Exactly where a sub-processor is engaged, exactly the same information security obligations from the agreement between the controller and processor should be imposed about the sub-processor Through agreement or other “organisational steps.”[forty five] The processor will continue to be absolutely liable towards the controller for performance of the sub-processor’s obligations. https://thesocialintro.com/story3107955/cyber-security-consulting-in-usa