Wherever a sub-processor is engaged, the same information protection obligations while in the deal involving the controller and processor must be imposed within the sub-processor By means of contract or other “organisational actions.”[45] The processor will remain fully liable on the controller for performance on the sub-processor’s obligations. Compliance with https://wildbookmarks.com/story17815240/cybersecurity-consulting-services-in-saudi-arabia