Cybersecurity Multi-Factor Authentication Data Subject Privacy Notice Data Minimization Confidentiality Risk Management Data Consent Cybersecurity Awareness Strong Password Data Breach Notification Consent Right to rectify Data Storage Data Breach Compliance Data Privacy Notice Right to Access Cyber Attacks Disclosure National Privacy Commission Firewalls Data Controller Incident Report Integration Rights of Data Subjects Ransomware Transparency Rights of Data Subjects Privacy Impact Assessment Right to Erasure Containment Malware Data Recovery Access Control Sensitive Personal Information Data Security Anonymization Data Processor Cloud Security Right to Damages Penalties Integration Phishing Encryption Data Protection Officer Identity Theft Backup Network Security Privacy Policy Vulnerability Data Processing Right to File a Complaint Lawful Access Data Retention Personal Data Cybersecurity Multi-Factor Authentication Data Subject Privacy Notice Data Minimization Confidentiality Risk Management Data Consent Cybersecurity Awareness Strong Password Data Breach Notification Consent Right to rectify Data Storage Data Breach Compliance Data Privacy Notice Right to Access Cyber Attacks Disclosure National Privacy Commission Firewalls Data Controller Incident Report Integration Rights of Data Subjects Ransomware Transparency Rights of Data Subjects Privacy Impact Assessment Right to Erasure Containment Malware Data Recovery Access Control Sensitive Personal Information Data Security Anonymization Data Processor Cloud Security Right to Damages Penalties Integration Phishing Encryption Data Protection Officer Identity Theft Backup Network Security Privacy Policy Vulnerability Data Processing Right to File a Complaint Lawful Access Data Retention Personal Data
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity
Multi-Factor Authentication
Data Subject
Privacy Notice
Data Minimization
Confidentiality
Risk Management
Data Consent
Cybersecurity Awareness
Strong Password
Data Breach Notification
Consent
Right to rectify
Data Storage
Data Breach
Compliance
Data Privacy Notice
Right to Access
Cyber Attacks
Disclosure
National Privacy Commission
Firewalls
Data Controller
Incident Report
Integration
Rights of Data Subjects
Ransomware
Transparency
Rights of Data Subjects
Privacy Impact Assessment
Right to Erasure
Containment
Malware
Data Recovery
Access Control
Sensitive Personal Information
Data Security
Anonymization
Data Processor
Cloud Security
Right to Damages
Penalties
Integration
Phishing
Encryption
Data Protection Officer
Identity Theft
Backup
Network Security
Privacy Policy
Vulnerability
Data Processing
Right to File a Complaint
Lawful Access
Data Retention
Personal Data