Wherever a sub-processor is engaged, the identical knowledge security obligations during the deal amongst the controller and processor must be imposed on the sub-processor By means of deal or other “organisational measures.”[forty five] The processor will keep on being fully liable to your controller for performance with the sub-processor’s obligations. https://bookmarkblast.com/story17699445/cyber-security-services-in-saudi-arabia