Anonymization Right to rectify Firewalls Multi-Factor Authentication Right to Damages Identity Theft Data Processor Cybersecurity Awareness Confidentiality Data Consent Malware Data Processing Containment National Privacy Commission Data Subject Data Controller Data Retention Privacy Impact Assessment Encryption Strong Password Privacy Policy Cyber Attacks Right to Access Ransomware Data Recovery Disclosure Data Breach Notification Risk Management Cloud Security Data Storage Network Security Access Control Integration Personal Data Transparency Data Security Right to File a Complaint Privacy Notice Data Privacy Notice Right to Erasure Incident Report Rights of Data Subjects Phishing Consent Integration Cybersecurity Data Minimization Vulnerability Penalties Lawful Access Rights of Data Subjects Data Breach Compliance Sensitive Personal Information Data Protection Officer Backup Anonymization Right to rectify Firewalls Multi-Factor Authentication Right to Damages Identity Theft Data Processor Cybersecurity Awareness Confidentiality Data Consent Malware Data Processing Containment National Privacy Commission Data Subject Data Controller Data Retention Privacy Impact Assessment Encryption Strong Password Privacy Policy Cyber Attacks Right to Access Ransomware Data Recovery Disclosure Data Breach Notification Risk Management Cloud Security Data Storage Network Security Access Control Integration Personal Data Transparency Data Security Right to File a Complaint Privacy Notice Data Privacy Notice Right to Erasure Incident Report Rights of Data Subjects Phishing Consent Integration Cybersecurity Data Minimization Vulnerability Penalties Lawful Access Rights of Data Subjects Data Breach Compliance Sensitive Personal Information Data Protection Officer Backup
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Anonymization
Right to rectify
Firewalls
Multi-Factor Authentication
Right to Damages
Identity Theft
Data Processor
Cybersecurity Awareness
Confidentiality
Data Consent
Malware
Data Processing
Containment
National Privacy Commission
Data Subject
Data Controller
Data Retention
Privacy Impact Assessment
Encryption
Strong Password
Privacy Policy
Cyber Attacks
Right to Access
Ransomware
Data Recovery
Disclosure
Data Breach Notification
Risk Management
Cloud Security
Data Storage
Network Security
Access Control
Integration
Personal Data
Transparency
Data Security
Right to File a Complaint
Privacy Notice
Data Privacy Notice
Right to Erasure
Incident Report
Rights of Data Subjects
Phishing
Consent
Integration
Cybersecurity
Data Minimization
Vulnerability
Penalties
Lawful Access
Rights of Data Subjects
Data Breach
Compliance
Sensitive Personal Information
Data Protection Officer
Backup