Updated At Mar 18, 2026
Key takeaways
- Under the DPDPA, the data fiduciary decides the “why and how” of processing; the data processor executes processing on documented instructions only.
- For global programmes, treat data fiduciaries as broadly equivalent to GDPR controllers and processors as roughly aligned to GDPR processors, but adapt for India-specific nuances.
- Legal accountability, penalties, and most obligations sit with data fiduciaries; processors are bound mainly through contracts, security duties, and oversight expectations.
- A practical DPDPA operating model needs clear ownership (board, CXOs, DPO, CISO, product, procurement), a RACI matrix, and uplifted data processing agreements.
- Many Indian organisations are both fiduciary and processor in different lines of business; mapping roles across group entities and vendors is a critical first 90-day task.
- Use DPDP Rules 2025 timelines as the outer boundary but work backward from board-level risk appetite to phase discovery, contract remediation, and control implementation.
Why fiduciary versus processor roles are a board-level issue in India
- Risk: Misclassifying a critical vendor as “just a processor” can leave you carrying liability without the contractual levers to manage it.
- Growth: Data-driven products, AI models, and cross-border services depend on clear fiduciary–processor roles to satisfy enterprise customers and regulators.
- Cost: A well-designed operating model avoids over-engineering (treating everyone as a fiduciary) and under-engineering (assuming outsourcing shifts accountability).
Legal definitions of data fiduciaries and data processors under the DPDPA
| DPDPA concept | Approximate GDPR equivalent | Who decides purpose & means? |
|---|---|---|
| Data fiduciary | Data controller (broadly analogous) | Yes – determines why and how personal data is processed. |
| Data processor | Processor (broadly analogous) | No – processes only on documented instructions of the fiduciary. |
Applying the roles to real-world Indian business models
| Sector / model | Typical role(s) under DPDPA | Practical notes for leadership teams |
|---|---|---|
| Banks & large NBFCs (retail lending, deposits, cards) | Primarily data fiduciaries vis-à-vis customers; may act as processors to other institutions in co-branded or white-label arrangements. | Core banking, KYC, and risk models are typically under your control; outsourcing to IT/BPO or cloud providers does not shift fiduciary accountability. |
| Insurers (life, health, general) and TPAs | Insurers are usually fiduciaries; TPAs often act as processors, but may be fiduciaries for their own analytics, fraud monitoring, or marketing uses. | Claims handling chains can involve multiple fiduciaries and processors; map each data flow (policyholder, family members, health data) explicitly. |
| IT services & BPO providers (captive and third-party) | Frequently processors to global or Indian enterprise clients; may be fiduciaries for HR, internal systems, and proprietary products or platforms they operate directly with end users. | When you only process client data under strict instructions, you are a processor; when you decide what data to collect from your own platform’s users, you are a fiduciary for that activity. |
| SaaS platforms (CRM, HRMS, analytics, martech, fintech SaaS) | Often processors to business customers using the platform; may be co-fiduciaries where they directly determine purposes (e.g., use of telemetry, product analytics, AI models trained on customer data). | Product teams should perform a use-case-by-use-case assessment: customer CRM data likely processed as a processor; platform’s own behavioural analytics more likely as fiduciary and must be addressed in notices and contracts. |
| Marketplaces & aggregators (e-commerce, travel, food delivery, gig platforms, financial marketplaces) | Typically data fiduciaries vis-à-vis end customers and partners; may also act as processors to merchants or lenders for specific services (e.g., onboarding, KYC). | Because platforms design the ecosystem, algorithms, and most engagement rules, regulators are likely to see them as fiduciaries for a wide range of processing operations, including profiling and recommendations. |
| Logistics, delivery, and mobility providers | Usually fiduciaries for their own apps and drivers/partners; may be processors for enterprise shippers or marketplaces that dictate data use policies. | Telematics, route optimisation, and tracking can generate rich behavioural data; clarify whether this is used only to deliver contracted services (processor role) or for independent purposes (fiduciary role). |
| HR & payroll service providers (including employer-of-record models) | Commonly processors to employer-clients, but fiduciaries for their own workforce and for any value-added analytics or benchmarking they run on aggregated HR data. | Because employee data is sensitive from a labour-relations perspective, organisations should explicitly classify which HR processes they retain as fiduciaries and which are safely outsourced under strict processor terms. |
- Who designed this data use and who can change it – us, a partner, or both?
- Do we decide which data is collected, for how long, and for which new use cases, or do we act purely on customer or client instructions?
- If a data principal complains or exercises a right, who is realistically expected to respond – us or our vendor?
End-to-end obligations that remain with data fiduciaries
- Lawful basis, notice, and consent: Ensure there is a valid legal ground (typically consent or legitimate use as permitted), provide clear and itemised notice, and record/manage consents or withdrawals.
- Purpose limitation and data minimisation: Collect and process only what is necessary for clearly specified purposes, and avoid incompatible secondary uses without fresh consent or another lawful basis.
- Children’s data: Implement higher standards for processing children’s personal data, including verifiable parental consent and additional safeguards as prescribed.[1]
- Security safeguards: Implement reasonable technical and organisational measures to prevent personal data breaches, including measures you require of your processors through contracts.[1]
- Breach notification and response: Detect, investigate, and notify prescribed authorities and affected individuals of qualifying personal data breaches in the manner and timelines that may be specified by rules.[1]
- Data principal rights: Enable access, correction, erasure, grievance redressal, and choice mechanisms, with appropriate authentication and logging across your own systems and processor ecosystem.[1]
- Retention and deletion: Define retention policies aligned to legal and business needs, and ensure timely deletion or anonymisation in your systems and at processors once purposes are met.
- Vendor oversight: Select processors capable of meeting DPDPA requirements, bind them via contract, and monitor their performance – including sub-processors – on an ongoing basis.[6]
-
Inventory processing activities where you are the data fiduciaryStart with customer, employee, and critical partner data. For each processing activity, confirm that your organisation decides the purposes and key means of processing.
-
Map obligations to controls and ownersFor every activity, map which DPDPA obligations apply (notice, consent, rights, security, breach response) and assign accountable owners in legal, product, security, and operations teams.
-
Identify processors and sub-processors supporting each activityList all service providers, group entities, and cloud platforms that handle the relevant personal data. Note where they further outsource to sub-processors or hyperscale cloud providers.
-
Uplift contracts and technical measuresUpdate data processing agreements, SLAs, and security requirements so that processors can help you discharge your fiduciary duties – including support for rights requests, deletion, and breach handling.
-
Set up monitoring, reporting, and testingDefine KPIs and reporting for privacy incidents, rights request handling, consent metrics, and vendor performance, and align them with board or risk committee dashboards.
What compliant data processors must do in practice
- Process only on documented instructions: Implement procedures to accept, record, and execute customer instructions, including limitations on combining or repurposing data for your own analytics or AI models unless clearly authorised.
- Embed security by design: Maintain technical and organisational measures aligned to industry standards and contractual commitments, including access controls, encryption where appropriate, logging, and incident management.[6]
- Support data principal rights: Develop APIs, admin consoles, or operational playbooks to support your clients in meeting access, correction, deletion, and portability requests within agreed timelines.
- Manage sub-processors: Maintain an inventory of sub-processors, perform due diligence, and give fiduciary customers transparency and (where agreed) approval rights for any changes.[2]
- Incident and breach cooperation: Detect and investigate security incidents, notify affected fiduciary clients promptly in line with contract SLAs, and help them meet their statutory notification duties.
- Cross-border transfers and localisation: Only transfer personal data outside India or to new locations where contracts permit it and agreed safeguards are in place, taking into account any evolving rules on international data flows.[3]
Designing a DPDPA operating model and RACI for your organisation
| Activity / decision | Board / risk committee | DPO / privacy head | CISO / security | Product / BU head | Procurement / vendor risk |
|---|---|---|---|---|---|
| Define and approve overall DPDPA risk appetite and role strategy (fiduciary vs processor split). | A | C | C | R | C |
| Approve privacy policy, notices, and approach to data principal rights handling across all fiduciary activities. | C | A/R | C | R | I |
| Select, contract, and monitor data processors and sub-processors used in fiduciary activities. | I | C | C | C/R | A/R |
| Manage security controls and incident response across fiduciary and processor environments. | I | C | A/R | R | C |
-
Define your role taxonomy and decision principlesAdopt clear definitions of when the organisation will treat itself as a data fiduciary, a processor, or both, and how this interacts with existing GDPR or sectoral classifications.[5]
-
Create a central data inventory and role registerCatalogue major systems, data sets, and processing activities, and record for each whether you are acting as fiduciary, processor, or joint fiduciary – and which legal entity inside your group is in that role.
-
Align governance bodies and reporting lines to rolesClarify which committees and executives oversee fiduciary responsibilities (often a privacy or risk steering committee) versus processor responsibilities (often delivery and operations leadership).
-
Standardise DPA templates and playbooksDevelop standard data processing agreement templates for when you act as fiduciary (buy-side) and when you act as processor (sell-side), with playbooks for which clauses are negotiable and which are not.
-
Embed responsibilities into project and vendor lifecyclesUpdate product development, change management, procurement, and vendor onboarding processes to require a fiduciary/processor role classification and privacy review at the design stage.
Structuring data processing agreements and allocating risk
| Clause / topic | Fiduciary focus | Processor focus |
|---|---|---|
| Scope of processing and documented instructions | Define purposes, categories of data, data subjects, and permitted operations. Reserve the right to update instructions and to stop unlawful processing immediately. | Ensure scope is precise and technically feasible; avoid vague language that could make you look like a fiduciary for your customer’s decisions. |
| Security measures and certifications | Specify minimum controls (e.g., encryption, access management, logging, business continuity) and require notification of material security changes and incidents. | Align commitments to your actual controls and audit reports; avoid promising “gold-plated” security on paper while running “bronze” in operations. |
| Sub-processing and international transfers | Control where data goes and who can access it. Require notice (and where appropriate, consent) for new sub-processors and for offshoring or cross-border transfers, considering evolving DPDPA rules.[3] | Seek pre-approved lists or risk-based approval mechanisms; ensure you can actually manage and contractually bind your own sub-processors to equivalent obligations. |
| Support for data principal rights and retention/deletion | Require timely execution of access, correction, and deletion instructions, and clear processes for end-of-contract data return or deletion in line with your retention policies.[6] | Set realistic SLAs based on system capabilities; clarify any limitations (e.g., immutable backups) and how you will handle them in practice. |
| Audit, reporting, and assurance rights | Secure rights to review security and privacy controls via reports, questionnaires, and, for high-risk processing, on-site or third-party audits, balanced against practicality. | Offer proportionate assurance mechanisms (e.g., third-party certifications, pooled audits) to avoid operational disruption from multiple overlapping customer audits. |
| Indemnities, liability caps, and insurance | Seek meaningful recourse where processor failures contribute to regulatory penalties or large-scale harm, while recognising you remain primarily accountable under DPDPA.[1] | Avoid uncapped liability for all data events; propose differentiated caps and insurance-backed coverage for specific risk categories (e.g., security breaches vs minor SLA breaches). |
- Which clauses are regulatory must-haves (e.g., security safeguards, incident cooperation, rights support) versus those that are commercial levers (e.g., liability caps, service credits).
- How DPDPA-specific requirements interact with existing GDPR or sectoral addenda, and whether you can maintain a global template with India-specific riders instead of entirely separate contracts.[5]
- Who internally signs off on risk trade-offs – for example, when accepting a lower audit right in exchange for stronger certifications and independent reports.
Implementation roadmap aligned to DPDP Rules 2025 timelines
-
Phase 1: Discovery and role mapping (first 3–6 months)Conduct enterprise-wide data mapping, focusing on customer, employee, and high-risk data. For each processing activity, classify whether your organisation is a fiduciary, processor, joint fiduciary, or sub-processor, and identify key vendors and group entities involved.
-
Phase 2: Policy, notices, and governance uplift (parallel 3–9 months)Update privacy policies, consent flows, data principal rights procedures, and incident response plans to reflect your mapped fiduciary/processor roles. Establish or strengthen the privacy office, steering committee, and DPO or equivalent role where needed.[4]
-
Phase 3: Contract remediation and vendor engagement (6–18 months)Prioritise high-risk and high-volume vendors for DPA updates, including cross-border data transfer provisions and processor obligations aligned with DPDPA. For sell-side contracts where you act as processor, prepare standard addenda and negotiation playbooks for enterprise customers.[2]
-
Phase 4: Technical controls and automation (ongoing)Invest in security enhancements, consent and preference management, data discovery and classification tools, and workflows for rights requests and breach response. Automate where feasible to reduce manual overhead for processors and fiduciaries alike.
-
Phase 5: Training, monitoring, and continuous improvementRoll out tailored training for leadership, product, engineering, operations, and vendor-management teams. Establish metrics and dashboards, perform periodic audits, and adjust your operating model in response to regulatory guidance and incidents.
Key takeaways
- Use regulatory timelines as outer limits, not starting points; front-load discovery and role mapping.
- Sequence vendor and contract work by risk and data criticality; not all processors need the same depth of review.
- Treat technical and contractual workstreams as integrated; many DPA clauses are only meaningful if backed by real controls and data flows.
Common questions about fiduciary and processor responsibilities
FAQs
Yes. Many Indian organisations are fiduciaries for some activities (e.g., processing their own customers’ or employees’ data) and processors for others (e.g., providing IT, BPO, or SaaS services to enterprise clients). The classification is activity-specific, based on who determines the purpose and means of processing, not on your overall business label.
Conceptually, a DPDPA data fiduciary is broadly analogous to a GDPR controller: both decide the purposes and essential means of processing and carry primary accountability. However, the legal tests, terminology, and some obligations differ. Global organisations should avoid assuming that GDPR role assessments automatically apply in India and should validate roles and contracts against the DPDPA specifically.[5]
The DPDPA is structured so that regulators typically look first at the data fiduciary, because it is responsible for choosing and supervising processors and for ensuring appropriate safeguards. However, the commercial contract can allocate financial risk and indemnities back to the processor where its failures were a contributing cause, and processors may face exposure under other applicable laws and regulations.[1]
Group entities performing centralised IT, HR, or analytics functions often act as processors to operating companies, but may themselves be fiduciaries for activities where they set purposes or combine data sets for their own objectives. The safest approach is to analyse each intra-group arrangement on its facts, document whether the shared-service entity is a processor or a co-fiduciary, and put appropriate intra-group DPAs or data-sharing agreements in place.
Fiduciaries must maintain visibility and control across the outsourcing chain, including approval or notification rights for sub-processors and assurance that equivalent obligations flow down the chain. Processors in the middle of the chain need to manage their own vendors carefully, ensuring that their sub-processor contracts allow them to meet the promises they make upstream to fiduciary customers.[2]
Cross-border processing remains possible, but fiduciaries must pay attention to evolving rules and any notified restrictions under the DPDPA, as well as sector-specific guidance. At a minimum, contracts with global cloud and SaaS providers should clearly identify where data is stored and processed, how it is protected, and how data principal rights and breach notifications will be handled across jurisdictions.[3]
Frequent missteps when assigning fiduciary and processor roles
- Assuming outsourcing shifts legal accountability: Treating processors as if they, not you, are responsible for notices, consent, rights, and regulatory engagement when you are the data fiduciary in law.
- Using role labels loosely in contracts: Calling a vendor a “processor” while contract terms and factual control show it independently sets purposes, making it a co-fiduciary in substance.
- Copy-pasting GDPR models without adaptation: Reusing EU-centric controller–processor assessments for India without testing them against DPDPA definitions, local business models, and data flows.[5]
- Ignoring internal processors: Overlooking shared services, captive centres, or IT teams that process data for multiple group entities without clear intra-group DPAs and role clarity.
- Over-classifying everyone as a fiduciary: Trying to avoid complexity by declaring all major vendors and group entities as fiduciaries, which dilutes accountability and complicates data principal journeys.
- Leaving role decisions to late-stage contract negotiation: Waiting until procurement or legal is finalising a contract to debate roles, rather than deciding at product or project design time based on the actual data use.
Executive summary and next actions for leadership teams
Key takeaways
- DPDPA makes the distinction between data fiduciary and processor central to how Indian organisations design governance, contracts, and technology choices.[1]
- Most obligations and regulatory exposure stay with the fiduciary; processors are critical partners but do not replace fiduciary accountability.[6]
- In practice, many organisations will occupy multiple roles across different products, geographies, and group entities – requiring nuanced, activity-level classification.
- A structured operating model, with a clear RACI and standardised DPAs, is essential to turn legal text into day-to-day behaviour across teams and vendors.
- Have we mapped our major data processing activities and tagged each as fiduciary, processor, joint fiduciary, or sub-processor, with clear owning entities?
- Do we have a single, approved view of DPDPA roles that aligns with (but does not blindly copy) our GDPR or other global frameworks?[5]
- Are our DPAs and intra-group agreements updated to reflect these roles, including realistic security, rights-support, and breach-cooperation clauses?[2]
- Is there a named executive owner and governance forum for fiduciary obligations, and a clear operating model for processor responsibilities in our delivery and operations teams?
- Do our product, engineering, procurement, and vendor-management processes require role classification at design or onboarding time, not as an afterthought?
Sources
- The Digital Personal Data Protection Act, 2023 (No. 22 of 2023) - Ministry of Law and Justice, Government of India
- Top 10 operational impacts of India’s DPDPA – Obligations of data processing entities - International Association of Privacy Professionals (IAPP)
- The Digital Personal Data Protection Act, 2023: Comprehensive Framework, Latest Developments, and Compliance Roadmap - The Legal 500 / Maheshwari & Co.
- 2025 Update : Deep Dive – Digital Personal Data Protection Act (DPDPA), 2023 - Spice Route Legal
- India’s Digital Personal Data Protection Act 2023 vs. the GDPR: A Comparison - Latham & Watkins LLP
- Data Fiduciary and Data Processor Obligations Under DPDPA, 2023 - AMLEGALS