Cybersecurity Data Breach Notification Strong Password Risk Management Privacy Impact Assessment Integration Consent Data Recovery Firewalls Data Controller Disclosure Identity Theft Data Breach Backup Rights of Data Subjects Incident Report Right to rectify Network Security Data Subject Cloud Security Privacy Policy Cybersecurity Awareness Penalties Data Consent Multi-Factor Authentication Data Privacy Notice Anonymization Privacy Notice Access Control National Privacy Commission Encryption Data Processing Integration Sensitive Personal Information Containment Transparency Ransomware Data Processor Malware Data Retention Data Security Rights of Data Subjects Confidentiality Cyber Attacks Data Storage Right to Damages Lawful Access Right to File a Complaint Right to Erasure Vulnerability Data Minimization Right to Access Data Protection Officer Compliance Personal Data Phishing Cybersecurity Data Breach Notification Strong Password Risk Management Privacy Impact Assessment Integration Consent Data Recovery Firewalls Data Controller Disclosure Identity Theft Data Breach Backup Rights of Data Subjects Incident Report Right to rectify Network Security Data Subject Cloud Security Privacy Policy Cybersecurity Awareness Penalties Data Consent Multi-Factor Authentication Data Privacy Notice Anonymization Privacy Notice Access Control National Privacy Commission Encryption Data Processing Integration Sensitive Personal Information Containment Transparency Ransomware Data Processor Malware Data Retention Data Security Rights of Data Subjects Confidentiality Cyber Attacks Data Storage Right to Damages Lawful Access Right to File a Complaint Right to Erasure Vulnerability Data Minimization Right to Access Data Protection Officer Compliance Personal Data Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity
Data Breach Notification
Strong Password
Risk Management
Privacy Impact Assessment
Integration
Consent
Data Recovery
Firewalls
Data Controller
Disclosure
Identity Theft
Data Breach
Backup
Rights of Data Subjects
Incident Report
Right to rectify
Network Security
Data Subject
Cloud Security
Privacy Policy
Cybersecurity Awareness
Penalties
Data Consent
Multi-Factor Authentication
Data Privacy Notice
Anonymization
Privacy Notice
Access Control
National Privacy Commission
Encryption
Data Processing
Integration
Sensitive Personal Information
Containment
Transparency
Ransomware
Data Processor
Malware
Data Retention
Data Security
Rights of Data Subjects
Confidentiality
Cyber Attacks
Data Storage
Right to Damages
Lawful Access
Right to File a Complaint
Right to Erasure
Vulnerability
Data Minimization
Right to Access
Data Protection Officer
Compliance
Personal Data
Phishing