Where a sub-processor is engaged, precisely the same data security obligations from the agreement involving the controller and processor need to be imposed over the sub-processor By means of contract or other “organisational steps.”[45] The processor will remain fully liable to the controller for performance from the sub-processor’s obligations. The https://iwanttobookmark.com/story17772594/cyber-security-services-in-usa