In which a sub-processor is engaged, the identical info safety obligations within the contract between the controller and processor must be imposed on the sub-processor By the use of agreement or other “organisational measures.”[forty five] The processor will continue to be totally liable towards the controller for performance of the https://bookmarkshq.com/story19092398/cyber-security-consulting-in-saudi-arabia