Exactly where a sub-processor is engaged, the identical info security obligations from the agreement between the controller and processor must be imposed over the sub-processor By means of contract or other “organisational measures.”[forty five] The processor will continue to be absolutely liable towards the controller for performance of the sub-processor’s https://express-page.com/story2932887/cyber-security-services-in-saudi-arabia