Exactly where a sub-processor is engaged, the same facts security obligations while in the contract involving the controller and processor must be imposed over the sub-processor by way of agreement or other “organisational steps.”[forty five] The processor will stay thoroughly liable for the controller for performance on the sub-processor’s obligations. https://bookmarkpath.com/story17625695/cyber-security-consulting-in-saudi-arabia