Exactly where a sub-processor is engaged, a similar info protection obligations inside the agreement concerning the controller and processor has to be imposed to the sub-processor By the use of contract or other “organisational steps.”[45] The processor will remain thoroughly liable towards the controller for performance on the sub-processor’s obligations. https://bookmarking1.com/story17653925/cybersecurity-consulting-services-in-saudi-arabia