Firewalls Right to rectify Lawful Access Penalties Cybersecurity Privacy Impact Assessment Right to Access Data Recovery Identity Theft Compliance Vulnerability Backup Cyber Attacks Containment Multi-Factor Authentication Rights of Data Subjects Strong Password Anonymization Integration Rights of Data Subjects Personal Data Data Protection Officer Data Consent Risk Management Disclosure Data Breach Integration Privacy Policy Incident Report Data Controller Data Minimization Data Security Phishing Right to Erasure Sensitive Personal Information Confidentiality Data Processor Network Security Data Storage Encryption Privacy Notice Ransomware National Privacy Commission Consent Data Processing Right to File a Complaint Data Breach Notification Right to Damages Access Control Data Retention Malware Cloud Security Data Privacy Notice Data Subject Cybersecurity Awareness Transparency Firewalls Right to rectify Lawful Access Penalties Cybersecurity Privacy Impact Assessment Right to Access Data Recovery Identity Theft Compliance Vulnerability Backup Cyber Attacks Containment Multi-Factor Authentication Rights of Data Subjects Strong Password Anonymization Integration Rights of Data Subjects Personal Data Data Protection Officer Data Consent Risk Management Disclosure Data Breach Integration Privacy Policy Incident Report Data Controller Data Minimization Data Security Phishing Right to Erasure Sensitive Personal Information Confidentiality Data Processor Network Security Data Storage Encryption Privacy Notice Ransomware National Privacy Commission Consent Data Processing Right to File a Complaint Data Breach Notification Right to Damages Access Control Data Retention Malware Cloud Security Data Privacy Notice Data Subject Cybersecurity Awareness Transparency
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewalls
Right to rectify
Lawful Access
Penalties
Cybersecurity
Privacy Impact Assessment
Right to Access
Data Recovery
Identity Theft
Compliance
Vulnerability
Backup
Cyber Attacks
Containment
Multi-Factor Authentication
Rights of Data Subjects
Strong Password
Anonymization
Integration
Rights of Data Subjects
Personal Data
Data Protection Officer
Data Consent
Risk Management
Disclosure
Data Breach
Integration
Privacy Policy
Incident Report
Data Controller
Data Minimization
Data Security
Phishing
Right to Erasure
Sensitive Personal Information
Confidentiality
Data Processor
Network Security
Data Storage
Encryption
Privacy Notice
Ransomware
National Privacy Commission
Consent
Data Processing
Right to File a Complaint
Data Breach Notification
Right to Damages
Access Control
Data Retention
Malware
Cloud Security
Data Privacy Notice
Data Subject
Cybersecurity Awareness
Transparency