Data Minimization Multi-Factor Authentication Rights of Data Subjects Cyber Attacks Ransomware Vulnerability Data Subject Identity Theft Personal Data Right to Damages Disclosure Data Privacy Notice Compliance Privacy Notice Backup Data Processor Lawful Access Anonymization Malware Privacy Impact Assessment Data Controller Transparency Data Security Firewalls Phishing Data Protection Officer Right to Access Access Control Data Consent Data Processing Data Breach Cloud Security Cybersecurity Awareness Data Recovery Encryption Penalties Privacy Policy Integration Data Breach Notification Sensitive Personal Information Right to rectify Containment National Privacy Commission Incident Report Cybersecurity Risk Management Data Retention Rights of Data Subjects Network Security Right to Erasure Strong Password Consent Confidentiality Data Storage Right to File a Complaint Integration Data Minimization Multi-Factor Authentication Rights of Data Subjects Cyber Attacks Ransomware Vulnerability Data Subject Identity Theft Personal Data Right to Damages Disclosure Data Privacy Notice Compliance Privacy Notice Backup Data Processor Lawful Access Anonymization Malware Privacy Impact Assessment Data Controller Transparency Data Security Firewalls Phishing Data Protection Officer Right to Access Access Control Data Consent Data Processing Data Breach Cloud Security Cybersecurity Awareness Data Recovery Encryption Penalties Privacy Policy Integration Data Breach Notification Sensitive Personal Information Right to rectify Containment National Privacy Commission Incident Report Cybersecurity Risk Management Data Retention Rights of Data Subjects Network Security Right to Erasure Strong Password Consent Confidentiality Data Storage Right to File a Complaint Integration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Minimization
Multi-Factor Authentication
Rights of Data Subjects
Cyber Attacks
Ransomware
Vulnerability
Data Subject
Identity Theft
Personal Data
Right to Damages
Disclosure
Data Privacy Notice
Compliance
Privacy Notice
Backup
Data Processor
Lawful Access
Anonymization
Malware
Privacy Impact Assessment
Data Controller
Transparency
Data Security
Firewalls
Phishing
Data Protection Officer
Right to Access
Access Control
Data Consent
Data Processing
Data Breach
Cloud Security
Cybersecurity Awareness
Data Recovery
Encryption
Penalties
Privacy Policy
Integration
Data Breach Notification
Sensitive Personal Information
Right to rectify
Containment
National Privacy Commission
Incident Report
Cybersecurity
Risk Management
Data Retention
Rights of Data Subjects
Network Security
Right to Erasure
Strong Password
Consent
Confidentiality
Data Storage
Right to File a Complaint
Integration