Data Retention Data Consent Rights of Data Subjects Integration Firewalls Cybersecurity Disclosure Right to rectify Network Security Data Processing Access Control Data Storage Data Breach Privacy Notice Identity Theft Right to Access Risk Management Privacy Impact Assessment Right to File a Complaint Containment Data Minimization Backup Strong Password Penalties Confidentiality Privacy Policy Multi-Factor Authentication Cyber Attacks Phishing Data Controller Right to Erasure Consent Vulnerability Data Processor Data Protection Officer Data Recovery Data Privacy Notice Right to Damages Encryption Cloud Security Compliance Data Subject Personal Data Cybersecurity Awareness Data Breach Notification Lawful Access Data Security Incident Report Ransomware Sensitive Personal Information National Privacy Commission Integration Transparency Anonymization Malware Rights of Data Subjects Data Retention Data Consent Rights of Data Subjects Integration Firewalls Cybersecurity Disclosure Right to rectify Network Security Data Processing Access Control Data Storage Data Breach Privacy Notice Identity Theft Right to Access Risk Management Privacy Impact Assessment Right to File a Complaint Containment Data Minimization Backup Strong Password Penalties Confidentiality Privacy Policy Multi-Factor Authentication Cyber Attacks Phishing Data Controller Right to Erasure Consent Vulnerability Data Processor Data Protection Officer Data Recovery Data Privacy Notice Right to Damages Encryption Cloud Security Compliance Data Subject Personal Data Cybersecurity Awareness Data Breach Notification Lawful Access Data Security Incident Report Ransomware Sensitive Personal Information National Privacy Commission Integration Transparency Anonymization Malware Rights of Data Subjects
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Retention
Data Consent
Rights of Data Subjects
Integration
Firewalls
Cybersecurity
Disclosure
Right to rectify
Network Security
Data Processing
Access Control
Data Storage
Data Breach
Privacy Notice
Identity Theft
Right to Access
Risk Management
Privacy Impact Assessment
Right to File a Complaint
Containment
Data Minimization
Backup
Strong Password
Penalties
Confidentiality
Privacy Policy
Multi-Factor Authentication
Cyber Attacks
Phishing
Data Controller
Right to Erasure
Consent
Vulnerability
Data Processor
Data Protection Officer
Data Recovery
Data Privacy Notice
Right to Damages
Encryption
Cloud Security
Compliance
Data Subject
Personal Data
Cybersecurity Awareness
Data Breach Notification
Lawful Access
Data Security
Incident Report
Ransomware
Sensitive Personal Information
National Privacy Commission
Integration
Transparency
Anonymization
Malware
Rights of Data Subjects