Cybersecurity Awareness Data Minimization Cloud Security Privacy Policy Access Control Data Storage Risk Management Data Consent Ransomware Right to Access Data Retention Data Breach Data Protection Officer Multi-Factor Authentication Anonymization Encryption Cyber Attacks Containment Penalties Phishing Backup Network Security Rights of Data Subjects Data Processor Data Security Personal Data Identity Theft Data Recovery Data Breach Notification Right to rectify Compliance Sensitive Personal Information Confidentiality Data Processing Data Subject Data Controller Malware Integration Lawful Access Rights of Data Subjects Vulnerability Integration Privacy Notice Right to Damages National Privacy Commission Cybersecurity Data Privacy Notice Disclosure Consent Strong Password Right to Erasure Transparency Privacy Impact Assessment Incident Report Firewalls Right to File a Complaint Cybersecurity Awareness Data Minimization Cloud Security Privacy Policy Access Control Data Storage Risk Management Data Consent Ransomware Right to Access Data Retention Data Breach Data Protection Officer Multi-Factor Authentication Anonymization Encryption Cyber Attacks Containment Penalties Phishing Backup Network Security Rights of Data Subjects Data Processor Data Security Personal Data Identity Theft Data Recovery Data Breach Notification Right to rectify Compliance Sensitive Personal Information Confidentiality Data Processing Data Subject Data Controller Malware Integration Lawful Access Rights of Data Subjects Vulnerability Integration Privacy Notice Right to Damages National Privacy Commission Cybersecurity Data Privacy Notice Disclosure Consent Strong Password Right to Erasure Transparency Privacy Impact Assessment Incident Report Firewalls Right to File a Complaint
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity Awareness
Data Minimization
Cloud Security
Privacy Policy
Access Control
Data Storage
Risk Management
Data Consent
Ransomware
Right to Access
Data Retention
Data Breach
Data Protection Officer
Multi-Factor Authentication
Anonymization
Encryption
Cyber Attacks
Containment
Penalties
Phishing
Backup
Network Security
Rights of Data Subjects
Data Processor
Data Security
Personal Data
Identity Theft
Data Recovery
Data Breach Notification
Right to rectify
Compliance
Sensitive Personal Information
Confidentiality
Data Processing
Data Subject
Data Controller
Malware
Integration
Lawful Access
Rights of Data Subjects
Vulnerability
Integration
Privacy Notice
Right to Damages
National Privacy Commission
Cybersecurity
Data Privacy Notice
Disclosure
Consent
Strong Password
Right to Erasure
Transparency
Privacy Impact Assessment
Incident Report
Firewalls
Right to File a Complaint