National Privacy Commission Strong Password Disclosure Data Controller Integration Privacy Policy Incident Report Containment Backup Data Storage Right to File a Complaint Privacy Impact Assessment Personal Data Data Breach Ransomware Right to Access Network Security Lawful Access Data Security Data Consent Multi-Factor Authentication Risk Management Data Recovery Firewalls Access Control Identity Theft Integration Cyber Attacks Confidentiality Data Retention Phishing Rights of Data Subjects Penalties Cloud Security Right to Erasure Vulnerability Anonymization Privacy Notice Data Breach Notification Data Privacy Notice Data Protection Officer Sensitive Personal Information Cybersecurity Awareness Data Subject Rights of Data Subjects Data Minimization Data Processor Malware Encryption Data Processing Right to Damages Right to rectify Compliance Consent Cybersecurity Transparency National Privacy Commission Strong Password Disclosure Data Controller Integration Privacy Policy Incident Report Containment Backup Data Storage Right to File a Complaint Privacy Impact Assessment Personal Data Data Breach Ransomware Right to Access Network Security Lawful Access Data Security Data Consent Multi-Factor Authentication Risk Management Data Recovery Firewalls Access Control Identity Theft Integration Cyber Attacks Confidentiality Data Retention Phishing Rights of Data Subjects Penalties Cloud Security Right to Erasure Vulnerability Anonymization Privacy Notice Data Breach Notification Data Privacy Notice Data Protection Officer Sensitive Personal Information Cybersecurity Awareness Data Subject Rights of Data Subjects Data Minimization Data Processor Malware Encryption Data Processing Right to Damages Right to rectify Compliance Consent Cybersecurity Transparency
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
National Privacy Commission
Strong Password
Disclosure
Data Controller
Integration
Privacy Policy
Incident Report
Containment
Backup
Data Storage
Right to File a Complaint
Privacy Impact Assessment
Personal Data
Data Breach
Ransomware
Right to Access
Network Security
Lawful Access
Data Security
Data Consent
Multi-Factor Authentication
Risk Management
Data Recovery
Firewalls
Access Control
Identity Theft
Integration
Cyber Attacks
Confidentiality
Data Retention
Phishing
Rights of Data Subjects
Penalties
Cloud Security
Right to Erasure
Vulnerability
Anonymization
Privacy Notice
Data Breach Notification
Data Privacy Notice
Data Protection Officer
Sensitive Personal Information
Cybersecurity Awareness
Data Subject
Rights of Data Subjects
Data Minimization
Data Processor
Malware
Encryption
Data Processing
Right to Damages
Right to rectify
Compliance
Consent
Cybersecurity
Transparency