Containment Integration Privacy Notice Cloud Security Data Processing Malware Data Recovery Data Breach Notification Penalties Data Retention Backup Incident Report Strong Password Confidentiality Risk Management Data Breach Data Subject Data Consent Cyber Attacks Data Storage Cybersecurity Awareness Consent Right to rectify Data Controller Anonymization Compliance Right to Erasure Data Security Privacy Policy Rights of Data Subjects Access Control Network Security Right to File a Complaint Right to Damages Multi-Factor Authentication Data Minimization Sensitive Personal Information Right to Access Phishing Identity Theft Disclosure Vulnerability Firewalls Data Processor Data Privacy Notice Privacy Impact Assessment Encryption Personal Data Ransomware Integration Lawful Access Cybersecurity Transparency Data Protection Officer Rights of Data Subjects National Privacy Commission Containment Integration Privacy Notice Cloud Security Data Processing Malware Data Recovery Data Breach Notification Penalties Data Retention Backup Incident Report Strong Password Confidentiality Risk Management Data Breach Data Subject Data Consent Cyber Attacks Data Storage Cybersecurity Awareness Consent Right to rectify Data Controller Anonymization Compliance Right to Erasure Data Security Privacy Policy Rights of Data Subjects Access Control Network Security Right to File a Complaint Right to Damages Multi-Factor Authentication Data Minimization Sensitive Personal Information Right to Access Phishing Identity Theft Disclosure Vulnerability Firewalls Data Processor Data Privacy Notice Privacy Impact Assessment Encryption Personal Data Ransomware Integration Lawful Access Cybersecurity Transparency Data Protection Officer Rights of Data Subjects National Privacy Commission
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Containment
Integration
Privacy Notice
Cloud Security
Data Processing
Malware
Data Recovery
Data Breach Notification
Penalties
Data Retention
Backup
Incident Report
Strong Password
Confidentiality
Risk Management
Data Breach
Data Subject
Data Consent
Cyber Attacks
Data Storage
Cybersecurity Awareness
Consent
Right to rectify
Data Controller
Anonymization
Compliance
Right to Erasure
Data Security
Privacy Policy
Rights of Data Subjects
Access Control
Network Security
Right to File a Complaint
Right to Damages
Multi-Factor Authentication
Data Minimization
Sensitive Personal Information
Right to Access
Phishing
Identity Theft
Disclosure
Vulnerability
Firewalls
Data Processor
Data Privacy Notice
Privacy Impact Assessment
Encryption
Personal Data
Ransomware
Integration
Lawful Access
Cybersecurity
Transparency
Data Protection Officer
Rights of Data Subjects
National Privacy Commission