loader image

Consent Managers, Children’s Data, and More: Looking Deeper into the Digital Personal Data Protection (DPDP) Rules, 2025

Consent Managers, Children’s Data, and More: Looking Deeper into the Digital Personal Data Protection (DPDP) Rules, 2025

DPDP Rules 2025

The Digital Personal Data Protection (DPDP) Rules 2025, implemented under the authority of the Digital Personal Data Protection Act 2023, represent a significant update in India’s data protection framework. These rules were finalized and notified by the Ministry of Electronics and Information Technology (MeitY) on 13 November 2025, following a rigorous legislative process that started with the draft rules’ public release on 3 January 2025.

Legislative Process and Timeline

The journey of the DPDP Rules began with the publication of the Draft Rules on 3 January 2025 in the Official Gazette of India. This step was a statutory requirement under sub-section (1) of section 40 of the DPDP Act, 2023. The draft rules were circulated to invite public feedback, objections, and suggestions from all stakeholders likely to be impacted. The government allotted a window for receiving these responses, fostering transparency and public participation in shaping the final regulation.

Following a deliberation on the feedback received from diverse stakeholders throughout this consultation phase, the Ministry finalized and notified the Rules in the Official Gazette of India dated 13 November 2025. Notably, the Rules provide for a phased implementation approach: certain provisions took effect immediately upon notification, others after one year, and some after eighteen months.

• Rule 1, 2 and 17-21 are applicable onwards 13 November.

• Rule 4 (regarding Consent Managers) will be applicable onwards one year from 13 November.

• Rule 3, 5 to 16-21 will be applicable onwards eighteen months from 13 November.

This phased implementation approach aims to give data fiduciaries adequate time to comply while safeguarding personal data effectively.

Summary and Arrangement of Provisions

The DPDP Rules comprise 23 substantive rules organized to create a coherent regulatory architecture. The rules open with foundational provisions: Rules 1 to 2 establish short title, commencement dates, and essential definitions, including key terms like “techno-legal measures,” “user account,” and “verifiable consent.”

Rule 3 mandates that notices provided by Data Fiduciaries to Data Principals be clear, independent, and sufficiently detailed to enable informed consent. The notice must itemize the specific personal data processed, specify purposes, and provide accessible links to withdraw consent or exercise data subject rights.

Rule 4 governs Consent Manager registration and obligations, which is a pivotal addition effectively creating a new regulated category of intermediaries. Part A of the First Schedule outlines ten conditions for registration, including incorporation in India, minimum net worth of two crore rupees, and independent certification of interoperable platforms. Part B details thirteen obligations, requiring Consent Managers to maintain consent records for at least seven years, act in a fiduciary capacity, avoid conflicts of interest with Data Fiduciaries, and publish transparency information.

Rule 5 addresses processing of personal data by the State and its instrumentalities for provision of subsidies, benefits, services, and licenses, requiring adherence to standards specified in the Second Schedule.

Rule 6 prescribes reasonable security safeguards, including encryption, access controls, anomaly monitoring, data backups, and retention of logs for one year.

Rule 7 establishes a two-tiered breach notification framework: immediate notification to affected Data Principals in plain language, followed by detailed notification to the Data Protection Board within seventy-two hours.

Rule 8 specifies timeframes for data erasure based on Data Fiduciary class and processing purpose, as detailed in the Third Schedule. E-commerce entities, gaming intermediaries, and social media platforms holding two crore, fifty lakh, and two crore registered users, respectively, must erase data three years after the Data Principal’s last interaction, unless otherwise required by law.

Rules 9 to 11 address transparency and vulnerable populations. Rule 9 requires publication of Data Protection Officer or designated contact information. Rules 10 and 11 establish verifiable consent mechanisms for children and persons with guardians, leveraging identity verification through government-issued tokens and Digital Locker services.

Rule 12 provides exemptions from parental consent requirements for specific Data Fiduciary classes (healthcare providers, educational institutions, crèches) and particular purposes (health protection, educational tracking, safety monitoring).

Rule 13 imposes stringent obligations on Significant Data Fiduciaries: annual Data Protection Impact Assessments and independent audits, algorithmic risk assessments, and restrictions on cross-border transfer of personal data classified by government committee.

Rules 14 to 16 guarantee Data Principal rights, encompassing means of exercising access, correction, and deletion rights; a ninety-day grievance redressal window; and exemptions for research, archival, and statistical processing consistent with Second Schedule standards.

Rules 17 to 22 address administrative mechanics: appointment of Data Protection Board members through Search-cum-Selection Committees, compensation, digital office functioning enabling virtual proceedings, and appeal provisions to the Appellate Tribunal with digital filing requirements.

Rule 23 empowers the Central Government to call for information from Data Fiduciaries and intermediaries for purposes specified in the Seventh Schedule, including sovereign security, and notified government functions, with confidentiality protections where disclosure threatens State interests.

Key Changes from Previous Legislation

1. Introduction of Consent Managers as Regulated Intermediaries

The DPDP Rules introduce Consent Managers, a new institutional category, representing a conceptual shift from traditional consent management. Unlike historical frameworks focusing on consent as a binary transaction between Data Fiduciary and Data Principal, the Rules embed Consent Managers as trusted intermediaries managing consent lifecycle events.

Strength: This architecture theoretically decouples consent management from commercial incentives, potentially reducing conflicts of interest. By mandating financial net worth thresholds and independent platform certification, the framework aims to ensure stability and credibility.

Concern: The minimum net worth requirement of two crore rupees, while protecting against fly-by-night operators, may inadvertently create barriers to entry for innovative fintech or tech startups attempting to enter the consent management space. Additionally, the obligation to act in a fiduciary capacity while maintaining financial viability remains untested, and conflicts could emerge if Consent Managers face commercial pressures to prioritize data flows or face deregistration for regulatory non-compliance.

Suggestions for Improvement: The framework would benefit from clearer guidance on fiduciary duty limits, particularly regarding scenarios where Data Principals’ consent preferences conflict with Data Fiduciaries’ processing needs. Establishing a dispute resolution mechanism between Consent Managers and regulated parties could pre-empt potential conflicts.

2. Phased Implementation Architecture

The previous draft rules were expected to take effect uniformly; the 2025 Rules adopt a staggered enforcement model, with eighteen-month timelines for core provisions.

Strength: This pragmatic approach recognizes operational realities. Organizations require time to redesign consent collection mechanisms, audit existing data processing, implement technological safeguards, and train personnel. The phased timeline mitigates disruption while ensuring regulatory coherence.

Concern: The eighteen-month delay for Rules 3, 5 to 16, and 22 creates a compliance vacuum. During this period, Data Fiduciaries lack legal certainty regarding standards for notices, security safeguards, and breach protocols, potentially incentivizing status quo behaviour rather than proactive alignment with the new regime. Organizations with internal momentum may exceed regulatory minimums; those with limited resources may delay investments pending rule implementation.

Suggestions for Improvement: The Data Protection Board should issue guidance or interpretive circulars during the transition period, signalling expected compliance trajectories and best practices. This would provide regulatory clarity without creating binding enforcement obligations.

3. Framework for Parental Consent for Children

Rule 10 and the Fourth Schedule establish detailed mechanisms for verifying parental consent for children’s data processing, incorporating government-issued identity tokens and Digital Locker services.

Strength: The framework addresses legitimate child protection imperatives. By requiring age verification through authoritative sources (government entities or Digital Locker providers), the Rules aim to prevent adults from falsely claiming parental authority and accessing children’s accounts. The ability for parents to verify identity through multiple channels, be it pre-existing platform accounts or government-issued tokens, offers flexibility.

Concern: The reliance on government identity infrastructure assumes near-universal Digital Locker adoption and seamless interoperability between Data Fiduciaries and Digital Locker providers. For millions of Indian children lacking access to government-issued identity tokens or parental Digital Locker accounts, this may create de facto exclusions from platforms requiring such verification. Moreover, the four illustrative scenarios in Rule 10 suggest complexity that could overwhelm smaller platforms lacking sophisticated identity verification systems. Another structural barrier to this implementation is the limitations on digital know-how and accessibility of infrastructures.

Suggestions for Improvement: The Data Protection Board should publish standardized templates and APIs for identity verification integration, reducing implementation friction. A grace period or safe harbour for good-faith parental consent verification attempts could encourage compliance while the technical systems mature and awareness spreads.

4. Significant Data Fiduciary Obligations and Cross-Border Data Restrictions

Rule 13 imposes mandatory annual Data Protection Impact Assessments and audits for Significant Data Fiduciaries, alongside algorithmic risk assessments and restrictions on cross-border transfers based on government committee recommendations.

Strength: This represents a material tightening of the fist compared to prior expectations. By mandating impact assessments and independent audits, the Rules create accountability checkpoints, potentially surfacing systemic risks and harms before they metastasize. The cross-border data restriction, contingent on government committee deliberation, safeguards data sovereignty and prevents casual offshore transfers.

Concern: The vagueness surrounding “Significant Data Fiduciary” classification, which is dependant on government notification rather than defined within the Rules themselves, creates regulatory uncertainty. Entities may not know if they fall within its scope until notified, hindering compliance planning. Additionally, the government committee tasked with identifying restricted data categories lacks fixed composition or procedural transparency requirements. This could lead to opaque determinations unconstrained by public input, creating opportunities for arbitrary or strategic classifications. For multinational companies operating in India, such opacity makes compliance planning nearly impossible.

Suggestions for Improvement: The framework should establish objective criteria for Significant Data Fiduciary classification (e.g., processing volume, data sensitivity, user count) rather than relying on open-ended notification. The government committee should issue published determinations with reasoned justifications for data transfer restrictions, allowing affected entities to understand and respond to rationales.

5. Data Breach Notification Timelines and Board Reporting

Rule 7 mandates breach notification to the Data Protection Board within seventy-two hours of awareness, accompanied by detailed information regarding nature, scope, remedial measures, and affected individual notifications.

Strength: The seventy-two-hour window balances investigation time with victim protection. Unlike more punitive frameworks penalizing delayed disclosure, this grace period acknowledges the operational realities of breach investigation while still prioritizing affected individuals’ right to timely information.

Concern: The phrase “without delay” in communicating with Data Principals, absent a defined timeline, creates ambiguity. Organizations may interpret this permissively, especially in complex breaches requiring weeks of forensic investigation. Additionally, the requirement to report “broad facts related to events, circumstances and reasons leading to the breach” presumes sophisticated breach investigation capabilities. For smaller organizations or those operating distributed systems, determining root cause within seventy-two hours may be infeasible, creating compliance dilemmas.

Suggestions for Improvement: The Board should establish a tiered reporting framework: initial notification within 72 hours with available information, followed by supplementary updates as investigation proceeds. This would incentivize rapid disclosure without penalizing organizations discovering evolving breach scope.

6. Data Retention and Erasure Timelines

Rule 8 and the Third Schedule specify that e-commerce entities, gaming intermediaries, and social media platforms must erase user data three years after the Data Principal’s last interaction, with minimum one-year retention for logs.

Strength: This represents a principled approach to data minimization and retention proportionality. By linking erasure to user inactivity rather than maintaining indefinite data silos, the Rules encourage ongoing data governance and reduce exposure surface area.

Concern: The three-year timeline may conflict with financial or regulatory record-keeping requirements. For financial services platforms (often classified as e-commerce), banking regulation may mandate seven-year retention of transaction records. The Rules create potential tension between DPDP erasure timelines and sectoral regulations, leaving organizations navigating conflicting obligations. Additionally, the one-year log retention requirement for forensic and detection purposes, while reasonable in principle, demands substantial storage infrastructure for high-volume platforms processing billions of transactions.

Suggestions for Improvement: The Framework should explicitly provide that DPDP retention requirements yield to other applicable laws, with clear guidance on hierarchy. Additionally, technical guidance on efficient log anonymization and summarization could reduce storage burdens while preserving forensic utility.

Conclusion

The Digital Personal Data Protection Rules, 2025, reflect India’s ambition to establish a world-class data protection regime balancing individual privacy, organizational operability, and State interests. The framework’s achievements (particularly the Consent Manager model, vulnerable population protections, and phased implementation) signal regulatory maturity.

However, the Rules harbour exploitable ambiguities and opacity around government powers, particularly concerning cross-border data restrictions and Significant Data Fiduciary classification. These gaps create compliance uncertainty for organizations while opening vectors for regulatory capture or arbitrary administration.

Moving forward, the Data Protection Board should prioritize transparent guidance, procedural clarity, and stakeholder engagement during the eighteen-month transition period. Clear standards and published criteria/ guidance will go a long way in transforming these rules from aspirational principles into a coherent, trustworthy regulatory framework: one that genuinely protects individuals while enabling innovation and organizational compliance.


Read More- MINISTRY OF ELECTRONICS AND INFORMATION TECHNOLOGY NOTIFICATION