Founder & CEO, Meridian Bridge Strategy
Half of Indian fintech will break in 16 months. Not from competition. From compliance.
Indian fintechs make money one way: Credit. Neobanks hemorrhage cash. Super apps burn funding. Payments are commoditized. The only profitable play is lending. But here's how they underwrite today:
Twitter activity, LinkedIn connections — scraped without consent and used to assess creditworthiness.
Phone contact lists accessed without user knowledge, used to build relationship graphs.
Bought from data brokers without the user ever knowing their data was being traded.
Data brokers selling your app behavior, screen time, and transaction patterns.
Data brokers operating in India's fintech ecosystem sell access to information that users never consented to share. This is well-documented across the industry:
Data broker systems typically know your:
All used to calculate credit scores. None of it consented to.
If the user refuses consent, you can't use their data. Period.
Can't buy third-party data for underwriting without explicit user consent
Can't use unauthorized social media scraping for credit assessment
Can't access credit databases without each user's specific, informed consent
"But we NEED this data to assess creditworthiness!"
Sure. And users will choose:
But here's what changes:
Use any data → Approve/reject → Make money
Request consent → User sees WHAT you're using → User can refuse specific data points → Your model breaks
Fintechs already deal with RBI's data localization rules. DPDP adds a second layer on top. You must comply with both simultaneously. Here's where they overlap — and where they conflict:
| Requirement | RBI | DPDP |
|---|---|---|
| Data Storage Location | Payment data must be stored in India | Cross-border transfer allowed with consent (but government can restrict) |
| Consent Requirement | KYC consent during onboarding | Separate consent per purpose — marketing, analytics, credit assessment each need own consent |
| Data Retention | Retain transaction records for 5-10 years | Delete when purpose is served — unless required by other law |
| Breach Reporting | Report to RBI within 6 hours | Report to Data Protection Board + affected users within 72 hours |
| Right to Delete | Must retain records | Must delete on request — conflicting obligation |
RBI says keep transaction records for years. DPDP says delete when purpose is served. A customer asks you to delete their data — but RBI mandates you keep it. Navigating this requires legal architecture, not just a compliance tool.
If your underwriting model breaks when users can refuse consent — did you ever have a legitimate business model? Or were you just exploiting a regulatory gap?
Every fintech collects Aadhaar for KYC. Under DPDP, Aadhaar is personal data with the same protections as any other identifier. You need explicit consent for how you store it, who sees it, and how long you keep it. If your KYC vendor (like DigiLocker or an eKYC provider) has a breach, you are liable as the Data Fiduciary — not them.
UPI transaction data reveals spending patterns, income estimates, and merchant relationships. Under DPDP, using this data for purposes beyond the original transaction (like marketing or credit scoring) requires separate, specific consent. Bundling it into a general "terms of service" won't hold up.
Got consent to process a loan? That doesn't cover cross-selling insurance, mutual funds, or credit cards. Each product needs its own consent flow. Users can opt into loans but refuse insurance marketing. Your CRM needs to handle granular consent per product line.
Map Your Data Sources
Audit every data source feeding your underwriting model. Identify which ones have user consent and which don't. If it comes from a data broker — flag it.
Build Consent Architecture
Implement granular consent flows — separate consent for KYC, credit assessment, marketing, and cross-selling. Each must be individually revocable.
Renegotiate Vendor Contracts
Sign DPAs (Data Processor Agreements) with every vendor — eKYC providers, data enrichment services, cloud providers. Include indemnity clauses.
Rebuild Underwriting for Consent
Stress-test your credit models. What happens when 30% of users refuse data sharing? Build fallback models using only consented data sources.
Breach Response Protocol
Set up dual-reporting: RBI within 6 hours + DPB within 72 hours. Document everything. Assign a point person for breach response.
Founder & CEO, Meridian Bridge Strategy
Sushant has built and sold products in identity verification, cybersecurity, and e-commerce at IDfy, CyberArk, and Cyware. He conducted due diligence on billion-dollar investments for a top global growth equity firm. Master's from IE Business School, Computer Science from BITS Pilani.
We've audited fintech data pipelines and know where the gaps hide. Book a free 30-minute clarity call — no sales pitch, just your specific risks mapped out.
Book Free Clarity Call