| Rule 1: Basic Provisions | Allows for adaptable implementation approach 
                                Final rules may have modifications, but no major changes anticipated. | 
                                Effective Implementation of the Act has to be done in accordance with these rules
                                 | 
                    
                        | Rule 2: Definitions | 
                                Rules are appendix to the Act henceforth definition given in the Act shall be
                                    followed.
                                 | 
                                Context-specific interpretations allowed  | 
                    
                        | Rule 3: Privacy Notice | To establish fundamental requirements for privacy notifications: 
                                Must be independent and easily understandable to ensure transparency and
                                    accountability
                                Requires itemized description and clear purposeMust cover both website and app platformsWithdrawal of consent mechanism to be updated in the Privacy Notice.  | 
                                Privacy Notice cannot be clubbed as part of terms and conditions.Itemized description of personal data with a clear purpose in a tabular form along
                                    with
                                    list of goods and services should be considered while formation of Privacy notice.
                                Update website and application with communication link for exercising data principal
                                    rights along with withdrawal mechanism and grievance redressal. | 
                    
                        | Rule 4 r/w Schedule 1: Consent Manager (CM) | Mandatory requirement of Consent Manager 
                                Minimum financial requirement of 2 croresMust obtain independent registration.Must be interoperable between CM and Data PrincipalRequired to maintain consent records for 7 yearsMust develop website/app for service accessRegular audits as per Board requirements | 
                                Establish framework for consent managementDefine interoperable requirements for CMsConsent managers to act as registered intermediaries to data fiduciaries.Consent manager will be dealing independently with consent and withdrawal of consent
                                    for
                                    an organisation.Consent manager to manage and document, the records of consent. | 
                    
                        | Rule 5 r/w Schedule 2 & 7: Government Data Processing | 
                                Guidelines for data processing by government and its entities.Limited to legal purposes and public fund usage
                                Must maintain data accuracyRequires transparency in data usageMandatory security measures | 
                                Only government and its instrumentalities are exempted and dealing with government
                                    does not perse exempt an organisation from its compliance obligations under the
                                    DPDPA.
                                 | 
                    
                        | Rule 6: Security Safeguards | 
                                Advanced encryption protocols requiredAccess control systems shall be in place
                                Comprehensive monitoring capabilitiesRegular backup proceduresDetailed logging requirements | 
                                Organisations to update and review existing privacy and security frameworks.
                                Implementation of reasonable security measures for preventing data breach, the rules
                                    specify a list of minimum safeguards requiring Fiduciaries to contractually obligate
                                    processors to ensure Data Security | 
                    
                        | Rule 7 Data Breach Management | 
                                Notify within 72-hour of the breach to the board and affected DPsMust provide: Breach description
                                Must provide potential consequenceRemedial measures taken Safety measures should be implemented Business contact information to be provided | 
                                Organisations to develop and enforce DPDPA compliant data breach procedures.Organisations to establish mechanism to notify Data Principals and Data Protection
                                    Board
                                    in case of a Data Breach within the stipulated timeline. | 
                    
                        | Rule 8 r/w Schedule 3: Data Retention | 
                                48-hour advance notice required before data deletionSchedule 3 guidelines to be followedClear data retention purpose documentation requiredStatutory requirements must be met | 
                                • Data Fiduciary to ensure establishment of Data Retention and Data Deletion for
                                    active
                                    and inactive users’ as per the procedure notified in the draft rules.Establish procedure to ensure that Data Principal is served with the Privacy Notice
                                    at
                                    least 48 hours prior to the Data Deletion. | 
                    
                        | Rule 9: Contact Information | 
                                DPO contact details to be made available on website/appFor response mechanism either DPO or any person who is able to answer on behalf of
                                    Data Fiduciary should be appointed | 
                                If applicable, Data Fiduciary to appoint Data Protection Officer (DPO)Data Fiduciary to publish the business contact information of the DPO on its website
                                    or
                                    application.Data Fiduciary to establish response mechanism and it shall also publish business
                                    contact information of the DPO. | 
                    
                        | Rule 10:Child/Disability Consent | 
                                Verifiable parental consent mechanismsDigital authentication systemsGuardian verification protocols | 
                                Data Fiduciary to ensure that age gating and age verification is completed.
                                Data Fiduciary to ensure due diligence is done by either using voluntary submission
                                    of
                                    data or government aggregators.
                                 | 
                    
                        | Rule 11 r/w Schedule 4: Child Data Exemptions | Exempted Sectors include: 
                                Educational institution Healthcare provider To follow Safety monitoring protocols | 
                                Classes of Data Fiduciary specified under Schedule 4 do not enjoy blanket right to
                                    process any kind of Personal Data rather they can process data only for specified
                                    purpose as mentioned in the rules. | 
                    
                        | Rule 12: Significant data fiduciary | Obligations of Significant Data Fiduciaries: 
                                Annual impact assessmentAlgorithmic accountabilityDomestic data processing restrictionsRegular audit requirementsThis requirement only applies to specific categories of Personal Data that will be
                                    designated by the Central Government  |  | 
                    
                        | Rule 13: Data Principal Rights | Data Retention for Children: 
                                Clear identification protocolsStructured grievance resolutionNomination rightsStandardized mechanisms for execution of rightsDetails of the means and purpose to be notified on the website or application. | 
                                Data Fiduciary to update their Privacy Notice using simple language to explain what
                                    data
                                    you collect and purpose of such collection.Create a dedicated Data Principal rights section on the website or application
                                    including step by step guide for making requests and providing multiple contact
                                    options
                                    (email, phone, form etc.)Maintain detailed records of all Data Principals’ request and to keep logs of all
                                    actions taken on such requests. | 
                    
                        | Rule 14: International Transfer | Cross-border data handling: 
                                Compliance to be done in accordance with Central GovernmentForeign state sharing protocols to be followed | 
                                Data Fiduciary to map all international data flows and identify which transfers
                                    involve Indian customer data and document where the data is going and who receives
                                    it.
                                Monitor Government notification and set up a process to verify compliance before
                                    each
                                    transfer.Regular review of international data sharing agreementsCheck for latest government order before initiating new international data transfers
                                    as requirements may vary according to transferee country. | 
                    
                        | Rule 15 r/w Schedule 2:Research Exemption |  | 
                                Create clear policies separating exempt vs non-exempt data processing | 
                    
                        | Rule 16 to 22 r/w Schedule 5 & 6: Board Composition and Operations with Appeals | Board Composition: 
                                Search committee protocolsAppointment proceduresBoard framework: Remote OperationsMeeting proceduresDecision-making protocolsStaff appointment conditionsDigital filing requirement Fee payment protocols Tribunal operationsAppeal Procedure Appeals to be directed to TDSAT. |  | 
                    
                        | Rule 22 r/w Schedule 7: Information Requests | Government authority: 
                                Information request by Central Government for sovereignty, integrity and National
                                    security of the State | 
                                Data Fiduciary to furnish such information with authorized signatory as may be
                                    called
                                    for.Data Fiduciaries to ensure not to disclose the information except with previous
                                    permission in writing of authorized person of the State. |