The place a sub-processor is engaged, precisely the same information security obligations inside the agreement in between the controller and processor needs to be imposed about the sub-processor by way of agreement or other “organisational measures.”[45] The processor will remain thoroughly liable for the controller for performance of the sub-processor’s https://bookmarkcolumn.com/story17492988/cybersecurity-consulting-services-in-saudi-arabia