Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Understanding India’s DPDPA Consent Manager

Published September 11, 2024
Contributors

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

1. Introduction

​​The India Digital Personal Data Protection Act (DPDPA) is a comprehensive data privacy law enacted to regulate the processing of digital personal data in India. It aims to grant individuals control over their personal data and seeks to balance the needs of businesses with the privacy rights of individuals. A unique feature of the DPDPA is the role of the consent manager. It is designed to streamline and simplify how data principals manage their consent related to their personal data processing activities.

This article examines the role and origin of consent managers. It explores their operational framework by taking inspiration from the Data Empowerment and Protection Architecture document and similar consent management models implemented in India's financial and health sectors. It also evaluates the accountability of consent managers under the DPDPA and discusses whether entities performing this role can be discharged from potential legal liability.

Under the DPDPA, a consent manager is a person or entity that is officially registered with the Data Protection Board of India (Board). It provides an accessible, transparent, and interoperable platform to enable data principals to give, manage, review, and withdraw their consent. It serves as the primary point of contact between the data principals and businesses and ensures that the consent preferences of data principals are respected across various data processing activities.

The idea of a consent manager can be traced back to the Srikrishna Committee Report of 2017, a document guiding the formulation of the DPDPA. It envisioned a consent manager as a trusted intermediary who would operate a "dashboard" between users and businesses and facilitate users to select their consent preferences from a range of options.

The DPDPA lacks detailed guidance regarding the operational framework of a consent manager. However, the Data Empowerment and Protection Architecture (DEPA) document, published by NITI Aayog, guides the technical aspects of consent dashboards. Additionally, inspiration can be drawn from the centralized consent management dashboard implemented in India’s financial and health sectors.

a. DEPA Document

The DEPA document explains that the consent manager would only collect "consent artefacts," meaning it would track the consent preferences of the data principal regarding their personal data and not have access to any of the actual personal data.

Under this framework, a consent manager acts as a liaison among three different entities:

  1. Data principal (user): The individual whose data is being managed. For example, a customer who shops online and has their purchase history managed.
  2. Data provider: An organization like an e-commerce platform that holds the customer's/user’s order history.
  3. Data requester: An entity like a marketing firm that seeks to access the customer’s shopping behavior for targeted advertising.

The consent manager serves as the intermediary between these entities. It maintains and oversees the customer's data-sharing preferences. When the marketing firm wants to access information about the customer’s shopping habits, the consent manager ensures that only the data for which the customer has given consent is shared. This process is handled securely through APIs, and the consent manager does not store any of the actual data. The consent manager will deny the request if the customer has not approved access to certain information.

It can be ascertained that a consent manager takes action on behalf of data principals as their representative when granting, managing, reviewing, and withdrawing consent. This system reduces the burden of repeatedly giving consent (often referred to as consent fatigue), replacing outdated data-sharing practices. Additionally, it provides users with a more consistent and controlled approach to how their data is shared across various platforms.

In India, models similar to the DPDPA’s consent manager have already been implemented in the financial and health sectors. These models may provide a useful reference point for how consent managers might operate under the DPDPA.

  1. Financial Sector: The Reserve Bank of India (RBI) has approved a consent management model called ‘Account Aggregator Directions’(Aggregator) under its Non-Banking Financial Company. In this setup, a dashboard collects 'consent artefacts', i.e., records of user consents to various financial institutions. The Aggregator doesn’t own the actual data but facilitates its sharing between the user and the institutions.
  2. Health Sector: The National Health Authority’s Ayushman Bharat Digital Mission (ABDM) offers another operational model. This initiative provides a seamless online platform for users to manage their health data and consent for its use, potentially guiding how consent managers could operate under the DPDPA.

Ensuring interoperability under the DPDPA may present significant challenges compared to the financial sector. In the finance sector, both Aggregators and financial institutions are regulated by the Reserve Bank of India (RBI), which sets stringent technical standards, ensuring that all participants develop interoperable systems. However, under the DPDPA, the board only has authority over consent managers and other involved entities do not fall under its scope. This could complicate achieving seamless integration across the ecosystem.

With regulatory oversight, interoperability within the DPDPA framework may be easier to achieve. The Central Government is expected to establish specific technical, operational, financial, and other registration requirements to ensure effective and secure consent management.

Under the DPDPA, if the processing of personal data is challenged in a legal proceeding, the data fiduciary must demonstrate that they properly notified the data principal and obtained their consent in compliance with the DPDPA’s requirements. The notice must contain:

  1. A description of the personal data that will be collected and the purpose for which it is being collected.
  2.  Information on how the data principal can exercise their right to withdraw consent at any time and the right to seek redressal for grievances.
  3. Instructions on how the data principal can file a complaint with the Board, including details of the procedures that will be specified for this purpose.

Additionally, consent must be free, specific, informed, unconditional, and unambiguous, with clear affirmative action.

Under the DPDPA, a consent manager becomes accountable to data principals and must act as their representative. While the extent of this accountability is yet to be clarified, the DPDPA allows data principals to seek grievance redressal from consent managers if something goes wrong. This means consent managers may potentially face legal liability under the DPDPA for any breaches. For instance, if a data principal withdraws consent, the consent manager must not approve access to their data; otherwise, it will face penalties for breach of DPDPA. This represents a shift from traditional privacy laws, where such liability typically rests with data fiduciaries.

Given that appointing a consent manager is not mandatory under the DPDPA, businesses might choose to manage specific consent processes on behalf of data fiduciaries without formally registering as a consent manager. These processes may include:

  1. Providing details related to the personal data collected and its purpose.
  2. Offering an easy-to-use dashboard for managing consent and withdrawing it.
  3. Instituting a grievance redressal mechanism.
  4. Using clear affirmative actions to ensure explicit consent collection.
  5. Keeping detailed records of consent and related communications to demonstrate compliance if needed.

Such processes will help data fiduciaries comply with the consent requirements under DPDPA. Additionally, in the absence of a registered consent manager, the legal accountability for compliance will remain with the data fiduciary.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures View More
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures
The U.S. M&A landscape is back in full swing. May witnessed a significant rebound in deal activity, especially for transactions exceeding $100 million, signaling...
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix View More
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix
The Challenge of Navigating Global Data Privacy Laws In today’s privacy-first world, navigating data protection laws and direct marketing compliance requirements is no easy...
View More
What is IAM (Identity and Access Management)?
Gain insights into Identity and Access Management (IAM), what it is, challenges, core components, and how organizations can leverage it.
AI Data Mapping View More
AI Data Mapping: The Pathway to Intelligent Data Insights
Discover how AI data mapping revolutionizes data utilization. Harness the power of AI for smarter decision-making, data utilization, and ensuring regulatory compliance.
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
EU AI Act Compliance: What You Need to Know for August 2, 2025 View More
EU AI Act Compliance: What You Need to Know for August 2, 2025
Download the infographic to learn about the EU AI Act compliance requirements before it takes effect on 2 August 2025. Avoid noncompliance penalties.
August 2, 2025 - A Critical Date in the EU AI Act Enforcement Timeline View More
August 2, 2025 – A Critical Date in the EU AI Act Enforcement Timeline
Securiti’s latest infographic explains the obligations and requirements coming into effect for different entities as the AI Act’s August 2 deadline approaches.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New