Containment Backup Cyber Attacks Right to Damages Data Recovery Strong Password Anonymization Data Subject Right to Access Data Minimization Data Controller Data Privacy Notice Data Breach Disclosure Privacy Policy Vulnerability National Privacy Commission Network Security Lawful Access Privacy Impact Assessment Ransomware Integration Penalties Access Control Data Processing Integration Data Breach Notification Data Consent Consent Encryption Right to File a Complaint Privacy Notice Cybersecurity Personal Data Data Storage Data Protection Officer Cloud Security Firewalls Rights of Data Subjects Malware Identity Theft Data Security Phishing Data Retention Rights of Data Subjects Sensitive Personal Information Cybersecurity Awareness Risk Management Right to Erasure Compliance Transparency Multi-Factor Authentication Right to rectify Confidentiality Data Processor Incident Report Containment Backup Cyber Attacks Right to Damages Data Recovery Strong Password Anonymization Data Subject Right to Access Data Minimization Data Controller Data Privacy Notice Data Breach Disclosure Privacy Policy Vulnerability National Privacy Commission Network Security Lawful Access Privacy Impact Assessment Ransomware Integration Penalties Access Control Data Processing Integration Data Breach Notification Data Consent Consent Encryption Right to File a Complaint Privacy Notice Cybersecurity Personal Data Data Storage Data Protection Officer Cloud Security Firewalls Rights of Data Subjects Malware Identity Theft Data Security Phishing Data Retention Rights of Data Subjects Sensitive Personal Information Cybersecurity Awareness Risk Management Right to Erasure Compliance Transparency Multi-Factor Authentication Right to rectify Confidentiality Data Processor Incident Report
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Containment
Backup
Cyber Attacks
Right to Damages
Data Recovery
Strong Password
Anonymization
Data Subject
Right to Access
Data Minimization
Data Controller
Data Privacy Notice
Data Breach
Disclosure
Privacy Policy
Vulnerability
National Privacy Commission
Network Security
Lawful Access
Privacy Impact Assessment
Ransomware
Integration
Penalties
Access Control
Data Processing
Integration
Data Breach Notification
Data Consent
Consent
Encryption
Right to File a Complaint
Privacy Notice
Cybersecurity
Personal Data
Data Storage
Data Protection Officer
Cloud Security
Firewalls
Rights of Data Subjects
Malware
Identity Theft
Data Security
Phishing
Data Retention
Rights of Data Subjects
Sensitive Personal Information
Cybersecurity Awareness
Risk Management
Right to Erasure
Compliance
Transparency
Multi-Factor Authentication
Right to rectify
Confidentiality
Data Processor
Incident Report