Firewalls Consent Penalties Rights of Data Subjects Data Protection Officer Data Privacy Notice Phishing Data Consent Right to Erasure Cybersecurity Identity Theft Data Breach Transparency Data Minimization Right to Damages Disclosure Right to rectify Data Subject Cloud Security Data Recovery Compliance Data Processor Cyber Attacks Access Control Privacy Policy Risk Management Malware Confidentiality Data Storage Network Security Sensitive Personal Information Privacy Notice Ransomware Integration Containment Anonymization Data Processing Data Controller Rights of Data Subjects Right to Access Data Security Integration National Privacy Commission Encryption Incident Report Right to File a Complaint Backup Personal Data Privacy Impact Assessment Lawful Access Vulnerability Multi-Factor Authentication Data Retention Strong Password Cybersecurity Awareness Data Breach Notification Firewalls Consent Penalties Rights of Data Subjects Data Protection Officer Data Privacy Notice Phishing Data Consent Right to Erasure Cybersecurity Identity Theft Data Breach Transparency Data Minimization Right to Damages Disclosure Right to rectify Data Subject Cloud Security Data Recovery Compliance Data Processor Cyber Attacks Access Control Privacy Policy Risk Management Malware Confidentiality Data Storage Network Security Sensitive Personal Information Privacy Notice Ransomware Integration Containment Anonymization Data Processing Data Controller Rights of Data Subjects Right to Access Data Security Integration National Privacy Commission Encryption Incident Report Right to File a Complaint Backup Personal Data Privacy Impact Assessment Lawful Access Vulnerability Multi-Factor Authentication Data Retention Strong Password Cybersecurity Awareness Data Breach Notification
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewalls
Consent
Penalties
Rights of Data Subjects
Data Protection Officer
Data Privacy Notice
Phishing
Data Consent
Right to Erasure
Cybersecurity
Identity Theft
Data Breach
Transparency
Data Minimization
Right to Damages
Disclosure
Right to rectify
Data Subject
Cloud Security
Data Recovery
Compliance
Data Processor
Cyber Attacks
Access Control
Privacy Policy
Risk Management
Malware
Confidentiality
Data Storage
Network Security
Sensitive Personal Information
Privacy Notice
Ransomware
Integration
Containment
Anonymization
Data Processing
Data Controller
Rights of Data Subjects
Right to Access
Data Security
Integration
National Privacy Commission
Encryption
Incident Report
Right to File a Complaint
Backup
Personal Data
Privacy Impact Assessment
Lawful Access
Vulnerability
Multi-Factor Authentication
Data Retention
Strong Password
Cybersecurity Awareness
Data Breach Notification