Wherever a sub-processor is engaged, the identical information protection obligations while in the agreement in between the controller and processor must be imposed on the sub-processor Through deal or other “organisational steps.”[45] The processor will continue to be entirely liable for the controller for performance of the sub-processor’s obligations. On https://hotbookmarkings.com/story17696277/cyber-security-services-in-saudi-arabia