Network Security Backup Privacy Impact Assessment Right to Damages Containment Firewalls Disclosure Identity Theft Cybersecurity Strong Password Integration Sensitive Personal Information Risk Management Data Breach Notification Personal Data Data Security Compliance Multi-Factor Authentication Encryption Data Retention Penalties Ransomware Data Minimization Right to Access Phishing Data Breach Cybersecurity Awareness Access Control Malware Data Consent Data Controller Privacy Notice Incident Report Consent Data Subject Cyber Attacks Confidentiality Data Processor Data Processing Right to rectify Integration Data Storage Vulnerability Privacy Policy Rights of Data Subjects National Privacy Commission Right to File a Complaint Data Protection Officer Lawful Access Data Recovery Data Privacy Notice Anonymization Right to Erasure Cloud Security Transparency Rights of Data Subjects Network Security Backup Privacy Impact Assessment Right to Damages Containment Firewalls Disclosure Identity Theft Cybersecurity Strong Password Integration Sensitive Personal Information Risk Management Data Breach Notification Personal Data Data Security Compliance Multi-Factor Authentication Encryption Data Retention Penalties Ransomware Data Minimization Right to Access Phishing Data Breach Cybersecurity Awareness Access Control Malware Data Consent Data Controller Privacy Notice Incident Report Consent Data Subject Cyber Attacks Confidentiality Data Processor Data Processing Right to rectify Integration Data Storage Vulnerability Privacy Policy Rights of Data Subjects National Privacy Commission Right to File a Complaint Data Protection Officer Lawful Access Data Recovery Data Privacy Notice Anonymization Right to Erasure Cloud Security Transparency Rights of Data Subjects
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Network Security
Backup
Privacy Impact Assessment
Right to Damages
Containment
Firewalls
Disclosure
Identity Theft
Cybersecurity
Strong Password
Integration
Sensitive Personal Information
Risk Management
Data Breach Notification
Personal Data
Data Security
Compliance
Multi-Factor Authentication
Encryption
Data Retention
Penalties
Ransomware
Data Minimization
Right to Access
Phishing
Data Breach
Cybersecurity Awareness
Access Control
Malware
Data Consent
Data Controller
Privacy Notice
Incident Report
Consent
Data Subject
Cyber Attacks
Confidentiality
Data Processor
Data Processing
Right to rectify
Integration
Data Storage
Vulnerability
Privacy Policy
Rights of Data Subjects
National Privacy Commission
Right to File a Complaint
Data Protection Officer
Lawful Access
Data Recovery
Data Privacy Notice
Anonymization
Right to Erasure
Cloud Security
Transparency
Rights of Data Subjects