Data Retention Ransomware Data Subject Encryption Disclosure Data Breach Notification Multi-Factor Authentication Lawful Access Risk Management Right to File a Complaint Data Privacy Notice Integration Cloud Security Phishing Sensitive Personal Information Consent Compliance Access Control Cybersecurity Cybersecurity Awareness Integration Data Breach Data Controller Data Security Data Processing Personal Data Backup Containment Right to Erasure Data Recovery Data Storage Right to Damages Privacy Policy Right to Access Rights of Data Subjects Confidentiality Data Minimization Privacy Impact Assessment Penalties Transparency Identity Theft Incident Report Right to rectify Data Processor Data Protection Officer National Privacy Commission Vulnerability Network Security Data Consent Anonymization Strong Password Privacy Notice Malware Cyber Attacks Firewalls Rights of Data Subjects Data Retention Ransomware Data Subject Encryption Disclosure Data Breach Notification Multi-Factor Authentication Lawful Access Risk Management Right to File a Complaint Data Privacy Notice Integration Cloud Security Phishing Sensitive Personal Information Consent Compliance Access Control Cybersecurity Cybersecurity Awareness Integration Data Breach Data Controller Data Security Data Processing Personal Data Backup Containment Right to Erasure Data Recovery Data Storage Right to Damages Privacy Policy Right to Access Rights of Data Subjects Confidentiality Data Minimization Privacy Impact Assessment Penalties Transparency Identity Theft Incident Report Right to rectify Data Processor Data Protection Officer National Privacy Commission Vulnerability Network Security Data Consent Anonymization Strong Password Privacy Notice Malware Cyber Attacks Firewalls Rights of Data Subjects
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Retention
Ransomware
Data Subject
Encryption
Disclosure
Data Breach Notification
Multi-Factor Authentication
Lawful Access
Risk Management
Right to File a Complaint
Data Privacy Notice
Integration
Cloud Security
Phishing
Sensitive Personal Information
Consent
Compliance
Access Control
Cybersecurity
Cybersecurity Awareness
Integration
Data Breach
Data Controller
Data Security
Data Processing
Personal Data
Backup
Containment
Right to Erasure
Data Recovery
Data Storage
Right to Damages
Privacy Policy
Right to Access
Rights of Data Subjects
Confidentiality
Data Minimization
Privacy Impact Assessment
Penalties
Transparency
Identity Theft
Incident Report
Right to rectify
Data Processor
Data Protection Officer
National Privacy Commission
Vulnerability
Network Security
Data Consent
Anonymization
Strong Password
Privacy Notice
Malware
Cyber Attacks
Firewalls
Rights of Data Subjects