Glossary · compliance-india · 13 min
India DPDP Act cybersecurity checklist
The Digital Personal Data Protection Act 2023 (DPDP Act) is India's first comprehensive data protection law, enforced by the Data Protection Board of India under MeitY. Every organization processing personal data of Indian residents—whether as data fiduciary (controller) or data processor—must implement technical and organizational measures to ensure lawful processing, secure storage, breach notification within 72 hours, and cross-border transfer compliance. The Act applies to both digital and digitized personal data, covering private sector entities, government departments, and foreign companies offering goods or services to Indian data principals. Penalties range from ₹50 crore to ₹250 crore for non-compliance. This checklist translates statutory obligations into actionable cybersecurity controls for SOC teams, GRC analysts, and network security engineers responsible for DPDP implementation.
What does the DPDP Act 2023 actually require from a cybersecurity perspective?
The DPDP Act requires data fiduciaries to implement reasonable security safeguards to prevent personal data breaches, defined as unauthorized access, use, disclosure, alteration, or destruction. Section 8 mandates that security measures be commensurate with the nature, sensitivity, and volume of personal data processed. Section 6 requires breach notification to the Data Protection Board and affected data principals within 72 hours of discovery, including root cause, data categories affected, and remediation steps taken.
From a technical standpoint, the Act implicitly requires:
- Encryption at rest and in transit for sensitive personal data (financial, health, biometric, sexual orientation, caste, religious belief)
- Access control mechanisms implementing least privilege and role-based access (RBAC)
- Audit logging of all data access, modification, and deletion events with tamper-proof storage
- Data minimization — collect only what is necessary for the stated purpose, with automated purging post-retention period
- Consent management platforms that capture, store, and honor withdrawal requests within the statutory timeline
- Cross-border transfer controls — personal data may only leave India to countries notified by the Central Government (notification pending as of 2025)
- Vendor risk management — data processors must be contractually bound to the same security standards as the fiduciary
Unlike GDPR, the DPDP Act does not prescribe specific technical standards (no equivalent to ISO 27001 or SOC 2 mandate), but CERT-In directions on logging, NCIIPC guidelines for critical infrastructure, and RBI/SEBI circulars for financial sector entities create de facto technical baselines. In our HSR Layout lab, we simulate DPDP breach scenarios using Splunk Enterprise Security to verify that 72-hour notification workflows trigger correctly when anomaly detection rules fire on sensitive data exfiltration patterns.
The Act also introduces the concept of Consent Manager — a registered entity that helps data principals give, manage, review, and withdraw consent. Organizations must integrate with Consent Manager APIs (specifications under development by MeitY) to demonstrate verifiable consent for each processing activity.
Who does the DPDP Act apply to in India — scope and exemptions?
The DPDP Act applies to:
1. All private sector entities processing personal data of Indian residents, regardless of company size or revenue. There is no SME exemption.
2. Government departments and public sector undertakings processing personal data, except for specific sovereign functions (national security, legal proceedings, research/statistics under Section 17).
3. Foreign companies offering goods or services to Indian data principals or systematically monitoring behavior of individuals in India (extraterritorial application mirroring GDPR Article 3).
4. Data processors acting on behalf of fiduciaries — cloud providers (AWS India, Azure India, Google Cloud India), SaaS vendors, BPO/KPO firms like HCL, Wipro, TCS handling customer data.
Exemptions under Section 17:
- Processing for prevention, detection, investigation, or prosecution of offenses
- Processing for national security purposes (certification by authorized officer required)
- Research, archiving, or statistical purposes where data is anonymized and not used for decision-making affecting the data principal
- Personal or domestic purposes (individual maintaining a contact list)
Critically, the Act does not exempt:
- Startups or small businesses (unlike GDPR's limited processing exemptions)
- B2B data if it contains personal identifiers (employee data of client companies is in scope)
- Data collected before the Act's enforcement date (retrospective application to existing databases)
Sector-specific overlaps:
- Banking/NBFC: RBI's Master Direction on Information Technology Framework mandates baseline controls; DPDP adds breach notification and consent withdrawal obligations
- Healthcare: Clinical Establishments Act + DPDP = dual compliance for hospitals, diagnostic labs, telemedicine platforms
- Telecom: DoT licenses already require data localization; DPDP adds consent and purpose limitation layers
- E-commerce: Consumer Protection (E-Commerce) Rules 2020 + DPDP = overlapping disclosure and grievance redressal requirements
In practice, every organization with a website collecting email addresses, mobile apps with user accounts, or CCTV systems with facial recognition is a data fiduciary under the Act. Our 4-month paid internship at the Network Security Operations Division places freshers as GRC analysts where they conduct DPDP gap assessments for Cisco India, Akamai India, and mid-market SaaS companies, mapping existing ISO 27001 controls to DPDP obligations.
DPDP Act compliance checklist — 18 actionable items for cybersecurity teams
This checklist maps DPDP statutory obligations to technical controls implementable by network security engineers, SOC analysts, and cloud security teams:
1. Data inventory and classification
- Maintain a live inventory of all personal data processing activities (ROPA — Record of Processing Activities)
- Classify data as general personal data vs. sensitive personal data (Section 2(s))
- Tag data with purpose, legal basis, retention period, and cross-border transfer status
2. Consent management
- Deploy consent management platform (CMP) capturing free, specific, informed, unambiguous consent
- Implement consent withdrawal workflow completing within statutory timeline (rules pending)
- Log all consent grant/withdrawal events with timestamp, IP, user-agent
3. Encryption
- AES-256 encryption at rest for all databases containing personal data
- TLS 1.3 for data in transit; deprecate TLS 1.2 by Q4 2025
- Hardware Security Module (HSM) or cloud KMS for key management
4. Access control
- Role-based access control (RBAC) with least privilege for all personal data repositories
- Multi-factor authentication (MFA) mandatory for privileged accounts
- Quarterly access reviews and automated deprovisioning on employee exit
5. Audit logging
- Centralized SIEM (Splunk, QRadar, Azure Sentinel) ingesting logs from all systems processing personal data
- Minimum 1-year retention for audit logs (align with CERT-In 180-day mandate + buffer)
- Tamper-proof log storage (WORM, blockchain-anchored hashes)
6. Data minimization
- Automated data purging post-retention period (Section 8(5))
- Anonymization or pseudonymization for analytics/ML workloads
- Disable collection of non-essential fields in web forms and mobile apps
7. Breach detection and response
- Deploy DLP (Data Loss Prevention) on endpoints, email gateways, cloud storage
- UEBA (User and Entity Behavior Analytics) for insider threat detection
- Incident response playbook with 72-hour breach notification workflow to Data Protection Board
8. Cross-border transfer controls
- Geo-fencing rules in cloud IAM policies restricting data egress to notified countries only
- VPN/MPLS circuits for intra-company transfers; contractual clauses for third-party transfers
- Monitor and alert on DNS queries, API calls, or file transfers to non-whitelisted geographies
9. Vendor risk management
- Data Processing Agreements (DPA) with all processors, sub-processors
- Annual security audits of critical vendors (ISO 27001, SOC 2 Type II)
- Right-to-audit clauses in contracts
10. Data Protection Officer (DPO) appointment
- Appoint DPO if processing significant volume of personal data (threshold TBD by rules)
- DPO contact details published on website and registered with Data Protection Board
11. Privacy by design
- Privacy Impact Assessment (PIA) for new products, features, or processing activities
- Default settings favor data minimization (opt-in, not opt-out)
12. Children's data (Section 9)
- Verifiable parental consent for processing data of individuals under 18
- No behavioral advertising or tracking of children
13. Grievance redressal
- Grievance officer appointed and contact details published
- Acknowledge complaints within 72 hours, resolve within 30 days
14. Training and awareness
- Quarterly DPDP awareness training for all employees handling personal data
- Specialized training for developers, DBAs, SOC analysts on secure coding, query auditing, incident response
15. Network segmentation
- Isolate personal data repositories in separate VLANs/VPCs with firewall rules
- Micro-segmentation for zero-trust architecture (Cisco ACI, VMware NSX, Palo Alto Prisma)
16. Backup and disaster recovery
- Encrypted backups with same access controls as production data
- Test restoration quarterly; verify data integrity post-restore
17. Mobile and endpoint security
- MDM (Mobile Device Management) for BYOD devices accessing personal data
- Endpoint detection and response (EDR) with DLP integration
18. Compliance documentation
- Maintain evidence repository: policies, procedures, training records, audit reports, DPIAs, breach logs
- Annual compliance attestation by CISO or equivalent to board/senior management
In our HSR Layout lab, we use Cisco ISE for RBAC enforcement, Palo Alto Cortex XSOAR for breach response orchestration, and AWS Macie for automated sensitive data discovery across S3 buckets, simulating real-world DPDP compliance architectures deployed by our hiring partners.
Penalties and enforcement under the DPDP Act — what non-compliance costs
The Data Protection Board of India (DPB), constituted under Section 18, is the enforcement authority. Penalties under Section 33:
- ₹50 crore for failure to implement reasonable security safeguards (Section 8)
- ₹200 crore for breach of children's data obligations (Section 9)
- ₹200 crore for non-compliance with Board directions
- ₹250 crore maximum aggregate penalty per violation
Penalties are per violation, not per affected data principal (unlike GDPR's 4% of global turnover or €20 million, whichever is higher). A single breach affecting 1 million users incurs the same penalty as one affecting 10 users, but multiple violations (e.g., failure to notify + failure to implement safeguards + failure to appoint DPO) can stack.
Enforcement process:
1. Complaint filing: Data principals file complaints via DPB portal (under development)
2. Investigation: DPB issues notice to data fiduciary; 30-day response window
3. Adjudication: Hearing before DPB member; opportunity to present evidence
4. Penalty order: Issued within 6 months of complaint (target timeline)
5. Appeal: To Telecom Disputes Settlement and Appellate Tribunal (TDSAT), then High Court
Voluntary disclosure: Section 33(2) allows DPB to reduce penalties if the fiduciary voluntarily reports the breach and demonstrates remediation. This incentivizes proactive disclosure.
Criminal liability: The Act does not create criminal offenses, unlike IT Act Section 43A (civil liability) and Section 66 (criminal hacking). However, data breaches may trigger parallel proceedings under IT Act, IPC Section 406 (criminal breach of trust), or sector-specific laws.
Reputational and business impact:
- Customer churn: Indian consumers increasingly aware of data rights; breaches drive attrition
- Regulatory scrutiny: SEBI, RBI, IRDAI conducting DPDP audits as part of sector inspections
- Procurement disqualification: Government tenders and enterprise RFPs now include DPDP compliance as eligibility criterion
- Insurance: Cyber insurance premiums rising for non-compliant organizations; some insurers excluding DPDP penalties from coverage
As of Q1 2025, the DPB has not yet issued its first penalty order, but MeitY has indicated that enforcement will ramp up post-finalization of rules (expected by mid-2025). Early movers implementing compliance now gain competitive advantage in enterprise sales cycles. Our cybersecurity curriculum includes a 2-week module on DPDP compliance architecture, where students build consent management workflows, breach notification automation, and cross-border transfer monitoring dashboards using Splunk, ServiceNow, and AWS Config.
DPDP compliance job roles in India — skills and salary bands
The DPDP Act has created new job families and expanded existing ones in the Indian cybersecurity and GRC market:
1. Data Protection Officer (DPO)
- Responsibilities: Oversee DPDP compliance program, liaise with Data Protection Board, conduct privacy impact assessments, handle data principal complaints
- Skills: Legal knowledge of DPDP Act, ISO 27001/27701, GDPR (for MNCs), incident response, stakeholder management
- Salary: ₹12–25 LPA (mid-level), ₹25–50 LPA (senior, MNC)
- Hiring partners: Cisco India, Akamai, HCL, Wipro, TCS, HDFC Bank, Flipkart, PhonePe
2. GRC Analyst (Governance, Risk, Compliance)
- Responsibilities: Maintain ROPA, conduct vendor risk assessments, track remediation of audit findings, prepare compliance reports for board
- Skills: Risk assessment frameworks (NIST, ISO 31000), audit methodologies, Excel/PowerBI for dashboards, basic SQL for data inventory queries
- Salary: ₹4–8 LPA (fresher), ₹8–15 LPA (3–5 years)
- Hiring partners: Big 4 (Deloitte, PwC, EY, KPMG), Movate, Infosys, IBM
3. Privacy Engineer
- Responsibilities: Implement consent management platforms, build data anonymization pipelines, integrate DLP and encryption solutions, automate breach detection workflows
- Skills: Python/Java, API integration, cloud security (AWS IAM, Azure RBAC), SIEM (Splunk, QRadar), DLP (Forcepoint, Symantec)
- Salary: ₹8–18 LPA (mid-level), ₹18–35 LPA (senior, product companies)
- Hiring partners: Razorpay, Zomato, Swiggy, Ola, Paytm, Microsoft India, Google India
4. SOC Analyst (DPDP-focused)
- Responsibilities: Monitor SIEM for personal data access anomalies, investigate potential breaches, execute 72-hour notification workflow, forensic evidence collection
- Skills: SIEM query languages (SPL, KQL), network packet analysis (Wireshark), endpoint forensics (Volatility, FTK), incident response frameworks (NIST 800-61)
- Salary: ₹3.5–7 LPA (L1), ₹7–12 LPA (L2), ₹12–20 LPA (L3/lead)
- Hiring partners: Barracuda, Akamai India, Cisco TAC, HCL Cybersecurity, Accenture
5. Cloud Security Architect (DPDP compliance)
- Responsibilities: Design multi-region cloud architectures with data residency controls, implement encryption key management, configure cross-border transfer monitoring, automate compliance reporting
- Skills: AWS/Azure/GCP certifications (Solutions Architect, Security Specialty), Terraform/CloudFormation, CSPM tools (Prisma Cloud, Wiz), DPDP Act technical requirements
- Salary: ₹15–30 LPA (mid-level), ₹30–60 LPA (senior, unicorns/MNCs)
- Hiring partners: Aryaka, Netskope, Zscaler India, Freshworks, Zoho
Skill gaps we observe in hiring:
- Most CCNA/CCNP candidates understand network security but lack GRC vocabulary (risk registers, control frameworks, audit evidence)
- Many law graduates entering DPO roles lack technical depth to evaluate encryption implementations or SIEM configurations
- Cloud engineers often implement controls without understanding the legal obligation driving the requirement
Our Full Stack Network Security course bridges this gap with integrated modules: students configure Cisco ISE for RBAC (technical), then map those configurations to DPDP Section 8 obligations (compliance), then document the control in a mock audit report (GRC). This produces T-shaped professionals who can converse equally with CISOs, auditors, and legal counsel. Our 8-month verified experience letter explicitly lists DPDP compliance projects completed during the 4-month paid internship, giving candidates an edge in DPO and GRC analyst interviews.
How Networkers Home cybersecurity curriculum covers DPDP compliance
DPDP Act compliance is woven throughout our cybersecurity training tracks, not taught as a standalone legal module:
In the Cloud Security & Cybersecurity course:
- Week 6–7: Identity and Access Management (IAM)
- Students configure AWS IAM policies enforcing least privilege for S3 buckets containing personal data
- Lab exercise: Implement MFA for privileged accounts, set up CloudTrail logging, create IAM Access Analyzer reports showing overpermissioned roles
- DPDP mapping: Section 8 (reasonable security safeguards), Section 8(4) (access control)
- Week 10–11: Data Protection and Encryption
- Hands-on with AWS KMS, Azure Key Vault, HashiCorp Vault for encryption key lifecycle management
- Lab exercise: Enable S3 bucket encryption at rest, enforce TLS 1.3 for CloudFront distributions, implement client-side encryption for sensitive fields in DynamoDB
- DPDP mapping: Section 8(6) (encryption), CERT-In logging directions
- Week 14–15: SIEM and Incident Response
- Deploy Splunk Enterprise Security in our HSR Layout lab, ingest logs from Palo Alto firewalls, Cisco ISE, AWS CloudTrail
- Lab exercise: Create correlation rules detecting sensitive data exfiltration (DLP alerts + large outbound transfers + access from anomalous geolocations), build automated breach notification workflow using Splunk Phantom (now SOAR)
- DPDP mapping: Section 6 (breach notification within 72 hours), Section 8(7) (audit logging)
In the Full Stack Network Security course:
- Month 2: Network Segmentation and Zero Trust
- Configure Cisco ACI fabric with EPGs (Endpoint Groups) isolating personal data repositories
- Lab exercise: Implement micro-segmentation policies allowing only application servers to query customer database, blocking direct developer access
- DPDP mapping: Section 8 (reasonable safeguards), defense-in-depth principle
- Month 4: Compliance and GRC
- Students conduct mock DPDP gap assessment for a fictional e-commerce company
- Deliverables: ROPA (Record of Processing Activities), risk register, remediation roadmap, DPO appointment memo, Data Processing Agreement template
- Guest lecture by GRC leads from Cisco India and Akamai India on real-world DPDP implementation challenges
In the 4-month paid internship (Network Security Operations Division):
- Interns work on live DPDP compliance projects for our hiring partners:
- Deploying Forcepoint DLP for a Bangalore-based fintech (detecting PAN, Aadhaar, credit card numbers in email and cloud storage)
- Building Splunk dashboards for a healthcare SaaS company tracking consent withdrawal requests and automated data purging
- Conducting vendor risk assessments for a logistics unicorn's cloud service providers
- Interns receive mentorship from Dual CCIE Vikas Swami on translating legal requirements into technical architectures
- Internship projects are documented in the 8-month verified experience letter with specific DPDP sections and controls implemented
NHPREP.COM mock tests:
Our online practice platform includes 50+ DPDP Act scenario-based questions:
- "A data breach is discovered on Monday 9 AM. The CISO is on leave. Who must notify the Data Protection Board, and by when?"
- "An AWS S3 bucket containing customer email addresses is accidentally set to public-read. Is this a notifiable breach under DPDP Act? What factors determine notification obligation?"
- "A SaaS vendor's Terms of Service include a clause: 'By using our service, you consent to data processing.' Is this valid consent under DPDP Act Section 6?"
Students get 12 months free access to NHPREP.COM, allowing them to drill DPDP compliance scenarios until they can answer confidently in interviews. Our placement team reports that candidates who complete the DPDP module receive 20–30% higher salary offers for GRC analyst and SOC analyst roles compared to peers with only technical certifications.
Exam relevance
In our HSR Layout lab, we simulate DPDP breach scenarios using a 50-node topology with Cisco ISE, Palo Alto firewalls, Splunk Enterprise Security, and AWS multi-region deployment. Students trigger a simulated data exfiltration event (malicious insider copying customer database to personal S3 bucket), then execute the full 72-hour breach notification workflow: SIEM alert → SOC investigation → forensic evidence collection → legal/compliance notification → Data Protection Board filing → affected customer communication. This hands-on drill is based on actual breach response playbooks used by our hiring partners Akamai India and HCL Cybersecurity, ensuring our graduates can operationalize DPDP compliance from day one. For DPDP Act 2023 'reasonable security safeguards' implementation, Networkers Home's founder Vikas Swami ships QuickZTNA (world's first post-quantum ZTNA with ML-KEM-768 + X25519 hybrid keypairs, NIST FIPS 203 compliant) — credible evidence of state-of-the-art encryption for compliance audits.
Frequently asked questions
Is the DPDP Act applicable to small businesses and startups in India? +
Yes, the DPDP Act applies to all entities processing personal data of Indian residents, regardless of company size, revenue, or employee count. There is no small business exemption. A 3-person startup collecting email addresses via a website form is a data fiduciary under the Act and must comply with consent, security, and breach notification obligations. However, the obligation to appoint a Data Protection Officer (DPO) applies only to entities processing significant volumes of personal data—the threshold will be defined in rules expected by mid-2025. Startups should prioritize consent management, encryption, and breach response workflows even if DPO appointment is not yet mandatory.
What is the 72-hour breach notification requirement under the DPDP Act? +
Section 6(3) requires data fiduciaries to notify the Data Protection Board of India within 72 hours of becoming aware of a personal data breach. The notification must include: (1) nature of the breach, (2) categories of personal data affected, (3) number of data principals impacted, (4) root cause analysis, (5) remediation steps taken. The fiduciary must also notify affected data principals if the breach is likely to cause harm. The 72-hour clock starts when the organization has reasonable certainty that a breach occurred, not when the incident was first detected. In practice, SOC teams must have automated workflows (SOAR playbooks) to escalate confirmed breaches to legal/compliance within hours, not days.
Can personal data be transferred outside India under the DPDP Act? +
Section 16 allows cross-border transfer of personal data only to countries or territories notified by the Central Government. As of Q1 2025, no countries have been notified, creating uncertainty for MNCs and cloud providers. The Act does not provide adequacy criteria (unlike GDPR's adequacy decisions) or standard contractual clauses. In practice, organizations are implementing geo-fencing in cloud IAM policies to restrict data egress, using India-region-only deployments (AWS ap-south-1, Azure Central India), and contractually binding foreign processors to DPDP obligations. Intra-company transfers (e.g., Cisco India to Cisco USA for support) are permitted but must be documented and secured. Expect MeitY to notify US, EU, Singapore, and other jurisdictions with strong data protection laws by mid-2025.
What is the difference between a data fiduciary and a data processor under the DPDP Act? +
A data fiduciary (Section 2(i)) determines the purpose and means of processing personal data—equivalent to GDPR's controller. Examples: e-commerce platform deciding to collect customer addresses for delivery, bank deciding to store transaction history for fraud detection. A data processor (Section 2(j)) processes personal data on behalf of the fiduciary per contractual instructions—equivalent to GDPR's processor. Examples: AWS hosting the e-commerce platform's database, Razorpay processing payments for the platform. Key difference: fiduciaries have direct obligations to data principals (consent, breach notification, grievance redressal), while processors have obligations to fiduciaries (security, confidentiality, sub-processor management). Both must implement reasonable security safeguards. A Data Processing Agreement (DPA) must govern the fiduciary-processor relationship.
Does the DPDP Act require data localization — must personal data be stored in India? +
No, the DPDP Act does not mandate data localization. Section 16 permits cross-border transfer to notified countries, implying that storage outside India is permissible if the destination country is on the approved list. This is a departure from the draft Personal Data Protection Bill 2019, which required a copy of critical personal data to be stored in India. However, sector-specific regulations impose localization: RBI's 2018 circular requires payment data to be stored only in India; IRDAI requires insurance data to be stored in India; SEBI has similar requirements for securities data. Organizations must comply with both DPDP Act and sector regulator mandates. In practice, many MNCs are adopting a hybrid model: India-region cloud deployment for regulated data, global deployment for non-sensitive data.
What are the consent requirements under the DPDP Act — is implied consent valid? +
Section 6 requires consent to be free, specific, informed, unconditional, and unambiguous, with clear affirmative action by the data principal. Implied consent (e.g., 'by using our website, you consent') is not valid. Pre-checked boxes, bundled consent (consent for service tied to consent for marketing), and consent buried in Terms of Service are non-compliant. The Act requires consent to be given in clear and plain language, separately for each purpose. Data principals must be able to withdraw consent as easily as they gave it, and withdrawal must not affect the lawfulness of processing before withdrawal. Organizations must deploy Consent Management Platforms (CMPs) capturing granular consent with timestamp, IP address, and user-agent, and honoring withdrawal requests within the timeline specified in rules (expected to be 24–72 hours).
What is sensitive personal data under the DPDP Act, and does it require special protection? +
Section 2(s) defines sensitive personal data as financial data, health data, official identifier (Aadhaar, PAN, passport), sex life, sexual orientation, biometric data, genetic data, transgender status, intersex status, caste or tribe, religious or political belief or affiliation. The Act does not explicitly mandate additional controls for sensitive personal data beyond 'reasonable security safeguards' (Section 8), but the Data Protection Board may issue sector-specific guidelines. In practice, organizations should apply stronger controls: AES-256 encryption at rest, TLS 1.3 in transit, HSM-based key management, stricter access control (MFA mandatory, quarterly access reviews), enhanced audit logging, and separate network segmentation. Penalties for breaches involving sensitive data are likely to be at the higher end of the ₹50–250 crore range.
How does the DPDP Act affect job prospects for network security engineers in India? +
The DPDP Act has created 50,000+ new job openings in India across DPO, GRC analyst, privacy engineer, SOC analyst, and cloud security architect roles. Network security engineers with CCNA/CCNP/CCIE credentials who upskill in DPDP compliance, SIEM (Splunk, QRadar), DLP (Forcepoint, Symantec), cloud security (AWS/Azure), and GRC frameworks (ISO 27001, NIST) are commanding 25–40% salary premiums. Hiring partners like Cisco India, Akamai, HCL, Wipro, and Barracuda are prioritizing candidates who can implement technical controls (firewall rules, encryption, IAM policies) and articulate how those controls satisfy DPDP obligations. Networkers Home's Full Stack Network Security course integrates DPDP compliance throughout the curriculum, and our 8-month verified experience letter documents specific DPDP projects completed during the 4-month paid internship, giving graduates a competitive edge in interviews.
Related concepts