The place a sub-processor is engaged, a similar info security obligations inside the deal between the controller and processor have to be imposed around the sub-processor By means of deal or other “organisational measures.”[45] The processor will continue to be entirely liable towards the controller for performance on the sub-processor’s https://socialeweb.com/story2941316/cybersecurity-consulting-services-in-saudi-arabia