Right to rectify Right to File a Complaint Data Minimization Ransomware Data Retention Confidentiality Data Security Data Recovery Integration Data Breach Notification Privacy Impact Assessment Containment Cybersecurity Awareness Backup Right to Access Vulnerability Malware Cybersecurity Data Processing Data Consent Phishing Access Control Compliance Risk Management Sensitive Personal Information Cloud Security Firewalls Privacy Policy Incident Report Data Storage Transparency Disclosure Multi-Factor Authentication Data Privacy Notice Data Subject Consent Cyber Attacks Encryption Integration Rights of Data Subjects Data Breach Privacy Notice Penalties Data Protection Officer Lawful Access Right to Damages Data Processor Anonymization National Privacy Commission Network Security Personal Data Strong Password Identity Theft Data Controller Right to Erasure Rights of Data Subjects Right to rectify Right to File a Complaint Data Minimization Ransomware Data Retention Confidentiality Data Security Data Recovery Integration Data Breach Notification Privacy Impact Assessment Containment Cybersecurity Awareness Backup Right to Access Vulnerability Malware Cybersecurity Data Processing Data Consent Phishing Access Control Compliance Risk Management Sensitive Personal Information Cloud Security Firewalls Privacy Policy Incident Report Data Storage Transparency Disclosure Multi-Factor Authentication Data Privacy Notice Data Subject Consent Cyber Attacks Encryption Integration Rights of Data Subjects Data Breach Privacy Notice Penalties Data Protection Officer Lawful Access Right to Damages Data Processor Anonymization National Privacy Commission Network Security Personal Data Strong Password Identity Theft Data Controller Right to Erasure Rights of Data Subjects
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Right to rectify
Right to File a Complaint
Data Minimization
Ransomware
Data Retention
Confidentiality
Data Security
Data Recovery
Integration
Data Breach Notification
Privacy Impact Assessment
Containment
Cybersecurity Awareness
Backup
Right to Access
Vulnerability
Malware
Cybersecurity
Data Processing
Data Consent
Phishing
Access Control
Compliance
Risk Management
Sensitive Personal Information
Cloud Security
Firewalls
Privacy Policy
Incident Report
Data Storage
Transparency
Disclosure
Multi-Factor Authentication
Data Privacy Notice
Data Subject
Consent
Cyber Attacks
Encryption
Integration
Rights of Data Subjects
Data Breach
Privacy Notice
Penalties
Data Protection Officer
Lawful Access
Right to Damages
Data Processor
Anonymization
National Privacy Commission
Network Security
Personal Data
Strong Password
Identity Theft
Data Controller
Right to Erasure
Rights of Data Subjects