Where a sub-processor is engaged, a similar info protection obligations while in the contract in between the controller and processor should be imposed around the sub-processor By the use of contract or other “organisational actions.”[45] The processor will stay entirely liable towards the controller for performance from the sub-processor’s obligations. https://yxzbookmarks.com/story17647879/cybersecurity-consulting-services-in-saudi-arabia