Data Privacy Notice Data Minimization Rights of Data Subjects Risk Management Identity Theft Cloud Security Strong Password Privacy Impact Assessment Multi-Factor Authentication Containment Transparency Malware Disclosure Access Control Right to rectify Privacy Notice Rights of Data Subjects Privacy Policy Network Security Firewalls Data Consent Anonymization Ransomware Data Processing Cyber Attacks Sensitive Personal Information Cybersecurity Data Protection Officer Right to Access Data Controller Right to Erasure Backup Right to Damages Data Breach Notification National Privacy Commission Cybersecurity Awareness Incident Report Consent Personal Data Compliance Right to File a Complaint Data Subject Phishing Data Retention Integration Vulnerability Data Breach Data Processor Encryption Data Recovery Integration Lawful Access Data Security Data Storage Confidentiality Penalties Data Privacy Notice Data Minimization Rights of Data Subjects Risk Management Identity Theft Cloud Security Strong Password Privacy Impact Assessment Multi-Factor Authentication Containment Transparency Malware Disclosure Access Control Right to rectify Privacy Notice Rights of Data Subjects Privacy Policy Network Security Firewalls Data Consent Anonymization Ransomware Data Processing Cyber Attacks Sensitive Personal Information Cybersecurity Data Protection Officer Right to Access Data Controller Right to Erasure Backup Right to Damages Data Breach Notification National Privacy Commission Cybersecurity Awareness Incident Report Consent Personal Data Compliance Right to File a Complaint Data Subject Phishing Data Retention Integration Vulnerability Data Breach Data Processor Encryption Data Recovery Integration Lawful Access Data Security Data Storage Confidentiality Penalties
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Privacy Notice
Data Minimization
Rights of Data Subjects
Risk Management
Identity Theft
Cloud Security
Strong Password
Privacy Impact Assessment
Multi-Factor Authentication
Containment
Transparency
Malware
Disclosure
Access Control
Right to rectify
Privacy Notice
Rights of Data Subjects
Privacy Policy
Network Security
Firewalls
Data Consent
Anonymization
Ransomware
Data Processing
Cyber Attacks
Sensitive Personal Information
Cybersecurity
Data Protection Officer
Right to Access
Data Controller
Right to Erasure
Backup
Right to Damages
Data Breach Notification
National Privacy Commission
Cybersecurity Awareness
Incident Report
Consent
Personal Data
Compliance
Right to File a Complaint
Data Subject
Phishing
Data Retention
Integration
Vulnerability
Data Breach
Data Processor
Encryption
Data Recovery
Integration
Lawful Access
Data Security
Data Storage
Confidentiality
Penalties