bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,599 @@
1
+ # DPDP Rules, 2025 — Rule-by-Rule Reference
2
+
3
+ Digital Personal Data Protection Rules, 2025. Notified: 13 November 2025.
4
+ Effective date: 13 May 2027 (18-month transition). 23 Rules total.
5
+
6
+ Published by the Ministry of Electronics and Information Technology (MeitY) under
7
+ Section 35 of the Digital Personal Data Protection Act, 2023.
8
+
9
+ ---
10
+
11
+ ## Overview: Rules Structure
12
+
13
+ | Chapter | Rules | Subject Matter |
14
+ |---------|-------|---------------|
15
+ | Chapter I | Rules 1–2 | Preliminary (title, definitions) |
16
+ | Chapter II | Rules 3–5 | Notice and consent |
17
+ | Chapter III | Rule 6 | Personal data breach notification |
18
+ | Chapter IV | Rule 7 | Security safeguards |
19
+ | Chapter V | Rules 8–9 | Data retention and erasure |
20
+ | Chapter VI | Rules 10–12 | Children's personal data |
21
+ | Chapter VII | Rules 13–15 | Significant Data Fiduciary obligations |
22
+ | Chapter VIII | Rules 16–18 | Data processing agreements |
23
+ | Chapter IX | Rules 19–21 | Data Protection Board procedure |
24
+ | Chapter X | Rules 22–23 | Miscellaneous |
25
+
26
+ ---
27
+
28
+ ## Rule 1 — Short Title and Commencement
29
+
30
+ **Rule 1(1):** These Rules are called the Digital Personal Data Protection Rules, 2025.
31
+
32
+ **Rule 1(2):** Coming into force on the date of publication in the Official Gazette (13 November 2025). Full compliance obligations under the Rules apply from 13 May 2027 (18-month transition, confirmed at commencement).
33
+
34
+ > **Practical note:** The 18-month transition period runs from 13 November 2025. During transition, organisations should treat the Rules as operative for planning and system design — implementing compliance programmes so they are ready by 13 May 2027. Delay risks are significant given system changes required (notice redesign, consent infrastructure, age-gate systems for children's data, breach notification pipelines).
35
+
36
+ ---
37
+
38
+ ## Rule 2 — Definitions
39
+
40
+ Incorporates definitions from the Act (Section 2) with supplementary procedural definitions:
41
+
42
+ | Term | Definition |
43
+ |------|-----------|
44
+ | **Consent record** | Documented evidence of valid consent including timestamp, mechanism, notice version presented, and the specific purpose consented to |
45
+ | **Data Auditor** | A qualified independent auditor registered with the Board for the purpose of conducting SDF data audits under Rule 14 |
46
+ | **Digital footprint** | The set of persistent identifiers, behavioural traces, and inferred attributes associated with a Data Principal arising from digital interactions |
47
+ | **Prescribed period** | The period specified in the relevant Rule or Schedule for fulfilling a specific obligation |
48
+
49
+ ---
50
+
51
+ ## Rule 3 — Notice to Data Principal
52
+
53
+ **Source authority:** Section 5 of the Act.
54
+
55
+ ### Rule 3(1) — Content Requirements
56
+
57
+ The notice must contain all of the following:
58
+
59
+ 1. **Identity and contact details** of the Data Fiduciary — full legal name, registered address, email or web contact
60
+ 2. **Categories of personal data** sought to be collected — described in plain, non-technical language
61
+ 3. **Specified purpose** — each purpose stated separately; generic purposes ("business operations") are insufficient
62
+ 4. **Processing activities** — brief description of how the data will be used for each stated purpose
63
+ 5. **Recipients** — categories of Processors and other Data Fiduciaries who will receive the data; identify by category if not by name
64
+ 6. **Retention period** — either a fixed period or the criteria for determining retention (e.g., "until withdrawal of consent" or "for the period required by law + 3 years")
65
+ 7. **Data Principal rights** — summary of rights under Sections 11, 12, 13, and 14; how to exercise each
66
+ 8. **Complaint mechanism** — steps to submit a grievance to the Data Fiduciary; Board complaint escalation pathway
67
+ 9. **Withdrawal procedure** — how to withdraw consent; the mechanism; what happens to data and processing after withdrawal
68
+
69
+ ### Rule 3(2) — Format Requirements
70
+
71
+ - Plain language — assessed against comprehension by an average literate adult, not a legal professional
72
+ - Standalone document — independent of T&Cs, product descriptions, or service agreements
73
+ - Retrievable at any time — permanently accessible via platform or website even after consent is given or service is engaged
74
+ - Must not be more complex than necessary — a notice that requires a legal degree to comprehend fails the plain language test
75
+
76
+ ### Rule 3(3) — Language
77
+
78
+ - Notice must be provided in English by default
79
+ - On request by the Data Principal, the Data Fiduciary must provide the notice in the language the Data Principal requests, **provided that language is in the Eighth Schedule of the Constitution of India**
80
+ - The Eighth Schedule contains 22 scheduled languages including Hindi, Bengali, Tamil, Telugu, Kannada, Malayalam, Gujarati, Marathi, Punjabi, Urdu, and others
81
+
82
+ **Practical implication:** Organisations with Indian user bases should plan for multi-language notice delivery, particularly for consumer-facing applications where the user base spans multiple linguistic regions.
83
+
84
+ ### Rule 3(4) — Existing Data Notices
85
+
86
+ Data Fiduciaries processing data collected before commencement must issue a Rule 3(1)-compliant notice within the **prescribed period** after the Act comes into force. The specific period is to be notified by MeitY; monitor the Official Gazette. Do not rely on any specific number of months until confirmed by notification.
87
+
88
+ > **Note:** Section 5(2) of the Act uses the term "prescribed period" without specifying a duration. The period is set in the Rules (or a schedule thereto) and has not been publicly confirmed as of April 2026. Advise clients to treat the existing-data notice obligation as active from 13 May 2027 at the latest, and ideally begin notice issuance well before that deadline.
89
+
90
+ ---
91
+
92
+ ## Rule 4 — Consent
93
+
94
+ **Source authority:** Section 6 of the Act.
95
+
96
+ ### Rule 4(1) — Consent Mechanism
97
+
98
+ Consent must be obtained through a clear affirmative action:
99
+ - Digital: button click, checkbox activation, explicit tap — all accompanied by a statement describing the purpose
100
+ - Written: signed statement for non-digital or paper-based interactions
101
+ - **Not acceptable:** Pre-filled checkboxes, silence, continued use of a service, inaction
102
+
103
+ ### Rule 4(2) — Granularity
104
+
105
+ - Separate consent must be obtained for each distinct purpose
106
+ - Bundling consent for multiple purposes into a single action is permitted **only where purposes are genuinely interdependent** — the burden of demonstrating interdependence lies on the Fiduciary
107
+ - Consent for optional or additional features must be obtained separately from consent for core service functionality
108
+
109
+ ### Rule 4(3) — Consent Records
110
+
111
+ Data Fiduciaries must maintain consent records containing:
112
+ - Data Principal identifier (sufficient to link to the individual's account/record)
113
+ - Timestamp of consent
114
+ - Notice version presented at time of consent (version ID or hash)
115
+ - Mechanism through which consent was given (button click, signed form, etc.)
116
+ - Specific purpose(s) consented to
117
+ - Withdrawal timestamp and mechanism (when applicable)
118
+
119
+ Consent records must be retained for the duration of the processing engagement and for the prescribed period thereafter.
120
+
121
+ ### Rule 4(4) — Withdrawal Mechanism
122
+
123
+ - Digital withdrawal must be achievable in **no more steps than consent was given**
124
+ - If consent was given by a single button click, withdrawal must be achievable by a single equivalent action (e.g., toggle off, single-click revoke)
125
+ - Withdrawal mechanism must be clearly visible and accessible — not hidden in account settings deep navigation
126
+
127
+ ---
128
+
129
+ ## Rule 5 — Consent Managers
130
+
131
+ **Source authority:** Section 6(3) of the Act.
132
+
133
+ ### Rule 5(1) — Registration
134
+
135
+ Consent Managers must be registered with the Data Protection Board before operating.
136
+
137
+ **Eligibility:**
138
+ - Body corporate incorporated in India
139
+ - Net worth requirements: minimum ₹[prescribed amount] — verify against gazette notification
140
+ - No conflicts of interest between the Consent Manager and Data Fiduciaries on its platform
141
+
142
+ ### Rule 5(2) — Technical Requirements
143
+
144
+ Consent Managers must implement:
145
+ - Interoperable technical standards for consent record exchange with Data Fiduciaries
146
+ - Secure authentication mechanisms for Data Principals accessing the platform
147
+ - Audit trails for all consent actions (give, modify, withdraw) with timestamps
148
+
149
+ ### Rule 5(3) — Data Principal Interface
150
+
151
+ Consent Managers must provide Data Principals with:
152
+ - A consolidated view of all consents given across Data Fiduciaries on the platform
153
+ - Ability to give, review, modify, and withdraw individual consents from a single interface
154
+ - Notifications when Data Fiduciaries process data pursuant to existing consents
155
+
156
+ ### Rule 5(4) — Liability
157
+
158
+ - Consent Managers are liable for inaccurate consent records resulting from their platform errors
159
+ - Data Fiduciaries retain primary liability to Data Principals for processing — engaging a Consent Manager does not transfer liability
160
+ - Consent Managers must carry appropriate professional indemnity insurance
161
+
162
+ ---
163
+
164
+ ## Rule 6 — Personal Data Breach Notification
165
+
166
+ **Source authority:** Section 8(6) of the Act.
167
+
168
+ ### Rule 6(1) — Notification to Board
169
+
170
+ **Timeline:** Within **72 hours** of the Data Fiduciary becoming aware of a breach.
171
+
172
+ **Form:** Notification submitted via the Board's prescribed digital portal (Board portal to be established and notified).
173
+
174
+ **Content of initial notification:**
175
+
176
+ | Field | Required Content |
177
+ |-------|----------------|
178
+ | Fiduciary identity | Full legal name, registration details, DPO/responsible officer contact |
179
+ | Nature of breach | Type of incident: ransomware, insider leak, misconfiguration, third-party compromise, etc. |
180
+ | Data categories affected | Categories of personal data involved (not necessarily exhaustive list) |
181
+ | Approximate volume | Estimated number of records and Data Principals affected |
182
+ | Detection timeline | When breach was detected and how |
183
+ | Immediate measures | Containment actions taken at time of notification |
184
+ | Likely consequences | Reasonably foreseeable harm to affected Data Principals |
185
+ | Investigation status | Whether investigation is ongoing and expected completion |
186
+
187
+ ### Rule 6(2) — Supplementary Notification
188
+
189
+ Where the initial notification is incomplete due to ongoing investigation, the Fiduciary must submit supplementary notifications as further information becomes available.
190
+
191
+ **Board direction:** The Board may direct the Fiduciary to provide specific additional information within a specified period.
192
+
193
+ ### Rule 6(3) — Data Principal Notification
194
+
195
+ The Board may direct the Fiduciary to notify affected Data Principals. Board-directed notification must:
196
+ - Describe the breach in terms accessible to the average Data Principal
197
+ - State what personal data was affected
198
+ - State what action the Data Principal should consider taking (e.g., change passwords, monitor financial accounts)
199
+ - Provide a dedicated contact point for affected Data Principal queries
200
+
201
+ ### Rule 6(4) — Processor Breach Notification
202
+
203
+ Data Processors must notify the Data Fiduciary **promptly** (within 24 hours — to allow Fiduciary to meet the 72-hour Board notification deadline) upon detecting or becoming aware of a breach affecting data processed on the Fiduciary's behalf.
204
+
205
+ ### Rule 6(5) — Recordkeeping
206
+
207
+ Fiduciaries must maintain records of all breaches (including near-misses) for a minimum of 3 years, available for Board inspection.
208
+
209
+ ---
210
+
211
+ ## Rule 7 — Security Safeguards
212
+
213
+ **Source authority:** Section 8(3) of the Act.
214
+
215
+ ### Rule 7(1) — Technical Safeguards
216
+
217
+ Data Fiduciaries must implement:
218
+
219
+ | Safeguard | Specification |
220
+ |-----------|--------------|
221
+ | **Encryption in transit** | TLS 1.2 minimum for all personal data transmission; TLS 1.3 recommended |
222
+ | **Encryption at rest** | AES-256 or equivalent for stored personal data |
223
+ | **Access control** | Role-based access control (RBAC); principle of least privilege; privileged access management for administrative accounts |
224
+ | **Access logging** | Immutable logs of all access to personal data: user, timestamp, data accessed, action performed |
225
+ | **Log retention** | Access logs retained for minimum 2 years |
226
+ | **Pseudonymisation** | Applied where technically feasible and operationally consistent with processing purpose |
227
+ | **Vulnerability management** | Regular vulnerability assessments (at minimum annual penetration testing; quarterly scans for SDFs) |
228
+ | **Patch management** | Critical security patches applied within prescribed timelines (30 days for critical CVEs) |
229
+
230
+ ### Rule 7(2) — Organisational Safeguards
231
+
232
+ | Safeguard | Specification |
233
+ |-----------|--------------|
234
+ | **Privacy by Design** | Personal data protection considered at system design stage, not as afterthought |
235
+ | **Data minimisation** | Collect only what is necessary for the specified purpose; delete or anonymise when no longer needed |
236
+ | **Staff training** | All staff with access to personal data trained on DPDPA obligations annually |
237
+ | **Vendor management** | All Data Processors bound by Rule 7-equivalent obligations in contract |
238
+ | **Incident response plan** | Documented and tested breach response plan including Rule 6 notification workflow |
239
+ | **Internal audit** | Annual internal review of security safeguard adequacy |
240
+
241
+ ### Rule 7(3) — Risk-Proportionate Safeguards
242
+
243
+ Safeguards must be proportionate to:
244
+ - Volume of personal data processed
245
+ - Sensitivity of personal data categories
246
+ - Potential harm to Data Principals from a breach
247
+ - Technical and financial capacity of the Data Fiduciary
248
+
249
+ **Note for small organisations:** The proportionality principle permits smaller organisations to implement safeguards commensurate with their scale — but this is not a relaxation of the encryption and access control baseline requirements. These apply regardless of size.
250
+
251
+ ---
252
+
253
+ ## Rule 8 — Retention Period
254
+
255
+ **Source authority:** Section 8(7) of the Act.
256
+
257
+ ### Rule 8(1) — Default Retention Standard
258
+
259
+ Personal data must be erased when:
260
+ 1. The specified purpose for which it was collected is fulfilled
261
+ 2. Consent is withdrawn and no other lawful basis applies
262
+ 3. The Data Principal exercises the Section 12(3) erasure right and no refusal ground applies
263
+
264
+ ### Rule 8(2) — Retention Schedule
265
+
266
+ Data Fiduciaries must maintain a documented data retention schedule covering:
267
+ - Each category of personal data processed
268
+ - The retention period or retention criteria for each category
269
+ - The lawful basis for retention beyond purpose fulfilment (statutory requirement, legal claims, etc.)
270
+ - The deletion method and timeline upon reaching retention limit
271
+
272
+ ### Rule 8(3) — Periodic Purge Review
273
+
274
+ Data Fiduciaries must conduct periodic reviews (at minimum annually) of data holdings to identify and erase data that has exceeded its retention period.
275
+
276
+ ---
277
+
278
+ ## Rule 9 — Erasure by Processor
279
+
280
+ **Source authority:** Section 8(7) of the Act.
281
+
282
+ Data Processors must:
283
+ 1. Erase all personal data received from the Data Fiduciary upon termination of the processing engagement
284
+ 2. Confirm erasure in writing within the prescribed period
285
+ 3. Ensure that all sub-processors also erase the data and provide equivalent confirmations
286
+ 4. Maintain records of erasure for 2 years after the engagement
287
+
288
+ ---
289
+
290
+ ## Rule 10 — Processing of Children's Personal Data: Standards
291
+
292
+ **Source authority:** Section 9 of the Act.
293
+
294
+ ### Rule 10(1) — Age Verification
295
+
296
+ Before collecting any personal data from a Data Principal who may be a child (under 18), Data Fiduciaries must:
297
+ 1. Implement an age-determination mechanism at the point of data collection
298
+ 2. Where the mechanism indicates the Data Principal is under 18, collect verifiable parental consent (Rule 12) before proceeding
299
+ 3. Not collect any personal data beyond what is necessary to conduct the age-check and parental consent verification
300
+
301
+ ### Rule 10(2) — Prohibited Data Processing
302
+
303
+ The following are absolutely prohibited for children (no consent can validate these):
304
+ 1. Tracking of geolocation data
305
+ 2. Persistent identifiers that track activity across sessions or platforms
306
+ 3. Behavioural analytics that build individual profiles of the child
307
+ 4. Targeting of any advertisement based on the child's personal data or inferred characteristics
308
+ 5. Collection of sensitive personal data beyond what is strictly necessary for the service (health data, biometric data, etc.) without specific Board approval
309
+
310
+ ### Rule 10(3) — Age-Appropriate Design
311
+
312
+ Data Fiduciaries operating services accessible to children must implement:
313
+ - Privacy-by-default settings that offer the highest level of protection without any action by the child or parent
314
+ - Simplified notice for children — language comprehensible to a child of the expected age range
315
+ - Prohibition on features that could expose children to harm or exploitation
316
+
317
+ ### Rule 10(4) — Exemptions
318
+
319
+ Where the Central Government has issued a notification under Section 9(3) exempting certain Data Fiduciaries (educational institutions, health providers, safety apps, etc.) from specific Section 9(1) requirements, the exemption applies only to the extent specified. Exemptions must be narrowly construed — where doubt exists, apply the full Section 9 standard.
320
+
321
+ ---
322
+
323
+ ## Rule 11 — Consent Manager for Children
324
+
325
+ Where parental consent is given through a Consent Manager, the Consent Manager must verify that:
326
+ 1. The consenting individual is the parent or lawful guardian of the child
327
+ 2. The consenting individual is 18 years of age or older
328
+ 3. The verification is recorded in a manner that can be audited
329
+
330
+ ---
331
+
332
+ ## Rule 12 — Verifiable Parental Consent Mechanisms
333
+
334
+ **Source authority:** Section 9(1) of the Act.
335
+
336
+ **Approved verification methods:**
337
+
338
+ ### Method 1: DigiLocker Authentication
339
+ - Parent/guardian authenticates via DigiLocker using a government-issued ID (Aadhaar, PAN, passport, etc.)
340
+ - Authentication confirms: (a) identity of the adult; (b) their relationship to the child (where linked records exist)
341
+ - Data Fiduciary receives a confirmation token — not the underlying ID document
342
+
343
+ ### Method 2: Government-Issued Token
344
+ - Any digital token prescribed by the Central Government as a verified identity credential
345
+ - Central Government may notify additional acceptable tokens over time — monitor MeitY updates
346
+
347
+ ### Method 3: Existing Verified Relationship
348
+ - Where the Data Fiduciary has already conducted KYC or equivalent identity verification for the parent/guardian in a prior relationship
349
+ - The Fiduciary must confirm: (a) that the prior verification is still current and valid; (b) that the person consenting is the same individual whose identity was verified
350
+ - Cannot be used if the prior verification is more than [prescribed period] old or if the Fiduciary has any reason to doubt the relationship
351
+
352
+ ### Method 4: Virtual Token (anonymised)
353
+ - Token issued by a MeitY-registered entity that provides an anonymised confirmation of: (a) adult age; (b) parental relationship
354
+ - Token does not expose the parent's identity to the Data Fiduciary — privacy-preserving verification
355
+ - Preferred method for consumer platforms seeking to minimise parental data collection
356
+
357
+ **Data minimisation in verification:**
358
+ The verification process itself must not collect more personal data than necessary to confirm adult age and parental relationship. Retaining a copy of the government ID beyond the verification transaction is not permitted.
359
+
360
+ ---
361
+
362
+ ## Rule 13 — Significant Data Fiduciary: Additional Obligations
363
+
364
+ **Source authority:** Section 10 of the Act.
365
+
366
+ ### Rule 13(1) — SDF Designation Criteria (supplementary to Section 10)
367
+
368
+ In addition to the statutory criteria (Section 10), the Central Government considers:
369
+
370
+ | Factor | Indicators |
371
+ |--------|-----------|
372
+ | Data volume | Processing data of more than [notified threshold] Data Principals |
373
+ | Sensitivity profile | Processing sensitive personal data (financial, health, biometric, geolocation) at scale |
374
+ | Interconnection | Serving as a data intermediary or platform operator for multiple other Data Fiduciaries |
375
+ | Market dominance | Systemic importance as a digital platform or service |
376
+ | Cross-border exposure | Processing data of Indian Data Principals in jurisdictions with weak data protection |
377
+
378
+ ### Rule 13(2) — DPO Requirements
379
+
380
+ | Requirement | Standard |
381
+ |-------------|----------|
382
+ | Residency | Must reside in India at all times during tenure |
383
+ | Qualifications | Legal, technical, or compliance background in data protection; specific minimum qualifications to be notified |
384
+ | Independence | Must have functional independence — not subject to instructions from the Fiduciary that would compromise compliance obligations |
385
+ | Access | Must have direct access to the Fiduciary's Board of Directors or equivalent governance body |
386
+ | Resources | Must be provided adequate staff, budget, and systems to perform the role |
387
+ | Terms | Appointment, remuneration, and removal governed by service agreement; removal only for cause |
388
+
389
+ ### Rule 13(3) — DPIA Requirements
390
+
391
+ The annual Data Protection Impact Assessment must be conducted by the SDF's internal privacy function (or an external expert engaged for this purpose) and must cover:
392
+
393
+ 1. **Processing activity register** — updated catalogue of all processing activities during the year
394
+ 2. **Legal basis review** — confirmation that all processing has a valid lawful basis
395
+ 3. **Rights exercise analysis** — data on Section 11–14 requests: volume, nature, response rate, resolution rate
396
+ 4. **Complaint analysis** — grievances received, root causes identified, remediation actions taken
397
+ 5. **Safeguard assessment** — review of whether Rule 7 safeguards remain adequate; gap identification
398
+ 6. **Processor compliance** — audit of Data Processor contract compliance; confirmation that Rule 16 obligations are being met
399
+ 7. **Children's data compliance** (if applicable) — audit of age verification and prohibition compliance
400
+ 8. **New technology assessment** — any new processing technologies, AI systems, or automated decision-making introduced during the year and their data protection implications
401
+ 9. **Risk register update** — updated risk assessment with residual risk ratings and treatment plans
402
+
403
+ **Submission:** DPIA report submitted to the Board annually within [prescribed period] of year-end.
404
+
405
+ ### Rule 13(4) — Data Audit Requirements
406
+
407
+ **Auditor eligibility:**
408
+ - Registered with the Board's panel of Data Auditors
409
+ - Independent of the SDF and its group companies
410
+ - No conflict of interest with the SDF's business activities
411
+
412
+ **Audit scope:**
413
+ - Full compliance audit against all Act and Rules obligations
414
+ - Review of DPIA quality and completeness
415
+ - Assessment of breach notification history and response adequacy
416
+ - Verification of DPO role and independence
417
+ - Assessment of Data Principal rights request fulfilment
418
+ - Review of Processor agreements and sub-processing chain
419
+
420
+ **Audit report:** Submitted to the Board. The Board publishes a summary register of SDF audits (specific findings remain confidential to the Board).
421
+
422
+ ### Rule 13(5) — Data Localisation Implementation
423
+
424
+ Upon Central Government notification of a data localisation requirement:
425
+ - SDFs have [prescribed period] to achieve compliance
426
+ - Must be able to demonstrate that specified data categories are stored only on infrastructure physically located in India
427
+ - Cloud deployments: data residency in Indian availability zones required; no replication to non-Indian regions for notified data categories
428
+
429
+ ---
430
+
431
+ ## Rule 14 — Data Auditor Registration
432
+
433
+ **Registration with Board:**
434
+ - Applicants must meet minimum qualification and experience criteria
435
+ - Criteria include: professional qualifications in information security, data protection, law, or related fields; minimum years of experience; continuing professional development requirements
436
+ - Registration is valid for [prescribed period]; renewable upon continued compliance with qualification standards
437
+
438
+ **Code of conduct:**
439
+ - Data Auditors are bound by a Board-prescribed code of conduct
440
+ - Must maintain professional independence; must not accept instructions from SDFs on audit scope or findings
441
+ - Must maintain confidentiality of SDF's proprietary information while reporting compliance findings to the Board
442
+
443
+ ---
444
+
445
+ ## Rule 15 — Consent Manager Registration (Extended)
446
+
447
+ See Rule 5. Additional requirements for Consent Managers registered with the Board:
448
+
449
+ - Annual compliance certification submitted to Board
450
+ - Technical interoperability audit of the consent platform
451
+ - Financial stability certification (maintaining minimum net worth throughout registration period)
452
+ - Incident reporting: any data breach affecting consent records must be reported to the Board within 24 hours
453
+
454
+ ---
455
+
456
+ ## Rule 16 — Data Processing Agreements
457
+
458
+ **Source authority:** Section 8(1) of the Act.
459
+
460
+ ### Rule 16(1) — Mandatory Contract Requirements
461
+
462
+ Written contracts with Data Processors must include:
463
+
464
+ | Clause | Minimum Content |
465
+ |--------|----------------|
466
+ | **Processing instructions** | Processor may only process data strictly in accordance with Fiduciary's written instructions; no independent processing |
467
+ | **Purpose limitation** | Processing restricted to specified purposes in the contract; no secondary use |
468
+ | **Security obligations** | Processor must implement safeguards meeting or exceeding Rule 7 standards |
469
+ | **Sub-processing** | Sub-processors may not be engaged without prior written approval of the Fiduciary; sub-processors must be bound by equivalent contract terms |
470
+ | **Audit rights** | Fiduciary has right to audit Processor's compliance at reasonable notice; Processor must cooperate and provide access |
471
+ | **Assistance obligations** | Processor must assist Fiduciary in fulfilling Data Principal rights requests (access, correction, erasure) where Processor holds the relevant data |
472
+ | **Breach notification** | Processor must notify Fiduciary within 24 hours of detecting any breach; must provide all Rule 6 information available |
473
+ | **Erasure/return on termination** | Processor must erase or return all personal data on termination; must confirm erasure in writing within [prescribed period] |
474
+ | **Confidentiality** | Processor must bind all staff processing data to confidentiality obligations |
475
+ | **Liability** | Parties agree on indemnity arrangements; noting that the Fiduciary remains primarily liable to Data Principals |
476
+
477
+ ### Rule 16(2) — Processor Register
478
+
479
+ Data Fiduciaries must maintain a register of all current Data Processors and sub-processors containing:
480
+ - Legal name and contact details
481
+ - Countries where processing takes place
482
+ - Categories of personal data processed
483
+ - Contract execution date and term
484
+ - Data categories subject to cross-border transfer (if any)
485
+
486
+ Register must be available for Board inspection.
487
+
488
+ ### Rule 16(3) — Existing Contracts
489
+
490
+ Contracts executed before commencement of the Act must be brought into compliance with Rule 16(1) within [prescribed period] of commencement. Where existing contracts are framework agreements, amendments may be effected by addendum.
491
+
492
+ ---
493
+
494
+ ## Rule 17 — Board Complaint Procedure
495
+
496
+ ### Rule 17(1) — Complaint Prerequisites
497
+
498
+ Before filing a complaint with the Board, the Data Principal must:
499
+ 1. Have submitted a grievance to the Data Fiduciary under Section 13
500
+ 2. Have waited for the Data Fiduciary's response for at least the prescribed period (or the Fiduciary's response is unsatisfactory)
501
+
502
+ ### Rule 17(2) — Complaint Form and Content
503
+
504
+ Board complaints must be submitted via the Board's digital portal and must include:
505
+ - Identity of the complainant (Data Principal)
506
+ - Identity of the respondent (Data Fiduciary)
507
+ - Description of the alleged violation
508
+ - Evidence of prior grievance submission to the Fiduciary and its outcome
509
+ - Relief sought
510
+
511
+ ### Rule 17(3) — Confidentiality
512
+
513
+ The Board may conduct proceedings in camera where the data at issue is sensitive. Parties may request confidential treatment of commercially sensitive information.
514
+
515
+ ---
516
+
517
+ ## Rule 18 — Board Proceedings
518
+
519
+ ### Rule 18(1) — Natural Justice
520
+
521
+ Board proceedings must comply with principles of natural justice:
522
+ - Both parties have the right to be heard
523
+ - Right to examine and respond to evidence
524
+ - Impartial adjudication
525
+
526
+ ### Rule 18(2) — Evidence and Discovery
527
+
528
+ The Board has power to:
529
+ - Require Data Fiduciaries to produce records, contracts, and consent records
530
+ - Require Data Processors to provide information relevant to proceedings
531
+ - Commission technical assessments by independent experts
532
+
533
+ ### Rule 18(3) — Summary Proceedings
534
+
535
+ For complaints below a prescribed threshold (minor violations; small compensation sought), the Board may adopt a summary procedure with shorter timelines and simplified evidence rules.
536
+
537
+ ---
538
+
539
+ ## Rule 19 — Alternate Dispute Resolution
540
+
541
+ **Source authority:** Section 29 of the Act.
542
+
543
+ Board-facilitated mediation/conciliation:
544
+ - Available at the Board's discretion or on joint request of parties
545
+ - Mediator appointed from Board's panel of qualified mediators
546
+ - Settlement agreements have the force of a Board order
547
+ - ADR proceedings confidential — cannot be used in evidence in subsequent litigation
548
+
549
+ ---
550
+
551
+ ## Rule 20 — Voluntary Undertaking
552
+
553
+ **Source authority:** Section 30 of the Act.
554
+
555
+ A Data Fiduciary may offer a voluntary undertaking to the Board:
556
+ - Specifying the violation or potential violation
557
+ - Committing to specific remediation actions and timelines
558
+ - Agreeing to monitoring by the Board during remediation
559
+
560
+ Board may accept, modify, or reject the undertaking. If accepted:
561
+ - Breach of undertaking attracts penalty up to ₹50 crore
562
+ - Accepted undertaking does not bar Board from further action if breach occurs
563
+
564
+ ---
565
+
566
+ ## Rule 21 — Appeal to TDSAT
567
+
568
+ **Source authority:** Section 27 of the Act.
569
+
570
+ - Appeals to TDSAT must be filed within [prescribed period] of the Board's order
571
+ - TDSAT may stay the Board's order pending appeal on application showing prima facie case and balance of convenience
572
+ - TDSAT proceedings governed by TDSAT's own rules of procedure
573
+
574
+ ---
575
+
576
+ ## Rule 22 — Fees
577
+
578
+ Prescribed fees for Board proceedings, Consent Manager registration, and Data Auditor registration are specified in the Schedule to the Rules. Fees subject to periodic revision by MeitY notification.
579
+
580
+ ---
581
+
582
+ ## Rule 23 — Protection of Actions Taken in Good Faith
583
+
584
+ Board members, officers, and Data Auditors are not liable for actions taken in good faith in exercise of their functions under the Act and Rules. Good faith is presumed unless shown otherwise.
585
+
586
+ ---
587
+
588
+ ## Summary: Key Implementation Timelines
589
+
590
+ | Milestone | Date |
591
+ |-----------|------|
592
+ | Rules notified | 13 November 2025 |
593
+ | Full compliance deadline | 13 May 2027 |
594
+ | Existing data notice deadline | Within the **prescribed period** after commencement — specific timeframe to be notified; monitor MeitY gazette |
595
+ | Existing Processor contract update | Within prescribed period of commencement |
596
+ | Board portal operational | To be notified by Board |
597
+ | First SDF designations expected | 2026–2027 (anticipated; not yet issued as of April 2026) |
598
+
599
+ > **Monitoring requirement:** Several provisions reference amounts, timelines, and criteria "to be prescribed" by notification or Schedule. These are published via MeitY's Official Gazette and the Board's website. Organisations should maintain a monitoring programme for these supplementary notifications as they are issued throughout the transition period.