Transparency Data Controller Multi-Factor Authentication Anonymization Risk Management Data Processing Compliance Vulnerability Data Privacy Notice Data Retention Consent Personal Data Data Protection Officer Penalties Disclosure Data Minimization Identity Theft Lawful Access Encryption Privacy Policy Data Processor National Privacy Commission Data Consent Integration Firewalls Cloud Security Data Recovery Incident Report Containment Right to Erasure Right to rectify Sensitive Personal Information Phishing Strong Password Network Security Access Control Cybersecurity Data Security Right to File a Complaint Data Subject Confidentiality Data Breach Right to Access Rights of Data Subjects Cyber Attacks Privacy Notice Rights of Data Subjects Privacy Impact Assessment Integration Data Breach Notification Malware Cybersecurity Awareness Data Storage Backup Ransomware Right to Damages Transparency Data Controller Multi-Factor Authentication Anonymization Risk Management Data Processing Compliance Vulnerability Data Privacy Notice Data Retention Consent Personal Data Data Protection Officer Penalties Disclosure Data Minimization Identity Theft Lawful Access Encryption Privacy Policy Data Processor National Privacy Commission Data Consent Integration Firewalls Cloud Security Data Recovery Incident Report Containment Right to Erasure Right to rectify Sensitive Personal Information Phishing Strong Password Network Security Access Control Cybersecurity Data Security Right to File a Complaint Data Subject Confidentiality Data Breach Right to Access Rights of Data Subjects Cyber Attacks Privacy Notice Rights of Data Subjects Privacy Impact Assessment Integration Data Breach Notification Malware Cybersecurity Awareness Data Storage Backup Ransomware Right to Damages
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Transparency
Data Controller
Multi-Factor Authentication
Anonymization
Risk Management
Data Processing
Compliance
Vulnerability
Data Privacy Notice
Data Retention
Consent
Personal Data
Data Protection Officer
Penalties
Disclosure
Data Minimization
Identity Theft
Lawful Access
Encryption
Privacy Policy
Data Processor
National Privacy Commission
Data Consent
Integration
Firewalls
Cloud Security
Data Recovery
Incident Report
Containment
Right to Erasure
Right to rectify
Sensitive Personal Information
Phishing
Strong Password
Network Security
Access Control
Cybersecurity
Data Security
Right to File a Complaint
Data Subject
Confidentiality
Data Breach
Right to Access
Rights of Data Subjects
Cyber Attacks
Privacy Notice
Rights of Data Subjects
Privacy Impact Assessment
Integration
Data Breach Notification
Malware
Cybersecurity Awareness
Data Storage
Backup
Ransomware
Right to Damages