Data Minimization Consent Incident Report Risk Management Cybersecurity Awareness Strong Password Access Control Integration Data Processing Confidentiality Data Breach Notification Network Security Cyber Attacks Data Protection Officer Right to Damages Encryption Compliance Right to Access Data Retention Malware Right to File a Complaint Right to Erasure Penalties Firewalls Privacy Impact Assessment Data Privacy Notice Phishing Identity Theft Cybersecurity Transparency Sensitive Personal Information National Privacy Commission Integration Containment Lawful Access Data Controller Data Consent Personal Data Rights of Data Subjects Rights of Data Subjects Disclosure Right to rectify Data Storage Data Recovery Data Processor Ransomware Privacy Notice Data Security Anonymization Multi-Factor Authentication Cloud Security Vulnerability Backup Data Breach Privacy Policy Data Subject Data Minimization Consent Incident Report Risk Management Cybersecurity Awareness Strong Password Access Control Integration Data Processing Confidentiality Data Breach Notification Network Security Cyber Attacks Data Protection Officer Right to Damages Encryption Compliance Right to Access Data Retention Malware Right to File a Complaint Right to Erasure Penalties Firewalls Privacy Impact Assessment Data Privacy Notice Phishing Identity Theft Cybersecurity Transparency Sensitive Personal Information National Privacy Commission Integration Containment Lawful Access Data Controller Data Consent Personal Data Rights of Data Subjects Rights of Data Subjects Disclosure Right to rectify Data Storage Data Recovery Data Processor Ransomware Privacy Notice Data Security Anonymization Multi-Factor Authentication Cloud Security Vulnerability Backup Data Breach Privacy Policy Data Subject
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Minimization
Consent
Incident Report
Risk Management
Cybersecurity Awareness
Strong Password
Access Control
Integration
Data Processing
Confidentiality
Data Breach Notification
Network Security
Cyber Attacks
Data Protection Officer
Right to Damages
Encryption
Compliance
Right to Access
Data Retention
Malware
Right to File a Complaint
Right to Erasure
Penalties
Firewalls
Privacy Impact Assessment
Data Privacy Notice
Phishing
Identity Theft
Cybersecurity
Transparency
Sensitive Personal Information
National Privacy Commission
Integration
Containment
Lawful Access
Data Controller
Data Consent
Personal Data
Rights of Data Subjects
Rights of Data Subjects
Disclosure
Right to rectify
Data Storage
Data Recovery
Data Processor
Ransomware
Privacy Notice
Data Security
Anonymization
Multi-Factor Authentication
Cloud Security
Vulnerability
Backup
Data Breach
Privacy Policy
Data Subject