Confidentiality Multi-Factor Authentication Privacy Notice Risk Management Containment Backup Transparency Right to Erasure Privacy Policy Firewalls Right to File a Complaint Data Breach Data Controller Data Processing Vulnerability Cloud Security Access Control Disclosure Data Minimization Data Breach Notification Privacy Impact Assessment Data Security Cybersecurity Right to Damages Data Privacy Notice Compliance Data Retention Data Subject Cybersecurity Awareness Integration Data Protection Officer Data Storage Personal Data Phishing National Privacy Commission Data Recovery Malware Right to Access Incident Report Integration Penalties Sensitive Personal Information Identity Theft Anonymization Data Consent Rights of Data Subjects Cyber Attacks Lawful Access Rights of Data Subjects Consent Data Processor Right to rectify Strong Password Encryption Network Security Ransomware Confidentiality Multi-Factor Authentication Privacy Notice Risk Management Containment Backup Transparency Right to Erasure Privacy Policy Firewalls Right to File a Complaint Data Breach Data Controller Data Processing Vulnerability Cloud Security Access Control Disclosure Data Minimization Data Breach Notification Privacy Impact Assessment Data Security Cybersecurity Right to Damages Data Privacy Notice Compliance Data Retention Data Subject Cybersecurity Awareness Integration Data Protection Officer Data Storage Personal Data Phishing National Privacy Commission Data Recovery Malware Right to Access Incident Report Integration Penalties Sensitive Personal Information Identity Theft Anonymization Data Consent Rights of Data Subjects Cyber Attacks Lawful Access Rights of Data Subjects Consent Data Processor Right to rectify Strong Password Encryption Network Security Ransomware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Confidentiality
Multi-Factor Authentication
Privacy Notice
Risk Management
Containment
Backup
Transparency
Right to Erasure
Privacy Policy
Firewalls
Right to File a Complaint
Data Breach
Data Controller
Data Processing
Vulnerability
Cloud Security
Access Control
Disclosure
Data Minimization
Data Breach Notification
Privacy Impact Assessment
Data Security
Cybersecurity
Right to Damages
Data Privacy Notice
Compliance
Data Retention
Data Subject
Cybersecurity Awareness
Integration
Data Protection Officer
Data Storage
Personal Data
Phishing
National Privacy Commission
Data Recovery
Malware
Right to Access
Incident Report
Integration
Penalties
Sensitive Personal Information
Identity Theft
Anonymization
Data Consent
Rights of Data Subjects
Cyber Attacks
Lawful Access
Rights of Data Subjects
Consent
Data Processor
Right to rectify
Strong Password
Encryption
Network Security
Ransomware