Anonymization Access Control Vulnerability Lawful Access Rights of Data Subjects Cybersecurity Transparency Confidentiality Identity Theft National Privacy Commission Data Subject Incident Report Phishing Firewalls Risk Management Compliance Privacy Policy Data Privacy Notice Data Retention Network Security Privacy Impact Assessment Privacy Notice Strong Password Data Storage Data Processor Containment Integration Right to rectify Data Security Integration Right to Damages Disclosure Data Controller Data Breach Notification Cloud Security Encryption Right to Erasure Consent Data Breach Malware Multi-Factor Authentication Data Processing Data Consent Rights of Data Subjects Sensitive Personal Information Data Minimization Right to Access Data Recovery Ransomware Data Protection Officer Personal Data Right to File a Complaint Backup Cyber Attacks Penalties Cybersecurity Awareness Anonymization Access Control Vulnerability Lawful Access Rights of Data Subjects Cybersecurity Transparency Confidentiality Identity Theft National Privacy Commission Data Subject Incident Report Phishing Firewalls Risk Management Compliance Privacy Policy Data Privacy Notice Data Retention Network Security Privacy Impact Assessment Privacy Notice Strong Password Data Storage Data Processor Containment Integration Right to rectify Data Security Integration Right to Damages Disclosure Data Controller Data Breach Notification Cloud Security Encryption Right to Erasure Consent Data Breach Malware Multi-Factor Authentication Data Processing Data Consent Rights of Data Subjects Sensitive Personal Information Data Minimization Right to Access Data Recovery Ransomware Data Protection Officer Personal Data Right to File a Complaint Backup Cyber Attacks Penalties Cybersecurity Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anonymization
Access Control
Vulnerability
Lawful Access
Rights of Data Subjects
Cybersecurity
Transparency
Confidentiality
Identity Theft
National Privacy Commission
Data Subject
Incident Report
Phishing
Firewalls
Risk Management
Compliance
Privacy Policy
Data Privacy Notice
Data Retention
Network Security
Privacy Impact Assessment
Privacy Notice
Strong Password
Data Storage
Data Processor
Containment
Integration
Right to rectify
Data Security
Integration
Right to Damages
Disclosure
Data Controller
Data Breach Notification
Cloud Security
Encryption
Right to Erasure
Consent
Data Breach
Malware
Multi-Factor Authentication
Data Processing
Data Consent
Rights of Data Subjects
Sensitive Personal Information
Data Minimization
Right to Access
Data Recovery
Ransomware
Data Protection Officer
Personal Data
Right to File a Complaint
Backup
Cyber Attacks
Penalties
Cybersecurity Awareness