Where by a sub-processor is engaged, the same data security obligations from the agreement amongst the controller and processor have to be imposed about the sub-processor By means of agreement or other “organisational actions.”[45] The processor will continue being entirely liable into the controller for performance of the sub-processor’s obligations. https://wildbookmarks.com/story17815240/cybersecurity-consulting-services-in-saudi-arabia