Data Recovery Access Control Strong Password Data Controller Data Minimization Right to Damages Multi-Factor Authentication Data Protection Officer Compliance Privacy Notice Integration Data Subject Data Storage Privacy Impact Assessment Confidentiality Integration Data Breach Notification Backup Privacy Policy Right to Erasure Sensitive Personal Information Right to File a Complaint Cloud Security Malware Right to rectify Cyber Attacks Data Security Data Retention Phishing Containment National Privacy Commission Right to Access Firewalls Cybersecurity Awareness Encryption Identity Theft Rights of Data Subjects Personal Data Data Processor Data Consent Disclosure Data Privacy Notice Incident Report Penalties Ransomware Data Breach Data Processing Lawful Access Consent Cybersecurity Rights of Data Subjects Network Security Vulnerability Transparency Risk Management Anonymization Data Recovery Access Control Strong Password Data Controller Data Minimization Right to Damages Multi-Factor Authentication Data Protection Officer Compliance Privacy Notice Integration Data Subject Data Storage Privacy Impact Assessment Confidentiality Integration Data Breach Notification Backup Privacy Policy Right to Erasure Sensitive Personal Information Right to File a Complaint Cloud Security Malware Right to rectify Cyber Attacks Data Security Data Retention Phishing Containment National Privacy Commission Right to Access Firewalls Cybersecurity Awareness Encryption Identity Theft Rights of Data Subjects Personal Data Data Processor Data Consent Disclosure Data Privacy Notice Incident Report Penalties Ransomware Data Breach Data Processing Lawful Access Consent Cybersecurity Rights of Data Subjects Network Security Vulnerability Transparency Risk Management Anonymization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Recovery
Access Control
Strong Password
Data Controller
Data Minimization
Right to Damages
Multi-Factor Authentication
Data Protection Officer
Compliance
Privacy Notice
Integration
Data Subject
Data Storage
Privacy Impact Assessment
Confidentiality
Integration
Data Breach Notification
Backup
Privacy Policy
Right to Erasure
Sensitive Personal Information
Right to File a Complaint
Cloud Security
Malware
Right to rectify
Cyber Attacks
Data Security
Data Retention
Phishing
Containment
National Privacy Commission
Right to Access
Firewalls
Cybersecurity Awareness
Encryption
Identity Theft
Rights of Data Subjects
Personal Data
Data Processor
Data Consent
Disclosure
Data Privacy Notice
Incident Report
Penalties
Ransomware
Data Breach
Data Processing
Lawful Access
Consent
Cybersecurity
Rights of Data Subjects
Network Security
Vulnerability
Transparency
Risk Management
Anonymization