Where by a sub-processor is engaged, exactly the same information protection obligations inside the agreement among the controller and processor have to be imposed over the sub-processor By the use of contract or other “organisational measures.”[forty five] The processor will continue being fully liable for the controller for performance on https://pr6bookmark.com/story17817793/cyber-security-services-in-saudi-arabia