You've only read — of this module. For the best learning experience and to qualify for certification, each module should be completed before moving forward.
Four Comprehensive Modules
A structured free certification covering the complete landscape of India's data protection law — from statutory framework to live dispute scenarios.
Chapters I–IX: Complete Statutory Framework. Story-Based Learning through FinEdge Digital Pvt. Ltd. and MedCare Multi-Speciality Hospital.
Rules 1–23 & All Schedules: Complete Regulatory Framework. FinEdge Digital Pvt. Ltd. and MedCare Multi-Speciality Hospital.
With Special Reference to Section 63 Certificate & DPDPA Proceedings. Case Study: TechNova Digital Pvt. Ltd.
All 9 Dispute Categories with Case Studies. SwiftMart E-Commerce Pvt. Ltd. · HealthPlus Insurance Ltd.
Complete each module step by step. Your live progress is shown below before you begin.
Chapters I – IX: Complete Statutory Framework · Case Studies: FinEdge Digital Pvt. Ltd. · MedCare Multi-Speciality Hospital
MODULE 1
Story-Based Learning
Digital Personal Data Protection Act, 2023
Chapters I – IX: Complete Statutory Framework
Case Studies:
FinEdge Digital Pvt. Ltd. · MedCare Multi-Speciality Hospital
FinEdge Digital Pvt. Ltd. is a Bengaluru-based fintech startup that offers instant personal loans through a mobile application. To deliver its services, FinEdge collects the following personal data from customers:
This module traces how each Chapter of the DPDPA applies through FinEdge's journey — from onboarding customers to handling a data breach, from exercising rights to facing enforcement action. A parallel healthcare case study (MedCare Hospital) is introduced in Chapters III onwards for comparative learning.
The governing legislation is the Digital Personal Data Protection Act, 2023 (DPDPA). The Act comes into force through government notification on a date determined by the Central Government.
Section 2 defines the key roles and concepts that determine accountability. The following actors appear within FinEdge's ecosystem.
Rahul downloads the FinEdge app and submits his name, PAN, Aadhaar, and bank details. All of this constitutes personal data because Rahul can be identified from it. Even his IP address recorded at login qualifies as personal data.
Rahul is the Data Principal — the individual to whom the data relates. If Rahul were under 16, his parent or guardian would act on his behalf.
FinEdge decides why data is collected (loan assessment) and how it is processed (AI-based risk profiling). FinEdge is therefore the Data Fiduciary and bears primary compliance responsibility.
FinEdge uses a cloud hosting provider, a third-party KYC verification service, and an SMS gateway vendor. These entities process data solely on FinEdge's instructions; they are Data Processors and do not determine the purpose of processing.
Six months after launch, a hacker accesses FinEdge's customer database and exposes PAN numbers. This constitutes a personal data breach because there is unauthorized access and disclosure of personal data.
FinEdge operates in India and processes digital personal data. DPDPA applies fully.
FinEdge conducts a physical loan mela and collects paper application forms. Once staff enter this data into the system, it becomes digital — and DPDPA applies from that point.
FinEdge expands to Singapore but continues offering loans to individuals in India. Even if servers are located outside India, DPDPA applies because services are offered to Indian residents.
If Rahul saves FinEdge's customer care number in his personal phone, that is a personal domestic activity. DPDPA does not apply to personal or domestic use of data.
This is where compliance responsibility becomes operational. Chapter II imposes enforceable duties on every Data Fiduciary.
FinEdge can process Rahul's data only if:
Processing cannot be arbitrary. Collecting Aadhaar for marketing campaigns, for example, would likely not constitute a lawful purpose.
When Rahul installs the FinEdge app, the app must display a clear and accessible notice stating:
| Day-to-Day Comparison Just as a bank explains why KYC documents are required, FinEdge must transparently communicate data use. A notice buried in a 40-page document, written in complex legal language, may not satisfy the clarity requirement. |
| 🟢 Example: Good Notice vs. Deficient Notice Deficient Notice (Non-Compliant): A food delivery app includes the following in page 38 of a 50-page terms document: 'We may use your data for various purposes as determined by us.' This fails — it is not clear, not specific, and buried in legalese. Compliant Notice: HealthTrack, a fitness app, displays a clear one-page notice during sign-up stating: 'We collect your name, age, and health metrics to provide personalised fitness recommendations. Your data is shared with our cloud partner AWS. You may withdraw consent at any time by visiting Settings > Privacy.' This notice is accessible, specific, and actionable. Key Lesson: Notice must be given before or at the time of data collection. It must be in simple language, clearly state the purpose, and explain how to withdraw consent. A buried or vague notice does not satisfy Section 5. |
Rahul sees two checkboxes when registering:
If both boxes are blank and Rahul actively ticks them, consent is valid. If the marketing checkbox is pre-ticked, consent is not valid.
Valid consent must be:
Withdrawal of Consent
Rahul later decides to stop receiving marketing emails and clicks 'Unsubscribe'. FinEdge must immediately stop that specific processing. However, loan repayment data may continue to be processed under a legal obligation.
Certain categories of processing do not require separate consent:
This is the most operational section of the Act. FinEdge must:
Security Safeguards
FinEdge must encrypt databases, implement access control systems, and monitor server logs. Leaving a PAN database unencrypted materially increases risk and legal exposure.
Breach Notification [Section 8(6)]
After the hacking incident, FinEdge must inform the Data Protection Board and notify all affected users, including Rahul. Failure may attract substantial monetary penalties.
Data Deletion
If Rahul fully repays his loan and no statutory retention requirement exists, FinEdge must delete the data. Financial transaction records, however, may be retained under applicable financial laws.
Grievance Mechanism
When Rahul sends an email asking what data FinEdge holds about him, FinEdge must respond through a formal, time-bound grievance system.
If a person under 18 applies for a loan, FinEdge must:
Children receive a higher level of protection under the Act.
FinEdge grows rapidly and reaches 5 million users. The Central Government notifies it as a Significant Data Fiduciary (SDF). FinEdge must then:
Classification as an SDF significantly increases compliance obligations.
After the data breach incident, Rahul becomes privacy-conscious and begins exercising his statutory rights under Chapter III. A parallel case from MedCare Hospital illustrates how these rights apply in a healthcare context.
Rahul sends an email to FinEdge: "Please confirm whether you are processing my personal data and provide a summary."
Under Section 11, Rahul has the right to obtain:
FinEdge must confirm that Rahul's data is stored and disclose what data is held (PAN, Aadhaar, bank details, repayment history) and whether it has been shared with KYC vendors, cloud providers, or the RBI.
| Practical Insight This right ensures organizational transparency. Organizations must maintain structured data inventories to respond effectively and within prescribed timelines. |
| 🟢 Example: Exercising the Right to Access Scenario: Deepa, a customer of MediInsure (a health insurance company), submits a written request asking: 'What personal data do you hold about me, who have you shared it with, and for what purpose?' MediInsure's Compliant Response: Within the prescribed period, MediInsure provides Deepa with: a summary of all data held (name, Aadhaar, medical history, premium history), the identities of third parties with whom data was shared (TPA, reinsurer, fraud investigation firm), the purpose of each disclosure, and the retention period for each category of data. Non-Compliant Response: MediInsure replies: 'Your data is processed in accordance with our privacy policy — please refer to our website.' This is inadequate. A generic redirection to a privacy policy does not satisfy Section 11. Key Lesson: Section 11 creates a substantive right — not merely a right to be told a policy exists. Organisations must maintain data inventories and be able to respond to access requests with specific, personalised information. |
Rahul notices his employment status is recorded as 'Self-employed' instead of 'Salaried'. He submits a correction request.
Under Section 12, Rahul can require FinEdge to:
FinEdge must verify the correction, update the database, maintain an audit trail, and confirm the update to Rahul. If Rahul closes his account after fully repaying his loan, he may request erasure — unless financial laws mandate retention.
If FinEdge fails to respond to Rahul's correction request, he may:
FinEdge must maintain a dedicated grievance email, an online complaint form, and a time-bound response system. Failure to establish this mechanism violates both Section 8 and Section 13.
Rahul nominates his wife as nominee. In the event of his death, the nominee may request deletion of unnecessary personal data and exercise access rights on his behalf. This ensures continuity of privacy protection beyond the Data Principal's lifetime.
The DPDPA balances rights with responsibilities. Rahul must not:
If Rahul knowingly submits incorrect income details to obtain a higher loan, he breaches his statutory duty. Rights cannot be exercised fraudulently.
MedCare Hospital operates electronic medical records (EMR), diagnostic labs, and insurance claim processing. Patient: Mrs. Anita Sharma.
Mrs. Sharma requests: "Provide a full copy of my medical records and details of who has accessed them." MedCare must provide her diagnostic history, stored medical records, and names of third parties such as the insurance TPA. Healthcare data is highly sensitive — transparency is critical.
Mrs. Sharma finds her blood group recorded incorrectly. The hospital must update the EMR, log the correction, and inform relevant departments. If she requests deletion of her medical history, the hospital may lawfully refuse full erasure if medical retention laws require preservation.
Mrs. Sharma complains that unauthorized staff accessed her medical file. The hospital must investigate access logs, respond formally, and provide an explanation. If dissatisfied, she may approach the Data Protection Board.
Mrs. Sharma nominates her son. In case of her incapacity, he may request medical record access and exercise correction rights.
Mrs. Sharma must provide accurate medical information, not suppress critical details during treatment, and not file malicious complaints. False medical information may endanger treatment and violate statutory duty.
| Aspect | FinEdge (Fintech) | MedCare (Hospital) |
|---|---|---|
| Type of Data | Financial + Identity | Medical + Health |
| Risk Level | Financial fraud | Life & safety risk |
| Retention | Financial regulations | Medical retention laws |
| Correction Impact | Credit score effect | Treatment outcome effect |
| Access Requests | Data inventory based | Medical record system based |
Both are Data Fiduciaries. Both must comply with Sections 11–15. The context changes the risk profile — not the legal framework.
Chapter IV addresses two major areas: restriction on cross-border data transfer (Section 16) and statutory exemptions from certain compliance obligations (Section 17).
Cross-border data transfer is generally permitted under DPDPA unless the Central Government issues a notification restricting transfer to specific countries or territories.
FinEdge currently stores customer data on a cloud server in Singapore. This is permitted unless the Government notifies that transfers to that jurisdiction are restricted.
Section 16(2): If any other Indian law provides stricter data localisation requirements — for example, RBI regulations for financial institutions — that law will prevail over DPDPA.
| Situation | Result |
|---|---|
| No restriction notified | Transfer allowed |
| Country restricted by Government notification | Transfer prohibited |
| Sectoral law stricter (e.g., RBI) | Stricter law prevails |
Section 17 specifies situations where Chapter II (Obligations), Chapter III (Rights), and Section 16 (Transfer Restrictions) may not apply. These exemptions are conditional and limited — they do not confer blanket immunity.
Processing necessary to enforce a legal right or claim is exempt. If Rahul defaults on his loan, FinEdge may process his personal data to ascertain assets and initiate recovery proceedings — even if Rahul has withdrawn consent.
Processing for judicial, quasi-judicial, regulatory, or supervisory functions is exempt to the extent necessary. When the Data Protection Board processes Mrs. Sharma's medical data during an inquiry, that processing is exempt.
Processing for prevention, detection, investigation, or prosecution of offences is exempt. If police request FinEdge's customer data to investigate fraud, processing for that investigation is exempt — though FinEdge's general security obligations remain.
If the Data Principal is outside India and processing occurs pursuant to a contract with a foreign entity, certain provisions may not apply. For example, FinEdge providing backend processing for UAE customers of a UAE lender may qualify for this exemption.
Processing necessary for a court- or tribunal-approved merger, amalgamation, or demerger is exempt. If FinEdge merges with another fintech company and customer data transfers under a court-approved scheme, this is permitted.
Processing to ascertain the financial information, assets, or liabilities of a defaulter is exempt. If Rahul defaults, FinEdge may check his CIBIL score and verify asset holdings even if he objects.
The Central Government may notify certain State instrumentalities as exempt where processing is in the interest of sovereignty, security, public order, or friendly relations with foreign States. An intelligence agency processing data for national security may qualify — but only through a formal Government notification.
Processing for research, archiving, or statistical purposes is exempt if the data is not used to make a decision affecting a specific Data Principal and if prescribed standards are followed. MedCare's anonymized cancer research study, where data is aggregated and no individual patient is affected, may qualify.
The Government may notify startups or certain classes of Data Fiduciaries to exempt them from notice requirements (Section 5), certain Section 8 obligations, SDF requirements (Section 10), or the right to access (Section 11). This provides regulatory flexibility for emerging businesses.
Within five years of the Act's commencement, the Government may notify that certain provisions shall not apply to specific Data Fiduciaries. This allows phased implementation of the compliance framework.
| Scenario | Exemption Applied |
|---|---|
| FinEdge loan recovery proceedings | Section 17(1)(a) |
| Data Protection Board inquiry | Section 17(1)(b) |
| Police fraud investigation | Section 17(1)(c) |
| FinEdge merger (court-approved) | Section 17(1)(e) |
| Defaulter financial information check | Section 17(1)(f) |
| MedCare anonymized research | Section 17(2)(b) |
| Intelligence agency processing | Section 17(2)(a) |
After the PAN data breach, Rahul asks: "Should I file an FIR? Should I go to a civil court? Who will hold FinEdge accountable?" Chapter V answers these questions by establishing a specialized adjudicatory body.
No. The DPDPA does not create criminal offences. It provides only for civil monetary penalties. There is no arrest provision, no imprisonment under DPDPA, and no criminal trial mechanism under this Act. Police cannot try FinEdge for a DPDPA violation.
No. Under Section 25 (Bar of Jurisdiction), civil courts cannot entertain matters that the Data Protection Board is empowered to determine. Ordinary courts have no jurisdiction over DPDPA contraventions.
Rahul must file a complaint before the Data Protection Board of India — the specialized regulatory adjudicating authority created by the Act.
The Central Government shall establish the Data Protection Board of India. The Board functions digitally and is the primary adjudicating authority under DPDPA — not a traditional civil court, but a specialized regulatory body.
The Board consists of a Chairperson and other Members appointed by the Central Government. Qualifications and service conditions are prescribed by rules. This ensures regulatory expertise and institutional accountability.
The Board may:
All proceedings must adhere to principles of natural justice.
In the MedCare case, the Board may examine access logs, role-based access controls, and grievance response records to determine whether Sections 8 and 13 were violated.
During an inquiry, the Board may call for information, require production of documents, summon records, and seek explanations. In the FinEdge case, the Board may demand server logs, cybersecurity audit reports, breach timeline documentation, and vendor agreements. Refusing or delaying production may aggravate liability.
Before a final order, a Data Fiduciary may offer a voluntary undertaking — for example, committing to security upgrades, establishing a compensation mechanism, appointing an external auditor, or implementing structural compliance reforms.
If accepted, proceedings may be concluded subject to compliance. If the undertaking is later breached, the inquiry may resume. MedCare might offer mandatory staff retraining, a system upgrade, and quarterly compliance audits in lieu of a harsher penalty.
Any person aggrieved by a Board order may appeal to the Appellate Tribunal (currently TDSAT). A further appeal lies to the Supreme Court of India.
If the Board imposes ₹40 crore on FinEdge and FinEdge believes this is disproportionate, it may appeal to TDSAT and, if still aggrieved, to the Supreme Court.
The Board may impose monetary penalties, direct corrective actions, mandate compliance steps, and issue binding directions. All orders are enforceable.
Civil courts cannot adjudicate DPDPA violations. The Board holds exclusive jurisdiction. Rahul cannot file a civil suit or seek criminal prosecution under DPDPA — his forum is the Data Protection Board. If hacking occurred, police may separately prosecute the hacker under the IT Act or BNS.
The Board may, where appropriate, direct mediation or other dispute resolution methods to promote efficient resolution in suitable cases.
Penalties may extend up to ₹250 crore depending on the contravention. Common grounds for penalty include:
Penalty determination considers: nature and gravity of the breach, duration, repetition, mitigation efforts, and the type of personal data affected. There is no imprisonment under DPDPA.
| Stage | Authority | Nature |
|---|---|---|
| Initial Complaint | Data Protection Board | Primary Inquiry & Order |
| First Appeal | Appellate Tribunal (TDSAT) | Statutory Appeal |
| Final Appeal | Supreme Court of India | Final Judicial Review |
If the Board has reason to believe that a person has contravened the provisions of the Act, it may conduct an inquiry, determine non-compliance, and proceed accordingly. In the FinEdge case, after receiving a complaint about delayed breach notification, the Board may examine the breach timeline and check compliance records to determine whether Section 8(6) was violated.
The Board must issue notice, give the concerned party an opportunity to be heard, consider all evidence, and pass a reasoned order. The Board cannot impose a penalty without first informing the accused party and allowing them to submit a defence.
Proceedings may be conducted entirely in digital format — including electronic filing, virtual hearings, and digital submission of evidence. MedCare Hospital, for example, may submit access logs, internal audit reports, and grievance records through an electronic portal.
The Board may require production of documents, call for records, and seek explanations. Failure to cooperate may worsen the outcome for the Data Fiduciary.
While not a traditional civil court, the Board may exercise certain civil court-equivalent powers for inquiry purposes, including summoning documents and requiring information.
The Board may act on a complaint by a Data Principal, on a reference by the Government, or on its own initiative (suo motu) if a contravention is evident — for example, if media reports a massive data breach by FinEdge even without an individual complaint being filed.
Before imposing a penalty, the Board considers the nature and gravity of the breach, its duration, whether it is repetitive, mitigation efforts undertaken, and the type of personal data affected. The penalty must be proportionate.
The person concerned must be given a full opportunity to present a defence, submit evidence, and explain any mitigating factors before a penalty is imposed.
The Board may impose monetary penalties, issue corrective directions, and require specific compliance measures. All orders are binding and enforceable.
Complaint: Unauthorized staff accessed patient data. The Board examines access logs, role-based permissions, and the grievance mechanism. It concludes the access resulted from an internal misconfiguration, but that corrective measures were taken promptly. Outcome: moderate penalty plus a direction for staff training and quarterly audits.
Chapter VII establishes the right of appeal, sets out the procedure before the Appellate Tribunal, and provides for mediation and voluntary undertaking as alternative resolution mechanisms.
Any person aggrieved by an order or direction of the Board may appeal to the Appellate Tribunal. If the Board imposes ₹50 crore on FinEdge and directs a redesign of its consent architecture, FinEdge may appeal to TDSAT.
The appeal must be filed within 60 days from receipt of the Board's order, in the prescribed form and with the prescribed fee. If FinEdge receives the order on 1 March, the appeal must be filed by 30 April.
The Tribunal may entertain a late appeal if sufficient cause is shown. If MedCare files after 70 days due to a serious system outage, the Tribunal may condone the delay if satisfied.
After hearing both parties, the Tribunal may confirm, modify, or set aside the Board's order. The Tribunal could, for example, reduce FinEdge's penalty from ₹50 crore to ₹30 crore.
The Tribunal shall endeavour to dispose of appeals within 6 months. If an appeal filed on 1 April is not decided by 30 September, the Tribunal must record reasons for the delay.
If a party is aggrieved by the Tribunal's order, Section 18 of the TRAI Act applies — providing a further appeal to the Supreme Court of India.
The Tribunal shall function as a digital office. All filing, hearings, and pronouncements of orders are digital by design. FinEdge may file electronically and attend a virtual hearing.
An order of the Appellate Tribunal is executable as a decree of a civil court. If FinEdge fails to pay a ₹40 crore penalty upheld by the Tribunal, the Tribunal may transmit the order to a civil court with local jurisdiction — for instance, a Mumbai civil court if FinEdge is registered there — for execution.
If the Board believes a complaint may be resolved through mediation, it may direct the parties to attempt resolution through a mutually agreed mediator. In the MedCare case, rather than full adjudication, the Board might suggest mediation. The hospital could apologize, offer compensation, and upgrade its systems — resolving the matter without penalty proceedings.
At any stage of proceedings under Section 28, the Board may accept a voluntary undertaking from a Data Fiduciary. Before a final penalty, FinEdge might offer immediate cybersecurity overhaul, a third-party audit, and a compensation framework for affected users.
The undertaking may include taking specific actions within a timeframe, refraining from certain activities, or publicly disclosing the undertaking. FinEdge might commit to appointing an external DPO within 30 days and suspending targeted marketing until a compliance review is complete.
Once a voluntary undertaking is accepted, proceedings are barred in relation to the contents of the undertaking — except in the event of a breach.
If the undertaking is not complied with, it is deemed a breach of the Act and the Board may resume proceedings after providing an opportunity of hearing. If FinEdge promised an audit within 30 days but fails to conduct one, the Board may reimpose proceedings and impose a penalty.
Complaint → Board Inquiry → Voluntary Undertaking Accepted → Compliance
If undertaking is breached → Fresh Proceedings → Penalty
Or: Board Order → Appeal to Appellate Tribunal → Tribunal Decision → Supreme Court
Chapter VIII is the enforcement backbone of the DPDPA. It defines when penalties may be imposed, how penalty amounts are determined, and where penalty proceeds are deposited.
If the Board, after completing an inquiry, determines that a person has committed a significant breach of the Act or Rules, it may impose a monetary penalty as specified in the Schedule — provided the person has first been given an opportunity to be heard.
The Board considers the following factors when calculating the appropriate penalty:
(a) Nature, Gravity and Duration of the Breach
A minor, short-term breach attracts a lower penalty. A systemic, long-term breach attracts a higher penalty. FinEdge ignoring security patches for a year is an aggravating factor.
(b) Type and Nature of Personal Data Affected
Sensitive personal data such as medical records or financial information increases seriousness. MedCare's breach of medical records would be treated with greater severity.
(c) Repetitive Nature
Prior compliance warnings or repeat violations may increase the penalty. If FinEdge had earlier been warned about defective consent mechanisms, a repeat infraction would attract a higher sanction.
(d) Gain or Avoidance of Loss
If the breach resulted in financial gain or avoided the cost of compliance, the penalty is stricter. Skipping security upgrades to save ₹10 crore is an aggravating factor.
(e) Mitigation Efforts
Prompt containment of the breach, immediate user notification, and proactive corrective action are mitigating factors. MedCare immediately suspending access and retraining staff would be weighed favourably.
(f) Proportionality and Deterrence
The penalty must be proportionate to the breach, effective as a deterrent, and not arbitrary.
(g) Likely Impact on the Person
The Board considers the financial impact of the penalty. A large multinational may absorb a higher penalty; a small startup would be assessed proportionally.
| Nature of Penalties Under DPDPA Civil in nature — not criminal. Monetary only — no imprisonment. Police involvement arises only if a separate criminal offence exists under IT Act or BNS. |
| 🟢 Example: Penalty Calculation in Practice Case: MegaRetail, a large e-commerce conglomerate, suffers a data breach affecting 10 million users' financial and personal data. The Board determines the following facts: The breach lasted 45 days before being contained. MegaRetail had been warned about deficient encryption in a prior audit. Notification to the Board was delayed by 20 days. The data affected included credit card numbers and purchase histories. Aggravating Factors Applied by Board: Long duration (45 days); repeated non-compliance (prior audit warning); sensitive financial data affected; significant gain avoided by skipping security upgrades; delayed notification. Mitigating Factors: MegaRetail cooperated with the Board's inquiry and provided detailed server logs without delay. Outcome: The Board imposes ₹200 crore — below the maximum of ₹250 crore but at the higher end given aggravating factors. The mitigating factor of cooperation reduces the penalty from what could have been the maximum. Key Lesson: Penalties are not formulaic — they are calibrated. A large organisation with repeat violations faces a different penalty calculus than a small startup with a first-time, quickly remedied lapse. Proactive compliance and cooperation materially reduce penalty exposure. |
All penalties imposed under the Act are credited to the Consolidated Fund of India. The penalty amount does not go to the complainant directly, nor does it remain with the Board. Rahul does not automatically receive compensation from a ₹40 crore penalty imposed on FinEdge. Any separate compensation claim would be a distinct legal matter under IT Act Section 43.
| Factor | FinEdge | MedCare |
|---|---|---|
| Nature | Large data breach | Internal access lapse |
| Duration | Long-term patch delay | Short-term misconfiguration |
| Data Type | PAN + financial data | Medical records |
| Repetition | Prior compliance warning | First-time lapse |
| Mitigation | Delayed response | Immediate corrective action |
| Likely Outcome | Higher penalty | Moderate penalty |
The final chapter contains structural, protective, interpretative, rule-making, and transitional provisions that complete the statutory framework of the DPDPA.
No suit, prosecution, or other legal proceeding shall lie against the Central Government, the Board, its Chairperson, Members, officers, or employees for actions done or intended to be done in good faith under the Act. FinEdge's remedy for a ₹50 crore penalty is an appeal under Section 29 — not a personal case against Board members.
The Central Government may require the Board, any Data Fiduciary, or any intermediary to furnish information for purposes of the Act. Following repeated breaches in the fintech sector, the Government may call for compliance reports from FinEdge and sector-wide data from multiple platforms.
This is a significant enforcement provision.
Section 37(1): If the Board has imposed monetary penalties on a Data Fiduciary in two or more instances and advises that blocking access is necessary in the public interest, the Central Government may — after providing a hearing — direct blocking of access to information hosted on computer resources that enable the Data Fiduciary to offer goods or services in India.
If FinEdge repeatedly violates consent provisions, fails to implement safeguards, and ignores penalties, the Board may recommend blocking and the Government may direct app stores and ISPs to block public access to FinEdge's platform.
Section 37(2): Every intermediary must comply with such a blocking direction.
The DPDPA operates in addition to other laws. In the event of a conflict, the DPDPA prevails to the extent of the conflict. If another law allows broader data sharing without safeguards but DPDPA imposes stricter requirements, DPDPA provisions govern.
No civil court shall entertain any suit regarding matters that the Board is empowered to determine. No injunction may be granted against actions taken under the Act. If the Board initiates an inquiry against MedCare, the hospital cannot approach a civil court to halt the proceedings — it must follow the statutory appeal mechanism.
The Central Government may make rules to carry out the purposes of the Act, including rules governing:
If Rules prescribe breach reporting within 72 hours, FinEdge must comply with that specific timeline.
All Rules and certain Notifications must be laid before Parliament, which may modify or annul them. This ensures democratic oversight of subordinate legislation.
The Government may amend penalty amounts by notification — but cannot increase any penalty to more than twice the original specified amount. If the Schedule currently specifies ₹250 crore as the maximum, it cannot be increased beyond ₹500 crore through notification.
If difficulty arises in implementing the Act, the Government may issue an order to remove it — provided the order does not contradict the Act, is issued within three years of commencement, and is laid before Parliament.
Section 44 amends three existing statutes to align them with the DPDPA:
Before the DPDPA, data protection compensation was sought under IT Act Section 43A. The DPDPA is now the primary data protection legislation in India.
This sequence demonstrates the full enforcement reach of the DPDPA — from initial inquiry to platform-level sanctions.
| Chapter | Subject | Key Sections |
|---|---|---|
| I | Preliminary — Definitions & Territorial Scope | Sections 1–3 |
| II | Obligations of Data Fiduciary | Sections 4–10 |
| III | Rights and Duties of Data Principal | Sections 11–15 |
| IV | Cross-Border Transfer & Exemptions | Sections 16–17 |
| V | Data Protection Board — Establishment | Sections 18–26 |
| VI | Board — Powers and Procedure | Sections 27–28 |
| VII | Appeal and ADR | Sections 29–32 |
| VIII | Penalties and Adjudication | Sections 33–34 |
| IX | Miscellaneous — Rules, Amendments, Enforcement | Sections 35–44 |
The DPDPA is not merely about obtaining consent. It creates a comprehensive governance framework built on:
Through the FinEdge and MedCare stories, this module has traced the complete compliance cycle: from onboarding a customer and collecting consent, to handling a breach, defending a Board inquiry, and — in a worst-case scenario — facing platform-level sanctions under Section 37.
Understanding this cycle is essential for lawyers, Data Protection Officers, compliance professionals, and organizational leaders operating in India's digital economy.
Rules 1 – 23 & All Schedules: Complete Regulatory Framework · Case Studies: FinEdge Digital Pvt. Ltd. · MedCare Multi-Speciality Hospital
MODULE 2
Story-Based Learning
Digital Personal Data Protection Rules, 2025
Rules 1 – 23 & All Schedules: Complete Regulatory Framework
Case Studies:
FinEdge Digital Pvt. Ltd. · MedCare Multi-Speciality Hospital
FinEdge Digital Pvt. Ltd., now a fast-growing Bengaluru-based fintech startup with over 20 lakh registered users, has successfully navigated the Digital Personal Data Protection Act, 2023 (DPDPA). Now, the Government of India has notified the Digital Personal Data Protection Rules, 2025 (the Rules) through Gazette Notification G.S.R. 846(E) dated 13 November 2025. The Rules operationalise the Act by prescribing specific procedures, standards, timelines, and mechanisms.
This module traces how each Rule of the DPDP Rules, 2025 applies through FinEdge’s journey — from redesigning consent notice screens to handling breach reporting timelines, from operationalising children’s consent to meeting Significant Data Fiduciary obligations. A parallel healthcare case study (MedCare Hospital) is introduced for comparative learning.
FinEdge’s legal counsel has been tracking the DPDPA since 2023. With the Rules now notified, FinEdge must plan its compliance roadmap based on which Rules take effect immediately and which are deferred.
FinEdge operates across mobile apps, its website, and partner integrations. Understanding the precise meaning of terms like ‘user account’ and ‘verifiable consent’ determines how FinEdge designs its technology flows.
When Rahul installs the FinEdge app, the app’s privacy notice is the first and most critical communication. Rule 3 prescribes exactly what that notice must contain and how it must be structured.
FinEdge is exploring a partnership with ConsentBridge, a platform that claims to manage consent centrally for multiple financial services. Before FinEdge relies on ConsentBridge, it must verify whether ConsentBridge is a registered Consent Manager.
FinEdge partners with a State Government’s Direct Benefit Transfer (DBT) programme to disburse subsidised loans. The State’s nodal agency processes beneficiary data. Rule 5 governs how State entities must handle this processing.
FinEdge has experienced a near-miss security incident — an unauthorised login attempt on its admin portal. This triggers a comprehensive review of its security architecture. Rule 6 provides the specific safeguards FinEdge must implement.
FinEdge’s security team detects at 11:00 PM that an unauthorised actor has accessed its customer database, exposing PAN numbers of 15,000 users. The incident response team activates. Rule 7 governs exactly what FinEdge must do next.
Rahul closed his FinEdge loan account two years ago after repayment. His data still resides in FinEdge’s systems. FinEdge’s data retention team must now determine how long to retain data and when erasure is mandatory under Rule 8.
Priya, a FinEdge customer, wants to know what personal data FinEdge holds about her. She cannot find any contact information on the app to raise her query. This is a Rule 9 violation.
FinEdge’s new ‘Junior Finance’ feature allows parents to create savings accounts for children under 18. Before processing any child’s data, FinEdge must obtain verifiable parental consent as prescribed in Rule 10.
A guardian approaches FinEdge to manage a loan account on behalf of a person with an intellectual disability. FinEdge must verify the guardian’s authority before processing the individual’s data.
FinEdge’s partner EdTechPlus operates an educational platform used by schools. Some data processing for children’s safety and educational tracking may qualify for limited exemptions under Rule 12.
FinEdge has grown rapidly and now has 25 lakh active users, processes over Rs. 500 crore in loans monthly, and uses AI-based risk profiling. The Central Government is assessing whether to notify FinEdge as a Significant Data Fiduciary. If notified, Rule 13 imposes significant additional obligations.
Priya wants to access all personal data FinEdge holds about her. Rahul wants to correct his income data (incorrectly recorded). Vikram wants to erase his account data after closing his loan. Rule 14 prescribes exactly how FinEdge must operationalise these rights.
FinEdge uses a US-based cloud analytics vendor to process loan application data and generate risk reports. Cross-border data transfers are common in FinEdge’s ecosystem. Rule 15 governs the conditions for such transfers.
FinEdge’s research team wants to analyse historical loan repayment patterns to improve its AI credit model. The research will not be used to make decisions about individual customers. Rule 16 provides a potential exemption from certain DPDPA obligations for such processing.
FinEdge has received a complaint from a customer filed with the Data Protection Board. FinEdge’s legal team needs to understand how the Board operates, who makes decisions, and what timelines apply.
FinEdge disagrees with a Board decision imposing a penalty of Rs. 50 lakh for delayed breach notification. FinEdge’s legal team wants to appeal. Rule 22 governs the appeals process.
The Ministry of Finance contacts FinEdge requesting detailed loan disbursement data for a policy review on digital lending. Separately, the Ministry directs FinEdge not to disclose the information request itself. Rule 23 governs both situations.
| Rule | Key Action for FinEdge | Timeline |
|---|---|---|
| Rule 1 | Build staggered compliance calendar | Immediate |
| Rule 2 | Update systems to recognise all user account identifiers | Immediate |
| Rule 3 | Redesign stand-alone privacy notice with itemised data and withdrawal link | 18 months |
| Rule 4 | Verify Consent Manager registration before integration | 12 months (registration) |
| Rule 5 | Ensure State processing partners follow Second Schedule standards | 18 months |
| Rule 6 | Implement encryption, access controls, logs, vendor contracts | 18 months |
| Rule 7 | Deploy dual-track breach notification system + 72-hour Board report capability | 18 months |
| Rule 8 | Implement automated data lifecycle management + 48-hour erasure notices | 18 months |
| Rule 9 | Publish DPO/Privacy Officer contact on website, app, and all rights responses | 18 months |
| Rule 10 | Build verifiable parental consent flow for Junior Finance accounts | 18 months |
| Rule 11 | Create guardian verification workflow for disability-related accounts | 18 months |
| Rule 12 | Document Fourth Schedule exemption basis for any child data processing | 18 months |
| Rule 13 | Prepare for SDF obligations: DPIA, algorithmic audit, localisation (if notified) | As notified |
| Rule 14 | Launch Privacy Request Portal with 90-day grievance timeline and nomination feature | 18 months |
| Rule 15 | Monitor Government transfer restrictions; update overseas vendor contracts | Ongoing |
| Rule 16 | Ensure research data is anonymised; no individual-level decision outputs | 18 months |
| Rules 17-21 | Register on Board’s digital platform; prepare for digital proceedings | Immediate |
| Rule 22 | Understand appeal timelines and digital filing procedures | 18 months |
| Rule 23 | Create protocol for Government information requests and confidentiality directions | Ongoing |
With Special Reference to Section 63 Certificate & DPDPA Proceedings · Case Study: TechNova Digital Pvt. Ltd.
MODULE 3
Story-Based Learning
Electronic Evidence under the Bharatiya Sakshya Adhiniyam, 2023
With Special Reference to Section 63 Certificate & DPDPA Proceedings
Case Study:
TechNova Digital Pvt. Ltd.
TechNova Digital Pvt. Ltd. is a fast-growing Mumbai-based fintech platform operating a digital lending and payment ecosystem serving over 2 crore users across India. Every interaction on TechNova’s platform is captured electronically:
One day, TechNova’s compliance team receives a formal notice from the Data Protection Board of India. Mr. Rohan Mehta, a Data Principal and TechNova user, has filed a complaint before the Board alleging four violations:
| # | Allegation | What Rohan Claims |
|---|---|---|
| 1 | Invalid Consent | No valid consent was obtained before TechNova sent marketing communications. |
| 2 | Unauthorised Data Sharing | TechNova shared his personal data with an analytics partner without his knowledge. |
| 3 | Delayed Breach Notification | TechNova failed to notify him promptly after a data breach. |
| 4 | Failure to Erase Data | TechNova did not erase his personal data after account closure. |
TechNova’s legal team asserts complete compliance. The Board’s response is decisive:
“Assertions of compliance are insufficient. Compliance must be proved through legally admissible electronic evidence. TechNova must produce its records in accordance with Section 63 of the Bharatiya Sakshya Adhiniyam, 2023.”
This module traces how TechNova must approach each allegation — not merely through internal policies, but through the production of legally admissible electronic evidence with a proper Section 63 certificate. The module is structured around the six elements of the Section 63 certificate, applied to each of TechNova’s four compliance challenges.
Under the Digital Personal Data Protection Act, 2023, TechNova has invested significantly in compliance infrastructure: a consent management system, a breach notification workflow, a data deletion mechanism, and a grievance redressal portal. But when the Board asks for proof, none of these systems matter unless the records they generate are admissible evidence.
The BSA 2023 defines evidence under Section 2(1)(e) as including:
In TechNova’s case, every compliance record is an electronic document — a consent log, a breach report, a deletion audit trail. For these to be admissible, they must satisfy Section 63 of the BSA 2023.
Understanding Section 63 requires tracing its legislative history. The old Indian Evidence Act, 1872 (IEA) had no specific provision for electronic records. Over time, Section 65B was introduced by amendment to govern admissibility of electronic records. Several landmark judgments shaped its interpretation:
| Case Name | Citation | Principle | Relevance to S.63 |
|---|---|---|---|
| State (NCT of Delhi) v. Navjot Sandhu | (2005) 11 SCC 600 | First significant case on electronic evidence. Court allowed some flexibility in certificate requirement for electronic records. | Historical baseline. Demonstrated courts were grappling with electronic evidence for the first time. |
| Anvar P.V. v. P.K. Basheer | (2014) 10 SCC 473 | Overruled Navjot Sandhu. Held that Section 65B certificate is mandatory. Electronic records cannot be proved by oral testimony alone. | Direct ancestor of Section 63. Established the certificate requirement as fundamental law. |
| Shafhi Mohammad v. State of H.P. | (2018) 2 SCC 801 | Introduced a temporary relaxation: certificate not required if device is not accessible to the party relying on the record. | Later overruled. Represents the short-lived attempt to dilute the certificate mandate. |
| Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal | (2020) 7 SCC 1 | Definitively settled the law. Section 65B certificate is mandatory in all cases. Shafhi Mohammad overruled. Certificate must be obtained from the person responsible for the device. | The doctrinal foundation for Section 63. TechNova’s certificate procedure is modelled on this judgment. |
| Sonu @ Amar v. State of Haryana | (2017) 8 SCC 570 | Objection to electronic evidence must be raised at the earliest opportunity. Late objections may not be entertained. | Procedural lesson: TechNova should ensure objections to its evidence are anticipated and addressed in the certificate itself. |
Section 63 of the Bharatiya Sakshya Adhiniyam, 2023 modernises the framework for electronic evidence. It moves beyond the limitations of Section 65B by explicitly covering:
Most importantly, Section 63 mandates that the certificate include hash values — a cryptographic requirement that was not explicitly in Section 65B. This transforms the certificate from a procedural formality into a technical guarantee of data integrity.
Section 63(4) specifies the mandatory contents of the certificate. This is the most operationally critical part of TechNova’s evidence strategy. The certificate must contain six elements. Each is examined below through the TechNova lens.
The certificate must specifically identify the electronic record being produced. A generic reference to ‘our system logs’ is insufficient.
The certificate must explain how the electronic record was produced — the process by which digital data was extracted, converted, and made ready for production.
For Rohan Mehta’s consent log:
The certificate must describe the computer or system on which the record was stored or through which it was produced. This establishes the technical foundation for admissibility.
TechNova’s system details for the consent log:
A key innovation in Section 63 over Section 65B is the explicit provision in Section 63(3): where an electronic record is produced by multiple interconnected systems (frontend app → API gateway → database → backup server), all these systems are treated as one integrated computer system for purposes of the certificate. TechNova does not need a separate certificate for each component.
This is the core test of admissibility. Section 63(2) imposes four conditions that must be certified:
The computer system must have been in regular use by a person in lawful control of the relevant activities at the time the record was generated.
The information was fed into the computer in the ordinary course of relevant activities.
The computer was operating properly throughout the relevant period, or if there was a malfunction, it did not affect the record in question.
The copy of the electronic record faithfully reproduces the original record stored in the computer.
A hash value (also called a digital fingerprint) is a unique alphanumeric string generated by applying a cryptographic algorithm (such as SHA-256) to a file. Any change — even a single character — in the file produces a completely different hash value. This makes hash values the gold standard for proving data integrity in digital evidence.
Section 65B (old law) did not explicitly require hash values. Courts relied on the certificate signer’s word alone. Section 63 BSA 2023 introduces hash values as a mandatory requirement, transforming the evidentiary framework from trust-based to verification-based.
| Record | File Name | SHA-256 Hash Value |
|---|---|---|
| Consent Log | Consent_Log_TN-88421.csv | a3f2b8d1...9e4c7a02 |
| Data Transfer Log | Analytics_Share_Q1_2024.json | 7b9d3c4f...2a1e8b56 |
| Breach Detection Log | Breach_TN-BR-2024-003.pdf | c1d4e9f2...5b3a7c81 |
| Deletion Audit Trail | Deletion_TN-88421_2024.xml | 9f8e2d3b...4c6a1e72 |
The certificate must be signed by a person occupying a responsible official position in relation to the operation of the relevant computer system. Section 63 also envisages involvement of an expert for technical aspects.
| Role | Person | Responsibility in Certificate |
|---|---|---|
| Chief Information Security Officer (CISO) | Ms. Priya Venkatesan | Certifies system architecture, access controls, security measures, and system integrity. Signs as person in charge of TechNova’s computer systems. |
| Compliance Head / DPO | Mr. Rajesh Kumar | Certifies that the records relate to the relevant compliance activity, that the activity was conducted in accordance with DPDPA obligations, and attests to the accuracy of compliance process descriptions. |
| Independent Digital Forensic Expert | Dr. Anand Sharma, Cert. Digital Forensic Examiner | Independently verifies hash values, confirms the technical integrity of the extraction process, and provides expert certification on system functioning and record authenticity. |
Rohan Mehta alleges that TechNova sent him marketing SMS and email communications without valid consent. He claims the consent was bundled into a general ‘Terms of Service’ acceptance and was not freely given, specific, or informed.
TechNova’s consent management system captures consent at two levels: onboarding consent (for loan processing) and separate marketing consent (opt-in tick box on a dedicated screen). The system records:
| # | Certificate Requirement | TechNova Action | Status |
|---|---|---|---|
| 1 | Identify the Record | Consent_Log_TN-88421.csv — Rohan Mehta’s onboarding consent record dated 10-Jan-2024 | ✅ Complete |
| 2 | Explain Production Method | Auto-generated by CMS v4.1.2 at time of user action; exported via read-only query EET v2.3 on 15-Mar-2024 | ✅ Complete |
| 3 | Describe the System | AWS RDS PostgreSQL 14.2 (ap-south-1); TechNova App v6.3.1; integrated system per S.63(3) | ✅ Complete |
| 4 | Certify All Four S.63(2) Conditions | Regular use ✔; Ordinary course ✔; Proper operation (CloudWatch uptime 99.97%) ✔; Authentic reproduction ✔ | ✅ Complete |
| 5 | Include SHA-256 Hash Value | a3f2b8d1c5e6f7a9b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5 (verified by Dr. Anand Sharma) | ✅ Complete |
| 6 | Sign by Authorised Persons | CISO Ms. Priya Venkatesan + DPO Mr. Rajesh Kumar + Independent Expert Dr. Anand Sharma | ✅ Complete |
Rohan Mehta alleges TechNova shared his personal data with an analytics partner, DataSense Analytics Pvt. Ltd., without his knowledge or a separate consent. He contends this violates DPDPA’s consent requirements.
TechNova’s data sharing is governed by its Data Processing Agreement (DPA) with DataSense. The DPA permits sharing of pseudonymised transactional data for fraud detection analysis only. TechNova’s data transfer logs record:
| # | Certificate Requirement | TechNova Action | Status |
|---|---|---|---|
| 1 | Identify the Record | Analytics_Partner_DataShare_Log_Q1_2024_Batch_007.json — Q1 2024 transfer log including Rohan Mehta’s pseudonymised record | ✅ Complete |
| 2 | Explain Production Method | System-generated API log captured by TechNova’s Data Governance Platform (DGP v2.1) at time of transfer; exported on 15-Mar-2024 | ✅ Complete |
| 3 | Describe the System | TechNova DGP (AWS Lambda + CloudWatch Logs); DataSense API endpoint; TLS 1.3 encrypted channel; integrated system per S.63(3) | ✅ Complete |
| 4 | Certify All Four S.63(2) Conditions | Regular use ✔; Ordinary course (fraud detection is standard process) ✔; Proper operation ✔; Authentic reproduction ✔ | ✅ Complete |
| 5 | Include SHA-256 Hash Value | 7b9d3c4f... (independently verified by Dr. Anand Sharma) | ✅ Complete |
| 6 | Sign by Authorised Persons | CISO + DPO + Independent Expert | ✅ Complete |
Rohan Mehta alleges that TechNova suffered a data breach in February 2024 but failed to notify him promptly as required by DPDPA Rule 7(1). He claims he learnt about the breach from a news article, not from TechNova.
TechNova’s incident response logs record every step of its breach detection and notification process:
| # | Certificate Requirement | TechNova Action | Status |
|---|---|---|---|
| 1 | Identify the Records | Breach_TN-BR-2024-003_Timeline.pdf + SMS_Delivery_Log_Feb15_2024.csv + Board_Notification_Receipt.json | ✅ Complete |
| 2 | Explain Production Method | AWS Security Hub auto-log; SMS delivery receipt from Airtel API; Board portal submission confirmation; all exported via TechNova’s Incident Response Platform v1.4 | ✅ Complete |
| 3 | Describe the System | AWS Security Hub + TechNova IRP (Incident Response Platform) + Airtel SMS gateway; integrated system per S.63(3) | ✅ Complete |
| 4 | Certify All Four S.63(2) Conditions | Regular use ✔; Ordinary course (incident response is a defined process) ✔; Proper operation ✔; Authentic reproduction ✔ | ✅ Complete |
| 5 | Include SHA-256 Hash Value | c1d4e9f2... (Breach Log), 8a2b7c9d... (SMS Log), 5e3f1a4b... (Board Receipt) — each certified separately | ✅ Complete |
| 6 | Sign by Authorised Persons | CISO + DPO + Independent Expert | ✅ Complete |
Rohan Mehta closed his TechNova account on 15-March-2024. He filed an erasure request on the same date. He alleges that as of the date of his complaint, his personal data had not been erased from TechNova’s systems.
TechNova’s account deletion process triggers a multi-system erasure workflow:
| # | Certificate Requirement | TechNova Action | Status |
|---|---|---|---|
| 1 | Identify the Record | Deletion_TN-88421_20240317.xml — Erasure Audit Trail for Rohan Mehta’s account; 48-Hour Notice Log; DataSense Deletion Acknowledgement | ✅ Complete |
| 2 | Explain Production Method | Auto-generated by Rights Management System v3.0 at time of each erasure event; exported on 20-March-2024 by RMS administrator Mr. D. Pillai | ✅ Complete |
| 3 | Describe the System | TechNova RMS (AWS DynamoDB + Lambda); Production DB (AWS RDS); S3 backup; DataSense API; Email Server; integrated system per S.63(3) | ✅ Complete |
| 4 | Certify All Four S.63(2) Conditions | Regular use ✔; Ordinary course (erasure workflow triggered by every account deletion) ✔; Proper operation ✔; Authentic reproduction ✔ | ✅ Complete |
| 5 | Include SHA-256 Hash Value | 9f8e2d3b... (Erasure XML), 3c7a5b1f... (48-Hr Notice Log), 6d2e4f8a... (DataSense Ack) — each certified | ✅ Complete |
| 6 | Sign by Authorised Persons | CISO + DPO + Independent Expert | ✅ Complete |
| Common Defect | Consequence | TechNova’s Preventive Measure |
|---|---|---|
| Generic record identification | Board cannot match certificate to specific record; certificate rejected | Use unique file names + record IDs in every certificate |
| No hash value or wrong algorithm | Integrity of record cannot be verified; record inadmissible | SHA-256 mandatory; generate hash at moment of extraction |
| Only one signatory (no expert) | Technical integrity of certificate challenged; reduced evidentiary weight | Always include independent digital forensic expert certification |
| System details incomplete | Board cannot assess whether S.63(2) conditions are met | Annex full system architecture document and uptime logs |
| S.63(2) conditions not individually addressed | Certificate fails on face; inadmissible | Each of four conditions must be explicitly certified in separate paragraphs |
| Late objection to opposing evidence not raised | Failure to object at earliest opportunity may waive objection (Sonu @ Amar) | TechNova’s counsel must challenge defective evidence at first hearing |
| Certificate signed by wrong person | Person must be in responsible official position; a junior IT staff certificate is insufficient | CISO-level or above; verify designation matches responsibilities |
| Hash generated after alteration window | Gap between extraction and hashing raises integrity question | Hash must be generated as immediate next step after extraction; no gap permitted |
The following is TechNova’s standard Section 63 BSA 2023 Certificate template, as applied to the consent log in the Rohan Mehta proceedings:
The TechNova case demonstrates the most critical insight of the DPDPA era: compliance must be evidence-ready from day one. It is no longer sufficient to have good processes — those processes must generate admissible electronic evidence that can withstand legal scrutiny before the Data Protection Board.
Section 63 of the Bharatiya Sakshya Adhiniyam, 2023 is the bridge between TechNova’s compliance operations and the legal proceedings it may face. Every consent log, transfer record, breach notification, and erasure audit trail must be:
In the DPDPA era, your compliance is only as strong as your Section 63 certificate.
All 9 Dispute Categories with Case Studies · SwiftMart E-Commerce Pvt. Ltd. · HealthPlus Insurance Ltd.
POSSIBLE DISPUTES
Story-Based Learning
Digital Personal Data Protection Act, 2023
All 9 Dispute Categories with Case Studies
SwiftMart E-Commerce Pvt. Ltd. · HealthPlus Insurance Ltd.
SwiftMart E-Commerce Pvt. Ltd. is a Hyderabad-based online marketplace offering consumer electronics, apparel, and grocery delivery across Tier I, II, and III cities in India. With over 12 million registered users, SwiftMart collects and processes significant volumes of personal data to facilitate transactions, personalise recommendations, and optimise logistics.
SwiftMart collects the following personal data from its customers:
This document traces the nine major categories of disputes that can arise under the DPDPA through SwiftMart's journey — from collecting consent, to handling a data breach, to facing an inquiry before the Data Protection Board of India (DPBI). A parallel insurance case study (HealthPlus Insurance Ltd.) is introduced from Category 3 onwards for comparative learning.
Consent lies at the heart of the DPDPA. Under Section 6, consent must be free, specific, informed, unconditional, and unambiguous. Any deviation creates actionable disputes. SwiftMart's onboarding flow presents five potential consent-related dispute scenarios.
| 1 | No Valid Consent Data processed without free, informed, and specific consent from the individual. |
| 2 | Bundled / Forced Consent Consent tied to a service where it is not necessary, removing genuine choice. |
| 3 | Withdrawal Ignored Processing continues after the Data Principal withdraws consent. |
| 4 | Consent by Deception Consent obtained through misleading language, dark patterns, or coercion. |
| 5 | Unauthorised Change of Purpose Data collected for one purpose is used for another without fresh consent. |
Section 5 of the DPDPA requires every Data Fiduciary to provide a clear, accessible, and complete notice before or at the time of data collection. Inadequate notice undermines a Data Principal's ability to make an informed decision, and creates disputes that can be raised before the DPBI.
| 1 | No Notice Given Data collected without informing individuals of the purpose or their rights. |
| 2 | Vague or Incomplete Notice Notice lacks clarity on purpose, data categories, or grievance mechanisms. |
| 3 | Inaccessible Language Notice not provided in a language the individual understands. |
| 4 | Failure to Update Notice Purpose changes but individuals are not re-informed with a revised notice. |
Chapter III of the DPDPA (Sections 11–15) confers on every Data Principal a suite of enforceable rights: the right to access, correct, erase, and nominate a representative. Denial of, or failure to respond to, these rights constitutes a separate category of dispute. A parallel case from HealthPlus Insurance Ltd. is introduced below.
| 1 | Denial of Access Organisation refuses to share what personal data it holds about the individual. |
| 2 | Denial of Correction Refusal to correct inaccurate or outdated personal data upon request. |
| 3 | Denial of Erasure Refusal to delete data after consent is withdrawn or purpose is fulfilled. |
| 4 | No Grievance Mechanism No redressal system in place or complaints left unacknowledged. |
| 5 | Nominee Rights Denied Lawfully appointed nominee's exercise of rights not recognised. |
Chapter II of the DPDPA (Sections 4–10) imposes affirmative obligations on Data Fiduciaries — to limit data collection, restrict retention, implement security, and designate grievance mechanisms. Failure to meet these obligations creates enforcement disputes distinct from individual rights claims.
| 1 | Purpose Limitation Violation Data used beyond the stated and consented purpose. |
| 2 | Excessive Data Retention Data retained beyond the period necessary after fulfilling the purpose. |
| 3 | Data Minimisation Failure More data collected than strictly necessary for the stated purpose. |
| 4 | Inadequate Security Safeguards Technical measures insufficient to protect personal data from breaches. |
| 5 | No Grievance Officer No designated officer or contact point made publicly available. |
Section 8(6) of the DPDPA requires every Data Fiduciary to notify the Data Protection Board and affected Data Principals promptly upon becoming aware of a personal data breach. Delays, non-disclosure, and failure to remediate are separately actionable and attract the highest tier of penalties.
| 1 | Failure to Notify Breach Affected individuals and the DPBI not informed of a personal data breach. |
| 2 | Delayed Notification Breach notification given but unreasonably late. |
| 3 | No Remedial Action No meaningful steps taken to contain or mitigate harm after a breach. |
| 4 | Breach Due to Negligence Preventable breach from failure to implement basic security measures. |
Section 9 of the DPDPA imposes heightened obligations when processing personal data of children (under 18 years of age). Verifiable parental consent is mandatory. Behavioural tracking and targeted advertising targeting children is prohibited. These obligations carry the second-highest penalty tier under the Act.
| 1 | No Parental Consent Child's data (under 18) processed without verifiable parental consent. |
| 2 | Profiling or Tracking Children Behavioural tracking or targeting of children's online activity. |
| 3 | Age Verification Failure No mechanism to verify user age before collecting children's data. |
Section 16 of the DPDPA permits cross-border transfer of personal data only to countries approved by the Central Government. Unapproved transfers, undisclosed transfers, and transfers without adequate safeguards constitute distinct violations. With SwiftMart's reliance on global cloud and analytics vendors, this is a commercially critical area of compliance.
| 1 | Transfer to Restricted Countries Data sent to countries not approved by the Central Government. |
| 2 | No Transfer Safeguards Data transferred internationally without adequate protections. |
| 3 | Undisclosed Transfer Individual not informed that their data is being sent outside India. |
Section 10 of the DPDPA empowers the Central Government to classify certain Data Fiduciaries as Significant Data Fiduciaries (SDFs) based on the volume and sensitivity of data processed, risk to Data Principals, and national security considerations. SDFs face heightened obligations — including a mandatory Data Protection Officer (DPO), periodic Data Protection Impact Assessments (DPIAs), and algorithmic accountability. If SwiftMart is classified as an SDF, these obligations activate immediately.
| 1 | No Data Protection Officer SDF has not appointed a qualified DPO as required under the Act. |
| 2 | No Data Protection Impact Assessment Mandatory DPIA not conducted before high-risk processing activities. |
| 3 | Algorithm Accountability Failure Automated decisions lack transparency, explainability, or human oversight. |
The DPDPA's enforcement architecture — the Data Protection Board of India (DPBI), the appellate mechanism before TDSAT, and the alternative dispute resolution pathway — creates a structured environment for resolving disputes between Data Principals and Data Fiduciaries. Procedural violations within this enforcement framework are themselves independently actionable.
| 1 | Complaint Rejected Without Inquiry Grievance dismissed without a fair or proper investigation. |
| 2 | Non-Compliance with DPBI Order Organisation ignores or delays implementing the Board's binding order. |
| 3 | Frivolous Complaints Vexatious complaints filed against a Data Fiduciary without factual basis. |
| 4 | Jurisdictional Disputes Disagreement on whether the DPDPA applies to a specific activity or entity. |
The following penalty tiers apply to the dispute categories covered in this document. Penalties are imposed by the Data Protection Board of India after inquiry and are subject to appeal before TDSAT.
| Maximum Penalty | Violation Category |
|---|---|
| ₹250 Crore (Highest) | Failure to implement security safeguards / personal data breach (Categories 4 & 5) |
| ₹200 Crore | Breach of children's data processing obligations (Category 6) |
| ₹150 Crore | Significant Data Fiduciary non-compliance — DPO, DPIA, Algorithmic Accountability (Category 8) |
| ₹50 Crore | Denial of Data Principal rights, notice failures, consent violations, cross-border transfer breaches (Categories 1, 2, 3, 7) |
| Variable | Grievance and enforcement violations — determined by nature and duration of non-compliance (Category 9) |
The following sequence demonstrates how disputes across multiple categories can compound into a comprehensive enforcement action:
This sequence demonstrates that DPDPA violations are rarely isolated. A consent failure at onboarding, left unaddressed, cascades into rights violations, breach disputes, and ultimately platform-level sanctions. The cost of non-compliance compounds with every category left unaddressed.
| # | Dispute Category | Key Sub-Types | Max Penalty |
|---|---|---|---|
| 1 | Consent-Related | No consent, bundled, withdrawal ignored, deception, purpose change | ₹50 Cr |
| 2 | Notice & Transparency | No notice, vague, inaccessible language, failure to update | ₹50 Cr |
| 3 | Data Principal Rights | Denial of access, correction, erasure, no grievance, nominee | ₹50 Cr |
| 4 | Fiduciary Obligations | Purpose limit, retention, minimisation, security, no officer | ₹250 Cr |
| 5 | Data Breach | No notification, delayed, no remedial action, negligence | ₹250 Cr |
| 6 | Children's Data | No parental consent, profiling, age verification failure | ₹200 Cr |
| 7 | Cross-Border Transfer | Restricted countries, no safeguards, undisclosed transfer | ₹50 Cr |
| 8 | Significant Data Fiduciary | No DPO, no DPIA, algorithm accountability failure | ₹150 Cr |
| 9 | Grievance & Enforcement | Complaint rejected, DPBI non-compliance, frivolous, jurisdictional | Variable |
Disputes under the DPDPA do not arise only from dramatic breaches or overt non-compliance. They arise from design choices made at product inception — when forms are built, consent flows are architected, and vendor contracts are signed. The most consequential compliance failures are embedded long before any individual customer complaint is filed.
Through the SwiftMart and HealthPlus stories, this document has traced the full landscape of possible disputes — from the smallest consent form deficiency to platform-level enforcement action. The DPDPA creates accountability not for breaches alone, but for every instance where a Data Principal's autonomy over their own data is compromised.
Understanding the complete dispute landscape is not merely a legal exercise. It is a governance imperative for every organisation that processes personal data of individuals in India.
Disclaimer: For educational and awareness purposes only. Not legal advice. Consult a qualified data protection lawyer for specific matters. | DPDPA 2023 · India
All four modules cover the complete landscape of India's data protection law. Test your knowledge with a quiz or proceed to earn your free certification.
Select a module below to start your 10-question quiz. Test your knowledge and track your score.
You scrolled through this module much faster than any reader could meaningfully absorb this material.
This is for your own benefit. Please go back, take your time, and let the content sink in before marking it complete.