NotificationPrivacyComplianceOfficer forPrivacyNonComplianceNationalPrivacyCommissionMalwareStorageRight toCorrectionDataSharingDisclosureProtectionRight toErasurePersonalInformationControllerPersonalInformationRight tobeInformedAccessPrivacyNoticeIntegrityBreachProportionalityDataProtectionOfficerSpecifiedPurposeDataSubjectSecurityIncidentMedicalRecordsRetentionDisposalWeakPasswordVirusRiskRatingInformationSharingEncryptionDataQualityAvailabilityBreachDataSharingAgreementPrivacyPolicyThreatsDataCollectionPrivacyManualConfidentialityDataPrivacyAct of2012PasswordSecurityBreachRight toDataPortabilityCybersecurityHackingLegitimatePurposeDataProcessingSystemConsentTransparencyComputerPersonalIdentifiableInformationHospitalInformationSystemPrivacyImpactAssessmentPosibleSafeguardsSensitivePersonalInformationRight toDamagesPriviledgeInformationConfidentialityBreachVulnerabilityServerDataBreachAdventistMedicalCenterManilaSecurityMeasuresComplaintsRighttoAccessPersonalInformationProcessorSecurityClearanceNonDisclosureRA10173PhishingAwarenessAutonomyRight tofile aComplaintRighttoObjectNotificationPrivacyComplianceOfficer forPrivacyNonComplianceNationalPrivacyCommissionMalwareStorageRight toCorrectionDataSharingDisclosureProtectionRight toErasurePersonalInformationControllerPersonalInformationRight tobeInformedAccessPrivacyNoticeIntegrityBreachProportionalityDataProtectionOfficerSpecifiedPurposeDataSubjectSecurityIncidentMedicalRecordsRetentionDisposalWeakPasswordVirusRiskRatingInformationSharingEncryptionDataQualityAvailabilityBreachDataSharingAgreementPrivacyPolicyThreatsDataCollectionPrivacyManualConfidentialityDataPrivacyAct of2012PasswordSecurityBreachRight toDataPortabilityCybersecurityHackingLegitimatePurposeDataProcessingSystemConsentTransparencyComputerPersonalIdentifiableInformationHospitalInformationSystemPrivacyImpactAssessmentPosibleSafeguardsSensitivePersonalInformationRight toDamagesPriviledgeInformationConfidentialityBreachVulnerabilityServerDataBreachAdventistMedicalCenterManilaSecurityMeasuresComplaintsRighttoAccessPersonalInformationProcessorSecurityClearanceNonDisclosureRA10173PhishingAwarenessAutonomyRight tofile aComplaintRighttoObject

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
  1. Notification
  2. Privacy
  3. Compliance Officer for Privacy
  4. Non Compliance
  5. National Privacy Commission
  6. Malware
  7. Storage
  8. Right to Correction
  9. Data Sharing
  10. Disclosure
  11. Protection
  12. Right to Erasure
  13. Personal Information Controller
  14. Personal Information
  15. Right to be Informed
  16. Access
  17. Privacy Notice
  18. Integrity Breach
  19. Proportionality
  20. Data Protection Officer
  21. Specified Purpose
  22. Data Subject
  23. Security Incident
  24. Medical Records
  25. Retention
  26. Disposal
  27. Weak Password
  28. Virus
  29. Risk Rating
  30. Information
  31. Sharing
  32. Encryption
  33. Data Quality
  34. Availability Breach
  35. Data Sharing Agreement
  36. Privacy Policy
  37. Threats
  38. Data Collection
  39. Privacy Manual
  40. Confidentiality
  41. Data Privacy Act of 2012
  42. Password
  43. Security Breach
  44. Right to Data Portability
  45. Cybersecurity
  46. Hacking
  47. Legitimate Purpose
  48. Data Processing System
  49. Consent
  50. Transparency
  51. Computer
  52. Personal Identifiable Information
  53. Hospital Information System
  54. Privacy Impact Assessment
  55. Posible Safeguards
  56. Sensitive Personal Information
  57. Right to Damages
  58. Priviledge Information
  59. Confidentiality Breach
  60. Vulnerability
  61. Server
  62. Data Breach
  63. Adventist Medical Center Manila
  64. Security Measures
  65. Complaints
  66. Right to Access
  67. Personal Information Processor
  68. Security Clearance
  69. Non Disclosure
  70. RA 10173
  71. Phishing
  72. Awareness
  73. Autonomy
  74. Right to file a Complaint
  75. Right to Object