Ransomware Data Privacy Notice Data Minimization Data Security Cloud Security Firewalls Compliance Incident Report Backup Transparency Access Control Phishing Cybersecurity Lawful Access Multi-Factor Authentication Integration Strong Password Cybersecurity Awareness Right to Erasure Data Controller Personal Data Penalties Risk Management National Privacy Commission Confidentiality Anonymization Data Consent Right to Damages Consent Data Retention Integration Containment Data Subject Vulnerability Malware Data Processor Privacy Notice Encryption Cyber Attacks Data Recovery Identity Theft Network Security Sensitive Personal Information Data Processing Privacy Impact Assessment Data Storage Data Breach Right to File a Complaint Data Protection Officer Right to rectify Privacy Policy Rights of Data Subjects Data Breach Notification Right to Access Rights of Data Subjects Disclosure Ransomware Data Privacy Notice Data Minimization Data Security Cloud Security Firewalls Compliance Incident Report Backup Transparency Access Control Phishing Cybersecurity Lawful Access Multi-Factor Authentication Integration Strong Password Cybersecurity Awareness Right to Erasure Data Controller Personal Data Penalties Risk Management National Privacy Commission Confidentiality Anonymization Data Consent Right to Damages Consent Data Retention Integration Containment Data Subject Vulnerability Malware Data Processor Privacy Notice Encryption Cyber Attacks Data Recovery Identity Theft Network Security Sensitive Personal Information Data Processing Privacy Impact Assessment Data Storage Data Breach Right to File a Complaint Data Protection Officer Right to rectify Privacy Policy Rights of Data Subjects Data Breach Notification Right to Access Rights of Data Subjects Disclosure
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Ransomware
Data Privacy Notice
Data Minimization
Data Security
Cloud Security
Firewalls
Compliance
Incident Report
Backup
Transparency
Access Control
Phishing
Cybersecurity
Lawful Access
Multi-Factor Authentication
Integration
Strong Password
Cybersecurity Awareness
Right to Erasure
Data Controller
Personal Data
Penalties
Risk Management
National Privacy Commission
Confidentiality
Anonymization
Data Consent
Right to Damages
Consent
Data Retention
Integration
Containment
Data Subject
Vulnerability
Malware
Data Processor
Privacy Notice
Encryption
Cyber Attacks
Data Recovery
Identity Theft
Network Security
Sensitive Personal Information
Data Processing
Privacy Impact Assessment
Data Storage
Data Breach
Right to File a Complaint
Data Protection Officer
Right to rectify
Privacy Policy
Rights of Data Subjects
Data Breach Notification
Right to Access
Rights of Data Subjects
Disclosure