Explores how the DPDP Act regulates the use of vendors and other third parties to process personal data, the rules around cross-border data transfers, and what employees must do to ensure compliant vendor selection, contracts and ongoing oversight.
After completing this subject, learners will be able to identify when a third party is acting as a Data Processor, understand the key contractual and operational safeguards required under the DPDP Act, and recognise when personal data is being transferred outside India. They will be able to follow internal procedures for onboarding and monitoring vendors, avoid unauthorised data exports, and flag risky data sharing arrangements for legal or privacy review.
This topic provides practical guidance on identifying Data Processors in the organisation’s vendor ecosystem. It explains that vendors such as payroll providers, background check agencies, cloud hosting services, marketing automation platforms and outsourced customer support centres often process personal data strictly according to the organisation’s instructions, making them Data Processors....
This topic provides practical guidance on identifying Data Processors in the organisation’s vendor ecosystem. It explains that vendors such as payroll providers, background check agencies, cloud hosting services, marketing automation platforms and outsourced customer support centres often process personal data strictly according to the organisation’s instructions, making them Data Processors. In contrast, partners who determine their own purposes for using the data, such as certain analytics or advertising platforms, may act as independent Data Fiduciaries. Through examples, the topic shows how the nature of the contract and actual data flows determine the role. Learners are encouraged to involve procurement, Legal or the privacy team early when new tools or vendors are proposed, so that roles, responsibilities and DPDP obligations can be clearly allocated and documented.
Show moreThis topic summarises, in non-legal language, the minimum contractual and security safeguards expected when a Data Fiduciary engages a Data Processor. It covers the need for a written contract that specifies permitted purposes, restricts sub-processing, mandates reasonable security safeguards, requires prompt breach notification, and obliges the processor to assist with...
This topic summarises, in non-legal language, the minimum contractual and security safeguards expected when a Data Fiduciary engages a Data Processor. It covers the need for a written contract that specifies permitted purposes, restricts sub-processing, mandates reasonable security safeguards, requires prompt breach notification, and obliges the processor to assist with rights requests and deletion. The topic also discusses expectations around location of data storage, encryption, access controls, logging and audits. While employees are not expected to draft contracts, the topic equips them to spot red flags such as vendors refusing to sign data protection clauses, insisting on broad rights to use data for their own purposes, or lacking basic security certifications. Learners understand that selecting low-cost vendors without considering privacy and security can create substantial DPDP compliance risk.
Show moreThis topic covers the practical aspects of vendor due diligence and monitoring from an employee perspective. It explains why procurement and Legal teams need accurate descriptions of the personal data a vendor will handle, the systems it will integrate with and any sub-processors it may use. The topic describes simple...
This topic covers the practical aspects of vendor due diligence and monitoring from an employee perspective. It explains why procurement and Legal teams need accurate descriptions of the personal data a vendor will handle, the systems it will integrate with and any sub-processors it may use. The topic describes simple due diligence steps such as checking vendor security certifications, asking about incident history, and reviewing privacy policies. It also emphasises ongoing monitoring: ensuring vendors follow agreed processes, restricting access when projects end, and reviewing access rights periodically. Learners are encouraged to report signs of vendor negligence, such as repeated mis-sent emails, insecure file sharing practices or refusal to cooperate with security improvements. By the end, employees see themselves as partners in keeping vendor relationships privacy-conscious and DPDP-compliant.
Show moreThis topic trains employees to spot warning signs in routine third-party interactions. Examples include vendors asking for more personal data than seems necessary for the service, proposals to reuse data for unrelated analytics or marketing, requests to copy entire databases for convenience, or suggestions to bypass procurement and use personal...
This topic trains employees to spot warning signs in routine third-party interactions. Examples include vendors asking for more personal data than seems necessary for the service, proposals to reuse data for unrelated analytics or marketing, requests to copy entire databases for convenience, or suggestions to bypass procurement and use personal credit cards to buy tools that handle personal data. It also covers informal data sharing with business partners, such as exchanging customer lists, sharing employee details for discounts, or granting temporary system access without proper approvals. The topic guides learners on how to respond when they notice such red flags: slow down, ask clarifying questions, and escalate the matter to Legal, InfoSec or the privacy team rather than agreeing under pressure. By recognising and challenging problematic data sharing, employees can prevent many DPDP issues before they arise.
Show moreThis topic explains that under the DPDP Act, personal data may generally be transferred to other countries unless the government notifies specific restricted territories, but such transfers must still comply with all other obligations such as lawful basis, security safeguards and contractual protections. It provides simple examples of cross-border transfers,...
This topic explains that under the DPDP Act, personal data may generally be transferred to other countries unless the government notifies specific restricted territories, but such transfers must still comply with all other obligations such as lawful basis, security safeguards and contractual protections. It provides simple examples of cross-border transfers, such as using global cloud platforms with overseas data centres, sharing HR data with a foreign parent company, or granting offshore support teams access to Indian customer databases. The topic warns against casually uploading personal data into foreign tools or services without checking whether they are approved. Learners are taught to confirm whether a tool is on the approved list before using it and to be transparent about data location when engaging new vendors. The possibility of future ‘negative lists’ of countries where data cannot be sent is also mentioned in accessible terms.
Show more