bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,349 @@
|
|
|
1
|
+
# DORA — ICT Third-Party Risk Management Reference
|
|
2
|
+
|
|
3
|
+
Chapter V, Articles 28–44, Regulation (EU) 2022/2554.
|
|
4
|
+
Key implementing measures: CDR (EU) 2024/1773, CIR (EU) 2024/2956, CDR (EU) 2025/532,
|
|
5
|
+
CDR (EU) 2024/1502, CDR (EU) 2024/1505, CDR (EU) 2025/295, CDR (EU) 2025/420.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Overview: Two-Track Structure
|
|
10
|
+
|
|
11
|
+
Chapter V operates on two parallel tracks:
|
|
12
|
+
|
|
13
|
+
**Track 1 — Entity-level obligations (Art. 28–30):**
|
|
14
|
+
Every financial entity must manage its own ICT third-party risks — regardless of
|
|
15
|
+
whether its TPSPs are designated critical.
|
|
16
|
+
|
|
17
|
+
**Track 2 — Systemic oversight of designated CTPPs (Art. 31–44):**
|
|
18
|
+
ESAs designate and oversee ICT TPSPs that are systemically important to the
|
|
19
|
+
EU financial sector. This is a supervisory regime, not an entity-level compliance task.
|
|
20
|
+
|
|
21
|
+
---
|
|
22
|
+
|
|
23
|
+
## Art. 28 — General Principles for ICT Third-Party Risk
|
|
24
|
+
|
|
25
|
+
### Art. 28(1) — ICT Third-Party Risk Policy
|
|
26
|
+
Every financial entity must adopt, regularly review, and update an **ICT third-party
|
|
27
|
+
risk policy** covering:
|
|
28
|
+
- Objectives and principles for managing ICT third-party risk
|
|
29
|
+
- Criteria for identifying critical and important functions (CIF) vs. non-critical
|
|
30
|
+
- Pre-contractual due diligence requirements
|
|
31
|
+
- Contract lifecycle management (onboarding, monitoring, exit)
|
|
32
|
+
- ICT concentration risk management
|
|
33
|
+
- Governance roles and responsibilities
|
|
34
|
+
|
|
35
|
+
**Key RTS:** CDR (EU) 2024/1773, Art. 1–12 (detailed policy content)
|
|
36
|
+
|
|
37
|
+
### Art. 28(2) — Maintaining the Register of Information
|
|
38
|
+
Financial entities must maintain and update the **Register of Information** (RoI)
|
|
39
|
+
covering **all** ICT service arrangements (not only those supporting critical
|
|
40
|
+
functions). See the Register of Information section below for full field details.
|
|
41
|
+
|
|
42
|
+
### Art. 28(3) — Annual Submission of Register of Information
|
|
43
|
+
The RoI must be submitted to the competent authority **at least annually** and
|
|
44
|
+
upon specific request. The submission format follows CIR (EU) 2024/2956 templates.
|
|
45
|
+
|
|
46
|
+
### Art. 28(4) — Pre-Contractual Due Diligence
|
|
47
|
+
Before entering any new ICT service arrangement supporting a critical or important
|
|
48
|
+
function, financial entities must:
|
|
49
|
+
- **(a)** Assess whether the ICT service arrangement supports a critical or important function
|
|
50
|
+
- **(b)** Assess the risks of the arrangement, including ICT concentration risk
|
|
51
|
+
- **(c)** Carry out appropriate due diligence on prospective ICT TPSPs
|
|
52
|
+
|
|
53
|
+
The due diligence must be documented and commensurate with the criticality of
|
|
54
|
+
the function.
|
|
55
|
+
|
|
56
|
+
### Art. 28(5) — Ongoing Monitoring of ICT TPSPs
|
|
57
|
+
- Monitor the performance, security posture, and compliance of ICT TPSPs
|
|
58
|
+
throughout the contract lifecycle
|
|
59
|
+
- Conduct regular reviews aligned with the contract terms and risk profile
|
|
60
|
+
- Verify that ICT TPSPs continue to meet agreed service levels and security standards
|
|
61
|
+
|
|
62
|
+
### Art. 28(6) — ICT Concentration Risk Assessment
|
|
63
|
+
Financial entities must:
|
|
64
|
+
- Assess the **concentration risk** arising from reliance on a single or limited
|
|
65
|
+
number of ICT TPSPs for critical functions
|
|
66
|
+
- Determine whether the failure or unavailability of any TPSP would threaten the
|
|
67
|
+
entity's ability to maintain critical functions
|
|
68
|
+
- Document this assessment and factor it into risk appetite and strategy
|
|
69
|
+
|
|
70
|
+
**Common scenario:** A bank using a single hyperscaler (e.g., one major cloud
|
|
71
|
+
provider) for core banking, treasury, and fraud detection creates high concentration
|
|
72
|
+
risk even if the TPSP is not designated critical.
|
|
73
|
+
|
|
74
|
+
### Art. 28(7) — Exit Strategy
|
|
75
|
+
For each ICT arrangement supporting a critical or important function, financial entities must:
|
|
76
|
+
- Develop and maintain an **exit strategy** covering:
|
|
77
|
+
- Conditions and triggers for exit
|
|
78
|
+
- Minimum notice period required to migrate services
|
|
79
|
+
- Data portability and return procedures
|
|
80
|
+
- Transition assistance obligations of the departing TPSP
|
|
81
|
+
- Test exit strategies periodically (frequency: risk-based)
|
|
82
|
+
|
|
83
|
+
---
|
|
84
|
+
|
|
85
|
+
## Art. 29 — Preliminary Assessment of ICT Concentration Risk
|
|
86
|
+
|
|
87
|
+
Before entering a new arrangement that would cause an entity's concentration in
|
|
88
|
+
a single TPSP to increase for critical functions:
|
|
89
|
+
- Conduct a specific **concentration risk assessment**
|
|
90
|
+
- Document the assessment outcome and risk mitigation measures (if any)
|
|
91
|
+
- Consider the systemic implications if the concentrated TPSP were to fail
|
|
92
|
+
|
|
93
|
+
This is a transaction-specific obligation (triggered by entering a new arrangement)
|
|
94
|
+
rather than an ongoing monitoring obligation (which is covered by Art. 28(6)).
|
|
95
|
+
|
|
96
|
+
---
|
|
97
|
+
|
|
98
|
+
## Art. 30 — Key Contractual Provisions
|
|
99
|
+
|
|
100
|
+
### Scope: When does Art. 30(2) apply?
|
|
101
|
+
|
|
102
|
+
Art. 30(2) applies to contracts for ICT services that support **critical or important
|
|
103
|
+
functions**. A lighter set of provisions applies to non-critical arrangements
|
|
104
|
+
(Art. 30(3)).
|
|
105
|
+
|
|
106
|
+
### Critical or Important Function (CIF)
|
|
107
|
+
|
|
108
|
+
A function is critical or important if its disruption would:
|
|
109
|
+
- Materially impair the financial entity's compliance with legal obligations
|
|
110
|
+
- Materially impair its financial performance, or
|
|
111
|
+
- Materially impair the soundness or continuity of its services
|
|
112
|
+
|
|
113
|
+
The criteria for identifying CIF are further specified in CDR (EU) 2024/1773.
|
|
114
|
+
|
|
115
|
+
### Mandatory Contractual Provisions — Art. 30(2)(a)–(i)
|
|
116
|
+
|
|
117
|
+
| Provision | DORA Requirement |
|
|
118
|
+
|-----------|-----------------|
|
|
119
|
+
| **(a)** Service description | Clear and complete description of the ICT services to be provided |
|
|
120
|
+
| **(b)** Data locations | Location(s) where services will be provided and data stored/processed, including notification obligations if locations change |
|
|
121
|
+
| **(c)** Data protection | Provisions ensuring data protection; compliance with applicable data protection law (GDPR where applicable) |
|
|
122
|
+
| **(d)** Availability, authenticity, integrity, security | Service level specifications; security standards; incident response obligations of the TPSP |
|
|
123
|
+
| **(e)** Audit and access rights | **Full and unrestricted audit rights** for the financial entity, its competent authorities (including ECB for significant institutions), and resolution authorities — including on-site inspection rights at the TPSP's premises |
|
|
124
|
+
| **(f)** Termination rights | Conditions under which the financial entity may terminate; minimum notice periods; the TPSP's obligation to provide transition services |
|
|
125
|
+
| **(g)** Reporting and monitoring | ICT incident reporting by the TPSP to the financial entity; performance monitoring; regular service reviews |
|
|
126
|
+
| **(h)** Data portability and migration | On termination, the TPSP must provide all data in machine-readable format; migration assistance; data deletion certification |
|
|
127
|
+
| **(i)** Sub-contracting | Conditions under which the TPSP may sub-contract ICT services; prior written consent requirement; equivalent contractual provisions in sub-processor contracts; right to audit sub-processors |
|
|
128
|
+
|
|
129
|
+
**Key RTS:** CDR (EU) 2024/1773 specifies the detailed content of each provision.
|
|
130
|
+
**Key RTS:** CDR (EU) 2025/532 specifies sub-contracting provisions in detail.
|
|
131
|
+
|
|
132
|
+
### The Audit Rights Problem (Art. 30(2)(e))
|
|
133
|
+
|
|
134
|
+
The most common contractual gap: large cloud providers offer only third-party
|
|
135
|
+
audit reports (e.g., SOC 2, ISO 27001 certificates) rather than direct audit
|
|
136
|
+
rights. DORA Art. 30(2)(e) requires:
|
|
137
|
+
- **Full and unrestricted** audit rights for the financial entity
|
|
138
|
+
- **Access rights for competent authorities** — including the right to inspect
|
|
139
|
+
the TPSP's premises
|
|
140
|
+
|
|
141
|
+
ESA guidance has clarified that:
|
|
142
|
+
- Pooled or third-party audits (SOC 2, ISO 27001 certification) may partially
|
|
143
|
+
satisfy the **entity's own audit right** where direct audit is genuinely
|
|
144
|
+
impracticable at hyperscale TPSPs — but only if the entity documents in writing
|
|
145
|
+
why direct audit is impracticable and confirms the pooled audit outputs are
|
|
146
|
+
meaningful and sufficient
|
|
147
|
+
- Financial entities must still document their assessment of why pooled audits
|
|
148
|
+
are acceptable and ensure they receive meaningful, entity-specific outputs
|
|
149
|
+
- **The competent authority's (and resolution authority's) on-site inspection
|
|
150
|
+
right under Art. 30(2)(e) is NON-WAIVABLE.** Even where the entity accepts
|
|
151
|
+
pooled audits, the contract must contain an express, unconditional clause
|
|
152
|
+
preserving the competent authority's right to inspect the TPSP's premises
|
|
153
|
+
directly. A clause that routes the authority's access through the TPSP's
|
|
154
|
+
third-party audit programme does NOT satisfy Art. 30(2)(e). This is a common
|
|
155
|
+
failure in standard cloud provider contracts.
|
|
156
|
+
- Acceptance of pooled audits must be documented with a written risk acceptance
|
|
157
|
+
approved at an appropriate governance level (e.g., CRO or board)
|
|
158
|
+
|
|
159
|
+
### Lighter Provisions for Non-Critical Arrangements (Art. 30(3))
|
|
160
|
+
|
|
161
|
+
For ICT service arrangements that do not support critical or important functions:
|
|
162
|
+
- Service description
|
|
163
|
+
- Data locations
|
|
164
|
+
- Basic availability and security commitments
|
|
165
|
+
- Incident notification obligations
|
|
166
|
+
- Exit/termination provisions
|
|
167
|
+
|
|
168
|
+
Full Art. 30(2) provisions are not required.
|
|
169
|
+
|
|
170
|
+
### Art. 30(4) — Review Before Renewal
|
|
171
|
+
|
|
172
|
+
Before renewing any contract for ICT services supporting critical functions,
|
|
173
|
+
financial entities must review whether:
|
|
174
|
+
- Service levels remain adequate
|
|
175
|
+
- Audit and access rights remain exercisable
|
|
176
|
+
- Exit strategy remains viable
|
|
177
|
+
- New risks (concentration, substitutability) have emerged
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
## Register of Information — Complete Field Reference (CIR (EU) 2024/2956)
|
|
182
|
+
|
|
183
|
+
### When to Maintain and Submit
|
|
184
|
+
|
|
185
|
+
- **Ongoing maintenance:** Update when new arrangements are entered, modified,
|
|
186
|
+
or terminated; when sub-processors change; when data locations change
|
|
187
|
+
- **Annual submission:** At least annually to the competent authority
|
|
188
|
+
- **On-demand submission:** Upon specific request from competent authority or ESA
|
|
189
|
+
(for the oversight framework of CTPPs under Art. 31)
|
|
190
|
+
|
|
191
|
+
### Complete Field Set
|
|
192
|
+
|
|
193
|
+
The RoI is structured around **arrangements** — each row represents one ICT
|
|
194
|
+
service arrangement.
|
|
195
|
+
|
|
196
|
+
| Field | Field Name (CIR 2024/2956) | Description |
|
|
197
|
+
|-------|---------------------------|-------------|
|
|
198
|
+
| 1 | Reporting entity LEI | Legal Entity Identifier of the financial entity |
|
|
199
|
+
| 2 | Reporting entity name | Legal name |
|
|
200
|
+
| 3 | Reporting entity type | Regulated entity type (credit institution, insurer, etc.) |
|
|
201
|
+
| 4 | Arrangement reference | Unique internal reference for this arrangement |
|
|
202
|
+
| 5 | Arrangement type | Type (outsourcing, SaaS, IaaS, PaaS, data services, etc.) |
|
|
203
|
+
| 6 | TPSP legal name | Legal name of the ICT third-party service provider |
|
|
204
|
+
| 7 | TPSP LEI | LEI of the TPSP |
|
|
205
|
+
| 8 | TPSP country of establishment | Country (ISO 3166-1 alpha-2) |
|
|
206
|
+
| 9 | TPSP within group? | Is the TPSP part of the same corporate group as the entity? |
|
|
207
|
+
| 10 | ICT service type | Nature of services (per CIR classification codes) |
|
|
208
|
+
| 11 | ICT service description | Free-text description of specific services |
|
|
209
|
+
| 12 | Critical or important function (CIF)? | Y/N — does this arrangement support a CIF? |
|
|
210
|
+
| 13 | Function identifier | Reference to the function(s) supported |
|
|
211
|
+
| 14 | Function description | Description of the supported function |
|
|
212
|
+
| 15 | Data types processed | Classification of personal/non-personal data processed |
|
|
213
|
+
| 16 | Data sensitivity | Sensitivity level of data (e.g., customer PII, financial data) |
|
|
214
|
+
| 17 | Primary data storage location | Country(ies) where data is primarily stored |
|
|
215
|
+
| 18 | Secondary/backup data storage location | Country(ies) where backup data is stored |
|
|
216
|
+
| 19 | Contract start date | Effective date of the arrangement |
|
|
217
|
+
| 20 | Contract end date or rolling | End date or indication of indefinite/rolling |
|
|
218
|
+
| 21 | Notice period for termination | Minimum notice period (in days) |
|
|
219
|
+
| 22 | Sub-processors used? | Y/N — does the TPSP sub-contract any services? |
|
|
220
|
+
| 23 | Sub-processor names and LEIs | Name and LEI of each sub-processor |
|
|
221
|
+
| 24 | Sub-processor data locations | Country(ies) of data processing by sub-processors |
|
|
222
|
+
| 25 | Substitutability assessment | High / Medium / Low — ease of replacing this TPSP |
|
|
223
|
+
| 26 | Exit strategy reference | Reference to the exit strategy document for this arrangement |
|
|
224
|
+
| 27 | Last due diligence date | Date of most recent due diligence assessment |
|
|
225
|
+
| 28 | Audit rights exercisable? | Y/N — can audit rights be exercised per contract? |
|
|
226
|
+
| 29 | Audit method | Direct audit / pooled audit / third-party certification |
|
|
227
|
+
|
|
228
|
+
### Register of Information — Key Points
|
|
229
|
+
|
|
230
|
+
1. **All arrangements, not just critical ones.** The RoI covers every ICT service
|
|
231
|
+
arrangement, not only those supporting critical or important functions. The
|
|
232
|
+
criticality flag (field 12) distinguishes them within the register.
|
|
233
|
+
|
|
234
|
+
2. **Sub-processors must be captured.** For each arrangement, the full chain of
|
|
235
|
+
sub-processors must be identified (fields 22–24). This is frequently incomplete
|
|
236
|
+
in practice.
|
|
237
|
+
|
|
238
|
+
3. **Not a static document.** The RoI must be updated throughout the year as
|
|
239
|
+
arrangements change; the annual submission is a snapshot of the current state.
|
|
240
|
+
|
|
241
|
+
4. **LEIs are mandatory.** Both the reporting entity and all TPSPs must have LEIs.
|
|
242
|
+
Where a TPSP does not have an LEI, the entity should document this and use
|
|
243
|
+
the TPSP's national business registration number as an alternative.
|
|
244
|
+
|
|
245
|
+
---
|
|
246
|
+
|
|
247
|
+
## ICT Concentration Risk — Practical Assessment
|
|
248
|
+
|
|
249
|
+
### What constitutes concentration risk under DORA?
|
|
250
|
+
|
|
251
|
+
**Horizontal concentration:** Multiple critical functions supported by a single TPSP
|
|
252
|
+
(e.g., core banking, fraud detection, and AML all on the same cloud provider).
|
|
253
|
+
|
|
254
|
+
**Sectoral concentration:** Many financial entities within the EU using the same
|
|
255
|
+
TPSP for critical functions — creating systemic risk even if each entity's own
|
|
256
|
+
dependency appears manageable.
|
|
257
|
+
|
|
258
|
+
**Geographic concentration:** All data and processing in a single geographic region
|
|
259
|
+
or data centre cluster, creating correlated failure risk.
|
|
260
|
+
|
|
261
|
+
### Concentration Risk Assessment Template
|
|
262
|
+
|
|
263
|
+
For each TPSP supporting critical functions, assess:
|
|
264
|
+
|
|
265
|
+
| Assessment Area | Question | Rating (H/M/L) |
|
|
266
|
+
|----------------|----------|----------------|
|
|
267
|
+
| Dependency depth | How many critical functions depend on this TPSP? | |
|
|
268
|
+
| Substitutability | Could this service be replaced within the entity's recovery time objectives? | |
|
|
269
|
+
| Contractual exit | Is there a viable exit path with adequate notice period and data portability? | |
|
|
270
|
+
| Financial stability | Is there material risk of the TPSP becoming insolvent or discontinuing the service? | |
|
|
271
|
+
| Geographic diversification | Are services provided from geographically diverse infrastructure? | |
|
|
272
|
+
| Regulatory enforceability | Are audit and competent authority access rights practically exercisable? | |
|
|
273
|
+
|
|
274
|
+
A TPSP rated High on any two or more areas should be treated as a concentration
|
|
275
|
+
risk concern requiring mitigation action.
|
|
276
|
+
|
|
277
|
+
---
|
|
278
|
+
|
|
279
|
+
## Oversight Framework for Critical ICT TPSPs (Art. 31–44)
|
|
280
|
+
|
|
281
|
+
### Designation of Critical ICT TPSPs (Art. 31)
|
|
282
|
+
|
|
283
|
+
ESAs (EBA, ESMA, EIOPA) jointly designate ICT TPSPs as **critical** based on
|
|
284
|
+
CDR (EU) 2024/1502 criteria. The designation process:
|
|
285
|
+
|
|
286
|
+
1. Financial entities submit their RoI annually
|
|
287
|
+
2. ESAs aggregate RoI data to map TPSP dependencies across the EU financial sector
|
|
288
|
+
3. ESAs apply CDR 2024/1502 criteria to assess systemic importance
|
|
289
|
+
4. Designated CTPPs are notified and published
|
|
290
|
+
5. ICT TPSPs not established in the EU that serve EU financial entities must
|
|
291
|
+
designate an EU-established legal representative (Art. 31(11))
|
|
292
|
+
|
|
293
|
+
### Lead Overseer Assignment (Art. 32)
|
|
294
|
+
|
|
295
|
+
Each designated CTPSP is assigned a **Lead Overseer** — one of EBA, ESMA, or EIOPA
|
|
296
|
+
— based on the predominant type of financial entity served. The Lead Overseer
|
|
297
|
+
coordinates with other ESAs via the **Joint Oversight Network (JON)**.
|
|
298
|
+
|
|
299
|
+
**Joint Examination Teams (JETs):** Per CDR (EU) 2025/420, JETs are assembled
|
|
300
|
+
from Lead Overseer and national authority staff to conduct on-site and off-site
|
|
301
|
+
examinations of CTPPs.
|
|
302
|
+
|
|
303
|
+
### Oversight Powers (Art. 33–38)
|
|
304
|
+
|
|
305
|
+
| Power | Description |
|
|
306
|
+
|-------|-------------|
|
|
307
|
+
| Art. 33 — Information requests | Lead Overseer can require CTTPSs to provide information, data, and documents |
|
|
308
|
+
| Art. 34 — General investigations | Including interviews, document reviews |
|
|
309
|
+
| Art. 35 — On-site inspections | Physical inspection of CTPSP premises and systems |
|
|
310
|
+
| Art. 36 — Recommendations | Lead Overseer issues recommendations for improvement |
|
|
311
|
+
| Art. 37 — Follow-up | Follow-up recommendations and potential escalation |
|
|
312
|
+
| Art. 38 — Oversight fees | Annual fees per CDR (EU) 2024/1505 |
|
|
313
|
+
|
|
314
|
+
### What CTPSP Designation Means for Financial Entities
|
|
315
|
+
|
|
316
|
+
- **No direct obligations change** for the financial entity when its TPSP is
|
|
317
|
+
designated critical — the entity's Art. 28–30 obligations apply regardless
|
|
318
|
+
- The Lead Overseer interacts with the **CTPSP directly**
|
|
319
|
+
- Financial entities must cooperate with information requests from the Lead
|
|
320
|
+
Overseer about their use of designated CTPPs (Art. 40)
|
|
321
|
+
- Financial entities should note that oversight recommendations to a CTPSP
|
|
322
|
+
may result in changes to service terms — monitor this
|
|
323
|
+
|
|
324
|
+
---
|
|
325
|
+
|
|
326
|
+
## Contract Review Checklist — DORA Art. 30(2) Compliance
|
|
327
|
+
|
|
328
|
+
Use this checklist when reviewing existing contracts or negotiating new ones:
|
|
329
|
+
|
|
330
|
+
| Clause | Required by | Present? | Gap? |
|
|
331
|
+
|--------|------------|---------|------|
|
|
332
|
+
| Clear service description | Art. 30(2)(a) | | |
|
|
333
|
+
| Data location — primary and secondary | Art. 30(2)(b) | | |
|
|
334
|
+
| Change notification for data locations | Art. 30(2)(b) | | |
|
|
335
|
+
| GDPR/data protection provisions | Art. 30(2)(c) | | |
|
|
336
|
+
| Service levels (availability, integrity, security) | Art. 30(2)(d) | | |
|
|
337
|
+
| Audit rights — financial entity | Art. 30(2)(e) | | |
|
|
338
|
+
| Audit rights — competent authority | Art. 30(2)(e) | | |
|
|
339
|
+
| Audit rights — resolution authority | Art. 30(2)(e) | | |
|
|
340
|
+
| Termination for cause | Art. 30(2)(f) | | |
|
|
341
|
+
| Termination for regulatory reasons | Art. 30(2)(f) | | |
|
|
342
|
+
| Minimum notice period on exit | Art. 30(2)(f) | | |
|
|
343
|
+
| Incident reporting by TPSP to entity | Art. 30(2)(g) | | |
|
|
344
|
+
| Data portability on exit | Art. 30(2)(h) | | |
|
|
345
|
+
| Migration assistance commitment | Art. 30(2)(h) | | |
|
|
346
|
+
| Data deletion/destruction certificate | Art. 30(2)(h) | | |
|
|
347
|
+
| Sub-contracting — prior consent | Art. 30(2)(i) + CDR 2025/532 | | |
|
|
348
|
+
| Sub-contracting — equivalent provisions | Art. 30(2)(i) + CDR 2025/532 | | |
|
|
349
|
+
| Sub-processor change notification | CDR 2025/532 | | |
|
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
# DPDPA vs GDPR — Compliance Comparison Reference
|
|
2
|
+
|
|
3
|
+
For compliance teams that are GDPR-experienced and are mapping obligations under
|
|
4
|
+
India's Digital Personal Data Protection Act, 2023.
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Quick Terminology Map
|
|
9
|
+
|
|
10
|
+
| GDPR Term | DPDPA Equivalent |
|
|
11
|
+
|-----------|-----------------|
|
|
12
|
+
| Data Controller | **Data Fiduciary** |
|
|
13
|
+
| Data Subject | **Data Principal** |
|
|
14
|
+
| Data Processor | **Data Processor** (same) |
|
|
15
|
+
| High-Risk Controller | **Significant Data Fiduciary (SDF)** |
|
|
16
|
+
| Supervisory Authority / DPA | **Data Protection Board of India (DPBI)** |
|
|
17
|
+
| Lawful Basis / Legal Ground | **Ground for Processing** |
|
|
18
|
+
| Legitimate Interests | **No equivalent** — does not exist under DPDPA |
|
|
19
|
+
| Adequacy Decision | **No equivalent** — DPDPA uses blacklist, not whitelist |
|
|
20
|
+
| Standard Contractual Clauses | **No equivalent prescribed** — contractual safeguards required but SCC-style mechanism not prescribed |
|
|
21
|
+
| Privacy Notice | **Notice** (Section 5 + Rule 3) |
|
|
22
|
+
| Data Subject Rights | **Data Principal Rights** (Sections 11–14) |
|
|
23
|
+
| Data Protection Impact Assessment | **DPIA** (SDFs only, Rule 13) |
|
|
24
|
+
| Data Protection Officer | **Data Protection Officer** (SDFs only; must be India-resident) |
|
|
25
|
+
| Right to be Forgotten | **Right to Erasure** (Section 12(3) — narrower than GDPR) |
|
|
26
|
+
|
|
27
|
+
---
|
|
28
|
+
|
|
29
|
+
## 8 Substantive Differences
|
|
30
|
+
|
|
31
|
+
### 1. Scope: Digital-Only vs. All Personal Data
|
|
32
|
+
|
|
33
|
+
| Dimension | GDPR | DPDPA |
|
|
34
|
+
|-----------|------|-------|
|
|
35
|
+
| Data medium | ALL personal data — digital, paper, audio, visual | Only **digital personal data** (or data subsequently digitised) |
|
|
36
|
+
| Physical records | Covered | Excluded unless digitised |
|
|
37
|
+
| Verbal data | Covered if recorded | Only if converted to digital form |
|
|
38
|
+
|
|
39
|
+
**Implication:** Organisations can maintain some non-digital records outside DPDPA scope. However, any digitisation triggers DPDPA applicability. Organisations should not rely on keeping data non-digital as a compliance strategy — most operational data is inherently digital.
|
|
40
|
+
|
|
41
|
+
---
|
|
42
|
+
|
|
43
|
+
### 2. Lawful Bases: Closed List vs. Balancing Test
|
|
44
|
+
|
|
45
|
+
| Dimension | GDPR | DPDPA |
|
|
46
|
+
|-----------|------|-------|
|
|
47
|
+
| Number of lawful bases | 6 (consent, contract, legal obligation, vital interests, public task, legitimate interests) | **2** (consent; or 8 enumerated "legitimate uses") |
|
|
48
|
+
| Legitimate interests | Yes — balancing test: organisation's interest vs. individual rights | **No** — does not exist |
|
|
49
|
+
| Contract performance | Yes — broad category | Narrow: covered only where it falls under employment (Section 7(e)) or specified purpose (Section 7(a)) |
|
|
50
|
+
| Flexibility | High — large class of processing can be justified on legitimate interests | Low — any processing not fitting 8 categories requires consent |
|
|
51
|
+
|
|
52
|
+
**Implication:** GDPR practitioners who rely on **legitimate interests** for analytics, fraud prevention, marketing to existing customers, or B2B data processing must map these use cases to either **consent** or one of the 8 Section 7 categories under the DPDPA. Most commercial analytics, profiling, and B2C marketing will require explicit consent.
|
|
53
|
+
|
|
54
|
+
---
|
|
55
|
+
|
|
56
|
+
### 3. Consent: "Unconditional" vs. "Freely Given"
|
|
57
|
+
|
|
58
|
+
| Dimension | GDPR | DPDPA |
|
|
59
|
+
|-----------|------|-------|
|
|
60
|
+
| Consent standard | Freely given, specific, informed, unambiguous | Free, specific, informed, **unconditional**, unambiguous |
|
|
61
|
+
| Bundled consent | Problematic under GDPR but not explicitly banned | **Explicitly prohibited** — consent cannot be bundled with service provision |
|
|
62
|
+
| Conditional processing | Possible via other lawful bases (contract, legitimate interests) | If service cannot be provided without consent, consent validity is questionable |
|
|
63
|
+
| Mechanism | Clear affirmative action (no pre-ticked boxes) | Same: clear affirmative action |
|
|
64
|
+
|
|
65
|
+
**Implication:** The DPDPA's addition of "unconditional" and explicit bundling prohibition is stricter than GDPR in practice. An "accept our privacy policy to use this app" mechanism is more clearly unlawful under DPDPA than under GDPR (where it might survive if the processing is genuinely necessary for the contract).
|
|
66
|
+
|
|
67
|
+
---
|
|
68
|
+
|
|
69
|
+
### 4. Cross-Border Data Transfers: Blacklist vs. Whitelist
|
|
70
|
+
|
|
71
|
+
| Dimension | GDPR | DPDPA |
|
|
72
|
+
|-----------|------|-------|
|
|
73
|
+
| Default position | **Restrictive** — transfers only to countries with adequacy or via SCCs, BCRs, etc. | **Permissive** — transfers allowed to all countries except notified restricted ones |
|
|
74
|
+
| Transfer mechanism required | Adequacy decision, SCCs, BCRs, binding corporate rules, derogations | **None required** — no adequacy assessment, no SCC-equivalent |
|
|
75
|
+
| Current restricted list | EU publishes list of adequate and inadequate countries | **No restricted countries notified** (April 2026) |
|
|
76
|
+
| Contractual documentation | Detailed SCC/BCR documentation required | Contractual safeguards with recipients recommended but not yet specified |
|
|
77
|
+
| Legal certainty | High (established mechanism) | Lower (uncertainty until blacklist notifications) |
|
|
78
|
+
|
|
79
|
+
**Implication:** For organisations currently applying GDPR SCCs, DPDPA does not require equivalent mechanisms. However, the lack of formal restrictions does not mean absence of accountability. Future notifications could restrict transfers, and organisations should maintain data flow maps and basic contractual protections.
|
|
80
|
+
|
|
81
|
+
---
|
|
82
|
+
|
|
83
|
+
### 5. Right to Erasure: Narrower vs. Broader
|
|
84
|
+
|
|
85
|
+
| Dimension | GDPR Art. 17 | DPDPA Section 12(3) |
|
|
86
|
+
|-----------|-------------|---------------------|
|
|
87
|
+
| Trigger grounds | Data no longer necessary; consent withdrawn; objection; unlawful processing; child consent; legal obligation | Data **no longer necessary for the specified purpose** |
|
|
88
|
+
| Right against profiling | Yes — right to erasure when objecting to profiling | No equivalent right to object to profiling |
|
|
89
|
+
| Historical/archival data | Specific exemptions for public interest archiving | Research/archiving exemption (Section 17(f)) |
|
|
90
|
+
| Children's "fading memory" | Enhanced right for minors' data posted online | Not explicitly addressed |
|
|
91
|
+
|
|
92
|
+
**Implication:** DPDPA's erasure right is narrower and more formulaic. The primary trigger is purpose fulfilment. Organisations can retain data lawfully so long as the specified purpose persists and retention is legally required or operationally necessary.
|
|
93
|
+
|
|
94
|
+
---
|
|
95
|
+
|
|
96
|
+
### 6. Data Protection Officer: SDFs Only vs. Broad Requirement
|
|
97
|
+
|
|
98
|
+
| Dimension | GDPR | DPDPA |
|
|
99
|
+
|-----------|------|-------|
|
|
100
|
+
| Mandatory for | Public authorities + large-scale systematic monitoring + large-scale special category processing | **Significant Data Fiduciaries only** (government-designated) |
|
|
101
|
+
| Location requirement | No mandatory location requirement | Must be **resident in India** |
|
|
102
|
+
| Role | Advisory; must report to highest management; protected from dismissal for role performance | Sole representative before Board; Data Principal grievance contact |
|
|
103
|
+
| Voluntary DPO | Not prohibited; recommended for smaller processors | Not addressed |
|
|
104
|
+
|
|
105
|
+
**Implication:** Most organisations that were required to appoint a GDPR DPO may NOT be required to appoint one under DPDPA (only if designated as SDF). However, assigning a senior privacy professional in an equivalent role is strongly recommended for compliance governance and Board interaction readiness.
|
|
106
|
+
|
|
107
|
+
---
|
|
108
|
+
|
|
109
|
+
### 7. Children's Data: Stricter Age Threshold and Broader Prohibitions
|
|
110
|
+
|
|
111
|
+
| Dimension | GDPR | DPDPA |
|
|
112
|
+
|-----------|------|-------|
|
|
113
|
+
| Age threshold | **16 years** (default; member states may lower to 13) | **18 years** (uniform; no variation) |
|
|
114
|
+
| Parental consent age range | 13–16 (varies by member state) | **All under 18** require verifiable parental consent |
|
|
115
|
+
| Behavioural monitoring | Permitted with appropriate legal basis | **Prohibited** for all children (Section 9(2)) |
|
|
116
|
+
| Targeted advertising | Permitted with appropriate consent/legal basis | **Prohibited** for all children (Section 9(2)) |
|
|
117
|
+
| Verification mechanism | Not specifically prescribed | Prescribed: DigiLocker, government tokens, existing data (Rule 12) |
|
|
118
|
+
|
|
119
|
+
**Implication:** DPDPA's 18-year threshold is more protective than GDPR's for the 16–17 age band. Organisations operating platforms accessible to teenagers must implement robust age-gate mechanisms in India, even if they have successfully managed GDPR compliance for 16–17 year olds in the EU.
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
123
|
+
### 8. Enforcement Model: Centralised Single Body vs. Decentralised Multi-Authority
|
|
124
|
+
|
|
125
|
+
| Dimension | GDPR | DPDPA |
|
|
126
|
+
|-----------|------|-------|
|
|
127
|
+
| Enforcement bodies | 27+ national DPAs + EDPB coordination | **Single** Data Protection Board of India |
|
|
128
|
+
| Proactive investigation | DPAs can investigate proactively | Board is primarily complaint-driven; no stated proactive investigation power |
|
|
129
|
+
| Guidance authority | DPAs issue binding guidance and opinions | **Board has no guidance-issuing power** — guidance comes from MeitY (non-binding) |
|
|
130
|
+
| One-stop-shop | GDPR one-stop-shop for cross-border processing | Not applicable (single authority) |
|
|
131
|
+
| Max penalty | **€20M or 4% of global annual turnover** | **₹250 crore (~USD 30M)** — fixed amount; no turnover-linked cap |
|
|
132
|
+
| Penalty impact on large companies | Very high (4% of global turnover for large multinationals) | Fixed INR amounts — less severe for large global companies, but not trivial for mid-sized organisations |
|
|
133
|
+
|
|
134
|
+
**Implication:** GDPR penalties are more financially severe for global multinationals (% of turnover). DPDPA fixed-amount penalties are more predictable but may be less deterrent for large tech companies. For Indian SMEs and startups, DPDPA penalties could be existential (₹200–250 crore against a startup). The Board lacks proactive investigation and guidance-issuing powers — a significant structural difference from GDPR DPAs.
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## Common GDPR-to-DPDPA Compliance Gaps
|
|
139
|
+
|
|
140
|
+
| GDPR-compliant practice | DPDPA status | Action needed |
|
|
141
|
+
|------------------------|-------------|---------------|
|
|
142
|
+
| Relies on "legitimate interests" for marketing analytics | **INVALID** — no equivalent basis | Obtain consent or cease processing |
|
|
143
|
+
| Privacy notice in T&Cs | **NON-COMPLIANT** — notice must be standalone, independent (Rule 3) | Separate, redesign notice |
|
|
144
|
+
| DPO based outside India | **NON-COMPLIANT** (for SDFs) | Appoint India-resident DPO if SDF-designated |
|
|
145
|
+
| SCCs for international transfers | **Not required, but not prohibited** | No action required; maintain contractual record |
|
|
146
|
+
| Age threshold 16 years | **NON-COMPLIANT** — DPDPA requires 18 | Implement 18-year age gate in India |
|
|
147
|
+
| Pre-ticked consent boxes | **NON-COMPLIANT** — same standard as GDPR | Remove; implement affirmative opt-in |
|
|
148
|
+
| DPIA for large-scale processing | Only for **SDFs** | Defer unless SDF designation received |
|
|
149
|
+
| Consent withdrawal by email | **LIKELY NON-COMPLIANT** — must be as easy as giving consent | Implement one-click/in-app withdrawal |
|
|
150
|
+
| Data processing agreements with vendors | Required (Rule 16) — similar to GDPR Art. 28 | Update contracts with DPDPA-specific terms |
|
|
151
|
+
| Annual data audit | Only for **SDFs** | Defer unless SDF designation received |
|
|
152
|
+
|
|
153
|
+
---
|
|
154
|
+
|
|
155
|
+
## Rights Comparison
|
|
156
|
+
|
|
157
|
+
| Right | GDPR | DPDPA Section | Notes |
|
|
158
|
+
|-------|------|--------------|-------|
|
|
159
|
+
| Right of access | Art. 15 — detailed portability and access rights | Section 11 | DPDPA access right is narrower; no explicit portability right (data portability absent) |
|
|
160
|
+
| Right to rectification | Art. 16 | Section 12(1) | Equivalent |
|
|
161
|
+
| Right to erasure | Art. 17 | Section 12(3) | DPDPA narrower — purpose fulfilment only; no objection-based erasure |
|
|
162
|
+
| Right to restrict processing | Art. 18 | **No equivalent** | Not provided under DPDPA |
|
|
163
|
+
| Right to data portability | Art. 20 | **No equivalent** | Not provided under DPDPA |
|
|
164
|
+
| Right to object | Art. 21 | **No equivalent** | Not provided under DPDPA (limited: Data Principal may object to Section 7(a) processing — voluntary data provided for a purpose — per Section 7(a) qualifier "unless specifically objected") |
|
|
165
|
+
| Rights in automated decision-making | Art. 22 | **No equivalent** | Not provided under DPDPA |
|
|
166
|
+
| Right to grievance redressal | Not explicit (complaint to DPA available) | Section 13 — explicit | Mandatory grievance mechanism at Fiduciary level; Board as escalation |
|
|
167
|
+
| Right to nominate | **No equivalent** | Section 14 | Unique to DPDPA |
|
|
168
|
+
|
|
169
|
+
**Key absences from DPDPA vs. GDPR:**
|
|
170
|
+
- No right to data portability
|
|
171
|
+
- No right to restrict processing
|
|
172
|
+
- No right to object to processing generally
|
|
173
|
+
- No rights against automated decision-making and profiling
|