DPDP RULES
Rule 1 – Short title and commencement.
Rule 2 – Definitions
Rule 3 -Notice given by Data Fiduciary to Data Principal
Rule 4 – Registration and obligations of Consent Manager
Rule 5 – Processing of personal data for provision or issue of subsidy …
Rule 6 – Reasonable security safeguards
Rule 7 – Intimation of personal data breach
Rule 8 – Time period for specified purpose to be deemed …
Rule 9 – Contact information of person to answer questions about processing
Rule 10 – Verifiable consent for processing of personal data of child
Rule 11 – Verifiable consent for processing of personal data …
Rule 12 – Exemptions from certain obligations …
Rule 13 – Additional obligations of Significant Data Fiduciary
Rule 14 – Rights of Data Principals
Rule 15 – Transfer of personal data outside
Rule 16 – Exemption from Act for research
Rule 17 – Appointment of Chairperson …
Rule 18 – Salary, allowances and other terms …
Rule 19 – Procedure for meetings of Board
Rule 20 – Functioning of Board as digital office
Rule 21 – Terms and conditions of appointment …
Rule 22 – Appeal to Appellate Tribunal
Rule 23 – Calling for information from …
First Schedule – Conditions for registration of …
Second Schedule – Standards for processing of …
Third Schedule
Fourth Schedule – Classes of Data Fiduciaries …
Fifth Schedule – Terms and conditions of …
Sixth Schedule – Terms and conditions of appointment …
Seventh Schedule
Rule 6
Reasonable security safeguards
(1) A Data Fiduciary shall protect personal data in its possession or
under its control, including in respect of any processing undertaken by it or on its behalf by a Data Processor, by taking reasonable security safeguards to prevent personal data breach, which shall include, at
the minimum,
(a) appropriate data security measures, such as securing of personal data through encryption, obfuscation, masking or the use of virtual tokens mapped to that personal data;
(b) appropriate measures to control access to the computer resources used by such Data Fiduciary or such a Data Processor, wherever applicable;
(c) visibility on the accessing of such personal data, through appropriate logs, monitoring and review, for enabling detection of unauthorised access, its investigation and remediation to prevent recurrence;
(d) reasonable measures for continued processing in the event of confidentiality, integrity or availability of such personal data being compromised as a result of destruction or loss of access to personal data or otherwise, such as by way of data-backups;
(e) for enabling the detection of unauthorised access, its investigation, remediation to prevent recurrence and continued processing in the event of such a compromise, retain such logs and personal data for a period of one year, unless compliance with any law for the time being in force
requires otherwise;
(f) appropriate provision in the contract entered into between such Data Fiduciary and such a Data Processor, wherever applicable, for taking reasonable security safeguards; and
(g) appropriate technical and organisational measures to ensure effective observance of security safeguards.
(2) In this rule, the expression “computer resource” shall have the same meaning as is assigned to it in Information Technology Act, 2000 (21 of 2000).
Effective after 18 months (13 May 2027)