Where a sub-processor is engaged, a similar info defense obligations from the agreement in between the controller and processor has to be imposed about the sub-processor By means of contract or other “organisational actions.”[forty five] The processor will remain fully liable for the controller for performance on the sub-processor’s obligations. https://bookmarklogin.com/story17771043/cyber-security-services-in-usa