Updated At Mar 18, 2026
Key takeaways
- DPDP applies to ongoing processing of personal data, even if it was collected before the Act, so legacy datasets need explicit board attention and a clear strategy.[1]
- Section 5(2) introduces a transitional requirement to give compliant notices for many pre-Act consents, which can be leveraged as a structured re-engagement exercise rather than a box-ticking campaign.[1]
- Leadership should classify each legacy dataset into four outcomes—retain, re-notice/re-consent, anonymise, or delete—based on business purpose, legal retention duties, and risk.
- The phased DPDP implementation window of up to 18 months allows a time-bound programme with 3, 6, 12, and 18-month milestones instead of rushed, ad hoc clean-up.[2]
- Strong governance, contracts with processors, and auditable deletion/anonymisation workflows are essential to demonstrate good-faith, risk-based compliance if questioned by the Data Protection Board.[1]
Legacy data under DPDP: why this is now a board-level issue
- What personal data do we still hold from before DPDP, across customers, employees, vendors, and prospects?
- On what legal basis do we continue to process it, and are the original consents or notices DPDP-compliant?
- How long must we retain it under sectoral and tax laws, and when should we delete or anonymise it instead of storing it indefinitely?
- If challenged by the Data Protection Board, can we show a clear plan, timelines, and evidence of good-faith implementation?
Translating DPDP requirements into decisions about pre-Act data
| Data category | Typical legacy sources | Likely primary action | Key DPDP considerations |
|---|---|---|---|
| Current customers | CRM, billing, product usage logs, support tickets | Retain with documented legal basis; issue DPDP-compliant notices where processing relies on consent. | Purpose limitation; transitional notices under Section 5(2); retention justified by contract or law; rights to access/correction/erasure.[1] |
| Lapsed / ex-customers | Old CRM entries, transaction histories, dormant accounts | Retain only fields needed for statutory retention or potential disputes; otherwise anonymise or delete. | Storage limitation and erasure once purposes are met, except where retention is required by law (e.g., tax, financial regulations).[3] |
| Marketing leads / prospects | Event lists, website forms, purchased databases, LinkedIn exports | Prioritise re-notification or fresh consent for high-value segments; delete stale, low-quality, or non-compliant sources. | Clarity of purpose at collection; ability to withdraw consent; fairness of using bought lists; rights to erasure and objection-like outcomes.[4] |
| Employees and contractors | HRIS, payroll, performance reviews, background checks | Retain core records for statutory periods; minimise sensitive data; anonymise older HR analytics where individual identification is not needed. | Employee rights of access/correction; legal retention obligations (e.g., employment, social security, tax); proportionality of monitoring data.[1] |
| Children’s data | Education products, family accounts, training programmes | Apply stricter scrutiny; confirm age-verification and guardian consents; consider faster deletion or strong anonymisation for legacy records. | Heightened protection obligations under DPDP; fairness and best interests of the child when retaining historical information.[1] |
| Vendor / partner contacts | Procurement tools, email address books, contract files | Retain contact details needed to manage the contract and compliance; periodically review and delete obsolete contacts. | Purpose limitation to business relationship; ability for individuals to request correction or removal from communications.[4] |
Designing an operating plan to remediate legacy data
-
Build an inventory of legacy data and systemsStart with where data actually lives: production systems, data warehouses, archives, backups, email, shared drives, collaboration tools, and major processors. Assign accountable owners for each system and estimate volumes, age, and data principal segments represented.
-
Map purposes, legal bases, and retention obligationsFor each dataset, document the business purpose, whether processing is based on consent or another legal basis, and which sectoral or tax laws mandate retention. Use this to identify data that is still needed versus data kept simply because storage was cheap.[3]
-
Classify datasets into retain, re-notice, anonymise, or deleteOn the basis of risk, value, and legal constraints, decide the target outcome for each dataset. Focus early on high-risk combinations: large volumes, sensitive data, weak historic consents, and widespread access across the organisation.
-
Plan and execute transitional notices and re-engagementFor ongoing processing that relies on legacy consents, design DPDP-compliant notices that explain purposes, rights (including withdrawal of consent), and grievance mechanisms. Prioritise current customers and active users; consider combining notices with meaningful product or service updates.[1]
-
Implement technical deletion, anonymisation, and suppression workflowsWork with engineering and IT to implement standard processes to delete or irreversibly anonymise data once retention triggers are met, while ensuring that erasure and correction rights can still be honoured in live systems and major archives.[4]
-
Sequence delivery over 3, 6, 12, and 18 monthsStructure the programme with clear milestones: early wins on high-risk datasets, medium-term rollout of notices and retention schedules, and longer-term remediation of unstructured data and complex vendor environments, aligned to the phased DPDP Rules timeline.[2]
| Time horizon | Target leadership outcomes |
|---|---|
| 3 months | Board-approved scope and risk appetite; high-level data inventory; prioritised list of high-risk legacy datasets; designated executive owner and programme budget. |
| 6 months | Draft retention and deletion schedule for major data categories; initial DPDP-compliant notices for key customer and employee data; technical design for deletion/anonymisation workflows. |
| 12 months | Operational re-notification campaigns for priority segments; implemented deletion workflows for core systems; updated vendor contracts with legacy-data clauses; early metrics on records deleted or anonymised. |
| 18 months | Residual legacy data limited to documented legal or business needs; unstructured and backup data brought under policy; audit trail demonstrating risk-based decisions and execution aligned with DPDP Rules implementation.[2] |
Embedding governance, vendor controls, and technology for ongoing compliance
- Governance: clear ownership (board committee, GC/CDPO, CIO/CTO, business data owners) with a RACI for decisions on retention, deletion, and re-notification.
- Vendor controls: contracts and data-processing agreements that require processors to support your retention/deletion schedule, respond to data principal requests, and provide evidence of erasure on request.
- Technology and processes: tools that can search, classify, and delete or anonymise data in both structured and unstructured systems, with logs that can be shown to auditors or the Data Protection Board if needed.[4]
| Role | Primary accountability on legacy data |
|---|---|
| Board / Risk Committee | Approve risk appetite, funding, and programme milestones; review reports on data reduction, residual exposures, and any incidents or regulatory interactions. |
| GC / Chief Data Protection Officer (or equivalent) | Interpret DPDP and sectoral laws; define policies and decision frameworks for retention, re-notification, and erasure; own engagement with the Data Protection Board where required.[5] |
| CIO / CTO / CDO | Implement data discovery, classification, and deletion/anonymisation capabilities; ensure legacy systems, data lakes, and backups are addressable under the retention schedule. |
| Business data owners (e.g., Sales, HR, Finance) | Decide which data is genuinely needed for operations and analytics; sponsor re-notification campaigns; sign off on deletion/anonymisation of low-value legacy datasets. |
| Information Security | Assess breach impact of legacy datasets; align technical and organisational measures to the reduced data footprint and monitor for policy drift over time. |
Common mistakes leadership teams make
- Treating legacy-data clean-up as a one-time IT project rather than an ongoing governance and risk-management responsibility.
- Attempting blanket re-consent for every historic record, overwhelming customers and teams, instead of prioritising current, high-value data subjects and high-risk processing activities.
- Ignoring unstructured data, personal data in test environments, and processor-held datasets, leaving large blind spots in DPDP compliance.
- Over-retaining data “just in case” without documenting specific legal obligations or business needs, which increases breach impact and potential penalties.
- Promising aggressive deletion timelines to the board or regulators without verifying that systems and vendors can technically execute those commitments.
Common questions about legacy data and DPDP compliance
FAQs
Yes. DPDP applies to processing of digital personal data, which generally includes ongoing use of data collected before commencement. Legacy data that you continue to store, analyse, or share after DPDP takes effect should be treated as in-scope unless a specific exemption applies, even though transitional provisions shape how you move to full compliance.[1]
Not necessarily. Where you rely on consent as the legal basis for ongoing processing, you should ensure individuals receive DPDP-compliant notice and can easily withdraw consent, including for legacy data. That may mean targeted re-notification or re-permissioning for certain segments, but it does not automatically require blanket re-consent for every historic record.[1]
Where another law requires you to retain data for a minimum period, that obligation generally prevails. DPDP’s storage-limitation and erasure duties then apply after those periods end. Your retention schedule should cross-reference sectoral and tax rules so that deletion and anonymisation begin as soon as legal retention no longer applies.[3]
DPDP obligations extend to personal data processed on your behalf, regardless of where it is stored. You should gradually bring unstructured systems and processor environments into the same retention and deletion framework, using search, classification, and contractual controls to manage these harder-to-reach locations over the 12–18 month horizon.[1]
Maintain a clear paper trail: board minutes approving the programme, your data inventory and risk assessment, the retention schedule, samples of transitional notices, logs of deletion or anonymisation, and records of how rights requests are handled. This documentation will be as important as your technical controls if your approach is ever scrutinised.[2]
Sources
- Digital Personal Data Protection Act, 2023 - Ministry of Electronics and Information Technology, Government of India
- DPDP Rules, 2025 Notified – A Citizen-Centric Framework for Privacy Protection and Responsible Data Use - Press Information Bureau, Government of India
- Decrypting India’s New Data Protection Law: Key Insights and Lessons Learned - Bird & Bird
- Top 10 operational impacts of India’s DPDPA – Individual rights - International Association of Privacy Professionals (IAPP)
- Summary of DSCI’s submission to MeitY on Draft Digital Personal Data Protection Rules, 2025 - Data Security Council of India