Are You a Significant Data Fiduciary? A Simple Decision Guide with Practical Examples
Article / March 10, 2026 March 10, 2026
Are You a Significant Data Fiduciary?
A Simple Decision Guide with Practical Examples
It is important for your organization to know if you are a Significant Data Fiduciary (SDF) under the DPDP Act in relation to Compliance, Security and Governance. This guide will help you measure your risk in an organized manner with practical actions, examples, and a quick self-check. While organizations can measure the likelihood that they may be SDF, the Government will determine SDF status. Following this guide will enable your organization to make correct, evidence-driven decisions and be ready for Compliance obligations if they are designated.
Do You Qualify as an SDF?
Being labeled as a Significant Data Fiduciary (SDF) comes with obligations beyond what is described in legal terms. Misclassifying an organization could lead to regulatory scrutiny, and if the organization over-estimates its SDF obligations, it could be wasting resources. You need to look beyond the simple record counts to assess whether or not your organization qualifies as a SDF–you need to take into account not just the number of records but also the type of record, the sensitivity of the record, what the consequences would be if someone misuses that record and finally, the systemic impact of how that organization processes and uses that data (e.g., the effect on individuals and/or their access to critical services).
The classification of SDFs plays an important role in fulfilling their legislated obligations, including governance, reporting, breach notification, and Mandatory Data Protection Impact Assessments (DPIAs).
Note: While you can assess your likelihood of being an SDF, formal designation is issued by the Government based on risk factors and thresholds.
How to Solve the Problem: Overview of the Approach
Assessing your risk of being an SDF can be simple if approached methodically.
The steps are:
1. Identify your data footprint
2. Assess data sensitivity and volume
3. Evaluate potential risk and systemic impact
4. Conduct a Quick SDF Self-Check
5. Document your assessment
6. Plan compliance steps if designated
This is an approach that offers the right balance between rigour and practicality; allowing you to make evidence-based decisions from such an approach without being immersed in compliance theory.
Step 1: Identify Your Data Footprint
Assembling your data footprint starts with identifying (defining) every source where personal data resides within your organization.
These typically include:
• Customer databases;
• HR and payroll systems;
• Vendor data;
• Marketing leads and marketing analytics;
• Analytics tools (e.g., web analytics);
• Cloud storage solutions (e.g., Amazon S3, Google Drive, etc., and SaaS applications); and
• Internet of Things devices or sensors.
The following are some examples of data flow mapping:
• What is the source of the data?
• Who has access to the data and for what reason?
• How long will data be retained?
For example, a fintech start-up with 10K active users may process both financial and medical records over multiple systems; even though this may seem like a small number of active users (10,000), the sensitive nature of both types of records creates substantial liability.
Step 2: Assess Data Sensitivity & Volume
Step 2: Assess Data Sensitivity & Volume
Data differs in sensitivity:
• Low – Names, emails, basic contact info
• Medium – Demographics, purchase history, employment data
• High – Financial information, health records, biometrics
Volume also matters. Even a few thousand sensitive records may trigger SDF considerations if misuse would cause serious harm. Conversely, millions of anonymized, non-sensitive records may not.
Practical methods:
• Count unique individuals in datasets
• Identify protected or special categories of data
• Compare against any government thresholds (where published)
Example: An e-commerce platform collects purchase history for 1 million users. Payment details increase sensitivity. Such an organization may be at risk of SDF designation.
Step 3: Determine Potential Risk & Impact
Step 3: Determine Potential Risk & Impact
Assess the potential for harm if data were compromised. Think about:
• Could misuse affect many people or a critical service?
• Could it cause financial, safety, or reputational harm?
• Could downstream systems be impacted?
Simpler terms: “Systemic risk” means the impact beyond just your immediate systems—think downstream consequences.
Example:
An AI credit scoring system affects lending decisions nationwide → high risk
A local HR payroll database → low risk
Use a simple heatmap or scoring table (Low / Medium / High) to evaluate each dataset.
Step 4: Quick SDF Self-Check
This checklist helps you visualize your likelihood of being an SDF.
Answer Yes / No:
• Do we process personal data above certain volume thresholds?
• Do we handle sensitive types (financial, health, biometric)?
• Could misuse of this data cause significant harm to people or systems?
• Does our data impact large populations or essential services?
Interpretation: If you answer “Yes” to two or more questions, you may be at risk of being classified as an SDF. This is not a formal designation, but it signals that you should review your compliance obligations carefully.
Step 5: Document Your Assessment
Step 5: Document Your Assessment
Maintain clear, audit-ready records of:
• Data sources and datasets reviewed
• Sensitivity classifications
• Risk analysis and systemic impact assessment
• Decision rationale
A simple spreadsheet or evaluation template is sufficient. The goal is reproducibility and transparency.
Step 6: Plan Compliance Steps (If Designated SDF)
Step 6: Plan Compliance Steps (If Designated SDF)
If the Government designates your organization as an SDF, practical steps include:
• Conducting a comprehensive Data Protection Impact Assessment (DPIA)
• Implementing technical and organizational measures (encryption, access controls, secure storage)
• Establishing governance with defined roles and responsibilities
• Reporting breaches and suspicious activity promptly
Example Scenario: A healthcare provider designated as an SDF:
• Limits access to patient data based on user role
• Encrypts data at rest and in transit
• Reports security incidents within 72 hours
Examples in practice
1. E-commerce Website – 1 million customer purchase histories and payment data – Very Sensitive → can be considered SDF. Next Steps: Encrypt data, implement user role access controls and complete DPIA.
2. Fintech Startup – 10,000 users with a mix of health and financial data stored in multiple systems – No significant volume, but very sensitive and can be relatively high risk. Next Steps: Continuous monitoring, securing and documenting data flow.
3. HR Software-as-a-Service – 50,000 employee records with predominantly demographic and payroll information – Low risk and minimal systemic impact. Next Steps: Follow best practices and create formal SDF compliance processes may not be necessary.
Challenges & Common Mistakes
• Underestimating systems: Consider downstream effects, not just primary datasets.
• Ignoring sensitivity: Both volume and data type matter.
• Unclear categorization: Leads to inconsistent assessments.
Mitigation Tips:
• Include representatives from legal, IT, and operations
• Reference external guidelines and thresholds
• Use simple scoring techniques to support objective decisions
What If You Are Not an SDF?
Even if not designated:
• Maintain basic governance and security practices
• Document your rationale for not being an SDF to avoid future compliance issues
Conclusion: Confidently Navigate SDF Status
You don’t have to overcomplicate the process of recognizing the likelihood of being an SDF. You can map your data, assess the level of sensitivity and understand the potential risk of harm to determine if you may be classified as an SDF.
Key Points:
• Download the Quick SDF Self-Check to evaluate yourself quickly
• Keep a record of your assessment and decision-making process
• Follow suitable governance, security and monitoring practices