Data Minimization Data Protection Officer Strong Password Cybersecurity Awareness Backup Data Privacy Notice Privacy Policy Integration Data Retention Vulnerability National Privacy Commission Disclosure Network Security Transparency Phishing Data Consent Access Control Lawful Access Data Subject Privacy Impact Assessment Right to File a Complaint Anonymization Data Processor Confidentiality Firewalls Right to Damages Data Recovery Multi-Factor Authentication Identity Theft Compliance Privacy Notice Data Storage Right to rectify Penalties Malware Rights of Data Subjects Data Controller Data Security Ransomware Incident Report Containment Data Breach Consent Rights of Data Subjects Data Breach Notification Right to Access Right to Erasure Cloud Security Encryption Integration Risk Management Data Processing Cybersecurity Cyber Attacks Personal Data Sensitive Personal Information Data Minimization Data Protection Officer Strong Password Cybersecurity Awareness Backup Data Privacy Notice Privacy Policy Integration Data Retention Vulnerability National Privacy Commission Disclosure Network Security Transparency Phishing Data Consent Access Control Lawful Access Data Subject Privacy Impact Assessment Right to File a Complaint Anonymization Data Processor Confidentiality Firewalls Right to Damages Data Recovery Multi-Factor Authentication Identity Theft Compliance Privacy Notice Data Storage Right to rectify Penalties Malware Rights of Data Subjects Data Controller Data Security Ransomware Incident Report Containment Data Breach Consent Rights of Data Subjects Data Breach Notification Right to Access Right to Erasure Cloud Security Encryption Integration Risk Management Data Processing Cybersecurity Cyber Attacks Personal Data Sensitive Personal Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Minimization
Data Protection Officer
Strong Password
Cybersecurity Awareness
Backup
Data Privacy Notice
Privacy Policy
Integration
Data Retention
Vulnerability
National Privacy Commission
Disclosure
Network Security
Transparency
Phishing
Data Consent
Access Control
Lawful Access
Data Subject
Privacy Impact Assessment
Right to File a Complaint
Anonymization
Data Processor
Confidentiality
Firewalls
Right to Damages
Data Recovery
Multi-Factor Authentication
Identity Theft
Compliance
Privacy Notice
Data Storage
Right to rectify
Penalties
Malware
Rights of Data Subjects
Data Controller
Data Security
Ransomware
Incident Report
Containment
Data Breach
Consent
Rights of Data Subjects
Data Breach Notification
Right to Access
Right to Erasure
Cloud Security
Encryption
Integration
Risk Management
Data Processing
Cybersecurity
Cyber Attacks
Personal Data
Sensitive Personal Information