Where a sub-processor is engaged, exactly the same details security obligations during the agreement concerning the controller and processor need to be imposed within the sub-processor By means of agreement or other “organisational steps.”[45] The processor will continue being fully liable into the controller for performance of your sub-processor’s obligations. https://bookmarklinking.com/story3104458/cyber-security-consulting-in-saudi-arabia