Where a sub-processor is engaged, the exact same data security obligations within the contract between the controller and processor need to be imposed within the sub-processor By means of contract or other “organisational actions.”[forty five] The processor will keep on being thoroughly liable towards the controller for performance of the https://socialmphl.com/story19484709/cybersecurity-consulting-services-in-saudi-arabia