Rights of Data Subjects Data Subject Lawful Access Data Controller Containment Privacy Policy Vulnerability Privacy Impact Assessment Ransomware Anonymization Data Privacy Notice Right to Access Data Processor Integration Network Security Access Control Sensitive Personal Information Encryption Transparency Data Retention Data Minimization Data Storage Cybersecurity Awareness Right to rectify Disclosure Cyber Attacks Malware Consent Personal Data Data Breach Notification Right to Damages Cloud Security Data Consent Integration Data Breach Confidentiality Right to File a Complaint Backup Phishing Multi-Factor Authentication Compliance Identity Theft Data Recovery Data Security Penalties Right to Erasure Risk Management Privacy Notice Rights of Data Subjects Data Processing Cybersecurity Strong Password Firewalls National Privacy Commission Data Protection Officer Incident Report Rights of Data Subjects Data Subject Lawful Access Data Controller Containment Privacy Policy Vulnerability Privacy Impact Assessment Ransomware Anonymization Data Privacy Notice Right to Access Data Processor Integration Network Security Access Control Sensitive Personal Information Encryption Transparency Data Retention Data Minimization Data Storage Cybersecurity Awareness Right to rectify Disclosure Cyber Attacks Malware Consent Personal Data Data Breach Notification Right to Damages Cloud Security Data Consent Integration Data Breach Confidentiality Right to File a Complaint Backup Phishing Multi-Factor Authentication Compliance Identity Theft Data Recovery Data Security Penalties Right to Erasure Risk Management Privacy Notice Rights of Data Subjects Data Processing Cybersecurity Strong Password Firewalls National Privacy Commission Data Protection Officer Incident Report
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Rights of Data Subjects
Data Subject
Lawful Access
Data Controller
Containment
Privacy Policy
Vulnerability
Privacy Impact Assessment
Ransomware
Anonymization
Data Privacy Notice
Right to Access
Data Processor
Integration
Network Security
Access Control
Sensitive Personal Information
Encryption
Transparency
Data Retention
Data Minimization
Data Storage
Cybersecurity Awareness
Right to rectify
Disclosure
Cyber Attacks
Malware
Consent
Personal Data
Data Breach Notification
Right to Damages
Cloud Security
Data Consent
Integration
Data Breach
Confidentiality
Right to File a Complaint
Backup
Phishing
Multi-Factor Authentication
Compliance
Identity Theft
Data Recovery
Data Security
Penalties
Right to Erasure
Risk Management
Privacy Notice
Rights of Data Subjects
Data Processing
Cybersecurity
Strong Password
Firewalls
National Privacy Commission
Data Protection Officer
Incident Report