ | Incident detection | Capability to detect and alert on unauthorised access or anomalous data processing activity |
112
+ | Business continuity | Measures to ensure personal data availability and integrity during system failures |
113
+ | Data minimisation | Collect and retain only what is necessary for the specified purpose |
114
+
115
+ **Highest penalty tier:** Failure to implement security safeguards = ₹250 crore maximum (Section 33 Schedule).
116
+
117
+ **Key audit questions:**
118
+ - Is personal data encrypted at rest and in transit?
119
+ - Is access to personal data logged and monitored?
120
+ - How quickly can the organisation detect a breach?
121
+ - Are all Data Processors bound by equivalent security obligations?
122
+
123
+ ---
124
+
125
+ ### A.5 Breach Notification Obligation (Section 8(6) + Rule 6)
126
+
127
+ **Trigger:** Any "personal data breach" — unauthorised processing or accidental disclosure causing loss of confidentiality, integrity, or availability.
128
+
129
+ **Notification timeline:**
130
+
131
+ | Step | Timeline | Content |
132
+ |------|----------|---------|
133
+ | Initial notification to Board | **Within 72 hours** of becoming aware | Type of breach; categories and approximate number of Data Principals affected; likely consequences; measures taken or proposed |
134
+ | Notification to affected Data Principals | As directed by the Board | Board may require or waive Data Principal notification |
135
+ | Supplementary report | As directed by the Board | Additional investigation findings |
136
+
137
+ **Rule 6 — Content requirements:**
138
+ - Nature of the breach (unauthorised access, accidental disclosure, ransomware, etc.)
139
+ - Personal data categories affected (categories, not necessarily exhaustive item list)
140
+ - Approximate volume of records and number of affected Data Principals
141
+ - Name and contact details of responsible officer (equivalent to DPO contact)
142
+ - Likely consequences of the breach
143
+ - Measures taken to address the breach and mitigate harm
144
+ - Measures proposed to prevent recurrence
145
+
146
+ **Key operational points:**
147
+ - The 72-hour clock runs from when the organisation **becomes aware** of a breach — not when breach is fully investigated
148
+ - Partial notifications are permissible — notify within 72 hours with available information, supplement later
149
+ - Unlike GDPR, the Act does not prescribe a risk-threshold for notification — **all breaches must be notified to the Board**
150
+ - The Board decides whether to require notification to affected Data Principals
151
+
152
+ **Penalty:** Failure to notify = ₹200 crore maximum.
153
+
154
+ **Recommended breach response protocol:**
155
+ 1. Detection → Incident ticket opened (T=0)
156
+ 2. T+4 hours: Initial containment and impact triage
157
+ 3. T+24 hours: Preliminary classification — is this a personal data breach?
158
+ 4. T+48 hours: Gather notification content; prepare Rule 6 report
159
+ 5. T+72 hours: Submit to Board (even if investigation ongoing)
160
+ 6. T+ongoing: Supplementary reporting as investigation progresses
161
+
162
+ ---
163
+
164
+ ### A.6 Data Retention and Erasure Obligation (Section 8(7) + Rule 8)
165
+
166
+ **Mandatory erasure triggers:**
167
+ 1. Consent withdrawn by the Data Principal
168
+ 2. Purpose for which data was collected is fulfilled
169
+ 3. Data Principal exercises erasure right under Section 12(3)
170
+ 4. Retention no longer necessary for the specified purpose or required by law
171
+
172
+ **Erasure extends to Processors:**
173
+ - Data Fiduciaries must direct all Data Processors to erase personal data upon termination of the processing engagement
174
+ - Data Processors must confirm erasure — contractual clause and confirmation procedure required
175
+
176
+ **Retention exceptions (Section 8(7) proviso):**
177
+ - Where retention is required by applicable law (e.g., statutory record-keeping under Companies Act, GST records, etc.)
178
+ - Where retention is necessary to enforce or defend legal rights or claims
179
+
180
+ **Practical retention schedule design:**
181
+ - Map each data category to its lawful retention trigger
182
+ - For consent-based processing: retention ends at withdrawal or purpose fulfilment (whichever first)
183
+ - For Section 7 legitimate uses: retention ends when the legitimate use purpose is fulfilled
184
+ - Statutory overlays: apply the longer of DPDPA retention limits and applicable statutory requirement
185
+
186
+ ---
187
+
188
+ ### A.7 Grievance Mechanism Obligation (Section 8 + Section 13)
189
+
190
+ **Minimum requirements:**
191
+ - Accessible mechanism for Data Principals to submit grievances (web form, email, phone — at minimum one channel)
192
+ - Acknowledgement within prescribed period (Rules specify timelines — verify against Rule schedule)
193
+ - Resolution within prescribed period (Rules specify timelines)
194
+ - Escalation path to the Board clearly communicated (Section 13(3) — exhaustion of fiduciary mechanism required before Board complaint)
195
+
196
+ **Critical design point:** The grievance mechanism is the mandatory first step before Board intervention. A deficient or non-responsive grievance mechanism not only violates the Act but creates the conditions for Board complaints and regulatory escalation.
197
+
198
+ ---
199
+
200
+ ### A.8 Data Processing Agreements (Section 8(1) + Rule 16)
201
+
202
+ Every Data Processor engaged must be under a **written contract** that specifies:
203
+
204
+ | Contract Element | Requirement |
205
+ |-----------------|-------------|
206
+ | Processing instructions | Processor may only process as instructed by the Fiduciary |
207
+ | Purpose limitation | Processing restricted to specified purposes |
208
+ | Security measures | Processor must implement equivalent safeguards to Rule 7 |
209
+ | Sub-processing | Must obtain Fiduciary's prior written approval for sub-processors |
210
+ | Audit rights | Fiduciary must have right to audit Processor's compliance |
211
+ | Breach notification | Processor must notify Fiduciary promptly upon detecting a breach |
212
+ | Erasure on termination | Processor must erase data upon termination of engagement and confirm erasure |
213
+ | Data Fiduciary's liability | Fiduciary remains liable to Data Principals for Processor's acts — Fiduciary may seek indemnity from Processor contractually |
214
+
215
+ **Rule 16 additional requirements:**
216
+ - Contract must be executed before processing begins (not retrospectively)
217
+ - Processor-to-sub-processor agreements must flow down all obligations
218
+ - Fiduciary must maintain a register of all Processors and sub-processors
219
+
220
+ ---
221
+
222
+ ## Part B — Children's Data (Section 9 + Rules 10 and 12)
223
+
224
+ ### B.1 Age Threshold
225
+
226
+ **18 years** — uniform across India, no regional variation.
227
+
228
+ ### B.2 Parental Consent (Section 9(1) + Rule 12)
229
+
230
+ **Requirement:** Verifiable consent from parent or lawful guardian before processing any personal data of a child.
231
+
232
+ **Rule 12 — Verification methods (prescribed):**
233
+
234
+ | Method | Description |
235
+ |--------|-------------|
236
+ | DigiLocker | Digital credentials authenticated via DigiLocker platform (government ID-linked) |
237
+ | Government token | Any other government-issued digital token prescribed by MeitY |
238
+ | Existing verified data | If the Data Fiduciary already holds verified parent/guardian details from a prior KYC or similar process, these may be relied upon |
239
+ | Virtual token | Anonymised tokens issued by entities operating token-based identity infrastructure |
240
+
241
+ **Key design requirements:**
242
+ - Verification must confirm the consenting individual is an adult (18+)
243
+ - Verification must confirm the consenting individual is the parent or lawful guardian of the child
244
+ - The verification process itself must not collect excessive personal data about the child or parent
245
+
246
+ **Exemption possibility (Section 9(3)):**
247
+ The Central Government may exempt certain classes of Data Fiduciaries (e.g., healthcare providers, educational institutions, essential digital services for children) from the verifiable parental consent requirement. These exemptions must be positively notified — no self-certification of exemption is permitted.
248
+
249
+ ### B.3 Absolute Prohibitions (Section 9(2))
250
+
251
+ Regardless of consent, the following are **prohibited for all children** (no exceptions unless separately notified):
252
+
253
+ 1. **Tracking or behavioural monitoring** — geolocation tracking, persistent identifiers, browsing history, app usage analytics on individual children
254
+ 2. **Targeted advertising** — advertising directed at a child based on their personal data, browsing patterns, or inferred characteristics
255
+ 3. **Any processing likely to cause detrimental effect on the child's well-being**
256
+
257
+ **Compliance implication:**
258
+ - An analytics platform that tracks individual child users violates Section 9(2) even if parental consent is obtained
259
+ - An advertising-funded platform that profiles children for ad targeting violates Section 9(2) regardless of consent
260
+ - Age-verification must precede any personalised or tracked service — not a post-onboarding check
261
+
262
+ **Penalty:** ₹200 crore maximum — second-highest penalty tier.
263
+
264
+ ### B.4 Practical Age-Gate Requirements
265
+
266
+ - Age declaration at registration: must capture claimed age
267
+ - Verification trigger: if claimed age is under 18, parental consent verification must be initiated before data processing begins
268
+ - False age declaration: Data Fiduciary is protected if it relied in good faith on a verified parental consent — responsibility shifts to the declarant
269
+ - Dark patterns: age-gate mechanisms must not use deceptive design to bypass age checks
270
+
271
+ ---
272
+
273
+ ## Part C — Significant Data Fiduciary Obligations (Section 10 + Rule 13)
274
+
275
+ ### C.1 SDF Designation
276
+
277
+ **Who designates:** Central Government (MeitY) by notification in the Official Gazette.
278
+
279
+ **Criteria (Section 10 + Rule 13(1)):**
280
+
281
+ | Factor | Indicators |
282
+ |--------|-----------|
283
+ | Volume of data | Large-scale processing of personal data across a significant number of Data Principals |
284
+ | Sensitivity | Processing of special categories (financial, health, biometric, location) at scale |
285
+ | Risk to rights | Potential for harm, discrimination, or manipulation of Data Principals |
286
+ | Sovereignty and security | Impact on India's sovereignty, integrity, national security |
287
+ | Electoral democracy | Potential to influence electoral processes or democratic participation |
288
+ | Public order | Processing that could affect public order, communal harmony |
289
+
290
+ **Current status (April 2026):** The Central Government has not yet published the first list of SDFs. Entities should assess their processing profile and prepare for potential SDF designation.
291
+
292
+ ### C.2 India-Resident Data Protection Officer (Section 10(2)(a) + Rule 13(2))
293
+
294
+ | Requirement | Detail |
295
+ |-------------|--------|
296
+ | Residency | Must be **resident in India** (not abroad) |
297
+ | Individual | Must be a natural person — not an entity or external law firm |
298
+ | Role before Board | Sole official representative of the SDF before the Data Protection Board |
299
+ | Data Principal contact | Primary contact for Data Principal grievances |
300
+ | Reporting line | Must have direct access to the highest management of the SDF |
301
+
302
+ **Key distinction from GDPR DPO:**
303
+ - The DPDPA DPO is the SDF's spokesperson and Board liaison — a more operational role than the GDPR advisory DPO
304
+ - The DPDPA DPO does not independently audit the organisation; that function is the Data Auditor's
305
+ - The DPDPA DPO must physically reside in India — a non-India-based privacy officer does not satisfy this requirement
306
+
307
+ ### C.3 Data Protection Impact Assessment (Section 10(2)(b) + Rule 13(3))
308
+
309
+ **Frequency:** Annual — covering the preceding year's processing activities.
310
+
311
+ **Mandatory content (Rule 13(3)):**
312
+
313
+ | Assessment Element | What to Cover |
314
+ |-------------------|---------------|
315
+ | Compliance review | Review of all processing activities against Act and Rules obligations |
316
+ | Rights exercise analysis | How Data Principals exercised their rights; complaints received; resolution rate |
317
+ | Safeguard adequacy | Assessment of whether security safeguards remain adequate given current threats |
318
+ | Third-party risk | Review of all Data Processor relationships and their compliance |
319
+ | Large-scale processing risks | Specific risks arising from high-volume or high-sensitivity processing |
320
+ | Mitigation measures | Actions taken and proposed to address identified risks |
321
+
322
+ **Output:** DPIA report submitted to the Board as part of the annual compliance cycle.
323
+
324
+ ### C.4 Annual Independent Data Audit (Section 10(2)(c) + Rule 13(4))
325
+
326
+ **Auditor:** External, independent, qualified data auditor (not the SDF's own privacy team or affiliated entity).
327
+
328
+ **Scope:**
329
+ - Compliance with all obligations under the Act and Rules
330
+ - Adequacy of security safeguards
331
+ - Data processing agreements with Processors
332
+ - Data Principal rights fulfilment
333
+ - Breach notification history and response adequacy
334
+ - Children's data compliance (if applicable)
335
+
336
+ **Output:** Audit report submitted to the Board. Board may use audit findings in investigations and penalty proceedings.
337
+
338
+ ### C.5 Data Localisation (Section 10(2)(d))
339
+
340
+ **Mechanism:** Central Government may, by notification, require SDFs to retain specified categories of personal data only within India — even if cross-border transfer is otherwise permitted.
341
+
342
+ **Current status (April 2026):** No localisation notifications issued for SDFs. Entities should monitor MeitY gazette.
343
+
344
+ **Planning requirement:** SDFs must be capable of implementing localisation on notification — this requires data mapping to identify which data categories and which systems would be affected, and architecture capable of separating India-stored data from globally replicated data.
345
+
346
+ ---
347
+
348
+ ## Part D — Data Principal Rights Fulfilment Procedures
349
+
350
+ ### D.1 Right to Access (Section 11)
351
+
352
+ **What the Data Principal may request:**
353
+ 1. Summary of personal data currently being processed
354
+ 2. Description of processing activities (purpose, legal basis, duration)
355
+ 3. All Data Fiduciaries and Processors who hold or process the data, with their contact details
356
+ 4. What data has been shared with each recipient and when
357
+
358
+ **Response timeline:** Within the prescribed period under Rules (verify against Rule schedule).
359
+
360
+ **Form of response:** Must be in a format accessible to the Data Principal — plain language, understandable categories, not raw database extracts.
361
+
362
+ **Limitations:**
363
+ - Data Fiduciaries may decline to provide information where disclosure would endanger another person
364
+ - Information subject to legal privilege or security exemptions (Section 17) may be withheld
365
+ - Must provide a reason for any refusal (enabling Board escalation)
366
+
367
+ ### D.2 Right to Correction, Completion, and Updating (Section 12(1))
368
+
369
+ **Process:**
370
+ 1. Data Principal submits correction/completion/update request
371
+ 2. Data Fiduciary verifies the request
372
+ 3. Data Fiduciary makes the requested correction, completion, or update
373
+ 4. Data Fiduciary notifies any Data Processors or other Fiduciaries who received the incorrect data (where feasible)
374
+
375
+ **Practical requirement:** Systems must be capable of propagating corrections across linked databases and to downstream Processors.
376
+
377
+ ### D.3 Right to Erasure (Section 12(3))
378
+
379
+ **Trigger:** Data Principal requests erasure of personal data no longer necessary for the specified purpose.
380
+
381
+ **Limitation grounds where Fiduciary may refuse (Section 12(4)):**
382
+ 1. Data is still necessary for the specified purpose
383
+ 2. Retention required by law (statutory obligation)
384
+ 3. Retention necessary to enforce or defend legal rights
385
+
386
+ **Process:**
387
+ 1. Data Principal submits erasure request
388
+ 2. Data Fiduciary assesses whether any refusal ground applies
389
+ 3. If no refusal ground: erase from own systems AND direct all Processors to erase
390
+ 4. If refusal ground applies: notify Data Principal with explanation and right to escalate to Board
391
+
392
+ ### D.4 Right of Grievance Redressal (Section 13)
393
+
394
+ **Mandatory exhaustion:** Data Principals MUST exhaust the Data Fiduciary's grievance mechanism before filing a complaint with the Board.
395
+
396
+ **Fiduciary obligations:**
397
+ - Grievance mechanism must be accessible (not buried or inaccessible)
398
+ - Acknowledgement and resolution within prescribed timelines
399
+ - Records of grievances and resolutions must be maintained
400
+
401
+ **Escalation to Board:** If the Data Principal is unsatisfied with the Fiduciary's response, or if the Fiduciary fails to respond within the prescribed period, the Data Principal may approach the Board.
402
+
403
+ ### D.5 Right to Nominate (Section 14)
404
+
405
+ **Available triggers:**
406
+ - Death of the Data Principal
407
+ - Incapacity (unsoundness of mind or physical infirmity preventing exercise of rights)
408
+
409
+ **Nominee's powers:** The nominee may exercise all rights under Sections 11, 12, and 13 as if they were the Data Principal.
410
+
411
+ **Operational requirement:** Data Fiduciaries must provide a mechanism for Data Principals to register nominations, update nominations, and for nominees to authenticate themselves upon claiming rights.
412
+
413
+ ---
414
+
415
+ ## Part E — Response Timelines Quick Reference
416
+
417
+ | Right/Obligation | Prescribed Timeline |
418
+ |-----------------|---------------------|
419
+ | Breach notification to Board | 72 hours from awareness |
420
+ | Grievance acknowledgement | As prescribed by Rules (monitor Rule schedule) |
421
+ | Grievance resolution | As prescribed by Rules |
422
+ | Access request response | As prescribed by Rules |
423
+ | Correction/erasure response | As prescribed by Rules |
424
+ | Notice for existing data | Within prescribed period after commencement |
425
+
426
+ > **Note on prescribed timelines:** The DPDP Rules 2025 set specific timelines for several obligations. Where the table above states "as prescribed by Rules," verify the current Rule text as timelines may be specified in schedules or subsequent notifications. Monitoring MeitY's official gazette is essential for SDF-designated and high-volume Data Fiduciaries.