Information Defense Influence Assessment:[33] Where by the controller undertakes a form of processing that is likely to bring about a superior risk for the rights and freedoms of purely natural people, the controller will have to carry out an influence evaluation of that processing, in consultation with any specified DPO. https://tbookmark.com/story17575209/cyber-security-consulting-in-usa