Where a sub-processor is engaged, the identical info safety obligations within the contract between the controller and processor must be imposed around the sub-processor By the use of contract or other “organisational steps.”[forty five] The processor will continue to be completely liable for the controller for performance in the sub-processor’s https://socialinplace.com/story2973028/cyber-security-services-in-usa