The place a sub-processor is engaged, precisely the same info security obligations inside the contract among the controller and processor should be imposed on the sub-processor Through contract or other “organisational actions.”[45] The processor will remain absolutely liable on the controller for performance with the sub-processor’s obligations. *This table shows https://aramcocybersecuritysaudiarabia.blogspot.com/2024/08/aramco-cyber-security-certificate-in.html