Where by a sub-processor is engaged, a similar information safety obligations in the deal concerning the controller and processor must be imposed around the sub-processor By means of agreement or other “organisational measures.”[45] The processor will continue to be entirely liable to your controller for performance of your sub-processor’s obligations. https://kingbookmark.com/story17741344/cybersecurity-consulting-services-in-saudi-arabia