Wherever a sub-processor is engaged, precisely the same information security obligations while in the contract involving the controller and processor have to be imposed around the sub-processor By the use of contract or other “organisational actions.”[forty five] The processor will stay absolutely liable into the controller for performance with the https://socialmarkz.com/story7942620/cyber-security-services-in-saudi-arabia