Logo
Logo
DPDPA Sections DPDP Rules BLOGS CASE LAWS FAQ's Templates
  • DPDP Rules 2025
  • Rules (1 – 3)
    • Rule 1: Short title and commencement. -
    • Rule 2: Definitions.
    • Rule 3: Notice given by Data Fiduciary to Data Principal.
  • Rules ( 4 – 5)
    • Rule 4: Registration and obligations of Consent Manager.
    • Rule 5: Processing for provision or issue of subsidy, benefit, service, certificate, licence or permit by State and its instrumentalities.—(
  • Rules (6 – 8)
    • Rule 6: Reasonable security safeguards.
    • Rule 7: Intimation of personal data breach.
    • Rule 8: Time period for specified purpose to be deemed as no longer being served.
  • Rules (9 – 12)
    • Rule 9: Contact information of person to answer questions about processing.
    • Rule 10: Verifiable consent for processing of personal data of child or of person with disability who has lawful guardian.
    • Rule 11: Exemptions from certain obligations applicable to processing of personal data of child
    • Rule 12: Additional obligations of Significant Data Fiduciary
  • Rules ( 13 – 15)
    • Rule 13: Rights of Data Principal.
    • Rule 14: Processing of personal data outside India.
    • Rule 15: Exemption from Act for research, archiving or statistical purposes.
  • Rule ( 16 – 18)
    • Rule 16: Appointment of Chairperson and other Members.
    • Rule 17: Salary, allowances and other terms and conditions of service of Chairperson and other Members.
    • Rule 18: Procedure for meetings of Board and authentication of its orders, directions and instruments.—(.
  • Rules ( 19 – 20)
    • Section 19: Functioning of Board as digital office.
    • Section 20: Terms and conditions of appointment and service of officers and employees of Board.
  • Rules ( 21 – 22)
    • Section 21: Appeal to Appellate Tribunal.
    • Section 22: Calling for information from Data Fiduciary or intermediary.
  • SCHEDULE I
    • Part A-Conditions of registration of Consent Manager | Part B-Obligations of Consent Manager
  • SCHEDULE II
    • Standards for processing of personal data by State and its instrumentalities under clause (b) of section 7 and for processing of personal data necessary for the purposes specified in clause (b) of sub-section (2) of section 17
  • SCHEDULE III
    • Table for Class of Data Fiduciaries| Purposes | Time period.
  • SCHEDULE IV
    • Part A -Classes of Data Fiduciaries in respect of whom provisions of sub-sections (1) and (3) of section 9 shall not apply | Part B - Purposes for which provisions of sub-sections (1) and (3) of section 9 shall not apply
  • SCHEDULE V
    • Terms and conditions of service of Chairperson and other Members
  • SCHEDULE VI
    • Terms and conditions of appointment and service of officers and employees of Board
  • SCHEDULE VII
    • Table for Purpose | Authorised person
  • Explanatory Note of MEITY
    • Explanatory note to Digital Personal Data Protection Rules, 2025
  • Responsive image

Rule 6 of DPDP Rules 2025

Reasonable security safeguards.


(1) A Data Fiduciary shall protect personal data in its possession or under its control, including in respect of any processing undertaken by it or on its behalf by a Data Processor, by taking reasonable security safeguards to prevent personal data breach, which shall include, at the minimum,—
(a) appropriate data security measures, including securing of such personal data through its encryption, obfuscation or masking or the use of virtual tokens mapped to that personal data;
(b) appropriate measures to control access to the computer resources used by such Data Fiduciary or such a Data Processor;
(c) visibility on the accessing of such personal data, through appropriate logs, monitoring and review, for enabling detection of unauthorised access, its investigation and remediation to prevent recurrence;
(d) reasonable measures for continued processing in the event of confidentiality, integrity or availability of such personal data being compromised as a result of destruction or loss of access to personal data or otherwise, including by way of data- backups;
(e) for enabling the detection of unauthorised access, its investigation, remediation to prevent recurrence and continued processing in the event of such a compromise, retain such logs and personal data for a period of one year, unless compliance with any law for the time being in force requires otherwise;
(f) appropriate provision in the contract entered into between such Data Fiduciary and such a Data Processor for taking reasonable security safeguards; and
(g) appropriate technical and organisational measures to ensure effective observance of security safeguards.
(2) In this rule, the expression “computer resource” shall have the same meaning as is assigned to it in Information Technology Act, 2000 (21 of 2000).

Rule 7 →
DPDPA
Table of contents


Report error
Your message ×

Please keep in mind that this form is only for feedback and suggestions for improvement. Unfortunately, questions will not be answered.

0 of 1000 max characters

Legal Interpretation: Reasonable Security Safeguards by Data Fiduciaries

In an era where data is likened to the "new oil," safeguarding personal data has become more than a compliance exercise—it's a fundamental necessity to build trust and mitigate risks. Rule 6 mandates reasonable security safeguards for Data Fiduciaries and their Data Processors, emphasizing accountability and proactive risk management. Let's break down the obligations and their implications.

1. What Are Reasonable Security Safeguards?

At its core, "reasonable security safeguards" refers to a comprehensive framework that protects personal data from breaches and unauthorized access. This responsibility extends beyond the Data Fiduciary to include any Data Processor acting on its behalf. The rule outlines specific measures that set the minimum threshold for data protection practices.

Think of it like fortifying a castle: you wouldn’t just build high walls; you'd also deploy guards, install surveillance systems, and have contingency plans for emergencies. Similarly, these safeguards are layered and multifaceted.

2. Key Safeguards Mandated by the Rule

The rule specifies a detailed list of security measures, each targeting a critical aspect of data protection:

  • (a) Encryption and Obfuscation: Personal data must be secured using techniques like encryption, obfuscation, or masking, ensuring that even if unauthorized access occurs, the data remains unreadable. Virtual tokens, which map sensitive data to anonymized references, add an additional layer of security.
  • (b) Access Control: Implementing strict access control measures over computer resources is crucial. This involves restricting access to sensitive systems and data only to authorized personnel.
  • (c) Logs and Monitoring for Unauthorized Access: Visibility into who accesses personal data is essential. Maintaining logs, performing real-time monitoring, and conducting regular reviews enable early detection of breaches.
  • (d) Backup and Recovery Plans: In case of data loss or compromise, the rule emphasizes having a disaster recovery plan, including regular backups. These measures ensure continuity of operations, even in the face of catastrophic events.
  • (e) Retention of Logs for Investigations: To facilitate the investigation and prevention of recurring breaches, logs and data must be retained for at least one year. This aligns with the principle of traceability.
  • (f) Contractual Obligations for Data Processors: The rule stresses that Data Fiduciaries must include explicit provisions in their contracts with Data Processors, mandating compliance with these security measures.
  • (g) Technical and Organizational Measures: Beyond technical safeguards, organizational policies and training programs are vital. Ensuring employees understand the importance of data security is crucial.

3. The Role of "Computer Resources"

The term "computer resource", as defined under the Information Technology Act, 2000, encompasses a wide array of digital infrastructure, including computers, networks, software, and data storage systems. This broad definition ensures that the security safeguards apply comprehensively to all components involved in data processing.

4. Practical Implications for Data Fiduciaries

For Data Fiduciaries, implementing these safeguards is non-negotiable. Non-compliance not only exposes them to legal penalties but also damages their reputation. Here's why these measures are critical:

  • Building Trust: Consumers are more likely to share their data with entities they perceive as secure and responsible.
  • Mitigating Risks: Proactive safeguards reduce the likelihood of breaches, protecting both the organization and the individuals whose data they process.
  • Compliance Assurance: These measures align with global best practices, including those under GDPR, ensuring that Indian Data Fiduciaries can operate internationally.

5. Balancing Security and Usability

While robust security is essential, it’s equally important not to overburden systems or users. The safeguards must be implemented in a way that maintains the usability and efficiency of data processing operations. For instance:

  • Encryption must not slow down critical processes.
  • Access control should be seamless yet secure, employing technologies like biometric authentication.

6. Broader Implications for Privacy and Governance

This rule reinforces the principle that privacy is a shared responsibility. Data Fiduciaries and Data Processors must work together to create an ecosystem where personal data is treated with the same care as a prized asset. By mandating these safeguards, the rule establishes:

  • Accountability: Data Fiduciaries cannot pass the buck to their Data Processors; they must ensure compliance across the board.
  • Preparedness: With proactive measures in place, organizations are better equipped to handle breaches and minimize damage.

Conclusion

Rule 6 lays down a robust framework for safeguarding personal data, combining technical measures, contractual obligations, and organizational policies. By mandating encryption, access controls, monitoring, and disaster recovery plans, the rule emphasizes a multi-layered approach to security. For Data Fiduciaries, compliance is not just about avoiding penalties—it’s about building trust, enhancing resilience, and demonstrating their commitment to privacy in a data-driven world. These safeguards aren’t just boxes to check; they’re the foundation of responsible data stewardship in the digital age.

© 2024 Advocate (Dr.) Prashant Mali

Logo

Site maintained by Advocate (Dr.) Prashant Mali for Public in General interest

Share: Facebook | Twitter | XING | LinkedIn | WhatsApp | <E-mail


Privacy Policy |  Cookie Policy |  Disclaimer