Transparency Right to Damages Privacy Policy Rights of Data Subjects Disclosure Data Recovery Network Security Encryption Data Privacy Notice Data Consent Confidentiality Sensitive Personal Information Rights of Data Subjects Consent Right to Erasure Data Storage Data Security Data Protection Officer Containment Ransomware Right to rectify Cloud Security Vulnerability Data Breach Notification Data Controller Data Retention Firewalls Compliance Strong Password Data Breach Malware Cybersecurity Awareness Data Minimization Cyber Attacks Data Processing Identity Theft Anonymization Incident Report Right to File a Complaint Lawful Access Cybersecurity Right to Access Integration Multi-Factor Authentication Personal Data Privacy Impact Assessment Data Processor Integration Risk Management Access Control Privacy Notice Backup Data Subject Penalties National Privacy Commission Phishing Transparency Right to Damages Privacy Policy Rights of Data Subjects Disclosure Data Recovery Network Security Encryption Data Privacy Notice Data Consent Confidentiality Sensitive Personal Information Rights of Data Subjects Consent Right to Erasure Data Storage Data Security Data Protection Officer Containment Ransomware Right to rectify Cloud Security Vulnerability Data Breach Notification Data Controller Data Retention Firewalls Compliance Strong Password Data Breach Malware Cybersecurity Awareness Data Minimization Cyber Attacks Data Processing Identity Theft Anonymization Incident Report Right to File a Complaint Lawful Access Cybersecurity Right to Access Integration Multi-Factor Authentication Personal Data Privacy Impact Assessment Data Processor Integration Risk Management Access Control Privacy Notice Backup Data Subject Penalties National Privacy Commission Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Transparency
Right to Damages
Privacy Policy
Rights of Data Subjects
Disclosure
Data Recovery
Network Security
Encryption
Data Privacy Notice
Data Consent
Confidentiality
Sensitive Personal Information
Rights of Data Subjects
Consent
Right to Erasure
Data Storage
Data Security
Data Protection Officer
Containment
Ransomware
Right to rectify
Cloud Security
Vulnerability
Data Breach Notification
Data Controller
Data Retention
Firewalls
Compliance
Strong Password
Data Breach
Malware
Cybersecurity Awareness
Data Minimization
Cyber Attacks
Data Processing
Identity Theft
Anonymization
Incident Report
Right to File a Complaint
Lawful Access
Cybersecurity
Right to Access
Integration
Multi-Factor Authentication
Personal Data
Privacy Impact Assessment
Data Processor
Integration
Risk Management
Access Control
Privacy Notice
Backup
Data Subject
Penalties
National Privacy Commission
Phishing