The place a sub-processor is engaged, the identical information defense obligations from the agreement in between the controller and processor have to be imposed to the sub-processor Through contract or other “organisational actions.”[forty five] The processor will continue being entirely liable towards the controller for performance with the sub-processor’s obligations. https://bookmarkstown.com/story17880248/cyber-security-consulting-in-saudi-arabia