The EdTech Vendor Map
Cloud hosting, proctoring, CRM, and WhatsApp—your vendors are “Data Processors.” Under the DPDP Act, you are responsible for their security and breaches.
Managing Your ‘Data Processors’
EdTech stacks rely on many SaaS tools—cloud hosting, analytics, CRM, WhatsApp/SMS, video conferencing, proctoring vendors, support desks, and payment gateways. Under DPDP, these vendors often act as Data Processors because they handle personal data on your behalf. A well-maintained SaaS & Vendor Map helps you clearly identify who touches student and parent data, control what data is shared and for what purpose, enforce reasonable security safeguards through strong vendor contracts, respond quickly and accurately during a personal data breach, and prevent risks caused by “unknown sub-processors” or uncontrolled cross-border data exposure.
What this page is for
This is a practical guide for building a DPDP-ready vendor map for:
- K–12 EdTech, coaching/test-prep, LMS platforms
- Proctoring / identity verification systems
- Live classes (video), chat, recordings
- Marketing and lead funnels (Meta/Google pixels, CRM, WhatsApp)
- Outsourced support operations
Why DPDP makes this non-negotiable

Security Safeguards
DPDP Rules explicitly require “contractual provisions” with processors to enforce security controls.

Breach Response
You cannot meet the 72-hour Board deadline if you don’t know which vendor caused the leak or who owns the logs.

Cross-Border Maps
Transfers outside India are allowed, but you must maintain an “Outbound Data Map” of regions and restrictions.
What you must capture
- Vendor name + product
- Category (Hosting / CRM / WhatsApp / Analytics / Proctoring / Video / Support / Payments)
- Vendor contract owner (internal)
- Support contacts + escalation contacts
- What data is shared (student/parent/teacher, contact, performance, recordings, proctoring artefacts)
- Purpose (course delivery, login, support, marketing, exam integrity)
- Data sensitivity (Low / Medium / High)
- Data volume (approx.)
- Cross-border? (Yes/No + regions)
- Encryption at rest/in transit (Yes/No)
- Access controls (MFA, RBAC)
- Audit logs availability + retention
- Sub-processors list (and change notification)
- Breach notification SLA (vendor → you)
- Deletion/return commitment on termination
- Evidence preservation commitment (for incidents)
- Notice alignment: is this vendor disclosed where needed?
- Rights request impact: can the vendor support deletion/export?
- Retention: do they delete as per your schedule?
- Incident response: can they support 72-hour reporting needs?
Common Vendors you must Map
Core Platform
Learning
Growth
Integrity (High Risk)
The Risk Model
Tier 1: High Risk
Tier 2: Medium Risk
Tier 3: Low Risk
The “Processor Contract” Checklist
Vendor-ready Checklist
To meet DPDP breach obligations quickly, make sure your Tier 1 vendors can provide within hours:
Practical implementation
Related pages
- Notices & Sign-up Flows (so vendor sharing is reflected in notices where needed)
- Breach Response & Proctoring (incident-ready operations)
- Retention Schedules (vendor deletion alignment)
- User Rights Portal (vendor support for deletion/export)
Need to audit your Vendor Stack?
We map your inventory, risk-rate your vendors, and draft the “Data Processor” contract addendums.
