India’s Digital Personal Data Protection (DPDP) framework has firmly entered its execution era. With the notification of the DPDP Rules, 2025, privacy compliance in India is no longer something that lives only in policies, notices, or legal reviews. It now has to show up in day-to-day operations – in how data is collected, stored, accessed, logged, retained, deleted, and protected across infrastructure.
For enterprise leaders, this is a shift worth treating as strategic, not administrative. Why? Because most personal data today is processed through complex, distributed ecosystems: colocation facilities, public and private cloud environments, managed services, hybrid architectures, disaster recovery setups, and cross-border delivery stacks. In this reality, compliance does not succeed or fail on paper. It succeeds or fails at the infrastructure layer.
As organizations move through 2026, DPDP is no longer a “new regulation.” It is an active operating constraint and for those prepared, a potential competitive advantage.
What DPDP 2025 Changes for CXOs
The DPDP Act, 2023 established the principles of lawful data processing and is now fully operational, and the DPDP Rules, 2025 provide the practical “how-to” framework for implementation. Together, they define how organizations must design and operate privacy notices, consent mechanisms, security safeguards, breach reporting processes, grievance redressal systems, and governance obligations for Significant Data Fiduciaries (SDFs).
For CISOs, CIOs, CTOs, CDOs, CHROs, CFOs, and General Counsels, this is not a narrow privacy update. DPDP directly affects product design, infrastructure choices, vendor strategy, HR data handling, marketing platforms, and board-level risk oversight.
For CXOs, DPDP 2025 effectively elevates data governance to a board-level responsibility, comparable to audit and financial controls, requiring coordinated ownership across security, IT, legal, HR, and operations.
Three shifts matter most for CXOs.
1) Compliance Becomes Provable
Encryption, access controls, monitoring, logging, incident response, and data lifecycle controls are no longer “best practices” or maturity goals. Under DPDP 2025, they form the baseline.
Organizations should assume that regulators, auditors, or even customers may ask not just what controls exist, but how consistently they operate, and to see evidence covering past periods, not just current configurations. This elevates observability, logging discipline, and operational rigor from technical hygiene to executive accountability.
In practice, this requires organizations to maintain accurate and current Records of Processing Activities (RoPA), documenting purposes of processing, categories of personal data, retention timelines, access controls, and involvement of vendors or processors.
Non-compliance carries material consequences: penalties can reach up to ₹250 crore for security safeguard failures and up to ₹200 crore for breach notification lapses or children-related violations.
2) Vendors Become Part of the Risk Surface
If personal data is processed through third parties, responsibility does not disappear with outsourcing. Contracts, operating procedures, and escalation models must reflect that reality.
Statements like “our vendor handles it” will not hold unless roles are clearly defined, processor obligations are explicit, and evidence can be produced quickly. DPDP pushes organizations to move beyond trust-based vendor relationships toward governance-backed partnerships.
For CXOs, this means vendor risk management and DPDP compliance are now inseparable.
3) Cross-Border Architecture Needs Contingency Planning
DPDP’s approach to cross-border transfers is expected to follow a “negative list” model – transfers are generally permitted unless restricted by the government. While this offers flexibility, it also introduces uncertainty.
For CXOs, this means global architectures must be designed with options, not assumptions: the ability to reroute workloads, localize data, or repatriate processing if jurisdictions or conditions change. Static designs will struggle in a dynamic regulatory environment.
Why Data Centers Are Directly Impacted
Data centers are no longer viewed as neutral warehouses for compute and storage. Under DPDP 2025, they increasingly function as compliance enablers because they sit at the intersection of several regulatory expectations:
- security safeguards (physical and logical)
- access governance (privileged access, segregation, audit trails)
- incident readiness (continuous monitoring and forensic evidence)
- retention and erasure execution (data lifecycle support)
- cross-border routing and localization feasibility
As DPDP pushes stronger onshore processing and hosting for Indian personal data, many enterprises, both Indian and multinational, are re-evaluating offshore-heavy architectures and investing in India-centric data centers and local cloud providers to de-risk exposure.
This means DPDP readiness cannot be isolated within enterprise IT or legal teams. It requires tight alignment with infrastructure partners who can support compliance not just in theory, but in execution.
The Role Trap: Processor vs Fiduciary
One of the most consequential – and often misunderstood – aspects of DPDP is the distinction between a Data Processor and a Data Fiduciary.
In many arrangements, colocation or IaaS data centers operate as processors, handling data strictly on customer instructions. However, DPDP makes the boundary sensitive. The moment a provider determines the purpose or means of processing—even partially—it risks being treated as a Data Fiduciary for that activity.
This becomes especially relevant where data centers provide shared platforms, managed services, analytics, identity systems, logging services, or AI-driven offerings. In such cases, the provider may attract full fiduciary obligations—and, at scale or for sensitive data, even SDF designation.
Where a data center operates as a Data Fiduciary for specific services, it must independently maintain records, evidence, and compliance artefacts for those processing activities, rather than relying solely on customer documentation.
Small design or operational decisions can therefore carry outsized legal and regulatory implications.
What Breaks First: The Three Failure Points
Most DPDP compliance failures will not come from lack of intent. They will come from operational friction.
1) Breach Response Timelines
DPDP breach notification expectations are tight and evidence-driven. This places pressure on detection, escalation, coordination, communication, and documentation, often across multiple teams and vendors.
2) Audit Evidence Gaps
Many organizations have policies, but not proof. Incomplete logs, missing drill records, inconsistent access trails, and unclear retention triggers are common failure points. Audits fail in the “show me” moments.
3) Contract and Accountability Ambiguity
When incidents occur, unclear responsibilities across vendors delay response and compound risk. DPDP pushes enterprises to define processor obligations, sub-processor controls, and audit rights with precision, before something goes wrong.
A Simple Readiness Question for CXOs
Ask this internally:
If a regulator asks us to prove our data protection decisions and controls over the last 12 months – can we produce evidence quickly and confidently?
If the answer is “not reliably,” DPDP readiness should be treated as an operational program, not a compliance memo.
Adi Seshu Kuruganti, AVP - Compliance & Data Protection Officer, CtrlS Datacenters
With over 25 years of experience across Information Security, Data Protection & Privacy, Business Continuity, GRC, Enterprise Architecture, and Risk Management, Adi is a specialist in Information Security and Privacy Management Systems. He has led large-scale consulting and programme management initiatives across IT/ITES, e-Governance, and public sector transformation. His experience includes end-to-end bid and programme management for landmark Government of Kerala projects, Aadhaar implementations across multiple states, DigiLocker rollout, and national-scale data processing initiatives-bringing deep expertise in compliance, governance, and secure digital ecosystems.