Incident Report Penalties Rights of Data Subjects Cybersecurity Awareness Sensitive Personal Information Data Processing Data Processor Privacy Notice Phishing Integration Transparency National Privacy Commission Right to File a Complaint Right to Erasure Data Consent Anonymization Backup Privacy Policy Lawful Access Encryption Personal Data Access Control Compliance Strong Password Data Recovery Multi-Factor Authentication Data Breach Notification Right to Damages Data Security Identity Theft Consent Confidentiality Data Controller Data Privacy Notice Data Minimization Privacy Impact Assessment Cyber Attacks Data Protection Officer Malware Vulnerability Right to Access Data Storage Data Subject Integration Network Security Rights of Data Subjects Firewalls Cloud Security Risk Management Data Retention Right to rectify Containment Data Breach Cybersecurity Disclosure Ransomware Incident Report Penalties Rights of Data Subjects Cybersecurity Awareness Sensitive Personal Information Data Processing Data Processor Privacy Notice Phishing Integration Transparency National Privacy Commission Right to File a Complaint Right to Erasure Data Consent Anonymization Backup Privacy Policy Lawful Access Encryption Personal Data Access Control Compliance Strong Password Data Recovery Multi-Factor Authentication Data Breach Notification Right to Damages Data Security Identity Theft Consent Confidentiality Data Controller Data Privacy Notice Data Minimization Privacy Impact Assessment Cyber Attacks Data Protection Officer Malware Vulnerability Right to Access Data Storage Data Subject Integration Network Security Rights of Data Subjects Firewalls Cloud Security Risk Management Data Retention Right to rectify Containment Data Breach Cybersecurity Disclosure Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Report
Penalties
Rights of Data Subjects
Cybersecurity Awareness
Sensitive Personal Information
Data Processing
Data Processor
Privacy Notice
Phishing
Integration
Transparency
National Privacy Commission
Right to File a Complaint
Right to Erasure
Data Consent
Anonymization
Backup
Privacy Policy
Lawful Access
Encryption
Personal Data
Access Control
Compliance
Strong Password
Data Recovery
Multi-Factor Authentication
Data Breach Notification
Right to Damages
Data Security
Identity Theft
Consent
Confidentiality
Data Controller
Data Privacy Notice
Data Minimization
Privacy Impact Assessment
Cyber Attacks
Data Protection Officer
Malware
Vulnerability
Right to Access
Data Storage
Data Subject
Integration
Network Security
Rights of Data Subjects
Firewalls
Cloud Security
Risk Management
Data Retention
Right to rectify
Containment
Data Breach
Cybersecurity
Disclosure
Ransomware