Rule 6 — Reasonable Security Safeguards under the DPDP Rules

Security of personal data is one of the most critical obligations under the Digital Personal Data Protection (DPDP) Act, 2023. Rule 6 of the DPDP Rules establishes a robust baseline for “reasonable security safeguards” that every Data Fiduciary must implement to ensure the confidentiality, integrity, and availability of personal data. These safeguards apply not only to the Data Fiduciary but also extend to all Data Processors acting on its behalf.

This rule forms the operational backbone of India’s data protection framework, ensuring that organisations adopt strong, proactive, and auditable security measures to prevent personal data breaches and minimise harm to Data Principals.

  1. Scope of the Security Obligation

Rule 6 requires Data Fiduciaries to protect all personal data in their possession or under their control, whether processed internally or by a Data Processor. This imposes a non-delegable responsibility: even when a third-party processor is engaged, the Data Fiduciary remains accountable for ensuring compliance with security safeguards.

The overarching objective is to prevent personal data breaches, unauthorised access, accidental loss, destruction, or misuse of personal information.

  1. Mandatory Minimum Safeguards

To fulfil their legal duty, Data Fiduciaries must implement the following minimum safeguards:

A. Encryption, Obfuscation, Masking, and Tokenisation

The rule mandates the use of modern data security techniques such as:

    • Encryption of personal data at rest and in transit
    • Obfuscation or masking of sensitive identifiers
    • Virtual tokens mapped securely to personal data

These measures ensure that even if data is intercepted or accessed improperly, it remains unreadable and unusable without decryption keys.

B. Access Control Mechanisms

The Data Fiduciary must restrict access to personal data through:

    • Role-based access controls
    • Multi-factor authentication
    • Least-privilege principles
    • Periodic access reviews

These controls prevent unauthorised employees, systems, or third parties from accessing personal data.

C. Logging, Monitoring, and Review

Visibility into data access is mandatory. Organisations must maintain:

    • Detailed audit logs
    • Monitoring systems to track access attempts
    • Alerts for suspicious activities
    • Regular review cycles

These mechanisms enable early detection of unauthorised access and support forensic investigation and remediation.

  1. Ease of Consent Withdrawal and Exercise of Rights

Rule 3 emphasises that Data Principals must have simple, consistent, and easily accessible mechanisms to:

    • Withdraw consent
    • Exercise rights under the Act
    • File complaints to the Data Protection Board

The ease of withdrawing consent must be comparable to the ease with which consent was initially given. This prevents the creation of friction or obstacles that discourage users from withdrawing consent.

To facilitate these rights, the Notice must provide:

    • A direct communication link to the Data Fiduciary’s website or app
    • A description of all available channels for exercising rights

This ensures that the Data Principal does not have to search for contact information or navigate complex processes.

  1. Resilience and Continuity Measures

Accidents, cyberattacks, system failures, or disasters can compromise the availability or integrity of personal data. Rule 6 requires Data Fiduciaries to implement business continuity and disaster recovery capabilities, including:

    • Data backup systems
    • Redundant infrastructure
    • Restoration processes
    • Regular testing of recovery procedures

Such measures ensure that personal data can be restored and processing can continue even if data is damaged, lost, or corrupted.

  1. Retention of Logs and Relevant Data

To enable comprehensive investigation and remediation of security incidents, the rule mandates:

    • Retention of logs and relevant personal data for one year
    • Longer retention where required by other laws

This retention period is crucial for audits, breach notification processes, forensic analysis, and regulatory inquiries.

  1. Security Requirements in Processor Contracts

A key obligation under Rule 6 is embedding security expectations into contracts with Data Processors. Every Data Fiduciary must ensure that its Data Processor contracts include:

    • Explicit clauses on security safeguards
    • Standards for encryption, logging, and access control
    • Incident reporting requirements
    • Audit rights and compliance verification mechanisms

This ensures that security obligations are enforceable across the entire data processing chain.

  1. Technical and Organisational Measures (TOMs)

Beyond technical controls, Data Fiduciaries must deploy strong organisational measures, including:

    • Formal security policies
    • Employee training on data protection
    • Vendor risk management
    • Regular security audits and compliance assessments
    • Governance frameworks for ongoing evaluation of safeguards

These measures ensure that security is embedded into organisational culture and operations, not limited to IT controls alone.

  1. Compliance and Risk Management Implications

Implementing Rule 6 safeguards is not merely a statutory duty but a strategic requirement. Organisations that fail to implement these safeguards risk:

    • Data breaches
    • Regulatory penalties
    • Loss of customer trust
    • Legal liability for harm to Data Principals

Adopting a proactive, well-documented security posture aligns organisations with global best practices such as ISO 27001, NIST CSF, and SOC 2.

Conclusion

Rule 6 of the DPDP Rules places a high bar for security readiness and operational resilience. By mandating encryption, access controls, monitoring, continuity measures, and enforceable processor contracts, the rule ensures a strong security infrastructure across the data lifecycle. These safeguards are integral to preventing breaches, ensuring accountability, and strengthening the trust of Data Principals in India’s digital ecosystem.

To stay updated Subscribe to our newsletter today

Explore other Legal updates on the 1-Comply and follow us on LinkedIn to stay updated 

Disclaimer: The information contained in this Article is intended solely for personal non-commercial use of the user who accepts full responsibility of its use. The information in the article is general in nature and should not be considered to be legal, tax, accounting, consulting or any other professional advice. We make no representation or warranty of any kind, express or implied regarding the accuracy, adequacy, reliability or completeness of any information on our page/article. 

Post Views: 25

Schedule A Demo