Exactly where a sub-processor is engaged, the same knowledge security obligations in the deal in between the controller and processor have to be imposed about the sub-processor By means of contract or other “organisational measures.”[45] The processor will continue being entirely liable towards the controller for performance with the sub-processor’s https://hyperbookmarks.com/story17668535/cyber-security-services-in-saudi-arabia