Firewalls Sensitive Personal Information Identity Theft Right to Damages Rights of Data Subjects Confidentiality Data Breach Notification Penalties Privacy Policy Containment Data Retention Access Control Cybersecurity Data Minimization Data Subject Data Storage Multi-Factor Authentication Risk Management Data Processor Integration Right to Erasure Phishing Cloud Security Personal Data Rights of Data Subjects Cyber Attacks National Privacy Commission Vulnerability Data Security Data Breach Lawful Access Data Recovery Privacy Impact Assessment Network Security Consent Right to Access Data Processing Malware Encryption Data Privacy Notice Disclosure Incident Report Anonymization Data Controller Right to rectify Right to File a Complaint Backup Integration Privacy Notice Data Protection Officer Data Consent Strong Password Transparency Compliance Ransomware Cybersecurity Awareness Firewalls Sensitive Personal Information Identity Theft Right to Damages Rights of Data Subjects Confidentiality Data Breach Notification Penalties Privacy Policy Containment Data Retention Access Control Cybersecurity Data Minimization Data Subject Data Storage Multi-Factor Authentication Risk Management Data Processor Integration Right to Erasure Phishing Cloud Security Personal Data Rights of Data Subjects Cyber Attacks National Privacy Commission Vulnerability Data Security Data Breach Lawful Access Data Recovery Privacy Impact Assessment Network Security Consent Right to Access Data Processing Malware Encryption Data Privacy Notice Disclosure Incident Report Anonymization Data Controller Right to rectify Right to File a Complaint Backup Integration Privacy Notice Data Protection Officer Data Consent Strong Password Transparency Compliance Ransomware Cybersecurity Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewalls
Sensitive Personal Information
Identity Theft
Right to Damages
Rights of Data Subjects
Confidentiality
Data Breach Notification
Penalties
Privacy Policy
Containment
Data Retention
Access Control
Cybersecurity
Data Minimization
Data Subject
Data Storage
Multi-Factor Authentication
Risk Management
Data Processor
Integration
Right to Erasure
Phishing
Cloud Security
Personal Data
Rights of Data Subjects
Cyber Attacks
National Privacy Commission
Vulnerability
Data Security
Data Breach
Lawful Access
Data Recovery
Privacy Impact Assessment
Network Security
Consent
Right to Access
Data Processing
Malware
Encryption
Data Privacy Notice
Disclosure
Incident Report
Anonymization
Data Controller
Right to rectify
Right to File a Complaint
Backup
Integration
Privacy Notice
Data Protection Officer
Data Consent
Strong Password
Transparency
Compliance
Ransomware
Cybersecurity Awareness