Where a sub-processor is engaged, precisely the same information protection obligations inside the contract between the controller and processor should be imposed on the sub-processor Through agreement or other “organisational measures.”[45] The processor will stay absolutely liable on the controller for performance in the sub-processor’s obligations. Even the presence of https://mysocialguides.com/story2982962/cybersecurity-consulting-services-in-saudi-arabia