Right to Access Containment Data Minimization Strong Password Data Storage Disclosure Penalties Confidentiality Encryption Right to Erasure Rights of Data Subjects Integration Multi-Factor Authentication Anonymization Integration Risk Management Rights of Data Subjects Right to Damages Cyber Attacks Data Protection Officer Firewalls Data Subject Right to rectify Network Security Data Controller Cloud Security Data Privacy Notice Malware Phishing Privacy Policy Vulnerability Data Breach Notification Data Consent Data Breach Data Processing Consent Lawful Access Sensitive Personal Information Data Security Identity Theft Privacy Notice Privacy Impact Assessment Transparency Compliance National Privacy Commission Ransomware Personal Data Cybersecurity Data Recovery Data Retention Data Processor Incident Report Cybersecurity Awareness Backup Right to File a Complaint Access Control Right to Access Containment Data Minimization Strong Password Data Storage Disclosure Penalties Confidentiality Encryption Right to Erasure Rights of Data Subjects Integration Multi-Factor Authentication Anonymization Integration Risk Management Rights of Data Subjects Right to Damages Cyber Attacks Data Protection Officer Firewalls Data Subject Right to rectify Network Security Data Controller Cloud Security Data Privacy Notice Malware Phishing Privacy Policy Vulnerability Data Breach Notification Data Consent Data Breach Data Processing Consent Lawful Access Sensitive Personal Information Data Security Identity Theft Privacy Notice Privacy Impact Assessment Transparency Compliance National Privacy Commission Ransomware Personal Data Cybersecurity Data Recovery Data Retention Data Processor Incident Report Cybersecurity Awareness Backup Right to File a Complaint Access Control
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Right to Access
Containment
Data Minimization
Strong Password
Data Storage
Disclosure
Penalties
Confidentiality
Encryption
Right to Erasure
Rights of Data Subjects
Integration
Multi-Factor Authentication
Anonymization
Integration
Risk Management
Rights of Data Subjects
Right to Damages
Cyber Attacks
Data Protection Officer
Firewalls
Data Subject
Right to rectify
Network Security
Data Controller
Cloud Security
Data Privacy Notice
Malware
Phishing
Privacy Policy
Vulnerability
Data Breach Notification
Data Consent
Data Breach
Data Processing
Consent
Lawful Access
Sensitive Personal Information
Data Security
Identity Theft
Privacy Notice
Privacy Impact Assessment
Transparency
Compliance
National Privacy Commission
Ransomware
Personal Data
Cybersecurity
Data Recovery
Data Retention
Data Processor
Incident Report
Cybersecurity Awareness
Backup
Right to File a Complaint
Access Control