Exactly where a sub-processor is engaged, the identical information security obligations from the contract between the controller and processor needs to be imposed on the sub-processor by way of agreement or other “organisational measures.”[forty five] The processor will continue being thoroughly liable for the controller for performance on the sub-processor’s https://seolistlinks.com/story18960382/cybersecurity-consulting-services-in-saudi-arabia