Ensure Compliance with India's Digital Personal Data Protection Act 2023

Safeguard Digital Personal Data and meet DPDP Act requirements with Thales's Comprehensive Data Security Suite

hero image

The What, Why, and How of India's Digital
Personal Data Protection Act 2023

Discover how Thales's comprehensive data security solutions help organizations meet
DPDP Act compliance requirements

Who needs to comply

The Digital Personal Data Protection Act, 2023 applies to:

man with tablet
files
Personal data capable of identifying individuals, which is Collected digitally
pc
Personal data capable of identifying individuals, which is Digitized after non-digital collection
globe
Data processed within India
globe
Data processed outside India if connected to offering goods and services to individuals within India

Data fiduciaries (controllers), data processors, and data principals (subjects) fall under the Act's governance. The legislation aims to protect digital personal data while allowing lawful processing for legitimate purposes.

The Act excludes:

  • Personal data processed for domestic purposes
  • Aggregated data for research and statistical purposes not used for individual-specific decisions
  • Publicly available personal data

Comprehensive Data Protection:
From Discovery to Authentication

Effective data security requires an integrated suite of protection capabilities spanning the entire data lifecycle. As a leader in data security, Thales offers comprehensive solutions that provide visibility, actionable insights, real-time controls, and automated compliance support across cloud, on-premises, and hybrid environments.

CipherTrust Platform unifies data discovery, classification, and protection and provides unprecedented granular access controls, all with centralized key management. 

You can rely on Thales CipherTrust Data Security Platform to discover, protect and control your organization’s sensitive data, wherever it resides

Here are some of the critical data protection capabilities:

data discovery Data Discovery
data classification Data Classification

Centralized Key Management Centralized Key Management
Encryption Encryption
Tokenization Tokenization

High-speed network encryption High-speed network encryption

authentication Access management & Authentication

Identifies structured and unstructured data on-premises and in the cloud, with built-in templates for rapid risk assessment and compliance gap identification.

Provides file-level encryption, application-layer encryption, database encryption, and various tokenization methods.

Unifies data discovery, classification, and protection with centralized key management.

Offers transparent data protection for RESTful web services and microservices.

Delivers data-at-rest encryption with centralized key management and privileged user access control.

Streamlines compliance reporting and accelerates threat detection, with automated escalation and response to unauthorized access attempts.

Supports strong separation of duties policies and two-factor authentication for administrative access.

Delivers enterprise key management across multiple cloud providers and hybrid environments, enabling centralized control of encryption keys and security policies.

Provide network-independent, data-in-motion encryption for secure data transfer between sites or to/from the cloud.

Protects sensitive data with strong access controls, supporting various authentication methods and policy-driven role-based access.

We Are Here to Help You

Let's Collaborate!

Drop your business email, and we will contact you without delay.

Need more information ?

loop

Looking to comply with SEBI-mandated Cloud Adoption Framework?

Learn more about the latest Framework and Guidelines for Cloud Services Adoption by Financial Entities in India

security

Looking to comply with Information and Cyber Security Guidelines 2023?

Learn more about IRDAI's new data-centric security requirements for the Indian Insurance Industry

loop

Ensure Compliance with RBI's 2023 IT Outsourcing Rules

Steps to Fulfill RBI's Regulations for IT Outsourcing for Banks and NBFCs