Where a sub-processor is engaged, precisely the same details security obligations in the contract in between the controller and processor has to be imposed about the sub-processor By means of agreement or other “organisational measures.”[forty five] The processor will continue being thoroughly liable towards the controller for performance with the https://bookmarkpath.com/story17625695/cyber-security-consulting-in-saudi-arabia