Data Protection Officer Identity Theft Lawful Access Cybersecurity Multi-Factor Authentication Penalties Encryption Confidentiality Disclosure Privacy Notice Anonymization Right to Damages Risk Management Privacy Policy Data Subject Data Breach Cybersecurity Awareness Containment Compliance Right to rectify Data Controller Data Security Phishing Data Retention Data Breach Notification Privacy Impact Assessment Data Consent Right to File a Complaint Integration Incident Report Integration Data Processor Personal Data Access Control Data Storage Firewalls Right to Access Consent Data Processing Data Privacy Notice Network Security Vulnerability Transparency Data Minimization Strong Password Ransomware Backup Cloud Security National Privacy Commission Data Recovery Rights of Data Subjects Right to Erasure Rights of Data Subjects Cyber Attacks Sensitive Personal Information Malware Data Protection Officer Identity Theft Lawful Access Cybersecurity Multi-Factor Authentication Penalties Encryption Confidentiality Disclosure Privacy Notice Anonymization Right to Damages Risk Management Privacy Policy Data Subject Data Breach Cybersecurity Awareness Containment Compliance Right to rectify Data Controller Data Security Phishing Data Retention Data Breach Notification Privacy Impact Assessment Data Consent Right to File a Complaint Integration Incident Report Integration Data Processor Personal Data Access Control Data Storage Firewalls Right to Access Consent Data Processing Data Privacy Notice Network Security Vulnerability Transparency Data Minimization Strong Password Ransomware Backup Cloud Security National Privacy Commission Data Recovery Rights of Data Subjects Right to Erasure Rights of Data Subjects Cyber Attacks Sensitive Personal Information Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Protection Officer
Identity Theft
Lawful Access
Cybersecurity
Multi-Factor Authentication
Penalties
Encryption
Confidentiality
Disclosure
Privacy Notice
Anonymization
Right to Damages
Risk Management
Privacy Policy
Data Subject
Data Breach
Cybersecurity Awareness
Containment
Compliance
Right to rectify
Data Controller
Data Security
Phishing
Data Retention
Data Breach Notification
Privacy Impact Assessment
Data Consent
Right to File a Complaint
Integration
Incident Report
Integration
Data Processor
Personal Data
Access Control
Data Storage
Firewalls
Right to Access
Consent
Data Processing
Data Privacy Notice
Network Security
Vulnerability
Transparency
Data Minimization
Strong Password
Ransomware
Backup
Cloud Security
National Privacy Commission
Data Recovery
Rights of Data Subjects
Right to Erasure
Rights of Data Subjects
Cyber Attacks
Sensitive Personal Information
Malware