Where by a sub-processor is engaged, a similar info security obligations from the deal between the controller and processor have to be imposed over the sub-processor By the use of contract or other “organisational steps.”[forty five] The processor will stay absolutely liable on the controller for performance of the sub-processor’s https://bookmarkbirth.com/story17536641/cyber-security-consulting-in-usa