Data Breach Notification Data Minimization Confidentiality Data Retention National Privacy Commission Data Processor Data Breach Right to File a Complaint Data Recovery Sensitive Personal Information Privacy Notice Lawful Access Backup Personal Data Cyber Attacks Network Security Multi-Factor Authentication Data Processing Privacy Impact Assessment Penalties Firewalls Data Controller Containment Integration Data Protection Officer Right to Damages Identity Theft Consent Transparency Phishing Rights of Data Subjects Incident Report Data Consent Data Security Compliance Cybersecurity Privacy Policy Disclosure Strong Password Anonymization Ransomware Vulnerability Right to Access Cloud Security Encryption Integration Malware Right to Erasure Data Privacy Notice Access Control Right to rectify Data Storage Rights of Data Subjects Cybersecurity Awareness Risk Management Data Subject Data Breach Notification Data Minimization Confidentiality Data Retention National Privacy Commission Data Processor Data Breach Right to File a Complaint Data Recovery Sensitive Personal Information Privacy Notice Lawful Access Backup Personal Data Cyber Attacks Network Security Multi-Factor Authentication Data Processing Privacy Impact Assessment Penalties Firewalls Data Controller Containment Integration Data Protection Officer Right to Damages Identity Theft Consent Transparency Phishing Rights of Data Subjects Incident Report Data Consent Data Security Compliance Cybersecurity Privacy Policy Disclosure Strong Password Anonymization Ransomware Vulnerability Right to Access Cloud Security Encryption Integration Malware Right to Erasure Data Privacy Notice Access Control Right to rectify Data Storage Rights of Data Subjects Cybersecurity Awareness Risk Management Data Subject
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach Notification
Data Minimization
Confidentiality
Data Retention
National Privacy Commission
Data Processor
Data Breach
Right to File a Complaint
Data Recovery
Sensitive Personal Information
Privacy Notice
Lawful Access
Backup
Personal Data
Cyber Attacks
Network Security
Multi-Factor Authentication
Data Processing
Privacy Impact Assessment
Penalties
Firewalls
Data Controller
Containment
Integration
Data Protection Officer
Right to Damages
Identity Theft
Consent
Transparency
Phishing
Rights of Data Subjects
Incident Report
Data Consent
Data Security
Compliance
Cybersecurity
Privacy Policy
Disclosure
Strong Password
Anonymization
Ransomware
Vulnerability
Right to Access
Cloud Security
Encryption
Integration
Malware
Right to Erasure
Data Privacy Notice
Access Control
Right to rectify
Data Storage
Rights of Data Subjects
Cybersecurity Awareness
Risk Management
Data Subject