Exactly where a sub-processor is engaged, the identical info defense obligations from the agreement between the controller and processor has to be imposed about the sub-processor By the use of agreement or other “organisational measures.”[45] The processor will continue being thoroughly liable for the controller for performance on the sub-processor’s https://explorebookmarks.com/story17610602/cyber-security-consulting-in-saudi-arabia