Rights of Data Subjects Lawful Access Incident Report Containment Malware Encryption Data Minimization Transparency Identity Theft Penalties Disclosure Privacy Notice Cybersecurity Awareness Network Security Right to Erasure Ransomware Risk Management Data Protection Officer Rights of Data Subjects Personal Data Data Breach Right to Damages Data Consent Firewalls Confidentiality Data Processing Data Subject Privacy Impact Assessment Data Breach Notification Data Storage Access Control Strong Password Cyber Attacks Phishing Data Recovery Data Controller Data Retention Data Security Cybersecurity Anonymization Compliance Right to rectify Integration Right to Access Right to File a Complaint Data Processor Consent Integration Multi-Factor Authentication Cloud Security Vulnerability Privacy Policy National Privacy Commission Sensitive Personal Information Data Privacy Notice Backup Rights of Data Subjects Lawful Access Incident Report Containment Malware Encryption Data Minimization Transparency Identity Theft Penalties Disclosure Privacy Notice Cybersecurity Awareness Network Security Right to Erasure Ransomware Risk Management Data Protection Officer Rights of Data Subjects Personal Data Data Breach Right to Damages Data Consent Firewalls Confidentiality Data Processing Data Subject Privacy Impact Assessment Data Breach Notification Data Storage Access Control Strong Password Cyber Attacks Phishing Data Recovery Data Controller Data Retention Data Security Cybersecurity Anonymization Compliance Right to rectify Integration Right to Access Right to File a Complaint Data Processor Consent Integration Multi-Factor Authentication Cloud Security Vulnerability Privacy Policy National Privacy Commission Sensitive Personal Information Data Privacy Notice Backup
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Rights of Data Subjects
Lawful Access
Incident Report
Containment
Malware
Encryption
Data Minimization
Transparency
Identity Theft
Penalties
Disclosure
Privacy Notice
Cybersecurity Awareness
Network Security
Right to Erasure
Ransomware
Risk Management
Data Protection Officer
Rights of Data Subjects
Personal Data
Data Breach
Right to Damages
Data Consent
Firewalls
Confidentiality
Data Processing
Data Subject
Privacy Impact Assessment
Data Breach Notification
Data Storage
Access Control
Strong Password
Cyber Attacks
Phishing
Data Recovery
Data Controller
Data Retention
Data Security
Cybersecurity
Anonymization
Compliance
Right to rectify
Integration
Right to Access
Right to File a Complaint
Data Processor
Consent
Integration
Multi-Factor Authentication
Cloud Security
Vulnerability
Privacy Policy
National Privacy Commission
Sensitive Personal Information
Data Privacy Notice
Backup