DPDP Compliance & Governance Framework

fevicon

For Face Recognition–Enabled CCTV Deployments in India

(Aligned with the Digital Personal Data Protection Act, 2023 and DPDP Rules, 2025)



Objective and Scope

This annexure documents the privacy, data protection, and governance controls applicable to the deployment of face recognition–enabled CCTV systems in India.

The objective is to ensure that biometric-based identification is:

  • lawful under the DPDP Act, 2023,
  • defensible under post-Puttaswamy constitutional privacy standards,
  • operationally governable during audits, incidents, and disputes.

This annexure is intended to support:

  • enterprise and government procurement due diligence,
  • internal risk and legal review,
  • regulatory or third-party audit readiness.

Roles and Accountability Under DPDP

2.1 Data Fiduciary

The deploying organization (enterprise, institution, government body, or housing society) acts as the Data Fiduciary, responsible for:

  • determining purpose and necessity of face recognition,
  • defining retention periods,
  • ensuring valid consent or lawful basis,
  • responding to Data Principal requests and grievances.

2.2 Data Processor (Technology Provider)

The technology platform provider (e.g., IndoAI) acts strictly as a Data Processor, processing personal data:

  • only on documented instructions of the Data Fiduciary,
  • without independent purpose determination,
  • without secondary use, profiling, or model training unless explicitly authorized.

This distinction is contractually enforced through a Data Processing Agreement (DPA).


Data Classification and Processing Boundaries

All data processed by the system is explicitly classified to ensure purpose limitation and proportional safeguards.

3.1 Data Categories

Data CategoryDescriptionRisk Classification
Video FootageRaw CCTV streams and recordingsPersonal Data
Facial TemplatesBiometric embeddings used for identificationHigh-Impact Personal Data
Event MetadataAlerts, timestamps, camera IDsContextual Personal Data
Audit LogsRecords of access, searches, exports, configuration changesCompliance Data

Each category is governed independently with respect to access, retention, and deletion.


Lawful Basis, Purpose Limitation, and Necessity

4.1 Purpose Definition

Face recognition is enabled only for explicitly documented purposes, such as:

  • controlled access to restricted areas,
  • security incident investigation,
  • safety compliance in regulated environments.

4.2 Prohibited Uses

Unless explicitly approved by the Data Fiduciary and documented:

  • no behavioral profiling,
  • no customer or employee monitoring beyond stated purpose,
  • no cross-site or cross-customer identity correlation,
  • no monetization or analytics reuse of biometric data.

Purpose creep is actively prevented at both system and contractual levels.


Where consent is the lawful basis:

  • consent is obtained prior to biometric enrollment,
  • consent artefacts are recorded, versioned, and timestamped,
  • withdrawal of consent is supported without adverse consequences.

5.2 Non-Biometric Alternatives

To avoid coerced consent:

  • non-biometric access paths (QR, card, OTP, manual verification) are supported,
  • denial of biometric consent does not automatically deny essential services unless legally required.

5.3 Notice Requirements

Notice clearly communicates:

  • nature and purpose of facial processing,
  • categories of data collected,
  • retention periods,
  • grievance and withdrawal mechanisms.

Notice is provided through physical signage and digital disclosure.


Retention and Deletion Framework

6.1 Retention Principles

Retention is governed by:

  • duration of purpose,
  • legal necessity,
  • proportionality and risk.

Default retention values are configurable by the Data Fiduciary.

6.2 Category-Specific Retention Logic

Data TypeRetention Control
Video FootageTime-bound, auto-deleted unless flagged
Facial TemplatesRelationship-bound; deleted on exit
Visitor DataEphemeral or short-term only
Audit LogsRetained to meet DPDP accountability expectations

6.3 Deletion Assurance

  • automated deletion workflows,
  • deletion confirmation logs,
  • exception reporting for failures.

Deletion is verifiable and auditable, not assumed.


Access Control and Privilege Management

7.1 Role-Based Access Control (RBAC)

Access is granted strictly on a least-privilege basis.

RoleAuthorized Capabilities
OperatorLive monitoring only
SupervisorPlayback, incident tagging
System AdministratorInfrastructure configuration
Privacy / Compliance OfficerAudit log review

7.2 Separation of Duties

  • No single role can both modify retention policies and export data.
  • Sensitive actions (exports, watchlist changes) require elevated authorization or dual control.

Audit Logging and Accountability

8.1 Logged Activities

Immutable audit logs are maintained for:

  • facial search queries and results,
  • biometric enrollment and deletion,
  • data exports and downloads,
  • retention and configuration changes.

8.2 Log Governance

  • logs are tamper-resistant,
  • access to logs is restricted,
  • logs are retained to support breach investigation and regulatory reporting timelines.

Audit logs constitute the primary evidence of DPDP compliance.


Security Safeguards

9.1 Technical Measures

  • encryption of biometric data at rest and in transit,
  • secure key management,
  • hardened edge devices and servers,
  • network segmentation for CCTV and analytics workloads.

9.2 Organizational Measures

  • documented access and escalation policies,
  • operator training,
  • periodic review of privileges.

These safeguards are designed to meet DPDP’s “reasonable security practices” standard.


Breach Detection and Response Readiness

10.1 Detection and Containment

The system supports:

  • detection of unauthorized access,
  • rapid containment and isolation,
  • forensic reconstruction using audit logs.

10.2 Notification Support

In the event of a personal data breach:

  • the Data Fiduciary is supported in notifying affected Data Principals without delay,
  • information required by the Data Protection Board can be assembled within statutory timelines (commonly operationalized as ~72 hours).

The processor’s role is supportive, not substitutive, of fiduciary obligations.


Accuracy, Bias, and Human Oversight

11.1 Operational Controls

  • configurable confidence thresholds,
  • context-specific tuning,
  • human confirmation for adverse actions.

11.2 Risk Mitigation

Facial recognition outputs are treated as decision support, not deterministic outcomes, reducing risk from false positives and demographic bias.


Exit, Termination, and Portability

Upon termination of services:

  • biometric data is deleted or returned as instructed by the Data Fiduciary,
  • deletion certificates are generated,
  • residual data in backups is purged per agreed timelines.

No silent or indefinite retention is permitted.


Audit and Verification Rights

The Data Fiduciary retains the right to:

  • review compliance documentation,
  • inspect audit logs and controls,
  • request evidence of deletion and access governance.

This framework is designed to be verifiable under audit, not merely declarative.


Closing Statement

This annexure reflects a privacy-by-architecture approach to face recognition on CCTV in India.Compliance with DPDP is treated not as a documentation exercise, but as a system-level design constraint, ensuring deployments remain defensible under legal scrutiny, regulatory inquiry, and public accountability.

more insights