In which a sub-processor is engaged, the exact same information defense obligations within the contract in between the controller and processor should be imposed on the sub-processor By the use of contract or other “organisational steps.”[forty five] The processor will continue to be fully liable towards the controller for performance https://socialdosa.com/story7418833/cybersecurity-consulting-services-in-saudi-arabia