In which a sub-processor is engaged, exactly the same details security obligations while in the contract in between the controller and processor should be imposed on the sub-processor by way of agreement or other “organisational steps.”[45] The processor will continue to be totally liable on the controller for performance from https://singnalsocial.com/story2952804/cyber-security-consulting-in-saudi-arabia