Lawful Access Penalties Containment Right to Access Rights of Data Subjects Data Privacy Notice Right to File a Complaint Access Control Firewalls Right to Erasure Disclosure Data Subject National Privacy Commission Data Breach Data Storage Cybersecurity Awareness Rights of Data Subjects Privacy Policy Data Controller Integration Vulnerability Confidentiality Data Retention Compliance Right to Damages Personal Data Data Processing Encryption Multi-Factor Authentication Backup Right to rectify Cyber Attacks Integration Data Security Privacy Notice Cybersecurity Cloud Security Identity Theft Network Security Strong Password Data Consent Transparency Anonymization Data Minimization Consent Ransomware Incident Report Sensitive Personal Information Data Breach Notification Malware Data Recovery Phishing Data Protection Officer Risk Management Data Processor Privacy Impact Assessment Lawful Access Penalties Containment Right to Access Rights of Data Subjects Data Privacy Notice Right to File a Complaint Access Control Firewalls Right to Erasure Disclosure Data Subject National Privacy Commission Data Breach Data Storage Cybersecurity Awareness Rights of Data Subjects Privacy Policy Data Controller Integration Vulnerability Confidentiality Data Retention Compliance Right to Damages Personal Data Data Processing Encryption Multi-Factor Authentication Backup Right to rectify Cyber Attacks Integration Data Security Privacy Notice Cybersecurity Cloud Security Identity Theft Network Security Strong Password Data Consent Transparency Anonymization Data Minimization Consent Ransomware Incident Report Sensitive Personal Information Data Breach Notification Malware Data Recovery Phishing Data Protection Officer Risk Management Data Processor Privacy Impact Assessment
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Lawful Access
Penalties
Containment
Right to Access
Rights of Data Subjects
Data Privacy Notice
Right to File a Complaint
Access Control
Firewalls
Right to Erasure
Disclosure
Data Subject
National Privacy Commission
Data Breach
Data Storage
Cybersecurity Awareness
Rights of Data Subjects
Privacy Policy
Data Controller
Integration
Vulnerability
Confidentiality
Data Retention
Compliance
Right to Damages
Personal Data
Data Processing
Encryption
Multi-Factor Authentication
Backup
Right to rectify
Cyber Attacks
Integration
Data Security
Privacy Notice
Cybersecurity
Cloud Security
Identity Theft
Network Security
Strong Password
Data Consent
Transparency
Anonymization
Data Minimization
Consent
Ransomware
Incident Report
Sensitive Personal Information
Data Breach Notification
Malware
Data Recovery
Phishing
Data Protection Officer
Risk Management
Data Processor
Privacy Impact Assessment