Exactly where a sub-processor is engaged, exactly the same information safety obligations in the contract among the controller and processor has to be imposed over the sub-processor By the use of contract or other “organisational actions.”[45] The processor will stay fully liable on the controller for performance in the sub-processor’s https://ragingbookmarks.com/story17662672/cyber-security-consulting-in-saudi-arabia