The DPDP Rules, 2025: What Multinationals and Indian Businesses Must Know for the Road Ahead
Privacy Enforcement

The DPDP Rules, 2025: What Multinationals and Indian Businesses Must Know for the Road Ahead

The Digital Personal Data Protection Act, 2023 (DPDP Act), has finally moved from promise to practice in India. On 14 November 2025, the Ministry of Electronics and Information Technology formally notified the Digital Personal Data Protection Rules, 2025, marking a key step in their rollout. This is a pivotal moment not only for India’s burgeoning digital economy but also for multinational organizations with any operational footprint in the country. From shared service centers and engineering teams to customer support, cloud infrastructure, or product offering businesses, this is a significant juncture for anyone engaging with the global privacy ecosystem. 

With India’s fast-growing tech adoption and massive data flows, businesses worldwide that were monitoring its regulatory evolution are now facing a mandatory readiness. Let us understand what the notification means in practice and what regulatory signals are emerging from DPDP’s rollout. 

The Pillars of DPDP Compliance 

India now has a practical and innovation-friendly system for data protection. DPDP aims to support ease of understanding the country’s growing digital ecosystem while encouraging compliance and strengthening citizens’ trust. The far-reaching expectation is to ensure that businesses process personal data transparently, securely, and in a manner that preserves the individual’s control at every stage of the data lifecycle. 

Notice & Consent UX 

The DPDP Act places its earliest and strongest emphasis on the clarity and accessibility of privacy notices. Businesses must present notices as standalone, easily understandable explanations of what data is collected and why, with itemized details and specific purpose statements. Importantly, the Rules also require explicit, visible pathways for users to withdraw consent, exercise their rights, or escalate complaints. 

Security Safeguards 

As per Rule 6,  businesses must adopt encryption, access controls, event logging, backup mechanisms, and organizational safeguards that ensure consistent protection of personal data, including data handled by processors. The requirement to maintain logs for at least one year significantly raises expectations for operational visibility. 

Breach Notifications 

DPDP introduces one of India’s strictest breach-notification frameworks, requiring businesses to notify both the regulator and affected individuals without delay. The Rules outline detailed disclosures, including breach nature, consequences, mitigation steps, and safety guidance, emphasizing actionable transparency.  

Retention + Auto-Deletion Timelines 

The Act treats unnecessary data retention as a compliance risk rather than a benign business choice. Rule 8 requires businesses to erase personal data once the specified purpose is achieved, unless another law requires retention. Additionally, DPDP introduces inactivity-based deletion which says that if a user does not engage for a defined period, the business must auto-erase data after giving a 48-hour prior notice. Companies must also retain personal data and associated logs for at least one year for audit and accountability purposes. 

DPO / Contact Publishing 

DPDP mandates a clear public-facing point of contact for all questions related to personal data processing. Whether or not a company appoints a formal Data Protection Officer, it must prominently publish the contact details of a responsible person and include this information in every rights response. 

Child & Guardian Verification 

The Rules impose rigorous obligations for verifying parental consent before processing children’s data, requiring identity and age checks based on reliable records or Digital Locker tokens. For persons with disabilities who have lawful guardians, the Rules further require verification of legal authority through designated bodies or court appointments. 

Duties of Significant Data Fiduciaries (SDFs) 

SDFs or data fiduciaries that process large volumes of personal data, once designated, will face the highest level of scrutiny. This will include mandatory annual DPIAs, independent audits, and algorithm risk assessments. It will also cover evaluating whether automated systems used for hosting, displaying, or transmitting personal data could pose risks to individual rights. Additionally, the SDFs must comply with potential restrictions on transferring specific classes of sensitive data outside India. 

Rights Exercise (DSRs) 

DPDP requires businesses to operationalize user rights, including access, correction, erasure, and grievance redressal, through clear, prominently published channels. The Rules allow users to exercise rights using the same mechanisms through which they granted consent, reinforcing the Act’s UX-centric vision. Businesses must respond to grievances within a maximum of 90 days and support nominee-based rights requests, creating a structured, user-friendly rights ecosystem. 

Cross-border Transfers 

DPDP adopts a relatively flexible approach where transfers are allowed unless explicitly restricted by the government. However, the Rules emphasize that certain categories of personal data may be subject to domestic-only processing based on future government notifications. Businesses must therefore design cross-border architectures with adaptability in mind, ensuring they can localize certain data flows if required. 

Government Power to Request Information 

Under Rule 23, the government may require businesses to furnish information for purposes listed in the Seventh Schedule, including investigations, law enforcement needs, cybersecurity, or regulatory oversight. In some cases, companies may even be prohibited from disclosing that such a request was made. This places an operational and legal responsibility on businesses to maintain reliable records, traceable logs, and compliant reporting processes. 

The DPDP Readiness Blueprint for Organizations 

The DPDP Rules also introduce a phased implementation timeline, with most operational obligations becoming enforceable eighteen months from the date of notification. This transition window gives businesses the space to realign their data practices, redesign consent and rights workflows, strengthen security posture, and prepare for the more demanding mandates around retention, verification, and cross-border governance. 

  • Specific Steps for For Multinational Organizations 
    • Assess where your global policies diverge from DPDP obligations, especially around notice UX, consent specificity, inactivity-based deletion, and rights delivery via the same interface 
    • Identify every workflow, system, vendor, and internal function where India-linked personal data is processed, including cloud tools, global CRMs, engineering logs, L1/L2 support systems, and offshore analytics teams. 
    • Build contingency options like local storage zones, region-specific routing, hybrid cloud toggles, and the ability to isolate India-specific data sets if future notifications require it. 
    • Implement DPDP-compliant rights and grievance flows with globally coordinated case management, nominee-based authentication, and workflows capable of retrieving data stored in different jurisdictions or systems 
    • Update DPDP-relevant clauses around security safeguards, breach notification timelines, retention logic, and India-specific obligations. 
    • If designated as a Significant Data Fiduciary, a multinational must evaluate algorithmic systems, risk models, and data processing pipelines used globally. This includes DPIAs, annual audits, algorithmic impact assessments, and enforcing India-mandated controls across multinational IT environments. 
  • Build Clear, User-First Disclosure & Consent Journeys:  
    • Begin with auditing all existing privacy notices, consent prompts, and onboarding flows 
    • Ensure they meet DPDP’s requirement for standalone, plainly-worded, itemized notices 
    • This means rewriting notices to clearly list what data is collected, why it is collected, and what service or function depends on that data 
  • Establish Verificable Security Foundations 
    • Conduct a gap assessment of the current security posture against DPDP’s minimum requirements 
    • Assess for encryption/masking, strict access controls, centralized logging, breach-detection monitoring, and disaster-recovery capabilities 
    • Logs must be retained for at least one year, which may require redesigning logging infrastructure or expanding SIEM capacity 
  • Structured, Rapid Breach-Response Engine 
    • Implement automated detection, internal escalation, and templated communications.  
    • Create clear response teams, define roles for legal, security, and engineering, and conduct tabletop exercises to validate readiness 
  • Purpose-Driven Retention and Automated Deletion Controls 
    • Map each category of personal data to its specific purpose.  
    • Track when that purpose is fulfilled, and automatically erase data unless another law requires retention.  
    • Deletion workflows for prolonged user inactivity require system-level engineering, including purpose tags, retention rules, deletion queues, inactivity monitors, and automated user notifications. 
  • Transparent Privacy Contact Channel 
    • Publish an easily accessible privacy point of contact, whether a formal DPO or another responsible officer, and include this contact in all rights-related responses.  
    • Audit websites, apps, and documentation to ensure consistency and visibility across all touchpoints. 
  • Age- and Guardian-Verification Systems 
    • While handling data from children or vulnerable individuals, implement robust identity and age verification mechanisms based on reliable records or Digital Locker-verified tokens.  
    • Sectors like gaming, ed-tech, telecom, and social media must redesign onboarding flows to identify minors and obtain verifiable parental consent.  
    • For persons with disabilities, this requires new UI components, backend logic, secure storage of verification evidence, and training for support teams. 
  • Governance Capacity for Potential SDF Designation 
    • High-volume data processors should prepare early for possible designation as Significant Data Fiduciaries.  
    • Establish DPIA processes, annual independent audits, algorithmic risk reviews, and structured data-flow mapping.  
    • Prepare for potential restrictions on transferring certain sensitive data categories outside India by developing adaptable storage and routing architectures. 
  • Redeployable Cross-Border Data Architectures 
    • Although cross-border transfers are allowed by default, organizations must prepare for rapid restrictions if the government classifies certain data categories as domestic-only.  
    • Evaluate whether your infrastructure supports optional data localization, region-based routing, or hybrid cloud setups. 

Stepping Into India’s New Data Privacy Era 

The notification of the DPDP Rules marks the beginning of India’s most consequential shift in digital governance to date. This reshapes expectations not only for domestic enterprises but also for multinationals with any operational, commercial, or data-processing connection to India. As the ecosystem matures and technical standards solidify, the organizations that thrive, both Indian and multinational, will be those that embed compliance into their operating DNA. Treating DPDP as a continuous capability, rather than a one-time implementation project, will be the defining factor that separates businesses that merely adapt from those that lead in a trust-first digital marketplace. 


Author

Dan Clarke
Dan Clarke
President, Truyo
November 20, 2025

Let Truyo Be Your Guide Towards Safer AI Adoption

Connect with us today