Network Security Right to Damages Right to File a Complaint Phishing Transparency Integration Data Processing Anonymization Right to Access Confidentiality Data Breach Malware Data Storage Privacy Notice Data Breach Notification Ransomware Penalties Rights of Data Subjects Backup Data Subject Rights of Data Subjects Data Privacy Notice Lawful Access Consent Risk Management Firewalls Multi-Factor Authentication Data Protection Officer Right to rectify Data Minimization Privacy Policy Personal Data National Privacy Commission Cybersecurity Awareness Data Retention Integration Strong Password Cyber Attacks Compliance Incident Report Identity Theft Cybersecurity Data Security Right to Erasure Data Controller Sensitive Personal Information Disclosure Vulnerability Data Consent Cloud Security Containment Encryption Access Control Data Processor Privacy Impact Assessment Data Recovery Network Security Right to Damages Right to File a Complaint Phishing Transparency Integration Data Processing Anonymization Right to Access Confidentiality Data Breach Malware Data Storage Privacy Notice Data Breach Notification Ransomware Penalties Rights of Data Subjects Backup Data Subject Rights of Data Subjects Data Privacy Notice Lawful Access Consent Risk Management Firewalls Multi-Factor Authentication Data Protection Officer Right to rectify Data Minimization Privacy Policy Personal Data National Privacy Commission Cybersecurity Awareness Data Retention Integration Strong Password Cyber Attacks Compliance Incident Report Identity Theft Cybersecurity Data Security Right to Erasure Data Controller Sensitive Personal Information Disclosure Vulnerability Data Consent Cloud Security Containment Encryption Access Control Data Processor Privacy Impact Assessment Data Recovery
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Network Security
Right to Damages
Right to File a Complaint
Phishing
Transparency
Integration
Data Processing
Anonymization
Right to Access
Confidentiality
Data Breach
Malware
Data Storage
Privacy Notice
Data Breach Notification
Ransomware
Penalties
Rights of Data Subjects
Backup
Data Subject
Rights of Data Subjects
Data Privacy Notice
Lawful Access
Consent
Risk Management
Firewalls
Multi-Factor Authentication
Data Protection Officer
Right to rectify
Data Minimization
Privacy Policy
Personal Data
National Privacy Commission
Cybersecurity Awareness
Data Retention
Integration
Strong Password
Cyber Attacks
Compliance
Incident Report
Identity Theft
Cybersecurity
Data Security
Right to Erasure
Data Controller
Sensitive Personal Information
Disclosure
Vulnerability
Data Consent
Cloud Security
Containment
Encryption
Access Control
Data Processor
Privacy Impact Assessment
Data Recovery