DPDP Act 2023 · CERT-In Directions · Breach Notification · 72-Hour Rule

Data Breach Notification India
The 72-Hour Rule Under DPDP

When a personal data breach occurs in India, the clock starts immediately. The CERT-In Directions 2022 require incident reporting within 6 hours. The DPDP Act 2023 mandates notification to the Data Protection Board and affected individuals within the prescribed timeline — expected to be 72 hours, consistent with global standards. Failure to notify carries a penalty of up to Rs.200 crore, separate from any penalty for the underlying security failure.

This guide covers both notification regimes, what triggers them, who must be notified, what information must be provided, and the step-by-step emergency response protocol every company should have ready before a breach occurs. By Advocate Subodh Bajpai, Senior Partner at Unified Chambers and Associates.

CERT-In Deadline:6 hours from awareness of cyber incident
DPDP Board Deadline:Expected 72 hours from awareness of personal data breach
Affected Individuals:Must be notified in prescribed manner (Section 8(6))
Non-Notification Penalty:Up to Rs.200 Crore (Section 8(6) + Schedule)
Security Failure Penalty:Up to Rs.250 Crore (Section 8(5) + Schedule)
Get DPDP Legal AdviceFree Consultation
6 HoursCERT-In incident reporting deadline
72 HoursExpected DPDP Board notification window
Rs.200 CrPenalty for non-notification
Rs.450 CrMaximum combined exposure per incident

Table of Contents

  1. India’s Dual Breach Notification Regime
  2. What Constitutes a “Personal Data Breach” Under DPDP
  3. Notification Timeline — Hour by Hour
  4. Penalties for Breach Notification Failure
  5. 7-Step Emergency Response Protocol
  6. Data Breach Notification FAQs

India’s Dual Breach Notification Regime

India operates two concurrent breach notification frameworks, each with distinct scopes, timelines, and enforcement bodies. Companies must comply with both simultaneously when a personal data breach occurs.

CERT-IN DIRECTIONS 2022
The Indian Computer Emergency Response Team (CERT-In), operating under the Ministry of Electronics and IT, issued binding Directions on 28 April 2022 requiring all service providers, intermediaries, data centres, body corporates, and government organisations to report cyber security incidents to CERT-In within 6 hours of noticing or being informed of such incidents. This 6-hour window is one of the strictest in the world — the EU NIS Directive allows 24 hours for early warning and 72 hours for full notification.
DPDP ACT 2023 — SECTION 8(6)
Separately, Section 8(6) of the DPDP Act requires every Data Fiduciary to notify the Data Protection Board of India and each affected Data Principal (individual) of any personal data breach. The notification must be given “in such form and manner as may be prescribed.” The specific timeline will be set in the DPDP Rules — based on global practice and draft rule consultations, a 72-hour window from awareness of the breach is expected.

The critical distinction: CERT-In notification covers all cyber security incidents (including those that do not involve personal data), while DPDP notification specifically targets personal data breaches and requires notification to affected individuals as well as the regulator. A ransomware attack on a company’s financial systems that does not compromise personal data triggers CERT-In reporting but not DPDP notification. A breach exposing customer personal data triggers both.

For companies in regulated sectors, additional obligations apply. Banks must notify the Reserve Bank of India (RBI) under its cybersecurity framework. Insurance companies must notify IRDAI. Telecom operators must notify DoT. Securities market intermediaries must notify SEBI. A single data breach can therefore trigger five or more separate regulatory notifications, each with different formats, timelines, and contact points.

What Constitutes a “Personal Data Breach” Under DPDP

Section 2(u) of the DPDP Act defines “personal data breach” as any unauthorised processing of personal data or accidental disclosure, acquisition, sharing, use, alteration, destruction of, or loss of access to personal data that compromises the confidentiality, integrity, or availability of personal data. This definition is intentionally broad, covering every category of incident that affects personal data.

External Attacks

Hacking, phishing, credential stuffing, SQL injection, ransomware encrypting personal data, man-in-the-middle interception, API exploitation

Internal Incidents

Employee accessing records without authorisation, accidental email to wrong recipient, unintended publication of personal data on company website, insider data theft

System Failures

Database corruption causing data loss, backup failure resulting in permanent data destruction, misconfigured cloud storage exposing personal data publicly (S3 bucket incidents)

Vendor Incidents

Third-party processor suffering a breach affecting your personal data, cloud provider security incident, SaaS platform vulnerability exposing tenant data

A common misconception: many companies believe a “data breach” only means data theft or exfiltration. Under the DPDP definition, a ransomware attack that encrypts personal data without exfiltrating it is a personal data breach because it causes “loss of access to personal data.” Similarly, an accidental deletion of customer records without backup is a breach because it constitutes “destruction of personal data.” Companies must train their incident response teams to recognise the full scope of what constitutes a reportable breach.

Notification Timeline — Hour by Hour

Hour 0

Breach Detected or Reported

The clock starts when any person in the organisation becomes aware that a personal data breach may have occurred. This includes: automated alerts from security systems, reports from employees, notifications from third-party vendors, reports from affected individuals, or media reports. Document the exact time and source of first awareness. This timestamp is critical for demonstrating compliance with notification timelines.

Hour 0-2

Initial Assessment and Containment

Activate the breach response team. Conduct initial triage: confirm whether a breach has actually occurred (vs. a false positive); determine whether personal data is affected; assess the scope (number of records, categories of data, systems affected); and take immediate containment measures (isolate affected systems, revoke compromised credentials, block malicious IP addresses). Do not shut down systems that may contain forensic evidence.

Hour 2-6

CERT-In Notification (Mandatory)

Prepare and submit the CERT-In incident report within 6 hours of becoming aware of the incident. The report must include: nature of the incident, systems affected, geographical scope, and initial assessment of impact. CERT-In provides an online reporting portal and a dedicated email (incident@cert-in.org.in). This is a hard deadline — CERT-In has the power to impose penalties for non-compliance under the IT Act, 2000.

Hour 6-48

Forensic Investigation and Scope Assessment

Engage external forensic investigators if the breach is significant. Determine: the root cause of the breach; the full scope of personal data affected; whether data was actually exfiltrated or only accessed/encrypted; the number of affected Data Principals; and whether the breach is ongoing or contained. Preserve all logs, forensic images, and evidence. This investigation informs both the DPDP Board notification and the communication to affected individuals.

Hour 48-72

DPDP Board and Individual Notification

Prepare and submit the notification to the Data Protection Board in the prescribed format. Simultaneously prepare the notification to affected Data Principals. The individual notification must be clear, non-technical, and must include: what happened, what personal data was affected, what the company is doing about it, and what steps the individual should take to protect themselves. If the investigation is still ongoing, submit an initial notification with a commitment to provide supplementary information as it becomes available.

72+ Hours

Supplementary Reporting and Remediation

Continue the investigation. Submit supplementary reports to the DPDP Board as new information emerges. Implement permanent remediation measures (not just temporary patches). Conduct a post-incident review. Update security safeguards based on lessons learned. Retain all breach-related records for the period prescribed in the DPDP Rules. If the company is in a regulated sector, submit parallel reports to the relevant sectoral regulator (RBI, IRDAI, SEBI, DoT).

Penalties for Breach Notification Failure

A single data breach incident can expose a company to multiple, stacking penalties under the DPDP Act. The penalties are not mutually exclusive — each obligation has its own penalty category in the Schedule.

Rs.250 Crore
Section 8(5)

Failure to implement reasonable security safeguards that caused or contributed to the breach

Rs.200 Crore
Section 8(6)

Failure to notify the Data Protection Board and affected individuals of the breach

Rs.200 Crore
Section 9

Additional penalty if the breach involved children's personal data

Rs.50 Crore
Schedule Sl.7

Additional penalty for any other contravention — e.g., cross-border transfer violations, consent failures, or purpose limitation breaches

The theoretical maximum exposure for a single data breach involving children’s data with inadequate security, where the company also fails to notify and has other contraventions, could reach Rs.700 crore in cumulative penalties (Sl.1: Rs.250 Cr + Sl.2: Rs.200 Cr + Sl.3: Rs.200 Cr + Sl.7: Rs.50 Cr). While such an extreme scenario is unlikely, it illustrates why breach preparedness is a board-level priority, not an IT department afterthought.

7-Step Emergency Response Protocol

01

Establish a Breach Response Team Before a Breach Occurs

Designate members from legal, IT/security, communications, HR, and executive leadership. Define roles, escalation paths, and decision authority. The team should be able to convene within 30 minutes of a breach alert. Store contact details (personal mobiles, not just office numbers) in an accessible location outside the potentially compromised corporate network.

02

Pre-Draft Notification Templates

Work with legal counsel to pre-draft notification templates for the Data Protection Board, CERT-In, and affected individuals. These templates should have fill-in-the-blank sections for breach-specific details. In the chaos of an active breach, drafting notifications from scratch costs precious hours. Pre-approved templates ensure legally compliant notifications are sent within the required timelines.

03

Deploy Breach Detection Systems

You cannot notify what you do not detect. Implement: Security Information and Event Management (SIEM) for log aggregation and alerting; Data Loss Prevention (DLP) tools for exfiltration detection; endpoint detection and response (EDR) on all endpoints; network traffic analysis for anomaly detection. The faster you detect, the smaller the breach scope and the more time you have for notification.

04

Maintain a Data Inventory

During a breach, the first question is: what data was affected? Without a current data inventory mapping which personal data resides in which systems, answering this question takes days. Maintain an updated data map (Step 02 of the DPDP compliance checklist). Know exactly what personal data each system contains so you can immediately assess the scope of any breach.

05

Engage External Counsel and Forensics on Retainer

When a breach occurs, you do not have time to evaluate and onboard legal counsel and forensic investigators. Establish retainer agreements with a law firm experienced in data protection law and a digital forensics firm before any breach occurs. Retainer agreements with pre-agreed hourly rates and response SLAs (ideally 2-4 hours for initial mobilisation) ensure immediate expert support when the clock is ticking.

06

Conduct Quarterly Tabletop Exercises

Simulate breach scenarios quarterly. The exercise should involve the full breach response team and should test: detection and escalation workflows, CERT-In notification within 6 hours, DPDP Board notification within 72 hours, individual notification content and delivery, media and stakeholder communications, and post-incident review. Each exercise should identify gaps and result in concrete improvements to the response plan.

07

Document Everything from Minute One

From the moment a breach is suspected, document every action taken, every decision made, and every communication sent. This contemporaneous record serves two purposes: it demonstrates to the Data Protection Board that you responded diligently and within timelines, and it provides the evidentiary foundation for any penalty proceeding or litigation that follows. Use a dedicated incident log with timestamped entries.

Data Breach Notification — Questions Answered

What is the difference between the CERT-In 6-hour rule and the DPDP notification requirement?

India has two overlapping breach notification regimes. CERT-In (Indian Computer Emergency Response Team) Directions of April 2022 require all "service providers, intermediaries, data centres, body corporate and government organisations" to report cyber security incidents to CERT-In within 6 hours of noticing or being informed of the incident. This is a broad obligation covering all cyber incidents (ransomware, unauthorised access, data breaches, DDoS attacks, etc.) and is currently enforced. Separately, the DPDP Act 2023 under Section 8(6) requires Data Fiduciaries to notify the Data Protection Board and affected Data Principals specifically when a "personal data breach" occurs. The DPDP notification timeline will be prescribed in the rules (expected to be 72 hours, consistent with global standards). Both obligations can apply simultaneously to the same incident — a personal data breach triggers CERT-In notification within 6 hours AND DPDP Board notification within the prescribed timeline.

What constitutes a "personal data breach" under the DPDP Act?

The DPDP Act 2023 defines "personal data breach" under Section 2(u) as any unauthorised processing of personal data or accidental disclosure, acquisition, sharing, use, alteration, destruction, or loss of access to personal data that compromises the confidentiality, integrity, or availability of personal data. This is a broad definition covering: external attacks (hacking, phishing, ransomware that encrypts personal data); internal incidents (employee accessing records without authorisation, accidental email to wrong recipient); system failures (database corruption leading to data loss); and vendor incidents (third-party processor suffering a breach affecting your data). Importantly, the definition covers not just data theft but also data loss and unauthorised alteration — a ransomware attack that encrypts but does not exfiltrate personal data is still a personal data breach under DPDP.

Who must be notified in case of a personal data breach?

Under the DPDP Act, two notifications are mandatory: (1) the Data Protection Board of India must be notified of the breach, including the nature and extent of the breach, the personal data affected, and the remedial measures taken; and (2) each affected Data Principal (individual) must be notified in the prescribed manner. Additionally, under CERT-In Directions 2022, the incident must be reported to CERT-In within 6 hours. If the company is in a regulated sector (banking — RBI; insurance — IRDAI; telecom — TRAI/DoT; securities — SEBI), the relevant sectoral regulator must also be notified. A single data breach can therefore trigger four or more separate notification obligations to different authorities.

What information must be included in a breach notification to the DPB?

While the specific format will be prescribed in the DPDP Rules, the notification to the Data Protection Board is expected to include: (a) the nature of the personal data breach (type of incident — hacking, insider threat, accidental disclosure, etc.); (b) the approximate number of Data Principals affected; (c) the categories of personal data affected (financial, health, identity, contact, biometric, etc.); (d) the likely consequences of the breach for Data Principals; (e) the measures taken or proposed to address the breach and mitigate its effects; (f) the contact details of the Data Protection Officer or compliance lead; and (g) a timeline of events from detection to notification. Based on GDPR practice (which DPDP draws from), incomplete initial notifications followed by supplementary reports are typically accepted, as long as the initial notification is made within the prescribed timeline.

What is the penalty for failing to notify a data breach?

Failure to notify the Data Protection Board and affected Data Principals of a personal data breach attracts a penalty of up to Rs.200 crore under Section 8(6) read with the Schedule to the DPDP Act. This is the second-highest penalty category in the Act (after the Rs.250 crore penalty for inadequate security safeguards). The penalty applies to the notification failure itself — it is separate from any penalty for the underlying security breach that caused the data breach. A company that suffers a breach due to inadequate security safeguards AND fails to notify could theoretically face both the Rs.250 crore and Rs.200 crore penalties, totalling Rs.450 crore in maximum exposure for a single incident.

Does the 72-hour clock start from when the breach occurs or when it is discovered?

The notification clock starts from when the Data Fiduciary becomes aware of the breach — not from when the breach actually occurred. This is critical because many breaches go undetected for weeks or months. A company that discovers in March that a breach occurred in January must notify within the prescribed timeline from the March discovery date, not from January. However, the Data Protection Board will scrutinise the gap between occurrence and discovery. If the Board determines that the company should have detected the breach sooner with reasonable monitoring and detection systems, the delay itself may be evidence of inadequate security safeguards (Section 8(5)) attracting the Rs.250 crore penalty. Companies must therefore invest in breach detection capabilities — not just breach response.
DPDP Legal ServiceDPDP Penalties GuideDPDP Compliance ChecklistDPDP vs GDPR Comparison

Data Breach? Act Within Hours, Not Days.

Breach notification deadlines are measured in hours. Unified Chambers provides emergency legal support for data breach incidents — CERT-In reporting, DPDP Board notification, and crisis management. Advocate Subodh Bajpai available directly.

WhatsApp UsSchedule Consultation
More on DPDP
DPDP Penalties GuideCompliance ChecklistDPDP vs GDPRRBI AI GuidelinesDPDP Lawyer — OverviewDPDP Compliance GuideData Protection Board
Free ConsultWhatsAppCall Now
WhatsApp