Strong Password Penalties Data Breach Right to Erasure Data Breach Notification Data Security Phishing Containment Cloud Security Disclosure Data Retention Integration Privacy Policy Data Processing National Privacy Commission Data Controller Ransomware Data Privacy Notice Malware Network Security Data Minimization Right to Access Incident Report Access Control Data Storage Right to rectify Compliance Privacy Impact Assessment Rights of Data Subjects Rights of Data Subjects Anonymization Multi-Factor Authentication Data Subject Risk Management Data Recovery Privacy Notice Encryption Consent Right to File a Complaint Integration Backup Lawful Access Cybersecurity Transparency Personal Data Cybersecurity Awareness Identity Theft Right to Damages Data Consent Firewalls Sensitive Personal Information Confidentiality Data Processor Vulnerability Data Protection Officer Cyber Attacks Strong Password Penalties Data Breach Right to Erasure Data Breach Notification Data Security Phishing Containment Cloud Security Disclosure Data Retention Integration Privacy Policy Data Processing National Privacy Commission Data Controller Ransomware Data Privacy Notice Malware Network Security Data Minimization Right to Access Incident Report Access Control Data Storage Right to rectify Compliance Privacy Impact Assessment Rights of Data Subjects Rights of Data Subjects Anonymization Multi-Factor Authentication Data Subject Risk Management Data Recovery Privacy Notice Encryption Consent Right to File a Complaint Integration Backup Lawful Access Cybersecurity Transparency Personal Data Cybersecurity Awareness Identity Theft Right to Damages Data Consent Firewalls Sensitive Personal Information Confidentiality Data Processor Vulnerability Data Protection Officer Cyber Attacks
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Strong Password
Penalties
Data Breach
Right to Erasure
Data Breach Notification
Data Security
Phishing
Containment
Cloud Security
Disclosure
Data Retention
Integration
Privacy Policy
Data Processing
National Privacy Commission
Data Controller
Ransomware
Data Privacy Notice
Malware
Network Security
Data Minimization
Right to Access
Incident Report
Access Control
Data Storage
Right to rectify
Compliance
Privacy Impact Assessment
Rights of Data Subjects
Rights of Data Subjects
Anonymization
Multi-Factor Authentication
Data Subject
Risk Management
Data Recovery
Privacy Notice
Encryption
Consent
Right to File a Complaint
Integration
Backup
Lawful Access
Cybersecurity
Transparency
Personal Data
Cybersecurity Awareness
Identity Theft
Right to Damages
Data Consent
Firewalls
Sensitive Personal Information
Confidentiality
Data Processor
Vulnerability
Data Protection Officer
Cyber Attacks