Containment Phishing Network Security Confidentiality Access Control Data Retention Right to File a Complaint Backup Strong Password Data Breach Notification Penalties Encryption Rights of Data Subjects Data Processor Privacy Impact Assessment Cybersecurity Data Storage Cyber Attacks Right to rectify Compliance Integration Data Security Vulnerability Ransomware National Privacy Commission Data Privacy Notice Data Processing Integration Cloud Security Privacy Policy Firewalls Anonymization Data Consent Sensitive Personal Information Data Recovery Personal Data Transparency Data Minimization Malware Right to Damages Identity Theft Lawful Access Disclosure Data Controller Privacy Notice Consent Cybersecurity Awareness Incident Report Data Protection Officer Right to Access Risk Management Right to Erasure Rights of Data Subjects Multi-Factor Authentication Data Subject Data Breach Containment Phishing Network Security Confidentiality Access Control Data Retention Right to File a Complaint Backup Strong Password Data Breach Notification Penalties Encryption Rights of Data Subjects Data Processor Privacy Impact Assessment Cybersecurity Data Storage Cyber Attacks Right to rectify Compliance Integration Data Security Vulnerability Ransomware National Privacy Commission Data Privacy Notice Data Processing Integration Cloud Security Privacy Policy Firewalls Anonymization Data Consent Sensitive Personal Information Data Recovery Personal Data Transparency Data Minimization Malware Right to Damages Identity Theft Lawful Access Disclosure Data Controller Privacy Notice Consent Cybersecurity Awareness Incident Report Data Protection Officer Right to Access Risk Management Right to Erasure Rights of Data Subjects Multi-Factor Authentication Data Subject Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Containment
Phishing
Network Security
Confidentiality
Access Control
Data Retention
Right to File a Complaint
Backup
Strong Password
Data Breach Notification
Penalties
Encryption
Rights of Data Subjects
Data Processor
Privacy Impact Assessment
Cybersecurity
Data Storage
Cyber Attacks
Right to rectify
Compliance
Integration
Data Security
Vulnerability
Ransomware
National Privacy Commission
Data Privacy Notice
Data Processing
Integration
Cloud Security
Privacy Policy
Firewalls
Anonymization
Data Consent
Sensitive Personal Information
Data Recovery
Personal Data
Transparency
Data Minimization
Malware
Right to Damages
Identity Theft
Lawful Access
Disclosure
Data Controller
Privacy Notice
Consent
Cybersecurity Awareness
Incident Report
Data Protection Officer
Right to Access
Risk Management
Right to Erasure
Rights of Data Subjects
Multi-Factor Authentication
Data Subject
Data Breach