Rights of Data Subjects Data Breach Notification Data Processor Anonymization Privacy Policy Integration Integration Consent Malware Phishing Incident Report Right to Access Containment Firewalls Backup Compliance Penalties Confidentiality National Privacy Commission Identity Theft Multi-Factor Authentication Lawful Access Privacy Impact Assessment Data Minimization Data Retention Access Control Personal Data Right to Damages Risk Management Cloud Security Right to rectify Data Processing Data Protection Officer Data Breach Right to Erasure Right to File a Complaint Data Security Data Consent Transparency Strong Password Cybersecurity Data Subject Encryption Data Storage Privacy Notice Vulnerability Data Privacy Notice Data Controller Ransomware Cybersecurity Awareness Rights of Data Subjects Cyber Attacks Data Recovery Sensitive Personal Information Network Security Disclosure Rights of Data Subjects Data Breach Notification Data Processor Anonymization Privacy Policy Integration Integration Consent Malware Phishing Incident Report Right to Access Containment Firewalls Backup Compliance Penalties Confidentiality National Privacy Commission Identity Theft Multi-Factor Authentication Lawful Access Privacy Impact Assessment Data Minimization Data Retention Access Control Personal Data Right to Damages Risk Management Cloud Security Right to rectify Data Processing Data Protection Officer Data Breach Right to Erasure Right to File a Complaint Data Security Data Consent Transparency Strong Password Cybersecurity Data Subject Encryption Data Storage Privacy Notice Vulnerability Data Privacy Notice Data Controller Ransomware Cybersecurity Awareness Rights of Data Subjects Cyber Attacks Data Recovery Sensitive Personal Information Network Security Disclosure
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Rights of Data Subjects
Data Breach Notification
Data Processor
Anonymization
Privacy Policy
Integration
Integration
Consent
Malware
Phishing
Incident Report
Right to Access
Containment
Firewalls
Backup
Compliance
Penalties
Confidentiality
National Privacy Commission
Identity Theft
Multi-Factor Authentication
Lawful Access
Privacy Impact Assessment
Data Minimization
Data Retention
Access Control
Personal Data
Right to Damages
Risk Management
Cloud Security
Right to rectify
Data Processing
Data Protection Officer
Data Breach
Right to Erasure
Right to File a Complaint
Data Security
Data Consent
Transparency
Strong Password
Cybersecurity
Data Subject
Encryption
Data Storage
Privacy Notice
Vulnerability
Data Privacy Notice
Data Controller
Ransomware
Cybersecurity Awareness
Rights of Data Subjects
Cyber Attacks
Data Recovery
Sensitive Personal Information
Network Security
Disclosure