Exactly where a sub-processor is engaged, the identical info safety obligations inside the contract amongst the controller and processor have to be imposed around the sub-processor By the use of agreement or other “organisational measures.”[45] The processor will continue to be entirely liable on the controller for performance on the https://hotbookmarkings.com/story17696277/cyber-security-services-in-saudi-arabia