Right to Access Data Processor Data Storage Data Processing Consent Data Security Malware Cybersecurity Ransomware Right to rectify Data Protection Officer National Privacy Commission Privacy Impact Assessment Integration Lawful Access Confidentiality Cloud Security Firewalls Data Controller Transparency Integration Identity Theft Right to File a Complaint Data Privacy Notice Access Control Data Breach Data Retention Incident Report Vulnerability Data Consent Right to Damages Network Security Right to Erasure Sensitive Personal Information Privacy Notice Encryption Cyber Attacks Anonymization Cybersecurity Awareness Data Minimization Backup Rights of Data Subjects Privacy Policy Data Subject Compliance Personal Data Penalties Strong Password Rights of Data Subjects Data Breach Notification Risk Management Phishing Containment Data Recovery Disclosure Multi-Factor Authentication Right to Access Data Processor Data Storage Data Processing Consent Data Security Malware Cybersecurity Ransomware Right to rectify Data Protection Officer National Privacy Commission Privacy Impact Assessment Integration Lawful Access Confidentiality Cloud Security Firewalls Data Controller Transparency Integration Identity Theft Right to File a Complaint Data Privacy Notice Access Control Data Breach Data Retention Incident Report Vulnerability Data Consent Right to Damages Network Security Right to Erasure Sensitive Personal Information Privacy Notice Encryption Cyber Attacks Anonymization Cybersecurity Awareness Data Minimization Backup Rights of Data Subjects Privacy Policy Data Subject Compliance Personal Data Penalties Strong Password Rights of Data Subjects Data Breach Notification Risk Management Phishing Containment Data Recovery Disclosure Multi-Factor Authentication
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Right to Access
Data Processor
Data Storage
Data Processing
Consent
Data Security
Malware
Cybersecurity
Ransomware
Right to rectify
Data Protection Officer
National Privacy Commission
Privacy Impact Assessment
Integration
Lawful Access
Confidentiality
Cloud Security
Firewalls
Data Controller
Transparency
Integration
Identity Theft
Right to File a Complaint
Data Privacy Notice
Access Control
Data Breach
Data Retention
Incident Report
Vulnerability
Data Consent
Right to Damages
Network Security
Right to Erasure
Sensitive Personal Information
Privacy Notice
Encryption
Cyber Attacks
Anonymization
Cybersecurity Awareness
Data Minimization
Backup
Rights of Data Subjects
Privacy Policy
Data Subject
Compliance
Personal Data
Penalties
Strong Password
Rights of Data Subjects
Data Breach Notification
Risk Management
Phishing
Containment
Data Recovery
Disclosure
Multi-Factor Authentication