Data Protection Officer Identity Theft Vulnerability Backup Strong Password Rights of Data Subjects Data Processor Data Privacy Notice Data Security Personal Data Right to rectify Anonymization Penalties Access Control Privacy Notice Incident Report Data Processing Data Retention Ransomware National Privacy Commission Containment Integration Data Storage Phishing Data Breach Notification Right to Damages Data Breach Confidentiality Compliance Right to Erasure Encryption Multi-Factor Authentication Right to Access Privacy Policy Cyber Attacks Disclosure Transparency Network Security Cybersecurity Awareness Data Controller Cloud Security Right to File a Complaint Malware Risk Management Cybersecurity Firewalls Data Subject Lawful Access Data Minimization Data Consent Data Recovery Privacy Impact Assessment Integration Sensitive Personal Information Rights of Data Subjects Consent Data Protection Officer Identity Theft Vulnerability Backup Strong Password Rights of Data Subjects Data Processor Data Privacy Notice Data Security Personal Data Right to rectify Anonymization Penalties Access Control Privacy Notice Incident Report Data Processing Data Retention Ransomware National Privacy Commission Containment Integration Data Storage Phishing Data Breach Notification Right to Damages Data Breach Confidentiality Compliance Right to Erasure Encryption Multi-Factor Authentication Right to Access Privacy Policy Cyber Attacks Disclosure Transparency Network Security Cybersecurity Awareness Data Controller Cloud Security Right to File a Complaint Malware Risk Management Cybersecurity Firewalls Data Subject Lawful Access Data Minimization Data Consent Data Recovery Privacy Impact Assessment Integration Sensitive Personal Information Rights of Data Subjects Consent
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Protection Officer
Identity Theft
Vulnerability
Backup
Strong Password
Rights of Data Subjects
Data Processor
Data Privacy Notice
Data Security
Personal Data
Right to rectify
Anonymization
Penalties
Access Control
Privacy Notice
Incident Report
Data Processing
Data Retention
Ransomware
National Privacy Commission
Containment
Integration
Data Storage
Phishing
Data Breach Notification
Right to Damages
Data Breach
Confidentiality
Compliance
Right to Erasure
Encryption
Multi-Factor Authentication
Right to Access
Privacy Policy
Cyber Attacks
Disclosure
Transparency
Network Security
Cybersecurity Awareness
Data Controller
Cloud Security
Right to File a Complaint
Malware
Risk Management
Cybersecurity
Firewalls
Data Subject
Lawful Access
Data Minimization
Data Consent
Data Recovery
Privacy Impact Assessment
Integration
Sensitive Personal Information
Rights of Data Subjects
Consent