In which a sub-processor is engaged, a similar info safety obligations during the agreement amongst the controller and processor has to be imposed around the sub-processor By the use of contract or other “organisational steps.”[45] The processor will stay fully liable on the controller for performance with the sub-processor’s obligations. https://socialmediaentry.com/story2989983/cyber-security-consulting-in-usa