Data Minimization Integration Right to Access Data Retention Identity Theft Backup Privacy Notice Ransomware Transparency Data Storage Data Processing Malware Cyber Attacks Data Breach Integration Data Consent Encryption Access Control Data Breach Notification National Privacy Commission Risk Management Rights of Data Subjects Right to Damages Privacy Policy Rights of Data Subjects Vulnerability Compliance Incident Report Phishing Consent Data Security Network Security Cloud Security Firewalls Confidentiality Strong Password Data Processor Right to File a Complaint Containment Right to rectify Cybersecurity Data Subject Sensitive Personal Information Anonymization Right to Erasure Data Controller Disclosure Lawful Access Cybersecurity Awareness Data Privacy Notice Data Recovery Multi-Factor Authentication Penalties Privacy Impact Assessment Data Protection Officer Personal Data Data Minimization Integration Right to Access Data Retention Identity Theft Backup Privacy Notice Ransomware Transparency Data Storage Data Processing Malware Cyber Attacks Data Breach Integration Data Consent Encryption Access Control Data Breach Notification National Privacy Commission Risk Management Rights of Data Subjects Right to Damages Privacy Policy Rights of Data Subjects Vulnerability Compliance Incident Report Phishing Consent Data Security Network Security Cloud Security Firewalls Confidentiality Strong Password Data Processor Right to File a Complaint Containment Right to rectify Cybersecurity Data Subject Sensitive Personal Information Anonymization Right to Erasure Data Controller Disclosure Lawful Access Cybersecurity Awareness Data Privacy Notice Data Recovery Multi-Factor Authentication Penalties Privacy Impact Assessment Data Protection Officer Personal Data
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Minimization
Integration
Right to Access
Data Retention
Identity Theft
Backup
Privacy Notice
Ransomware
Transparency
Data Storage
Data Processing
Malware
Cyber Attacks
Data Breach
Integration
Data Consent
Encryption
Access Control
Data Breach Notification
National Privacy Commission
Risk Management
Rights of Data Subjects
Right to Damages
Privacy Policy
Rights of Data Subjects
Vulnerability
Compliance
Incident Report
Phishing
Consent
Data Security
Network Security
Cloud Security
Firewalls
Confidentiality
Strong Password
Data Processor
Right to File a Complaint
Containment
Right to rectify
Cybersecurity
Data Subject
Sensitive Personal Information
Anonymization
Right to Erasure
Data Controller
Disclosure
Lawful Access
Cybersecurity Awareness
Data Privacy Notice
Data Recovery
Multi-Factor Authentication
Penalties
Privacy Impact Assessment
Data Protection Officer
Personal Data