Rights of Data Subjects Integration Risk Management Right to rectify Data Processor Personal Data Consent Access Control Right to Access Privacy Notice Penalties Compliance Confidentiality Ransomware Anonymization Firewalls Right to File a Complaint Data Protection Officer Data Consent Data Privacy Notice Network Security Cyber Attacks Cybersecurity Awareness Data Minimization National Privacy Commission Right to Erasure Malware Privacy Policy Vulnerability Transparency Data Retention Data Subject Privacy Impact Assessment Data Storage Data Processing Cloud Security Data Recovery Data Breach Notification Data Controller Multi-Factor Authentication Cybersecurity Phishing Identity Theft Lawful Access Strong Password Data Security Sensitive Personal Information Disclosure Encryption Rights of Data Subjects Data Breach Integration Backup Right to Damages Incident Report Containment Rights of Data Subjects Integration Risk Management Right to rectify Data Processor Personal Data Consent Access Control Right to Access Privacy Notice Penalties Compliance Confidentiality Ransomware Anonymization Firewalls Right to File a Complaint Data Protection Officer Data Consent Data Privacy Notice Network Security Cyber Attacks Cybersecurity Awareness Data Minimization National Privacy Commission Right to Erasure Malware Privacy Policy Vulnerability Transparency Data Retention Data Subject Privacy Impact Assessment Data Storage Data Processing Cloud Security Data Recovery Data Breach Notification Data Controller Multi-Factor Authentication Cybersecurity Phishing Identity Theft Lawful Access Strong Password Data Security Sensitive Personal Information Disclosure Encryption Rights of Data Subjects Data Breach Integration Backup Right to Damages Incident Report Containment
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Rights of Data Subjects
Integration
Risk Management
Right to rectify
Data Processor
Personal Data
Consent
Access Control
Right to Access
Privacy Notice
Penalties
Compliance
Confidentiality
Ransomware
Anonymization
Firewalls
Right to File a Complaint
Data Protection Officer
Data Consent
Data Privacy Notice
Network Security
Cyber Attacks
Cybersecurity Awareness
Data Minimization
National Privacy Commission
Right to Erasure
Malware
Privacy Policy
Vulnerability
Transparency
Data Retention
Data Subject
Privacy Impact Assessment
Data Storage
Data Processing
Cloud Security
Data Recovery
Data Breach Notification
Data Controller
Multi-Factor Authentication
Cybersecurity
Phishing
Identity Theft
Lawful Access
Strong Password
Data Security
Sensitive Personal Information
Disclosure
Encryption
Rights of Data Subjects
Data Breach
Integration
Backup
Right to Damages
Incident Report
Containment