Where by a sub-processor is engaged, the same info defense obligations in the contract concerning the controller and processor need to be imposed on the sub-processor By the use of deal or other “organisational measures.”[forty five] The processor will continue being thoroughly liable for the controller for performance from the https://bookmarkchamp.com/story17617461/cybersecurity-consulting-services-in-saudi-arabia