The place a sub-processor is engaged, a similar data security obligations in the deal concerning the controller and processor must be imposed on the sub-processor By the use of agreement or other “organisational measures.”[forty five] The processor will keep on being thoroughly liable on the controller for performance on the https://mediasocially.com/story2919486/cyber-security-consulting-in-saudi-arabia