Confidentiality Ransomware Lawful Access Phishing Right to Access Identity Theft Penalties Transparency Rights of Data Subjects Data Retention Right to rectify Backup Data Breach Data Storage Incident Report Disclosure Cyber Attacks Cloud Security National Privacy Commission Data Security Personal Data Right to Damages Strong Password Integration Network Security Cybersecurity Awareness Privacy Policy Right to File a Complaint Access Control Privacy Impact Assessment Data Breach Notification Data Processing Data Processor Anonymization Encryption Vulnerability Integration Multi-Factor Authentication Data Minimization Data Protection Officer Data Recovery Right to Erasure Data Controller Data Privacy Notice Risk Management Firewalls Compliance Data Consent Sensitive Personal Information Containment Rights of Data Subjects Consent Cybersecurity Malware Data Subject Privacy Notice Confidentiality Ransomware Lawful Access Phishing Right to Access Identity Theft Penalties Transparency Rights of Data Subjects Data Retention Right to rectify Backup Data Breach Data Storage Incident Report Disclosure Cyber Attacks Cloud Security National Privacy Commission Data Security Personal Data Right to Damages Strong Password Integration Network Security Cybersecurity Awareness Privacy Policy Right to File a Complaint Access Control Privacy Impact Assessment Data Breach Notification Data Processing Data Processor Anonymization Encryption Vulnerability Integration Multi-Factor Authentication Data Minimization Data Protection Officer Data Recovery Right to Erasure Data Controller Data Privacy Notice Risk Management Firewalls Compliance Data Consent Sensitive Personal Information Containment Rights of Data Subjects Consent Cybersecurity Malware Data Subject Privacy Notice
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Confidentiality
Ransomware
Lawful Access
Phishing
Right to Access
Identity Theft
Penalties
Transparency
Rights of Data Subjects
Data Retention
Right to rectify
Backup
Data Breach
Data Storage
Incident Report
Disclosure
Cyber Attacks
Cloud Security
National Privacy Commission
Data Security
Personal Data
Right to Damages
Strong Password
Integration
Network Security
Cybersecurity Awareness
Privacy Policy
Right to File a Complaint
Access Control
Privacy Impact Assessment
Data Breach Notification
Data Processing
Data Processor
Anonymization
Encryption
Vulnerability
Integration
Multi-Factor Authentication
Data Minimization
Data Protection Officer
Data Recovery
Right to Erasure
Data Controller
Data Privacy Notice
Risk Management
Firewalls
Compliance
Data Consent
Sensitive Personal Information
Containment
Rights of Data Subjects
Consent
Cybersecurity
Malware
Data Subject
Privacy Notice