{"id":17403,"date":"2024-04-26T18:32:58","date_gmt":"2024-04-26T22:32:58","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=17403"},"modified":"2024-05-30T15:08:27","modified_gmt":"2024-05-30T19:08:27","slug":"dpdpa-compliance","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/","title":{"rendered":"Navigating DPDPA Compliance"},"content":{"rendered":"<h5><b>Introduction<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.<\/span><\/p>\n<h5><b>Key DPDPA Definitions<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">A<\/span><i><span style=\"font-weight: 400;\"> Data Fiduciary<\/span><\/i><span style=\"font-weight: 400;\"> is anyone who alone or in conjunction with others determines the purpose and means of processing of personal data. A <\/span><i><span style=\"font-weight: 400;\">Data Principal<\/span><\/i><span style=\"font-weight: 400;\"> is the individual to whom the personal data relates, with a special focus on children or the disabled and their lawful guardians, but of course, this pretty much means everyone in a family.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A <\/span><i><span style=\"font-weight: 400;\">Data Processor<\/span><\/i><span style=\"font-weight: 400;\"> is a person who processes personal data on behalf of a Data Fiduciary. <\/span><i><span style=\"font-weight: 400;\">Processing <\/span><\/i><span style=\"font-weight: 400;\">means fully or partly automated operations on digital personal data, including its collection, storage, use, disclosure, or restriction\/erasure. And, a <\/span><i><span style=\"font-weight: 400;\">Data Protection Officer<\/span><\/i><span style=\"font-weight: 400;\"> is the person appointed by the \u201csignificant\u201d Data Fiduciary.\u00a0\u00a0<\/span><\/p>\n<h5><b>The Importance of Compliance<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Non-compliance with the DPDPA can lead to substantial penalties, including fines up to 250 crore INR (roughly US $30M). Such measures highlight the critical need for data-centric protection practices that can maintain compliance and uphold public trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IRI has <\/span><a href=\"https:\/\/www.iri.com\/news\/press-releases\/hawktech-as-iri-inc-partner-to-help-firms-protect-pii-subject-to-dpdp-law\"><span style=\"font-weight: 400;\">recently partnered<\/span><\/a><span style=\"font-weight: 400;\"> with Indian data consultancy HawkTech Advance Solutions in Noida to apply expert vulnerability assessment services with <\/span><a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\">IRI Data Protector Suite software<\/span><\/a><span style=\"font-weight: 400;\"> like <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> to classify, discover, and mask PII <\/span><i><span style=\"font-weight: 400;\">before <\/span><\/i><span style=\"font-weight: 400;\">a data breach happens. This same combination of expertise and technology also aims to satisfy DPDPA Subject Access Requests (SARs).<\/span><\/p>\n<p><b><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17405 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2024\/04\/personal-data-protection-300x200.png\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/personal-data-protection-300x200.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/personal-data-protection.png 758w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/b><\/p>\n<h5><b>Data Discovery and Masking for Compliance<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">In general, if breached data was rendered unidentifiable by prior redaction, erasure, or pseudonymisation for example, it cannot be reused. Such prevention of data misuse should thus preclude any DPDPA penalties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If it is too late, however, and a breach of unmasked data has occurred, the DPDPA requires notification of the affected Data Principals about what has been exposed. Data Fiduciaries must identify (by searching for all names or Aadhaar numbers for example) and notify those whose unmasked values were found (and thus exposed). They can do this through the IRI product search logs; see <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/verifying-compliance\"><span style=\"font-weight: 400;\">this page<\/span><\/a><span style=\"font-weight: 400;\"> and details in the next section.<\/span><\/p>\n<h5><b>Key DPDPA Provisions and IRI Technology Applications<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Following are the general requirements of the DPDPA and specific IRI solutions to them. Let\u2019s start with those pertaining to the Data Fidicuciary\u2019s responsibility to obtain consent to process a Data Principal\u2019s data, and to maintain an audit trail around it:<\/span><\/p>\n<p><b><i>Chapter II,<\/i><\/b><i><span style=\"font-weight: 400;\"> Obligations of Data Fiduciary, <\/span><\/i><\/p>\n<p><b><i>5. (1)<\/i><\/b><i> Every request made to a Data Principal under section 6 for consent shall be <\/i><i>accompanied or preceded by a notice given by the Data Fiduciary to the Data Principal, informing her,\u2014<\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(i) the personal data and the purpose for which the same is proposed to be processed;<\/span><\/i><\/p>\n<p><b>Chapter II, Section 10:\u00a0<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">(2) The Significant Data Fiduciary shall\u2014<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(c) undertake the following other measures, namely:\u2014<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(i) periodic Data Protection Impact Assessment, which shall be a process comprising a description of the rights of Data Principals and the purpose of processing of their personal data, assessment and management of the risk to the rights of the Data Principals, and such other matters regarding such process as may be prescribed;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(ii) periodic audit<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">and<\/span><\/p>\n<p><b><i>Chapter III, Section 11: <\/i><\/b><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i> <i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(1) The Data Principal shall have the right to obtain from the Data Fiduciary to whom she has previously given consent, including consent as referred to in clause (a) of section 7 (hereinafter referred to as the said Data Fiduciary), for processing of personal data, upon making to it a request in such manner as may be prescribed,\u2014<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(a) a summary of personal data which is being processed by such Data Fiduciary<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">and the processing activities undertaken by that Data Fiduciary with respect to such personal data;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">These clauses effectively require the Data Fiduciary to locate, extract, and provide the Data Principal with his\/her record(s) for review. IRI software users can pull those records from tables or files in a simple (e.g., FieldShield) <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl-metadata\"><span style=\"font-weight: 400;\">job script<\/span><\/a><span style=\"font-weight: 400;\"> using the SQL SELECT (query) syntax, or an \/INCLUDE filter on the Data Principal\u2019s name or other value in a unique identifier column.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similarly, an IRI DarkShield search through structured, semi-structured, or unstructured sources can optionally save the person\u2019s name or other unique attribute\/s (e.g., a phone number or email address) in human or machine-readable search logs.<\/span><\/p>\n<p><b><i>Chapter II, 5. (2)(b)<\/i><\/b><i><span style=\"font-weight: 400;\">, the Data Fiduciary may continue to process the personal data until and unless the Data Principal withdraws her consent.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Once a Data Principal has withdrawn their consent, the Data Fiduciary must be able to find and delete (or otherwise &#8220;cease processing&#8221;) all data associated with that Data Principal. See the section on erasure below.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note that an \/OMIT WHERE clause in FieldShield jobs may be added to allow for the exigencies to this however, as foreseen in:<\/span><\/p>\n<p><b><i>Chapter II, Section 7 (II)<\/i><\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">(c) for the performance by the State or any of its instrumentalities of any function under any law for the time being in force in India or in the interest of sovereignty and integrity of India or security of the State;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(d) for fulfilling any obligation under any law for the time being in force in India on any person to disclose any information to the State or any of its instrumentalities, subject to such processing being under the provisions regarding disclosure of such information in any other law for the time being in force;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(e) for compliance with any judgment decree or order issued under any law for the time being in force in India, or any judgment or order relating to claims of a contractual or civil nature under any law for the time being in force outside India;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(f) for responding to a medical emergency involving a threat to the life or immediate threat to the health of the Data Principal or any other individual;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(g) for taking measures to provide medical treatment or health services to any individual during an epidemic, outbreak of disease, or any other threat to public health;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(h) for taking measures to ensure safety of, or provide assistance or services to, any individual during any disaster, or any breakdown of public order.<\/span><\/i><\/p>\n<h5><b>Robust Data Discovery Is Needed for Audit, Consent, Data Protection and More\u00a0\u00a0<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The sections above mean that the Data Fiduciary needs \u2013 for risk assessment, management, and summarization purposes \u2013 to know where the Data Principal\u2018s PII is stored. Again, this is something that <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> can discover in structured, semi-structured, and unstructured sources on-premise or in the cloud from searches that produce logs described in features #1, 3, and 7 <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\/audit-logs\"><span style=\"font-weight: 400;\">listed here<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17409 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2024\/04\/Darkshield-aggregate-results-report-300x208.png\" alt=\"\" width=\"423\" height=\"293\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/Darkshield-aggregate-results-report-300x208.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/Darkshield-aggregate-results-report.png 512w\" sizes=\"(max-width: 423px) 100vw, 423px\" \/><\/h4>\n<p><span style=\"font-weight: 400;\">The need for discovery of both direct and indirect Data Principal identifies is also a condition precedent to meeting DPDPA security and SAR requirements, starting with <\/span><b><i>data protection<\/i><\/b> <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">through PII data masking<\/span><\/a><span style=\"font-weight: 400;\"> functions, per:,\u00a0<\/span><\/p>\n<p><b><i>Chapter II, Section 8:<\/i><\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">(5) A Data Fiduciary shall protect personal data in its possession or under its control, including in respect of any processing undertaken by it or on its behalf by a Data Processor, by taking reasonable security safeguards to prevent a personal data breach.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The consistent application of obfuscation functions like redaction, removal, pseudonymization, scrambling, encryption, and blurring \u2013 all of which are provided and configurable in IRI FieldShield and DarkShield \u2013 provides those safeguards and production environments, as well as realism and referential integrity in test environments.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17410\" src=\"\/blog\/wp-content\/uploads\/2024\/04\/New-field-rule-wizard-221x300.png\" alt=\"\" width=\"368\" height=\"500\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/New-field-rule-wizard-221x300.png 221w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/New-field-rule-wizard.png 526w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In addition to data protection, Data Principals have the<\/span> <b><i>right to rectificatio<\/i><\/b><b>n <\/b><span style=\"font-weight: 400;\">so that the data being processed or stored by the Data Fiduciary is up to date and\/or corrected:<\/span><\/p>\n<p><b><i>Chapter III, Section 12: <\/i><\/b><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><\/p>\n<p><i>12. (1) A Data Principal shall have the right to correction, completion, updating and erasure of her personal data for the processing of which she has previously given consent, including consent as referred to in clause (a) of section 7, in accordance with any requirement or procedure under any law for the time being in force.<\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(2) A Data Fiduciary shall, upon receiving a request for correction, completion, or updating from a Data Principal,<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(a) correct the inaccurate or misleading personal data;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(b) complete the incomplete personal data; and<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">(c) update the personal data.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">This right to rectification means the Data Fiduciary must find and fix the Data Principal\u2019s data, which could exist in different silos. In structured sources, changing values can be done with a lookup transformation or conditional field statement in a FieldShield job.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the data is in structured, semi-structured and\/or unstructured sources, it\u2019s possible to set up a DarkShield pseudonymization rule to auto-substitute a particular person\u2019s PII in multiple data sources. This can be done via specifically named <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">data classes<\/span><\/a><span style=\"font-weight: 400;\"> that refer to a new value placed in the relevant replacement set file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, Data Principal have the<\/span> <b><i>right to erasure<\/i><\/b><span style=\"font-weight: 400;\">, per the GDPR right to be forgotten:\u00a0<\/span><\/p>\n<p><b><i>Chapter III, Section 12,\u00a0<\/i><\/b><\/p>\n<ol start=\"12\">\n<li><i><span style=\"font-weight: 400;\"> (3)\u00a0 A Data Principal shall make a request in such manner as may be prescribed to the Data Fiduciary for erasure of her personal data, and upon receipt of such a request, the Data Fiduciary shall erase her personal data unless retention of the same is necessary for the specified purpose or for compliance with any law for the time being in force.<\/span><\/i><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The &#8220;<\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-be-forgotten-masking-tools\/\"><span style=\"font-weight: 400;\">Right to be Forgotten<\/span><\/a><span style=\"font-weight: 400;\">&#8221; article (re: GDPR) explains how to do this in each IRI data masking product.<\/span><\/p>\n<h5><b>Implementation Scenarios and Best Practices<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Implementing these solutions requires strategic planning and proactive management of data protection measures:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerability Assessments: Engage with the experts at HawkTech to analyze and test your systems for their risk from cyber attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proactive Data Protection: Deploy IRI FieldShield or DarkShield to perform continuous data scans, and masking sensitive data so it\u2019s secure and compliant well before any potential breach occurs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Responsive Data Management Post-Breach: If your data was not pre-masked, you can still use the built-in data classification and discovery features in these tools to identify, report on the exposed data to meet notification requirements. And of course, you can use the masking functions to neutralize future breaches in relevant data silos and sources.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17411\" src=\"\/blog\/wp-content\/uploads\/2024\/04\/HawkTech-IRI-DPDPA-Revised-300x226.png\" alt=\"\" width=\"494\" height=\"372\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/HawkTech-IRI-DPDPA-Revised-300x226.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/HawkTech-IRI-DPDPA-Revised-1024x771.png 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/HawkTech-IRI-DPDPA-Revised-768x578.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/HawkTech-IRI-DPDPA-Revised.png 1110w\" sizes=\"(max-width: 494px) 100vw, 494px\" \/><\/p>\n<h5><b>Conclusion and Call to Action<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The Digital Personal Data Protection Act 2023 sets forth rigorous standards that redefine data privacy and security. By leveraging HawkTech\u2019s expert services in India with best-in-class IRI data classification, discovery, and masking software, you can comply with the law\u2019s many requirements, and strengthen the security posture of your data processing and development infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Click <\/span><a href=\"https:\/\/www.hawktech.co.in\/contact-4\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\"> to contact HawkTech in India, and <\/span><a href=\"https:\/\/www.iri.com\/company\/contact\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\"> to contact IRI. Please tell us about your environment, timeline, and availability for an online meeting and demonstration. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities. Key DPDPA Definitions A Data Fiduciary is<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\" title=\"Navigating DPDPA Compliance\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":17414,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-17403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Navigating DPDPA Compliance - IRI<\/title>\n<meta name=\"description\" content=\"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating DPDPA Compliance - IRI\" \/>\n<meta property=\"og:description\" content=\"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T22:32:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T19:08:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"Navigating DPDPA Compliance\",\"datePublished\":\"2024-04-26T22:32:58+00:00\",\"dateModified\":\"2024-05-30T19:08:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\"},\"wordCount\":1753,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\",\"name\":\"Navigating DPDPA Compliance - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png\",\"datePublished\":\"2024-04-26T22:32:58+00:00\",\"dateModified\":\"2024-05-30T19:08:27+00:00\",\"description\":\"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png\",\"width\":768,\"height\":368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating DPDPA Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating DPDPA Compliance - IRI","description":"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Navigating DPDPA Compliance - IRI","og_description":"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.","og_url":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/","og_site_name":"IRI","article_published_time":"2024-04-26T22:32:58+00:00","article_modified_time":"2024-05-30T19:08:27+00:00","og_image":[{"width":768,"height":368,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","type":"image\/png"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/"},"author":{"name":"David Friedland","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"Navigating DPDPA Compliance","datePublished":"2024-04-26T22:32:58+00:00","dateModified":"2024-05-30T19:08:27+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/"},"wordCount":1753,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/","url":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/","name":"Navigating DPDPA Compliance - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","datePublished":"2024-04-26T22:32:58+00:00","dateModified":"2024-05-30T19:08:27+00:00","description":"The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India\u2019s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities.","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","width":768,"height":368},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/dpdpa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Navigating DPDPA Compliance"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/beta.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/04\/DPDPA.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17403"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=17403"}],"version-history":[{"count":12,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17403\/revisions"}],"predecessor-version":[{"id":17546,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17403\/revisions\/17546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/17414"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=17403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=17403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=17403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}