Data Storage Cyber Attacks Right to File a Complaint Consent Firewalls Malware Data Breach Notification Cloud Security Cybersecurity Disclosure Privacy Notice Data Controller Multi-Factor Authentication Right to Access Data Subject Data Breach Data Processor Right to Damages Strong Password Data Protection Officer Data Retention Data Processing Privacy Policy Data Privacy Notice Vulnerability Encryption Rights of Data Subjects Incident Report Containment Data Security Rights of Data Subjects Penalties Personal Data Phishing Data Recovery Privacy Impact Assessment Sensitive Personal Information National Privacy Commission Identity Theft Anonymization Ransomware Transparency Data Consent Network Security Access Control Confidentiality Compliance Right to Erasure Lawful Access Risk Management Cybersecurity Awareness Integration Backup Data Minimization Integration Right to rectify Data Storage Cyber Attacks Right to File a Complaint Consent Firewalls Malware Data Breach Notification Cloud Security Cybersecurity Disclosure Privacy Notice Data Controller Multi-Factor Authentication Right to Access Data Subject Data Breach Data Processor Right to Damages Strong Password Data Protection Officer Data Retention Data Processing Privacy Policy Data Privacy Notice Vulnerability Encryption Rights of Data Subjects Incident Report Containment Data Security Rights of Data Subjects Penalties Personal Data Phishing Data Recovery Privacy Impact Assessment Sensitive Personal Information National Privacy Commission Identity Theft Anonymization Ransomware Transparency Data Consent Network Security Access Control Confidentiality Compliance Right to Erasure Lawful Access Risk Management Cybersecurity Awareness Integration Backup Data Minimization Integration Right to rectify
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Storage
Cyber Attacks
Right to File a Complaint
Consent
Firewalls
Malware
Data Breach Notification
Cloud Security
Cybersecurity
Disclosure
Privacy Notice
Data Controller
Multi-Factor Authentication
Right to Access
Data Subject
Data Breach
Data Processor
Right to Damages
Strong Password
Data Protection Officer
Data Retention
Data Processing
Privacy Policy
Data Privacy Notice
Vulnerability
Encryption
Rights of Data Subjects
Incident Report
Containment
Data Security
Rights of Data Subjects
Penalties
Personal Data
Phishing
Data Recovery
Privacy Impact Assessment
Sensitive Personal Information
National Privacy Commission
Identity Theft
Anonymization
Ransomware
Transparency
Data Consent
Network Security
Access Control
Confidentiality
Compliance
Right to Erasure
Lawful Access
Risk Management
Cybersecurity Awareness
Integration
Backup
Data Minimization
Integration
Right to rectify