Where by a sub-processor is engaged, a similar information defense obligations within the contract among the controller and processor have to be imposed to the sub-processor By the use of agreement or other “organisational actions.”[45] The processor will stay entirely liable towards the controller for performance in the sub-processor’s obligations. https://cyber-security-consulting-in-usa.mystrikingly.com/