The place a sub-processor is engaged, the identical information security obligations during the contract between the controller and processor must be imposed around the sub-processor By means of deal or other “organisational measures.”[45] The processor will remain thoroughly liable towards the controller for performance with the sub-processor’s obligations. Documents must https://networkbookmarks.com/story17671327/cybersecurity-consulting-services-in-saudi-arabia