Right to Erasure Data Breach Compliance Data Processing Right to Damages Cybersecurity Awareness Lawful Access Data Protection Officer Cloud Security Cyber Attacks Integration Cybersecurity Incident Report Data Breach Notification Personal Data Rights of Data Subjects Data Retention Right to File a Complaint Identity Theft Data Privacy Notice Multi-Factor Authentication Right to Access Confidentiality Data Security Right to rectify Data Storage Privacy Notice Privacy Policy Ransomware Privacy Impact Assessment Disclosure Data Controller Penalties Phishing Sensitive Personal Information Malware Firewalls Consent Data Minimization Data Recovery Data Subject Rights of Data Subjects Data Consent Data Processor Integration Transparency Anonymization National Privacy Commission Vulnerability Containment Risk Management Network Security Backup Access Control Strong Password Encryption Right to Erasure Data Breach Compliance Data Processing Right to Damages Cybersecurity Awareness Lawful Access Data Protection Officer Cloud Security Cyber Attacks Integration Cybersecurity Incident Report Data Breach Notification Personal Data Rights of Data Subjects Data Retention Right to File a Complaint Identity Theft Data Privacy Notice Multi-Factor Authentication Right to Access Confidentiality Data Security Right to rectify Data Storage Privacy Notice Privacy Policy Ransomware Privacy Impact Assessment Disclosure Data Controller Penalties Phishing Sensitive Personal Information Malware Firewalls Consent Data Minimization Data Recovery Data Subject Rights of Data Subjects Data Consent Data Processor Integration Transparency Anonymization National Privacy Commission Vulnerability Containment Risk Management Network Security Backup Access Control Strong Password Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Right to Erasure
Data Breach
Compliance
Data Processing
Right to Damages
Cybersecurity Awareness
Lawful Access
Data Protection Officer
Cloud Security
Cyber Attacks
Integration
Cybersecurity
Incident Report
Data Breach Notification
Personal Data
Rights of Data Subjects
Data Retention
Right to File a Complaint
Identity Theft
Data Privacy Notice
Multi-Factor Authentication
Right to Access
Confidentiality
Data Security
Right to rectify
Data Storage
Privacy Notice
Privacy Policy
Ransomware
Privacy Impact Assessment
Disclosure
Data Controller
Penalties
Phishing
Sensitive Personal Information
Malware
Firewalls
Consent
Data Minimization
Data Recovery
Data Subject
Rights of Data Subjects
Data Consent
Data Processor
Integration
Transparency
Anonymization
National Privacy Commission
Vulnerability
Containment
Risk Management
Network Security
Backup
Access Control
Strong Password
Encryption