Data Controller Data Storage Data Minimization Data Protection Officer Right to Damages Malware Data Consent Phishing Data Security Rights of Data Subjects Incident Report Integration Privacy Notice Consent Data Breach Compliance Encryption Rights of Data Subjects Personal Data Firewalls Ransomware Cyber Attacks Data Privacy Notice Risk Management Data Processor Right to File a Complaint Penalties Privacy Impact Assessment Confidentiality Cloud Security Data Processing Multi-Factor Authentication Data Breach Notification Access Control Network Security National Privacy Commission Strong Password Right to Erasure Containment Data Subject Identity Theft Data Recovery Privacy Policy Vulnerability Backup Disclosure Right to rectify Right to Access Cybersecurity Awareness Data Retention Cybersecurity Anonymization Transparency Lawful Access Integration Sensitive Personal Information Data Controller Data Storage Data Minimization Data Protection Officer Right to Damages Malware Data Consent Phishing Data Security Rights of Data Subjects Incident Report Integration Privacy Notice Consent Data Breach Compliance Encryption Rights of Data Subjects Personal Data Firewalls Ransomware Cyber Attacks Data Privacy Notice Risk Management Data Processor Right to File a Complaint Penalties Privacy Impact Assessment Confidentiality Cloud Security Data Processing Multi-Factor Authentication Data Breach Notification Access Control Network Security National Privacy Commission Strong Password Right to Erasure Containment Data Subject Identity Theft Data Recovery Privacy Policy Vulnerability Backup Disclosure Right to rectify Right to Access Cybersecurity Awareness Data Retention Cybersecurity Anonymization Transparency Lawful Access Integration Sensitive Personal Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Controller
Data Storage
Data Minimization
Data Protection Officer
Right to Damages
Malware
Data Consent
Phishing
Data Security
Rights of Data Subjects
Incident Report
Integration
Privacy Notice
Consent
Data Breach
Compliance
Encryption
Rights of Data Subjects
Personal Data
Firewalls
Ransomware
Cyber Attacks
Data Privacy Notice
Risk Management
Data Processor
Right to File a Complaint
Penalties
Privacy Impact Assessment
Confidentiality
Cloud Security
Data Processing
Multi-Factor Authentication
Data Breach Notification
Access Control
Network Security
National Privacy Commission
Strong Password
Right to Erasure
Containment
Data Subject
Identity Theft
Data Recovery
Privacy Policy
Vulnerability
Backup
Disclosure
Right to rectify
Right to Access
Cybersecurity Awareness
Data Retention
Cybersecurity
Anonymization
Transparency
Lawful Access
Integration
Sensitive Personal Information