Sensitive Personal Information Firewalls Network Security Integration Data Protection Officer Data Recovery Ransomware Personal Data Lawful Access Confidentiality Multi-Factor Authentication Data Processing Penalties Encryption Incident Report Transparency Data Processor Disclosure Compliance Data Breach Strong Password Data Retention Risk Management Data Storage Cybersecurity Cloud Security Right to File a Complaint Data Breach Notification Rights of Data Subjects Backup Rights of Data Subjects Data Subject Data Security Containment Consent Anonymization Malware Vulnerability Cyber Attacks Right to Erasure Integration Right to Damages Data Minimization Data Controller Privacy Policy Phishing Identity Theft Access Control Right to rectify National Privacy Commission Data Privacy Notice Privacy Impact Assessment Data Consent Privacy Notice Cybersecurity Awareness Right to Access Sensitive Personal Information Firewalls Network Security Integration Data Protection Officer Data Recovery Ransomware Personal Data Lawful Access Confidentiality Multi-Factor Authentication Data Processing Penalties Encryption Incident Report Transparency Data Processor Disclosure Compliance Data Breach Strong Password Data Retention Risk Management Data Storage Cybersecurity Cloud Security Right to File a Complaint Data Breach Notification Rights of Data Subjects Backup Rights of Data Subjects Data Subject Data Security Containment Consent Anonymization Malware Vulnerability Cyber Attacks Right to Erasure Integration Right to Damages Data Minimization Data Controller Privacy Policy Phishing Identity Theft Access Control Right to rectify National Privacy Commission Data Privacy Notice Privacy Impact Assessment Data Consent Privacy Notice Cybersecurity Awareness Right to Access
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Sensitive Personal Information
Firewalls
Network Security
Integration
Data Protection Officer
Data Recovery
Ransomware
Personal Data
Lawful Access
Confidentiality
Multi-Factor Authentication
Data Processing
Penalties
Encryption
Incident Report
Transparency
Data Processor
Disclosure
Compliance
Data Breach
Strong Password
Data Retention
Risk Management
Data Storage
Cybersecurity
Cloud Security
Right to File a Complaint
Data Breach Notification
Rights of Data Subjects
Backup
Rights of Data Subjects
Data Subject
Data Security
Containment
Consent
Anonymization
Malware
Vulnerability
Cyber Attacks
Right to Erasure
Integration
Right to Damages
Data Minimization
Data Controller
Privacy Policy
Phishing
Identity Theft
Access Control
Right to rectify
National Privacy Commission
Data Privacy Notice
Privacy Impact Assessment
Data Consent
Privacy Notice
Cybersecurity Awareness
Right to Access