Right to Erasure Network Security Compliance Cyber Attacks Rights of Data Subjects Penalties Integration Consent Incident Report Cybersecurity Awareness Data Processor Rights of Data Subjects Backup Integration Identity Theft Cybersecurity Data Storage Risk Management Phishing Malware Data Recovery Data Privacy Notice Transparency Data Processing Data Security Personal Data Data Controller Sensitive Personal Information Right to Access Right to rectify Data Subject Confidentiality Data Minimization Data Consent Multi-Factor Authentication Ransomware Access Control Lawful Access Vulnerability Privacy Policy Firewalls Strong Password Privacy Impact Assessment Anonymization Cloud Security Data Breach Notification Encryption Right to Damages Privacy Notice Disclosure National Privacy Commission Containment Data Protection Officer Data Retention Data Breach Right to File a Complaint Right to Erasure Network Security Compliance Cyber Attacks Rights of Data Subjects Penalties Integration Consent Incident Report Cybersecurity Awareness Data Processor Rights of Data Subjects Backup Integration Identity Theft Cybersecurity Data Storage Risk Management Phishing Malware Data Recovery Data Privacy Notice Transparency Data Processing Data Security Personal Data Data Controller Sensitive Personal Information Right to Access Right to rectify Data Subject Confidentiality Data Minimization Data Consent Multi-Factor Authentication Ransomware Access Control Lawful Access Vulnerability Privacy Policy Firewalls Strong Password Privacy Impact Assessment Anonymization Cloud Security Data Breach Notification Encryption Right to Damages Privacy Notice Disclosure National Privacy Commission Containment Data Protection Officer Data Retention Data Breach Right to File a Complaint
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Right to Erasure
Network Security
Compliance
Cyber Attacks
Rights of Data Subjects
Penalties
Integration
Consent
Incident Report
Cybersecurity Awareness
Data Processor
Rights of Data Subjects
Backup
Integration
Identity Theft
Cybersecurity
Data Storage
Risk Management
Phishing
Malware
Data Recovery
Data Privacy Notice
Transparency
Data Processing
Data Security
Personal Data
Data Controller
Sensitive Personal Information
Right to Access
Right to rectify
Data Subject
Confidentiality
Data Minimization
Data Consent
Multi-Factor Authentication
Ransomware
Access Control
Lawful Access
Vulnerability
Privacy Policy
Firewalls
Strong Password
Privacy Impact Assessment
Anonymization
Cloud Security
Data Breach Notification
Encryption
Right to Damages
Privacy Notice
Disclosure
National Privacy Commission
Containment
Data Protection Officer
Data Retention
Data Breach
Right to File a Complaint