bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,599 @@
|
|
|
1
|
+
# DPDP Rules, 2025 — Rule-by-Rule Reference
|
|
2
|
+
|
|
3
|
+
Digital Personal Data Protection Rules, 2025. Notified: 13 November 2025.
|
|
4
|
+
Effective date: 13 May 2027 (18-month transition). 23 Rules total.
|
|
5
|
+
|
|
6
|
+
Published by the Ministry of Electronics and Information Technology (MeitY) under
|
|
7
|
+
Section 35 of the Digital Personal Data Protection Act, 2023.
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## Overview: Rules Structure
|
|
12
|
+
|
|
13
|
+
| Chapter | Rules | Subject Matter |
|
|
14
|
+
|---------|-------|---------------|
|
|
15
|
+
| Chapter I | Rules 1–2 | Preliminary (title, definitions) |
|
|
16
|
+
| Chapter II | Rules 3–5 | Notice and consent |
|
|
17
|
+
| Chapter III | Rule 6 | Personal data breach notification |
|
|
18
|
+
| Chapter IV | Rule 7 | Security safeguards |
|
|
19
|
+
| Chapter V | Rules 8–9 | Data retention and erasure |
|
|
20
|
+
| Chapter VI | Rules 10–12 | Children's personal data |
|
|
21
|
+
| Chapter VII | Rules 13–15 | Significant Data Fiduciary obligations |
|
|
22
|
+
| Chapter VIII | Rules 16–18 | Data processing agreements |
|
|
23
|
+
| Chapter IX | Rules 19–21 | Data Protection Board procedure |
|
|
24
|
+
| Chapter X | Rules 22–23 | Miscellaneous |
|
|
25
|
+
|
|
26
|
+
---
|
|
27
|
+
|
|
28
|
+
## Rule 1 — Short Title and Commencement
|
|
29
|
+
|
|
30
|
+
**Rule 1(1):** These Rules are called the Digital Personal Data Protection Rules, 2025.
|
|
31
|
+
|
|
32
|
+
**Rule 1(2):** Coming into force on the date of publication in the Official Gazette (13 November 2025). Full compliance obligations under the Rules apply from 13 May 2027 (18-month transition, confirmed at commencement).
|
|
33
|
+
|
|
34
|
+
> **Practical note:** The 18-month transition period runs from 13 November 2025. During transition, organisations should treat the Rules as operative for planning and system design — implementing compliance programmes so they are ready by 13 May 2027. Delay risks are significant given system changes required (notice redesign, consent infrastructure, age-gate systems for children's data, breach notification pipelines).
|
|
35
|
+
|
|
36
|
+
---
|
|
37
|
+
|
|
38
|
+
## Rule 2 — Definitions
|
|
39
|
+
|
|
40
|
+
Incorporates definitions from the Act (Section 2) with supplementary procedural definitions:
|
|
41
|
+
|
|
42
|
+
| Term | Definition |
|
|
43
|
+
|------|-----------|
|
|
44
|
+
| **Consent record** | Documented evidence of valid consent including timestamp, mechanism, notice version presented, and the specific purpose consented to |
|
|
45
|
+
| **Data Auditor** | A qualified independent auditor registered with the Board for the purpose of conducting SDF data audits under Rule 14 |
|
|
46
|
+
| **Digital footprint** | The set of persistent identifiers, behavioural traces, and inferred attributes associated with a Data Principal arising from digital interactions |
|
|
47
|
+
| **Prescribed period** | The period specified in the relevant Rule or Schedule for fulfilling a specific obligation |
|
|
48
|
+
|
|
49
|
+
---
|
|
50
|
+
|
|
51
|
+
## Rule 3 — Notice to Data Principal
|
|
52
|
+
|
|
53
|
+
**Source authority:** Section 5 of the Act.
|
|
54
|
+
|
|
55
|
+
### Rule 3(1) — Content Requirements
|
|
56
|
+
|
|
57
|
+
The notice must contain all of the following:
|
|
58
|
+
|
|
59
|
+
1. **Identity and contact details** of the Data Fiduciary — full legal name, registered address, email or web contact
|
|
60
|
+
2. **Categories of personal data** sought to be collected — described in plain, non-technical language
|
|
61
|
+
3. **Specified purpose** — each purpose stated separately; generic purposes ("business operations") are insufficient
|
|
62
|
+
4. **Processing activities** — brief description of how the data will be used for each stated purpose
|
|
63
|
+
5. **Recipients** — categories of Processors and other Data Fiduciaries who will receive the data; identify by category if not by name
|
|
64
|
+
6. **Retention period** — either a fixed period or the criteria for determining retention (e.g., "until withdrawal of consent" or "for the period required by law + 3 years")
|
|
65
|
+
7. **Data Principal rights** — summary of rights under Sections 11, 12, 13, and 14; how to exercise each
|
|
66
|
+
8. **Complaint mechanism** — steps to submit a grievance to the Data Fiduciary; Board complaint escalation pathway
|
|
67
|
+
9. **Withdrawal procedure** — how to withdraw consent; the mechanism; what happens to data and processing after withdrawal
|
|
68
|
+
|
|
69
|
+
### Rule 3(2) — Format Requirements
|
|
70
|
+
|
|
71
|
+
- Plain language — assessed against comprehension by an average literate adult, not a legal professional
|
|
72
|
+
- Standalone document — independent of T&Cs, product descriptions, or service agreements
|
|
73
|
+
- Retrievable at any time — permanently accessible via platform or website even after consent is given or service is engaged
|
|
74
|
+
- Must not be more complex than necessary — a notice that requires a legal degree to comprehend fails the plain language test
|
|
75
|
+
|
|
76
|
+
### Rule 3(3) — Language
|
|
77
|
+
|
|
78
|
+
- Notice must be provided in English by default
|
|
79
|
+
- On request by the Data Principal, the Data Fiduciary must provide the notice in the language the Data Principal requests, **provided that language is in the Eighth Schedule of the Constitution of India**
|
|
80
|
+
- The Eighth Schedule contains 22 scheduled languages including Hindi, Bengali, Tamil, Telugu, Kannada, Malayalam, Gujarati, Marathi, Punjabi, Urdu, and others
|
|
81
|
+
|
|
82
|
+
**Practical implication:** Organisations with Indian user bases should plan for multi-language notice delivery, particularly for consumer-facing applications where the user base spans multiple linguistic regions.
|
|
83
|
+
|
|
84
|
+
### Rule 3(4) — Existing Data Notices
|
|
85
|
+
|
|
86
|
+
Data Fiduciaries processing data collected before commencement must issue a Rule 3(1)-compliant notice within the **prescribed period** after the Act comes into force. The specific period is to be notified by MeitY; monitor the Official Gazette. Do not rely on any specific number of months until confirmed by notification.
|
|
87
|
+
|
|
88
|
+
> **Note:** Section 5(2) of the Act uses the term "prescribed period" without specifying a duration. The period is set in the Rules (or a schedule thereto) and has not been publicly confirmed as of April 2026. Advise clients to treat the existing-data notice obligation as active from 13 May 2027 at the latest, and ideally begin notice issuance well before that deadline.
|
|
89
|
+
|
|
90
|
+
---
|
|
91
|
+
|
|
92
|
+
## Rule 4 — Consent
|
|
93
|
+
|
|
94
|
+
**Source authority:** Section 6 of the Act.
|
|
95
|
+
|
|
96
|
+
### Rule 4(1) — Consent Mechanism
|
|
97
|
+
|
|
98
|
+
Consent must be obtained through a clear affirmative action:
|
|
99
|
+
- Digital: button click, checkbox activation, explicit tap — all accompanied by a statement describing the purpose
|
|
100
|
+
- Written: signed statement for non-digital or paper-based interactions
|
|
101
|
+
- **Not acceptable:** Pre-filled checkboxes, silence, continued use of a service, inaction
|
|
102
|
+
|
|
103
|
+
### Rule 4(2) — Granularity
|
|
104
|
+
|
|
105
|
+
- Separate consent must be obtained for each distinct purpose
|
|
106
|
+
- Bundling consent for multiple purposes into a single action is permitted **only where purposes are genuinely interdependent** — the burden of demonstrating interdependence lies on the Fiduciary
|
|
107
|
+
- Consent for optional or additional features must be obtained separately from consent for core service functionality
|
|
108
|
+
|
|
109
|
+
### Rule 4(3) — Consent Records
|
|
110
|
+
|
|
111
|
+
Data Fiduciaries must maintain consent records containing:
|
|
112
|
+
- Data Principal identifier (sufficient to link to the individual's account/record)
|
|
113
|
+
- Timestamp of consent
|
|
114
|
+
- Notice version presented at time of consent (version ID or hash)
|
|
115
|
+
- Mechanism through which consent was given (button click, signed form, etc.)
|
|
116
|
+
- Specific purpose(s) consented to
|
|
117
|
+
- Withdrawal timestamp and mechanism (when applicable)
|
|
118
|
+
|
|
119
|
+
Consent records must be retained for the duration of the processing engagement and for the prescribed period thereafter.
|
|
120
|
+
|
|
121
|
+
### Rule 4(4) — Withdrawal Mechanism
|
|
122
|
+
|
|
123
|
+
- Digital withdrawal must be achievable in **no more steps than consent was given**
|
|
124
|
+
- If consent was given by a single button click, withdrawal must be achievable by a single equivalent action (e.g., toggle off, single-click revoke)
|
|
125
|
+
- Withdrawal mechanism must be clearly visible and accessible — not hidden in account settings deep navigation
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## Rule 5 — Consent Managers
|
|
130
|
+
|
|
131
|
+
**Source authority:** Section 6(3) of the Act.
|
|
132
|
+
|
|
133
|
+
### Rule 5(1) — Registration
|
|
134
|
+
|
|
135
|
+
Consent Managers must be registered with the Data Protection Board before operating.
|
|
136
|
+
|
|
137
|
+
**Eligibility:**
|
|
138
|
+
- Body corporate incorporated in India
|
|
139
|
+
- Net worth requirements: minimum ₹[prescribed amount] — verify against gazette notification
|
|
140
|
+
- No conflicts of interest between the Consent Manager and Data Fiduciaries on its platform
|
|
141
|
+
|
|
142
|
+
### Rule 5(2) — Technical Requirements
|
|
143
|
+
|
|
144
|
+
Consent Managers must implement:
|
|
145
|
+
- Interoperable technical standards for consent record exchange with Data Fiduciaries
|
|
146
|
+
- Secure authentication mechanisms for Data Principals accessing the platform
|
|
147
|
+
- Audit trails for all consent actions (give, modify, withdraw) with timestamps
|
|
148
|
+
|
|
149
|
+
### Rule 5(3) — Data Principal Interface
|
|
150
|
+
|
|
151
|
+
Consent Managers must provide Data Principals with:
|
|
152
|
+
- A consolidated view of all consents given across Data Fiduciaries on the platform
|
|
153
|
+
- Ability to give, review, modify, and withdraw individual consents from a single interface
|
|
154
|
+
- Notifications when Data Fiduciaries process data pursuant to existing consents
|
|
155
|
+
|
|
156
|
+
### Rule 5(4) — Liability
|
|
157
|
+
|
|
158
|
+
- Consent Managers are liable for inaccurate consent records resulting from their platform errors
|
|
159
|
+
- Data Fiduciaries retain primary liability to Data Principals for processing — engaging a Consent Manager does not transfer liability
|
|
160
|
+
- Consent Managers must carry appropriate professional indemnity insurance
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## Rule 6 — Personal Data Breach Notification
|
|
165
|
+
|
|
166
|
+
**Source authority:** Section 8(6) of the Act.
|
|
167
|
+
|
|
168
|
+
### Rule 6(1) — Notification to Board
|
|
169
|
+
|
|
170
|
+
**Timeline:** Within **72 hours** of the Data Fiduciary becoming aware of a breach.
|
|
171
|
+
|
|
172
|
+
**Form:** Notification submitted via the Board's prescribed digital portal (Board portal to be established and notified).
|
|
173
|
+
|
|
174
|
+
**Content of initial notification:**
|
|
175
|
+
|
|
176
|
+
| Field | Required Content |
|
|
177
|
+
|-------|----------------|
|
|
178
|
+
| Fiduciary identity | Full legal name, registration details, DPO/responsible officer contact |
|
|
179
|
+
| Nature of breach | Type of incident: ransomware, insider leak, misconfiguration, third-party compromise, etc. |
|
|
180
|
+
| Data categories affected | Categories of personal data involved (not necessarily exhaustive list) |
|
|
181
|
+
| Approximate volume | Estimated number of records and Data Principals affected |
|
|
182
|
+
| Detection timeline | When breach was detected and how |
|
|
183
|
+
| Immediate measures | Containment actions taken at time of notification |
|
|
184
|
+
| Likely consequences | Reasonably foreseeable harm to affected Data Principals |
|
|
185
|
+
| Investigation status | Whether investigation is ongoing and expected completion |
|
|
186
|
+
|
|
187
|
+
### Rule 6(2) — Supplementary Notification
|
|
188
|
+
|
|
189
|
+
Where the initial notification is incomplete due to ongoing investigation, the Fiduciary must submit supplementary notifications as further information becomes available.
|
|
190
|
+
|
|
191
|
+
**Board direction:** The Board may direct the Fiduciary to provide specific additional information within a specified period.
|
|
192
|
+
|
|
193
|
+
### Rule 6(3) — Data Principal Notification
|
|
194
|
+
|
|
195
|
+
The Board may direct the Fiduciary to notify affected Data Principals. Board-directed notification must:
|
|
196
|
+
- Describe the breach in terms accessible to the average Data Principal
|
|
197
|
+
- State what personal data was affected
|
|
198
|
+
- State what action the Data Principal should consider taking (e.g., change passwords, monitor financial accounts)
|
|
199
|
+
- Provide a dedicated contact point for affected Data Principal queries
|
|
200
|
+
|
|
201
|
+
### Rule 6(4) — Processor Breach Notification
|
|
202
|
+
|
|
203
|
+
Data Processors must notify the Data Fiduciary **promptly** (within 24 hours — to allow Fiduciary to meet the 72-hour Board notification deadline) upon detecting or becoming aware of a breach affecting data processed on the Fiduciary's behalf.
|
|
204
|
+
|
|
205
|
+
### Rule 6(5) — Recordkeeping
|
|
206
|
+
|
|
207
|
+
Fiduciaries must maintain records of all breaches (including near-misses) for a minimum of 3 years, available for Board inspection.
|
|
208
|
+
|
|
209
|
+
---
|
|
210
|
+
|
|
211
|
+
## Rule 7 — Security Safeguards
|
|
212
|
+
|
|
213
|
+
**Source authority:** Section 8(3) of the Act.
|
|
214
|
+
|
|
215
|
+
### Rule 7(1) — Technical Safeguards
|
|
216
|
+
|
|
217
|
+
Data Fiduciaries must implement:
|
|
218
|
+
|
|
219
|
+
| Safeguard | Specification |
|
|
220
|
+
|-----------|--------------|
|
|
221
|
+
| **Encryption in transit** | TLS 1.2 minimum for all personal data transmission; TLS 1.3 recommended |
|
|
222
|
+
| **Encryption at rest** | AES-256 or equivalent for stored personal data |
|
|
223
|
+
| **Access control** | Role-based access control (RBAC); principle of least privilege; privileged access management for administrative accounts |
|
|
224
|
+
| **Access logging** | Immutable logs of all access to personal data: user, timestamp, data accessed, action performed |
|
|
225
|
+
| **Log retention** | Access logs retained for minimum 2 years |
|
|
226
|
+
| **Pseudonymisation** | Applied where technically feasible and operationally consistent with processing purpose |
|
|
227
|
+
| **Vulnerability management** | Regular vulnerability assessments (at minimum annual penetration testing; quarterly scans for SDFs) |
|
|
228
|
+
| **Patch management** | Critical security patches applied within prescribed timelines (30 days for critical CVEs) |
|
|
229
|
+
|
|
230
|
+
### Rule 7(2) — Organisational Safeguards
|
|
231
|
+
|
|
232
|
+
| Safeguard | Specification |
|
|
233
|
+
|-----------|--------------|
|
|
234
|
+
| **Privacy by Design** | Personal data protection considered at system design stage, not as afterthought |
|
|
235
|
+
| **Data minimisation** | Collect only what is necessary for the specified purpose; delete or anonymise when no longer needed |
|
|
236
|
+
| **Staff training** | All staff with access to personal data trained on DPDPA obligations annually |
|
|
237
|
+
| **Vendor management** | All Data Processors bound by Rule 7-equivalent obligations in contract |
|
|
238
|
+
| **Incident response plan** | Documented and tested breach response plan including Rule 6 notification workflow |
|
|
239
|
+
| **Internal audit** | Annual internal review of security safeguard adequacy |
|
|
240
|
+
|
|
241
|
+
### Rule 7(3) — Risk-Proportionate Safeguards
|
|
242
|
+
|
|
243
|
+
Safeguards must be proportionate to:
|
|
244
|
+
- Volume of personal data processed
|
|
245
|
+
- Sensitivity of personal data categories
|
|
246
|
+
- Potential harm to Data Principals from a breach
|
|
247
|
+
- Technical and financial capacity of the Data Fiduciary
|
|
248
|
+
|
|
249
|
+
**Note for small organisations:** The proportionality principle permits smaller organisations to implement safeguards commensurate with their scale — but this is not a relaxation of the encryption and access control baseline requirements. These apply regardless of size.
|
|
250
|
+
|
|
251
|
+
---
|
|
252
|
+
|
|
253
|
+
## Rule 8 — Retention Period
|
|
254
|
+
|
|
255
|
+
**Source authority:** Section 8(7) of the Act.
|
|
256
|
+
|
|
257
|
+
### Rule 8(1) — Default Retention Standard
|
|
258
|
+
|
|
259
|
+
Personal data must be erased when:
|
|
260
|
+
1. The specified purpose for which it was collected is fulfilled
|
|
261
|
+
2. Consent is withdrawn and no other lawful basis applies
|
|
262
|
+
3. The Data Principal exercises the Section 12(3) erasure right and no refusal ground applies
|
|
263
|
+
|
|
264
|
+
### Rule 8(2) — Retention Schedule
|
|
265
|
+
|
|
266
|
+
Data Fiduciaries must maintain a documented data retention schedule covering:
|
|
267
|
+
- Each category of personal data processed
|
|
268
|
+
- The retention period or retention criteria for each category
|
|
269
|
+
- The lawful basis for retention beyond purpose fulfilment (statutory requirement, legal claims, etc.)
|
|
270
|
+
- The deletion method and timeline upon reaching retention limit
|
|
271
|
+
|
|
272
|
+
### Rule 8(3) — Periodic Purge Review
|
|
273
|
+
|
|
274
|
+
Data Fiduciaries must conduct periodic reviews (at minimum annually) of data holdings to identify and erase data that has exceeded its retention period.
|
|
275
|
+
|
|
276
|
+
---
|
|
277
|
+
|
|
278
|
+
## Rule 9 — Erasure by Processor
|
|
279
|
+
|
|
280
|
+
**Source authority:** Section 8(7) of the Act.
|
|
281
|
+
|
|
282
|
+
Data Processors must:
|
|
283
|
+
1. Erase all personal data received from the Data Fiduciary upon termination of the processing engagement
|
|
284
|
+
2. Confirm erasure in writing within the prescribed period
|
|
285
|
+
3. Ensure that all sub-processors also erase the data and provide equivalent confirmations
|
|
286
|
+
4. Maintain records of erasure for 2 years after the engagement
|
|
287
|
+
|
|
288
|
+
---
|
|
289
|
+
|
|
290
|
+
## Rule 10 — Processing of Children's Personal Data: Standards
|
|
291
|
+
|
|
292
|
+
**Source authority:** Section 9 of the Act.
|
|
293
|
+
|
|
294
|
+
### Rule 10(1) — Age Verification
|
|
295
|
+
|
|
296
|
+
Before collecting any personal data from a Data Principal who may be a child (under 18), Data Fiduciaries must:
|
|
297
|
+
1. Implement an age-determination mechanism at the point of data collection
|
|
298
|
+
2. Where the mechanism indicates the Data Principal is under 18, collect verifiable parental consent (Rule 12) before proceeding
|
|
299
|
+
3. Not collect any personal data beyond what is necessary to conduct the age-check and parental consent verification
|
|
300
|
+
|
|
301
|
+
### Rule 10(2) — Prohibited Data Processing
|
|
302
|
+
|
|
303
|
+
The following are absolutely prohibited for children (no consent can validate these):
|
|
304
|
+
1. Tracking of geolocation data
|
|
305
|
+
2. Persistent identifiers that track activity across sessions or platforms
|
|
306
|
+
3. Behavioural analytics that build individual profiles of the child
|
|
307
|
+
4. Targeting of any advertisement based on the child's personal data or inferred characteristics
|
|
308
|
+
5. Collection of sensitive personal data beyond what is strictly necessary for the service (health data, biometric data, etc.) without specific Board approval
|
|
309
|
+
|
|
310
|
+
### Rule 10(3) — Age-Appropriate Design
|
|
311
|
+
|
|
312
|
+
Data Fiduciaries operating services accessible to children must implement:
|
|
313
|
+
- Privacy-by-default settings that offer the highest level of protection without any action by the child or parent
|
|
314
|
+
- Simplified notice for children — language comprehensible to a child of the expected age range
|
|
315
|
+
- Prohibition on features that could expose children to harm or exploitation
|
|
316
|
+
|
|
317
|
+
### Rule 10(4) — Exemptions
|
|
318
|
+
|
|
319
|
+
Where the Central Government has issued a notification under Section 9(3) exempting certain Data Fiduciaries (educational institutions, health providers, safety apps, etc.) from specific Section 9(1) requirements, the exemption applies only to the extent specified. Exemptions must be narrowly construed — where doubt exists, apply the full Section 9 standard.
|
|
320
|
+
|
|
321
|
+
---
|
|
322
|
+
|
|
323
|
+
## Rule 11 — Consent Manager for Children
|
|
324
|
+
|
|
325
|
+
Where parental consent is given through a Consent Manager, the Consent Manager must verify that:
|
|
326
|
+
1. The consenting individual is the parent or lawful guardian of the child
|
|
327
|
+
2. The consenting individual is 18 years of age or older
|
|
328
|
+
3. The verification is recorded in a manner that can be audited
|
|
329
|
+
|
|
330
|
+
---
|
|
331
|
+
|
|
332
|
+
## Rule 12 — Verifiable Parental Consent Mechanisms
|
|
333
|
+
|
|
334
|
+
**Source authority:** Section 9(1) of the Act.
|
|
335
|
+
|
|
336
|
+
**Approved verification methods:**
|
|
337
|
+
|
|
338
|
+
### Method 1: DigiLocker Authentication
|
|
339
|
+
- Parent/guardian authenticates via DigiLocker using a government-issued ID (Aadhaar, PAN, passport, etc.)
|
|
340
|
+
- Authentication confirms: (a) identity of the adult; (b) their relationship to the child (where linked records exist)
|
|
341
|
+
- Data Fiduciary receives a confirmation token — not the underlying ID document
|
|
342
|
+
|
|
343
|
+
### Method 2: Government-Issued Token
|
|
344
|
+
- Any digital token prescribed by the Central Government as a verified identity credential
|
|
345
|
+
- Central Government may notify additional acceptable tokens over time — monitor MeitY updates
|
|
346
|
+
|
|
347
|
+
### Method 3: Existing Verified Relationship
|
|
348
|
+
- Where the Data Fiduciary has already conducted KYC or equivalent identity verification for the parent/guardian in a prior relationship
|
|
349
|
+
- The Fiduciary must confirm: (a) that the prior verification is still current and valid; (b) that the person consenting is the same individual whose identity was verified
|
|
350
|
+
- Cannot be used if the prior verification is more than [prescribed period] old or if the Fiduciary has any reason to doubt the relationship
|
|
351
|
+
|
|
352
|
+
### Method 4: Virtual Token (anonymised)
|
|
353
|
+
- Token issued by a MeitY-registered entity that provides an anonymised confirmation of: (a) adult age; (b) parental relationship
|
|
354
|
+
- Token does not expose the parent's identity to the Data Fiduciary — privacy-preserving verification
|
|
355
|
+
- Preferred method for consumer platforms seeking to minimise parental data collection
|
|
356
|
+
|
|
357
|
+
**Data minimisation in verification:**
|
|
358
|
+
The verification process itself must not collect more personal data than necessary to confirm adult age and parental relationship. Retaining a copy of the government ID beyond the verification transaction is not permitted.
|
|
359
|
+
|
|
360
|
+
---
|
|
361
|
+
|
|
362
|
+
## Rule 13 — Significant Data Fiduciary: Additional Obligations
|
|
363
|
+
|
|
364
|
+
**Source authority:** Section 10 of the Act.
|
|
365
|
+
|
|
366
|
+
### Rule 13(1) — SDF Designation Criteria (supplementary to Section 10)
|
|
367
|
+
|
|
368
|
+
In addition to the statutory criteria (Section 10), the Central Government considers:
|
|
369
|
+
|
|
370
|
+
| Factor | Indicators |
|
|
371
|
+
|--------|-----------|
|
|
372
|
+
| Data volume | Processing data of more than [notified threshold] Data Principals |
|
|
373
|
+
| Sensitivity profile | Processing sensitive personal data (financial, health, biometric, geolocation) at scale |
|
|
374
|
+
| Interconnection | Serving as a data intermediary or platform operator for multiple other Data Fiduciaries |
|
|
375
|
+
| Market dominance | Systemic importance as a digital platform or service |
|
|
376
|
+
| Cross-border exposure | Processing data of Indian Data Principals in jurisdictions with weak data protection |
|
|
377
|
+
|
|
378
|
+
### Rule 13(2) — DPO Requirements
|
|
379
|
+
|
|
380
|
+
| Requirement | Standard |
|
|
381
|
+
|-------------|----------|
|
|
382
|
+
| Residency | Must reside in India at all times during tenure |
|
|
383
|
+
| Qualifications | Legal, technical, or compliance background in data protection; specific minimum qualifications to be notified |
|
|
384
|
+
| Independence | Must have functional independence — not subject to instructions from the Fiduciary that would compromise compliance obligations |
|
|
385
|
+
| Access | Must have direct access to the Fiduciary's Board of Directors or equivalent governance body |
|
|
386
|
+
| Resources | Must be provided adequate staff, budget, and systems to perform the role |
|
|
387
|
+
| Terms | Appointment, remuneration, and removal governed by service agreement; removal only for cause |
|
|
388
|
+
|
|
389
|
+
### Rule 13(3) — DPIA Requirements
|
|
390
|
+
|
|
391
|
+
The annual Data Protection Impact Assessment must be conducted by the SDF's internal privacy function (or an external expert engaged for this purpose) and must cover:
|
|
392
|
+
|
|
393
|
+
1. **Processing activity register** — updated catalogue of all processing activities during the year
|
|
394
|
+
2. **Legal basis review** — confirmation that all processing has a valid lawful basis
|
|
395
|
+
3. **Rights exercise analysis** — data on Section 11–14 requests: volume, nature, response rate, resolution rate
|
|
396
|
+
4. **Complaint analysis** — grievances received, root causes identified, remediation actions taken
|
|
397
|
+
5. **Safeguard assessment** — review of whether Rule 7 safeguards remain adequate; gap identification
|
|
398
|
+
6. **Processor compliance** — audit of Data Processor contract compliance; confirmation that Rule 16 obligations are being met
|
|
399
|
+
7. **Children's data compliance** (if applicable) — audit of age verification and prohibition compliance
|
|
400
|
+
8. **New technology assessment** — any new processing technologies, AI systems, or automated decision-making introduced during the year and their data protection implications
|
|
401
|
+
9. **Risk register update** — updated risk assessment with residual risk ratings and treatment plans
|
|
402
|
+
|
|
403
|
+
**Submission:** DPIA report submitted to the Board annually within [prescribed period] of year-end.
|
|
404
|
+
|
|
405
|
+
### Rule 13(4) — Data Audit Requirements
|
|
406
|
+
|
|
407
|
+
**Auditor eligibility:**
|
|
408
|
+
- Registered with the Board's panel of Data Auditors
|
|
409
|
+
- Independent of the SDF and its group companies
|
|
410
|
+
- No conflict of interest with the SDF's business activities
|
|
411
|
+
|
|
412
|
+
**Audit scope:**
|
|
413
|
+
- Full compliance audit against all Act and Rules obligations
|
|
414
|
+
- Review of DPIA quality and completeness
|
|
415
|
+
- Assessment of breach notification history and response adequacy
|
|
416
|
+
- Verification of DPO role and independence
|
|
417
|
+
- Assessment of Data Principal rights request fulfilment
|
|
418
|
+
- Review of Processor agreements and sub-processing chain
|
|
419
|
+
|
|
420
|
+
**Audit report:** Submitted to the Board. The Board publishes a summary register of SDF audits (specific findings remain confidential to the Board).
|
|
421
|
+
|
|
422
|
+
### Rule 13(5) — Data Localisation Implementation
|
|
423
|
+
|
|
424
|
+
Upon Central Government notification of a data localisation requirement:
|
|
425
|
+
- SDFs have [prescribed period] to achieve compliance
|
|
426
|
+
- Must be able to demonstrate that specified data categories are stored only on infrastructure physically located in India
|
|
427
|
+
- Cloud deployments: data residency in Indian availability zones required; no replication to non-Indian regions for notified data categories
|
|
428
|
+
|
|
429
|
+
---
|
|
430
|
+
|
|
431
|
+
## Rule 14 — Data Auditor Registration
|
|
432
|
+
|
|
433
|
+
**Registration with Board:**
|
|
434
|
+
- Applicants must meet minimum qualification and experience criteria
|
|
435
|
+
- Criteria include: professional qualifications in information security, data protection, law, or related fields; minimum years of experience; continuing professional development requirements
|
|
436
|
+
- Registration is valid for [prescribed period]; renewable upon continued compliance with qualification standards
|
|
437
|
+
|
|
438
|
+
**Code of conduct:**
|
|
439
|
+
- Data Auditors are bound by a Board-prescribed code of conduct
|
|
440
|
+
- Must maintain professional independence; must not accept instructions from SDFs on audit scope or findings
|
|
441
|
+
- Must maintain confidentiality of SDF's proprietary information while reporting compliance findings to the Board
|
|
442
|
+
|
|
443
|
+
---
|
|
444
|
+
|
|
445
|
+
## Rule 15 — Consent Manager Registration (Extended)
|
|
446
|
+
|
|
447
|
+
See Rule 5. Additional requirements for Consent Managers registered with the Board:
|
|
448
|
+
|
|
449
|
+
- Annual compliance certification submitted to Board
|
|
450
|
+
- Technical interoperability audit of the consent platform
|
|
451
|
+
- Financial stability certification (maintaining minimum net worth throughout registration period)
|
|
452
|
+
- Incident reporting: any data breach affecting consent records must be reported to the Board within 24 hours
|
|
453
|
+
|
|
454
|
+
---
|
|
455
|
+
|
|
456
|
+
## Rule 16 — Data Processing Agreements
|
|
457
|
+
|
|
458
|
+
**Source authority:** Section 8(1) of the Act.
|
|
459
|
+
|
|
460
|
+
### Rule 16(1) — Mandatory Contract Requirements
|
|
461
|
+
|
|
462
|
+
Written contracts with Data Processors must include:
|
|
463
|
+
|
|
464
|
+
| Clause | Minimum Content |
|
|
465
|
+
|--------|----------------|
|
|
466
|
+
| **Processing instructions** | Processor may only process data strictly in accordance with Fiduciary's written instructions; no independent processing |
|
|
467
|
+
| **Purpose limitation** | Processing restricted to specified purposes in the contract; no secondary use |
|
|
468
|
+
| **Security obligations** | Processor must implement safeguards meeting or exceeding Rule 7 standards |
|
|
469
|
+
| **Sub-processing** | Sub-processors may not be engaged without prior written approval of the Fiduciary; sub-processors must be bound by equivalent contract terms |
|
|
470
|
+
| **Audit rights** | Fiduciary has right to audit Processor's compliance at reasonable notice; Processor must cooperate and provide access |
|
|
471
|
+
| **Assistance obligations** | Processor must assist Fiduciary in fulfilling Data Principal rights requests (access, correction, erasure) where Processor holds the relevant data |
|
|
472
|
+
| **Breach notification** | Processor must notify Fiduciary within 24 hours of detecting any breach; must provide all Rule 6 information available |
|
|
473
|
+
| **Erasure/return on termination** | Processor must erase or return all personal data on termination; must confirm erasure in writing within [prescribed period] |
|
|
474
|
+
| **Confidentiality** | Processor must bind all staff processing data to confidentiality obligations |
|
|
475
|
+
| **Liability** | Parties agree on indemnity arrangements; noting that the Fiduciary remains primarily liable to Data Principals |
|
|
476
|
+
|
|
477
|
+
### Rule 16(2) — Processor Register
|
|
478
|
+
|
|
479
|
+
Data Fiduciaries must maintain a register of all current Data Processors and sub-processors containing:
|
|
480
|
+
- Legal name and contact details
|
|
481
|
+
- Countries where processing takes place
|
|
482
|
+
- Categories of personal data processed
|
|
483
|
+
- Contract execution date and term
|
|
484
|
+
- Data categories subject to cross-border transfer (if any)
|
|
485
|
+
|
|
486
|
+
Register must be available for Board inspection.
|
|
487
|
+
|
|
488
|
+
### Rule 16(3) — Existing Contracts
|
|
489
|
+
|
|
490
|
+
Contracts executed before commencement of the Act must be brought into compliance with Rule 16(1) within [prescribed period] of commencement. Where existing contracts are framework agreements, amendments may be effected by addendum.
|
|
491
|
+
|
|
492
|
+
---
|
|
493
|
+
|
|
494
|
+
## Rule 17 — Board Complaint Procedure
|
|
495
|
+
|
|
496
|
+
### Rule 17(1) — Complaint Prerequisites
|
|
497
|
+
|
|
498
|
+
Before filing a complaint with the Board, the Data Principal must:
|
|
499
|
+
1. Have submitted a grievance to the Data Fiduciary under Section 13
|
|
500
|
+
2. Have waited for the Data Fiduciary's response for at least the prescribed period (or the Fiduciary's response is unsatisfactory)
|
|
501
|
+
|
|
502
|
+
### Rule 17(2) — Complaint Form and Content
|
|
503
|
+
|
|
504
|
+
Board complaints must be submitted via the Board's digital portal and must include:
|
|
505
|
+
- Identity of the complainant (Data Principal)
|
|
506
|
+
- Identity of the respondent (Data Fiduciary)
|
|
507
|
+
- Description of the alleged violation
|
|
508
|
+
- Evidence of prior grievance submission to the Fiduciary and its outcome
|
|
509
|
+
- Relief sought
|
|
510
|
+
|
|
511
|
+
### Rule 17(3) — Confidentiality
|
|
512
|
+
|
|
513
|
+
The Board may conduct proceedings in camera where the data at issue is sensitive. Parties may request confidential treatment of commercially sensitive information.
|
|
514
|
+
|
|
515
|
+
---
|
|
516
|
+
|
|
517
|
+
## Rule 18 — Board Proceedings
|
|
518
|
+
|
|
519
|
+
### Rule 18(1) — Natural Justice
|
|
520
|
+
|
|
521
|
+
Board proceedings must comply with principles of natural justice:
|
|
522
|
+
- Both parties have the right to be heard
|
|
523
|
+
- Right to examine and respond to evidence
|
|
524
|
+
- Impartial adjudication
|
|
525
|
+
|
|
526
|
+
### Rule 18(2) — Evidence and Discovery
|
|
527
|
+
|
|
528
|
+
The Board has power to:
|
|
529
|
+
- Require Data Fiduciaries to produce records, contracts, and consent records
|
|
530
|
+
- Require Data Processors to provide information relevant to proceedings
|
|
531
|
+
- Commission technical assessments by independent experts
|
|
532
|
+
|
|
533
|
+
### Rule 18(3) — Summary Proceedings
|
|
534
|
+
|
|
535
|
+
For complaints below a prescribed threshold (minor violations; small compensation sought), the Board may adopt a summary procedure with shorter timelines and simplified evidence rules.
|
|
536
|
+
|
|
537
|
+
---
|
|
538
|
+
|
|
539
|
+
## Rule 19 — Alternate Dispute Resolution
|
|
540
|
+
|
|
541
|
+
**Source authority:** Section 29 of the Act.
|
|
542
|
+
|
|
543
|
+
Board-facilitated mediation/conciliation:
|
|
544
|
+
- Available at the Board's discretion or on joint request of parties
|
|
545
|
+
- Mediator appointed from Board's panel of qualified mediators
|
|
546
|
+
- Settlement agreements have the force of a Board order
|
|
547
|
+
- ADR proceedings confidential — cannot be used in evidence in subsequent litigation
|
|
548
|
+
|
|
549
|
+
---
|
|
550
|
+
|
|
551
|
+
## Rule 20 — Voluntary Undertaking
|
|
552
|
+
|
|
553
|
+
**Source authority:** Section 30 of the Act.
|
|
554
|
+
|
|
555
|
+
A Data Fiduciary may offer a voluntary undertaking to the Board:
|
|
556
|
+
- Specifying the violation or potential violation
|
|
557
|
+
- Committing to specific remediation actions and timelines
|
|
558
|
+
- Agreeing to monitoring by the Board during remediation
|
|
559
|
+
|
|
560
|
+
Board may accept, modify, or reject the undertaking. If accepted:
|
|
561
|
+
- Breach of undertaking attracts penalty up to ₹50 crore
|
|
562
|
+
- Accepted undertaking does not bar Board from further action if breach occurs
|
|
563
|
+
|
|
564
|
+
---
|
|
565
|
+
|
|
566
|
+
## Rule 21 — Appeal to TDSAT
|
|
567
|
+
|
|
568
|
+
**Source authority:** Section 27 of the Act.
|
|
569
|
+
|
|
570
|
+
- Appeals to TDSAT must be filed within [prescribed period] of the Board's order
|
|
571
|
+
- TDSAT may stay the Board's order pending appeal on application showing prima facie case and balance of convenience
|
|
572
|
+
- TDSAT proceedings governed by TDSAT's own rules of procedure
|
|
573
|
+
|
|
574
|
+
---
|
|
575
|
+
|
|
576
|
+
## Rule 22 — Fees
|
|
577
|
+
|
|
578
|
+
Prescribed fees for Board proceedings, Consent Manager registration, and Data Auditor registration are specified in the Schedule to the Rules. Fees subject to periodic revision by MeitY notification.
|
|
579
|
+
|
|
580
|
+
---
|
|
581
|
+
|
|
582
|
+
## Rule 23 — Protection of Actions Taken in Good Faith
|
|
583
|
+
|
|
584
|
+
Board members, officers, and Data Auditors are not liable for actions taken in good faith in exercise of their functions under the Act and Rules. Good faith is presumed unless shown otherwise.
|
|
585
|
+
|
|
586
|
+
---
|
|
587
|
+
|
|
588
|
+
## Summary: Key Implementation Timelines
|
|
589
|
+
|
|
590
|
+
| Milestone | Date |
|
|
591
|
+
|-----------|------|
|
|
592
|
+
| Rules notified | 13 November 2025 |
|
|
593
|
+
| Full compliance deadline | 13 May 2027 |
|
|
594
|
+
| Existing data notice deadline | Within the **prescribed period** after commencement — specific timeframe to be notified; monitor MeitY gazette |
|
|
595
|
+
| Existing Processor contract update | Within prescribed period of commencement |
|
|
596
|
+
| Board portal operational | To be notified by Board |
|
|
597
|
+
| First SDF designations expected | 2026–2027 (anticipated; not yet issued as of April 2026) |
|
|
598
|
+
|
|
599
|
+
> **Monitoring requirement:** Several provisions reference amounts, timelines, and criteria "to be prescribed" by notification or Schedule. These are published via MeitY's Official Gazette and the Board's website. Organisations should maintain a monitoring programme for these supplementary notifications as they are issued throughout the transition period.
|