A comprehensive roadmap for CIOs, CISOs, and IT Leaders to navigate the new landscape of data governance, privacy rights, and operational compliance.
Access the core documentation and industry-standard research curated for leadership teams.
Major milestones from the bill’s inception to today’s enforcement.
Legal Origins
Privacy declared a fundamental right.
DPDP Act Enacted
DPDP Act, 2023 receives Presidential assent.
Draft Rules & Consultation
Draft DPDP Rules released for comments.
Rules Notification & Phase-Wise Enforcement
DPDP Rules notified; Data Protection Board established.
Phased Compliance Timeline (Phase I)
Legal provisions & DPBI active.
Phase II
Consent manager framework operational
Phase III
Full compliance enforcement (fiduciary obligations, data principal rights, breach reporting).
Compliance team, roles, policies
Identify, document, classify data
Transparent consent, notices, opt-in/out
Safeguards, encryption, access control
Incident response, 72-hour reporting
Access, correction, erasure, grievance redressal
Regular audits, updates, compliance tracking
Real-world scenarios asked by professionals and answered by compliance experts.
Anita Mehra
CIO
"How does the Act treat legacy data collected before 2023?"
Under Section 5(2), organizations must issue a fresh notice to users describing the data held and its purpose. You may continue processing the data unless the user explicitly withdraws consent.
Vikram Joshi
IT Head
"Can we store personal data in global clouds like AWS or Azure while remaining DPDP compliant?"
Yes. The DPDP Act does not mandate strict data localization, but some countries may be restricted via government notifications. Best practices include:
Vikram Joshi
IT Head
"Can a Consent Manager be an external third party?"
Yes. Consent Managers can be registered entities that manage consent workflows for data fiduciaries while ensuring DPDP compliance.
Anita Mehra
CIO
"Do we need to encrypt all personal data?"
The Act requires “reasonable security safeguards,” which include encryption at rest and in transit for sensitive personal data. Organizations should implement end-to-end encryption, key management, and regular vulnerability assessments.
Ask our panel of privacy and cybersecurity experts.