Transparency Data Protection Officer Data Security Data Processing Data Subject Malware Cybersecurity Awareness Personal Data Right to rectify Privacy Impact Assessment Data Retention Access Control Data Breach Notification Vulnerability Cyber Attacks Data Minimization Data Controller Backup Network Security Consent Data Processor Right to Erasure Cloud Security Data Storage Lawful Access Integration Right to File a Complaint Firewalls National Privacy Commission Right to Damages Ransomware Cybersecurity Rights of Data Subjects Identity Theft Integration Compliance Confidentiality Rights of Data Subjects Data Consent Incident Report Encryption Sensitive Personal Information Data Recovery Data Breach Containment Risk Management Data Privacy Notice Right to Access Privacy Notice Strong Password Disclosure Anonymization Multi-Factor Authentication Penalties Privacy Policy Phishing Transparency Data Protection Officer Data Security Data Processing Data Subject Malware Cybersecurity Awareness Personal Data Right to rectify Privacy Impact Assessment Data Retention Access Control Data Breach Notification Vulnerability Cyber Attacks Data Minimization Data Controller Backup Network Security Consent Data Processor Right to Erasure Cloud Security Data Storage Lawful Access Integration Right to File a Complaint Firewalls National Privacy Commission Right to Damages Ransomware Cybersecurity Rights of Data Subjects Identity Theft Integration Compliance Confidentiality Rights of Data Subjects Data Consent Incident Report Encryption Sensitive Personal Information Data Recovery Data Breach Containment Risk Management Data Privacy Notice Right to Access Privacy Notice Strong Password Disclosure Anonymization Multi-Factor Authentication Penalties Privacy Policy Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Transparency
Data Protection Officer
Data Security
Data Processing
Data Subject
Malware
Cybersecurity Awareness
Personal Data
Right to rectify
Privacy Impact Assessment
Data Retention
Access Control
Data Breach Notification
Vulnerability
Cyber Attacks
Data Minimization
Data Controller
Backup
Network Security
Consent
Data Processor
Right to Erasure
Cloud Security
Data Storage
Lawful Access
Integration
Right to File a Complaint
Firewalls
National Privacy Commission
Right to Damages
Ransomware
Cybersecurity
Rights of Data Subjects
Identity Theft
Integration
Compliance
Confidentiality
Rights of Data Subjects
Data Consent
Incident Report
Encryption
Sensitive Personal Information
Data Recovery
Data Breach
Containment
Risk Management
Data Privacy Notice
Right to Access
Privacy Notice
Strong Password
Disclosure
Anonymization
Multi-Factor Authentication
Penalties
Privacy Policy
Phishing