Wherever a sub-processor is engaged, precisely the same information security obligations while in the contract amongst the controller and processor should be imposed to the sub-processor By means of deal or other “organisational measures.”[45] The processor will remain entirely liable to the controller for performance on the sub-processor’s obligations. Even https://dmozbookmark.com/story17715887/cyber-security-services-in-saudi-arabia