Where a sub-processor is engaged, the identical info security obligations in the deal involving the controller and processor have to be imposed over the sub-processor By the use of deal or other “organisational measures.”[forty five] The processor will remain absolutely liable to your controller for performance in the sub-processor’s obligations. https://brightbookmarks.com/story17835657/cyber-security-consulting-in-saudi-arabia