Comply DP

Data Intelligence

You cannot protect what you cannot see. Map every personal data touchpoint before the regulator asks you to.

The problem

The single question that exposes every company's DPDP readiness gap: "Show me all the personal data you hold about a specific individual, which systems it sits in, why you have it, who you've shared it with, and how long you're keeping it."

If you cannot answer this question - for any Data Principal, across any system, in under an hour - you cannot fulfil access requests, execute erasure requests within 7 days, estimate the scope of a breach within 72 hours, or demonstrate to the DPBI that you have "reasonable" control over personal data processing.

The average Indian company with 50-500 employees processes personal data across 15-40 systems: CRM, email marketing, analytics, payment processing, HR/payroll, customer support, cloud storage, collaboration tools, and often several bespoke internal applications. In most organisations, nobody has a complete map of what data flows where.

This is not a technology problem. It is an organisational knowledge problem. The data exists. The connections between systems exist. What does not exist is a single, current, searchable inventory that maps: what personal data is collected, from whom, for what purpose, in which systems, shared with whom, retained for how long, and under what lawful basis.

Without this inventory, every other compliance activity - consent management, rights fulfilment, breach notification, vendor risk assessment - is guesswork.

What ComplyDP does

Guided data inventory builder

A structured workflow that walks you through every system and data processing activity in your organisation. Not a blank spreadsheet - a guided questionnaire that asks the right questions: what data, from whom, why, where stored, who has access, how long retained, lawful basis.

Processing activity register

A living record of every processing activity mapped to DPDP requirements: purpose, data categories, Data Principal categories, recipients, retention periods, cross-border transfers, and security measures. This is the document the DPBI will ask for.

Purpose and lawful basis mapping

For each processing activity, map the specific lawful basis - consent, legitimate use, legal obligation. Identify where you rely on consent (so you know which activities stop if consent is withdrawn) versus where you have an independent lawful basis.

Data flow visualisation

See how personal data moves through your organisation: collection points, internal systems, third-party processors, and cross-border transfers. Identify where data crosses boundaries that create compliance obligations.

Gap identification

The platform automatically flags processing activities that lack a documented lawful basis, have no retention period defined, involve undocumented third-party sharing, or are missing from your privacy notice. These are your compliance gaps - prioritised by risk.

How it works

  1. 1

    List your systems

    Enter every system, application, and tool in your organisation that processes personal data. ComplyDP provides a starter list of common SaaS tools to jog your memory.

  2. 2

    Map data flows

    For each system, document what personal data enters, what happens to it, where it goes next, and how long it stays. The guided workflow ensures you don't miss fields.

  3. 3

    Assign purposes and bases

    Link each data flow to a specific processing purpose and lawful basis. The platform flags mismatches - data collected without a stated purpose, purposes without a lawful basis.

  4. 4

    Review and maintain

    Your data inventory is a living document. Set review reminders, update when you add new systems or change processing activities, and export for audit or regulator response at any time.

What the Act requires

SectionRequirement
Section 8(1)Data Fiduciary must process personal data only for lawful purposes for which consent was obtained
Section 8(4)Implement reasonable security safeguards - requires knowing where data is to protect it
Section 8(7)Erase personal data when purpose is complete - requires knowing what data exists and why
Rule 7 (SDF)Conduct Data Protection Impact Assessments - requires a complete processing inventory
Section 8(6)Breach notification requires estimating affected Data Principals - impossible without a data inventory

Frequently asked questions

Does DPDP apply to my business in India?

If you process digital personal data of any individual in India - for any purpose, in any system - the Act applies to you. There is no revenue threshold, no employee count minimum. A data inventory is how you determine the full scope of your obligations.

What is 'digital personal data'?

Any data about an individual who is identifiable in relation to that data, stored in digital form. This includes names, email addresses, phone numbers, device IDs, IP addresses, location data, financial records, health records, biometric data, and any other information that can identify a person directly or in combination.

Can we keep data forever for 'analytics'?

No. Section 8(7) requires erasure when the purpose of collection is complete. 'Analytics' is not an indefinite retention justification. You must define a specific retention period for each data category and delete when it expires - unless a legal obligation requires longer retention.

What about logs (IP/device/security logs)?

Security logs containing personal data (IP addresses, device IDs, user IDs) are personal data under the Act. You must include them in your data inventory, define a retention period, and delete when that period expires. The DPDP Rules require retaining processing logs for at least one year.

Find out where you stand

10-minute diagnostic. 43 controls. No demo call required.