The place a sub-processor is engaged, the identical information protection obligations from the contract in between the controller and processor must be imposed within the sub-processor Through agreement or other “organisational measures.”[45] The processor will stay absolutely liable on the controller for performance of the sub-processor’s obligations. Embracing these rules https://bookmark-search.com/story17588803/cyber-security-consulting-in-saudi-arabia