Encryption Right to rectify National Privacy Commission Consent Network Security Data Retention Cybersecurity Privacy Policy Access Control Sensitive Personal Information Malware Incident Report Cyber Attacks Strong Password Confidentiality Cybersecurity Awareness Personal Data Integration Right to Damages Lawful Access Privacy Impact Assessment Data Breach Notification Data Minimization Data Controller Data Subject Cloud Security Phishing Data Protection Officer Firewalls Penalties Data Breach Disclosure Data Recovery Risk Management Ransomware Rights of Data Subjects Right to Erasure Transparency Backup Right to File a Complaint Vulnerability Right to Access Data Processing Rights of Data Subjects Data Processor Integration Data Privacy Notice Multi-Factor Authentication Containment Data Security Privacy Notice Anonymization Data Storage Identity Theft Data Consent Compliance Encryption Right to rectify National Privacy Commission Consent Network Security Data Retention Cybersecurity Privacy Policy Access Control Sensitive Personal Information Malware Incident Report Cyber Attacks Strong Password Confidentiality Cybersecurity Awareness Personal Data Integration Right to Damages Lawful Access Privacy Impact Assessment Data Breach Notification Data Minimization Data Controller Data Subject Cloud Security Phishing Data Protection Officer Firewalls Penalties Data Breach Disclosure Data Recovery Risk Management Ransomware Rights of Data Subjects Right to Erasure Transparency Backup Right to File a Complaint Vulnerability Right to Access Data Processing Rights of Data Subjects Data Processor Integration Data Privacy Notice Multi-Factor Authentication Containment Data Security Privacy Notice Anonymization Data Storage Identity Theft Data Consent Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Right to rectify
National Privacy Commission
Consent
Network Security
Data Retention
Cybersecurity
Privacy Policy
Access Control
Sensitive Personal Information
Malware
Incident Report
Cyber Attacks
Strong Password
Confidentiality
Cybersecurity Awareness
Personal Data
Integration
Right to Damages
Lawful Access
Privacy Impact Assessment
Data Breach Notification
Data Minimization
Data Controller
Data Subject
Cloud Security
Phishing
Data Protection Officer
Firewalls
Penalties
Data Breach
Disclosure
Data Recovery
Risk Management
Ransomware
Rights of Data Subjects
Right to Erasure
Transparency
Backup
Right to File a Complaint
Vulnerability
Right to Access
Data Processing
Rights of Data Subjects
Data Processor
Integration
Data Privacy Notice
Multi-Factor Authentication
Containment
Data Security
Privacy Notice
Anonymization
Data Storage
Identity Theft
Data Consent
Compliance