Where by a sub-processor is engaged, exactly the same information safety obligations inside the contract in between the controller and processor should be imposed about the sub-processor By means of contract or other “organisational steps.”[45] The processor will remain entirely liable to the controller for performance on the sub-processor’s obligations. https://pukkabookmarks.com/story17732876/cybersecurity-consulting-services-in-saudi-arabia