Operating Model

How legal and ops teams should divide privacy work

Audience: in-house legal, founders, compliance leads, operations leaders, privacy owners · Last reviewed: March 2026

Privacy programs get weird fast when legal owns everything and ops owns nothing. They also break when ops runs everything and legal only appears after a complaint, contract dispute, or risky product launch. The healthier model is simple: legal defines the boundaries and reviews risk; operations runs the machine.

Legal should own interpretation, escalation thresholds, and defensibility. Ops should own intake, coordination, tracking, follow-through, and repeatable execution.

Why this division matters under DPDP

DPDP-related work is not one task. It includes public notices, collection design, rights handling, grievance response, vendor review, retention practice, internal records, and edge-case judgment. Those are different muscles. Legal teams are usually best at interpretation and risk calls. Ops teams are usually best at process, timing, handoffs, and closure discipline.

When these roles are blurred, one of two things happens: either every routine task gets stuck waiting for a lawyer, or risky issues get handled by whoever happened to see the ticket first.

A practical default split

Legal owns

  • Interpreting obligations and exceptions
  • Approving position statements and escalation rules
  • Reviewing high-risk complaints, incidents, and novel product issues
  • Supporting contract and enterprise diligence commitments
  • Defining when outside counsel is needed

Ops owns

  • Request intake, routing, and tracking
  • SLA management and follow-up
  • Maintaining SOPs, trackers, and working documentation
  • Coordinating engineering, support, product, and vendor action
  • Closing the loop and preserving records of action

Who should own common privacy tasks?

TaskPrimary ownerSecondary support
Drafting escalation rulesLegalOps
Running the rights-request queueOpsLegal for exceptions
Approving public privacy-language changesLegalOps, product, marketing
Documenting actual workflow stepsOpsLegal reviews fit
Vendor review process upkeepOps / procurementLegal for contract terms and edge cases
Complaint triageOpsLegal once thresholds are met
Novel feature reviewProduct + legalOps for implementation readiness

What legal should not be forced to do

What ops should not be forced to guess

The handoff that matters most

The most valuable privacy handoff is not from legal to ops once a year in a training deck. It is the ongoing translation of principle into playbook. Legal should define what the rule means, what counts as an exception, and what must be preserved for defensibility. Ops should turn that into a queue, an SOP, a checklist, a ticket state, and a recurring review.

A lean-team model when you do not have both functions fully staffed

Small companies may not have dedicated privacy counsel or a formal operations team. In that case, do not pretend the split does not exist. Assign the roles anyway. One person can wear the legal-adjacent hat and another can wear the process-owner hat, but the work still needs separate modes: interpretation and execution.

Useful artifacts for the legal-ops boundary

  1. Escalation matrix. Clear rules for when ops can proceed and when legal must review.
  2. Approved standard responses. Reduce reinvention for routine user and customer questions.
  3. SOP library. Ops-run, legal-reviewed, versioned, and linked to system owners.
  4. Issue log. Track repeat edge cases that may require a policy update or formal legal position.
  5. Diligence pack. One verified source for enterprise customer privacy answers.

Official and higher-authority references

The law sets the duties. The company still needs an operating model that matches its actual systems, contracts, and team shape.