Updated At Mar 20, 2026

DPDP Act Consent Management Analytics Architecture 8 min read
Building a Consent Event Taxonomy for Analytics Teams
A business-style technical guide for DPDP-era technical evaluators on how to design a consent event taxonomy, implement it across analytics systems, and operate defensible consent workflows.

Key takeaways

  • DPDP-era analytics needs provable consent lifecycle events, not just cookie banner clicks.
  • A consent event taxonomy is a shared data contract between privacy/legal and analytics/engineering teams.
  • Core events—request, grant, deny, withdraw, refresh and expire—should carry standard attributes like subject, purpose, channel and version.
  • Defensible consent operations require central logging, retention rules, access controls and monitoring.
  • When evaluating consent tools, prioritise how well they implement your taxonomy and integrate with your existing analytics stack.

DPDP-era consent accountability and why analytics teams need an event taxonomy

India’s Digital Personal Data Protection (DPDP) Act has moved consent from a UX formality to a provable control that can be scrutinised by auditors and the Data Protection Board. For analytics teams, this means you must be able to show when, how and for what purposes consent was captured, not just that a tag was fired. The Act requires consent to be free, specific, informed, unconditional and unambiguous, and withdrawal must be as easy as giving consent.[1]
  • Hard to answer regulator or internal audit questions like “show us all users who withdrew consent for behavioural analytics in Q1”.
  • Inconsistent consent states across web, app and backend systems, leading to over-collection or underserving users.
  • CDPs, data warehouses and marketing platforms not aware of the latest consent decision, so analytics relies on stale or inferred states.
  • Ad hoc cookie banner configurations that do not map cleanly to purposes, data uses or data principals.
High-level consent lifecycle and event taxonomy for DPDP-aligned analytics teams.

Translating DPDP consent requirements into an events and data-contract model

To turn DPDP requirements into something systems can enforce, treat consent as a series of events in a data contract between privacy/legal and engineering. The law defines actors such as the Data Principal, Data Fiduciary and, in some journeys, a Consent Manager that can mediate requests and withdrawals, all of which should be reflected in your event model.[1]
Consent lifecycle stages mapped to minimum evidence needed for DPDP-aligned operations and analytics.[5]
Lifecycle stage DPDP expectation Evidence as events/logs Typical analytics uses
notice_shown Serve clear, itemised notice before collecting personal data. Event with notice_id, version, channel and purposes listed. Measure notice display rates and correlate with consent grant/deny.
consent_granted Obtain valid consent for specific purposes via clear affirmative action. Event with principal_id (or pseudonym), purposes, legal_basis, timestamp, channel, consent_manager_id (if any) and notice_version. Define consented audience for analytics, experiments and marketing.
consent_denied Respect refusal when the user chooses not to consent. Event including purposes refused and UI surface that captured the denial. Monitor drop-off, and optimise notice and permission prompts without overriding refusal.
consent_withdrawn Allow withdrawal through accessible mechanisms, effective going forward. Event with previous_consent_reference, purposes withdrawn, actor and effective_from timestamp. Stop new tracking for those purposes, adjust audience sizes and attribution rules.
consent_refreshed Seek renewed consent when notice changes materially or consent expires by policy. Event linking to prior consent, capturing new purposes and notice_version. Compare behaviour before and after refreshed consent; monitor impact of notice changes on opt-in rates.
consent_expired Cease processing when consent validity period ends unless renewed or another lawful basis applies. Event created by a policy engine, referencing original consent and purposes it covered. Identify data that must be suppressed or aggregated; understand consent churn over time.
  • Data Principal ID: stable pseudonymous user key that can be linked across channels where legally appropriate.
  • Data Fiduciary ID: identifier for your organisation or business unit where notice and consent responsibility sits.
  • Consent Manager ID: identifier for any external consent manager involved, so you can reconcile its logs with your own.
  • Purpose codes: controlled list of analytics, marketing and operational purposes (for example, ANL_BASIC, ANL_PERSONALISED, MKT_EMAIL).
  • Data use selectors: flags indicating which downstream systems are allowed to receive data under each purpose (for example, analytics_warehouse=true, adtech=false).

Designing a consent event taxonomy that works for analytics and compliance

A consent event taxonomy is the canonical list of events and attributes that represent the state of permission for using personal data. It is different from a generic analytics tracking plan, which focuses on user behaviour, and from a cookie banner configuration, which focuses on storage mechanisms. The taxonomy lets analytics queries reliably answer whether a specific use of data was permitted for a given purpose and user at a given time.
The following process helps you design a consent event taxonomy that satisfies DPDP obligations while staying practical for analytics and engineering teams.
  1. Document consent use cases and purposes
    Work with privacy and legal stakeholders to enumerate where consent is needed: behavioural analytics, profiling, remarketing, cross-site tracking and so on. For each, capture the purpose description that will appear in the notice, the lawful basis and the withdrawal channels that must be supported.[2]
    • Create a purpose catalogue with stable IDs and plain-language descriptions.
    • Flag purposes that can share the same consent toggle versus those that must remain separate (for example, basic analytics vs personalised advertising).
  2. Define core consent event types
    Start with a small, expressive set of events such as notice_shown, consent_granted, consent_denied, consent_withdrawn, consent_refreshed and consent_expired. Avoid inventing many custom variants; use attributes on these core types to model nuances like channel, product or campaign.
    • Ensure every consent state transition maps to one of these event types.
    • Reserve room in the naming convention for future DPDP-driven operations such as “consent_ported” if interoperability requirements increase.
  3. Design standard attributes for each event
    Agree on a shared attribute set across all consent events: principal_id or hashed identifier, session_id, channel, app_id, notice_id, notice_version, purpose_ids, legal_basis, actor_type, consent_manager_id (if any) and correlation_id to link to UI interactions. Decide which attributes are mandatory for compliance and which are optional but useful for analytics (for example, campaign_id, experiment_id).
    • Use controlled vocabularies (enums) for attributes like channel, actor_type and legal_basis to keep queries simple.
    • Capture timestamps with timezone and, where relevant, expiry_at or effective_from timestamps for forward-looking changes.
  4. Plan identity strategy across web, app and backend
    Decide how anonymous identifiers (cookies, device IDs) will be linked to authenticated user IDs, and when IDs should be reset (for example, after withdrawal for all profiling purposes). Ensure the taxonomy supports both pseudonymous and authenticated identifiers without over-collecting or storing more personal data than needed.
    • Document ID mapping logic and store it in a restricted system; avoid embedding raw personal data in analytics events where not required.
    • Model consent at the user level, but allow separate states per device or app if your risk assessment requires it.
  5. Map events to tools and schema registries
    For each event type, specify which components emit it (CMP, web SDK, mobile SDK, backend service) and how it reaches your warehouse, lake or event bus. Register each event schema in a central schema registry or analytics tracking plan, and treat changes as code with review, versioning and rollback.
    • Create reference payload examples for each event type for frontend, mobile and backend teams.
    • Include consent events in your data quality tests, checking for required fields and acceptable values before loading them into analytics tables.
Example schema for a consent_granted event that balances compliance and analytics needs.
Field Type Required? Description
event_name string Yes Should be "consent_granted" for this event type.
event_time timestamp Yes Time at which the user action or consent manager confirmed consent.
principal_id string (hashed) Yes, if identifiable user Pseudonymous ID representing the Data Principal in your systems.
session_id string Optional Client-side session identifier, useful for analysing drop-off and funnels around consent.
channel enum (web, android, ios, call_centre, etc.) Yes Channel where consent was captured, enabling channel-wise analytics and audits.
purpose_ids array<string> Yes List of purpose codes that this consent covers (for example, ["ANL_BASIC", "MKT_EMAIL"]).
legal_basis enum (consent, legitimate_use, etc.) Yes for personal data events Legal basis relied on for the processing; typically "consent" for analytics unless another basis is documented.
notice_id / notice_version string / string or int Yes Identifier and version of the notice shown at the time consent was granted, critical for reconstructing context in audits.
consent_source / actor_type enum Optional but recommended Whether consent came from first-party UI, a consent manager, call centre, etc., and who triggered it (user, admin on request).
  • Use consistent event names and attributes across web, mobile and backend services; vary only channel or app identifiers.
  • Emit server-side consent events for backend-only flows (such as call centre requests) so your warehouse still sees a unified taxonomy.
  • Ensure your CMP or SDK propagates consent state into tag managers, analytics SDKs and CDPs via standardised flags (for example, analytics_consent=true/false).
  • Establish contracts with third-party platforms so they honour your consent state, passing purpose- and channel-specific parameters where necessary.

Implementation patterns and controls for defensible consent operations

Once the taxonomy is agreed, the challenge is wiring it consistently across your stack and proving that it works over time. Legal and technical commentary on DPDP emphasises that consent is the default lawful basis for processing personal data when other grounds do not apply, and that organisations should be able to evidence how consent was obtained, updated and withdrawn.[3]
  • Consent capture layer (web/app): Your CMP or custom UI components fire consent_* events to a central collector, passing standard attributes from the taxonomy.
  • Tag manager and SDKs: Gate analytics and marketing tags on live consent state, using data layer variables or SDK callbacks that reflect the latest consent_* events.
  • Backend services: For server-side tracking and enrichment, maintain a lightweight consent_state per principal and check it before forwarding events into analytics streams or third-party tools.
  • Data warehouse or lake: Ingest consent events into dedicated consent tables, and build views that join them with behavioural events, enabling queries like “only include sessions where analytics_consent=true at event time”.
  • Monitoring and alerting: Implement dashboards and automated checks that compare traffic with and without consent to detect misconfigurations, such as spikes in tracking despite many withdrawals.

Troubleshooting consent event integrations

  • Symptom: Analytics data still arriving for users who withdrew consent. Check consent gates in the tag manager, verify that withdrawal events reach the warehouse, and confirm joins use the correct principal_id and timestamps.
  • Symptom: Large drop in consents after a UI change. Compare notice_shown vs consent_granted rates by notice_version, and run controlled experiments on copy and layout rather than guessing.
  • Symptom: Mismatched consent states between web and mobile for the same user. Check ID mapping and login flows, ensure consent state is refreshed after authentication, and standardise purpose IDs across platforms.
  • Symptom: Third-party tools appear to ignore consent flags. Inspect network calls to confirm consent parameters are sent, and review partner configurations or APIs to ensure those parameters actually control tracking.

Common mistakes in consent event design

  • Encoding consent as a single global boolean instead of purpose-specific flags, making it impossible to distinguish analytics from advertising permissions.
  • Using different purpose names across CMPs, SDKs and the warehouse (for example, “analytics”, “measurement”, “product insights”), which complicates joins and audits.
  • Treating the CMP configuration as the taxonomy, without a version-controlled schema shared across engineering, analytics and privacy teams.
  • Not modelling withdrawals and expiries as first-class events, leaving you with only a latest_state flag and no way to answer historic questions accurately.
  • Letting product or marketing teams add new consent toggles without updating the taxonomy, downstream data contracts and governance processes.

Common questions about DPDP-aligned consent taxonomies

FAQs

You should be able to show that, for each processing activity that relies on consent, the data principal received an appropriate notice, gave valid consent for specific purposes, and had an accessible way to withdraw it. In practice this means maintaining coherent records of notices served, consents granted or denied, withdrawals, and any later refresh or expiry decisions, along with timestamps and scope.[5]

A tracking plan usually lists user behaviour events (page_view, add_to_cart, etc.) and their properties. A consent event taxonomy instead encodes the legal state of permission to process personal data for particular purposes, independent of behaviour. Both plans should be aligned so that every behavioural event can be filtered or suppressed according to the relevant consent state.

You can implement a consent event taxonomy with your own UIs, SDKs and backend services even if you do not use an external Consent Manager. If you do work with a registered Consent Manager, treat its payloads as another source of truth and map its lifecycle events into your internal taxonomy so that analytics sees a unified view.

If purposes are too broad, users cannot make meaningful choices and analytics teams cannot tailor processing; if they are too granular, UX suffers and implementation becomes brittle. Many organisations separate essential product analytics from optional profiling or remarketing, then refine further only where risk and business value justify it.

Yes. A common pattern is to create consent_events and consent_state tables, backfill them from existing logs where possible, and then join them to behavioural events using principal_id and event_time. Over time, you can migrate legacy analytics pipelines to query only consent-compliant datasets while keeping raw data in tightly controlled environments for exceptional use cases approved by governance.

Evaluating consent management solutions against your taxonomy

Your consent event taxonomy should drive tool selection, not the other way around. When evaluating consent management solutions, assess how well they represent your events and attributes, integrate with your analytics stack, and support DPDP-specific operational needs.
  • Data model fit: Can the solution represent your lifecycle events (grant, deny, withdraw, refresh, expire) and mandatory attributes without brittle workarounds?
  • DPDP alignment: Does it support Indian consent flows, including clear notices, purpose management and withdrawal, and can it interoperate with DPDP Consent Managers where relevant?
  • Integration with analytics stack: Are there SDKs, APIs or connectors for your web and mobile apps, tag manager, CDP, warehouse and marketing tools, so consent state reliably gates downstream processing?
  • Auditability and export: Does the tool keep immutable logs, version notices and purposes, and allow exporting records for internal audit or response to regulatory queries?
  • Governance: Are there role-based permissions, approval workflows for new purposes or notices, and clear separation between test and production environments?
  • Total cost of ownership: How much engineering effort is needed to implement and maintain integrations, and how much time could it save analytics and privacy teams during audits and change cycles?

Considering a specialised DPDP consent solution?

Digital Anumati

Digital Anumati presents itself as a DPDP Act consent management solution for organisations that want to operationalise consent under India’s Digital Personal Data Protection fram...
  • Focused specifically on consent management for India’s DPDP context, rather than generic global privacy tooling.
  • Positioned as a digital, software-led service that can be evaluated alongside your analytics and data platforms as part...
  • Suitable for technical evaluators who want to assess how a dedicated consent solution could implement or complement the...

A robust consent event taxonomy turns DPDP requirements into concrete events, schemas and controls that analytics and engineering teams can implement and defend. As a next step, map your current consent flows to the lifecycle and schema patterns described here, identify gaps, and pilot the taxonomy on a limited set of properties before a wider rollout. If you are assessing how a dedicated DPDP Act consent management solution could support this taxonomy and your analytics stack, consider evaluating Digital Anumati for technical fit alongside advice from your legal and privacy teams.[6]

Sources

  1. The Digital Personal Data Protection Act, 2023 - Ministry of Law and Justice, Government of India
  2. FAQs on Consent Management – Digital Personal Data Protection Framework - Data Security Council of India (DSCI)
  3. Lawful Processing and Consent under DPDP Act 2023 - Taxmann
  4. India publishes consent management rules under Digital Personal Data Protection Act - Hogan Lovells via JD Supra
  5. Digital Personal Data Protection Rules, 2025 - Wikipedia (with references to Government of India and PIB)
  6. Digital Anumati – DPDP Act Consent Management Solution - Digital Anumati