access to this type of customers PII or personal data then we have the same data security requirements as the Customer even though we do not the data controller. In all cases, we are now required by law to implement appropriate technical and organizational measures to ensure a level of data security proportional to the risks inherent in the data processing. Complying with this obligation will require a detailed assessment of various factors including the purposes of data processing activities, potential risks (such as accidental and unlawful destruction or unauthorized disclosure of, or access to, data), and the state of the art of security and implementation costs. We have to include the costs of the security in our bid or make an assumption that costs will be paid by the customer or will need to be agreed. Powered by EPAM