Disclosure Firewalls Right to Access Rights of Data Subjects Penalties Data Processing National Privacy Commission Vulnerability Encryption Privacy Notice Transparency Network Security Malware Cyber Attacks Right to rectify Data Breach Data Controller Rights of Data Subjects Data Consent Containment Data Breach Notification Data Processor Privacy Impact Assessment Access Control Data Subject Strong Password Right to Damages Compliance Integration Data Retention Data Protection Officer Incident Report Privacy Policy Lawful Access Right to Erasure Confidentiality Integration Data Privacy Notice Personal Data Right to File a Complaint Data Minimization Phishing Cybersecurity Consent Data Storage Anonymization Sensitive Personal Information Ransomware Identity Theft Cybersecurity Awareness Multi-Factor Authentication Backup Data Recovery Data Security Risk Management Cloud Security Disclosure Firewalls Right to Access Rights of Data Subjects Penalties Data Processing National Privacy Commission Vulnerability Encryption Privacy Notice Transparency Network Security Malware Cyber Attacks Right to rectify Data Breach Data Controller Rights of Data Subjects Data Consent Containment Data Breach Notification Data Processor Privacy Impact Assessment Access Control Data Subject Strong Password Right to Damages Compliance Integration Data Retention Data Protection Officer Incident Report Privacy Policy Lawful Access Right to Erasure Confidentiality Integration Data Privacy Notice Personal Data Right to File a Complaint Data Minimization Phishing Cybersecurity Consent Data Storage Anonymization Sensitive Personal Information Ransomware Identity Theft Cybersecurity Awareness Multi-Factor Authentication Backup Data Recovery Data Security Risk Management Cloud Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Disclosure
Firewalls
Right to Access
Rights of Data Subjects
Penalties
Data Processing
National Privacy Commission
Vulnerability
Encryption
Privacy Notice
Transparency
Network Security
Malware
Cyber Attacks
Right to rectify
Data Breach
Data Controller
Rights of Data Subjects
Data Consent
Containment
Data Breach Notification
Data Processor
Privacy Impact Assessment
Access Control
Data Subject
Strong Password
Right to Damages
Compliance
Integration
Data Retention
Data Protection Officer
Incident Report
Privacy Policy
Lawful Access
Right to Erasure
Confidentiality
Integration
Data Privacy Notice
Personal Data
Right to File a Complaint
Data Minimization
Phishing
Cybersecurity
Consent
Data Storage
Anonymization
Sensitive Personal Information
Ransomware
Identity Theft
Cybersecurity Awareness
Multi-Factor Authentication
Backup
Data Recovery
Data Security
Risk Management
Cloud Security