Encryption Data Breach Containment Disclosure Transparency National Privacy Commission Data Retention Data Subject Integration Incident Report Data Controller Data Recovery Phishing Cybersecurity Awareness Rights of Data Subjects Anonymization Ransomware Data Processing Right to Erasure Confidentiality Backup Right to Damages Data Security Lawful Access Rights of Data Subjects Network Security Multi-Factor Authentication Penalties Malware Privacy Notice Data Protection Officer Data Processor Vulnerability Firewalls Cloud Security Identity Theft Right to Access Compliance Right to rectify Cybersecurity Data Minimization Consent Data Privacy Notice Integration Right to File a Complaint Cyber Attacks Privacy Policy Privacy Impact Assessment Data Storage Personal Data Risk Management Access Control Data Breach Notification Strong Password Data Consent Sensitive Personal Information Encryption Data Breach Containment Disclosure Transparency National Privacy Commission Data Retention Data Subject Integration Incident Report Data Controller Data Recovery Phishing Cybersecurity Awareness Rights of Data Subjects Anonymization Ransomware Data Processing Right to Erasure Confidentiality Backup Right to Damages Data Security Lawful Access Rights of Data Subjects Network Security Multi-Factor Authentication Penalties Malware Privacy Notice Data Protection Officer Data Processor Vulnerability Firewalls Cloud Security Identity Theft Right to Access Compliance Right to rectify Cybersecurity Data Minimization Consent Data Privacy Notice Integration Right to File a Complaint Cyber Attacks Privacy Policy Privacy Impact Assessment Data Storage Personal Data Risk Management Access Control Data Breach Notification Strong Password Data Consent Sensitive Personal Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Data Breach
Containment
Disclosure
Transparency
National Privacy Commission
Data Retention
Data Subject
Integration
Incident Report
Data Controller
Data Recovery
Phishing
Cybersecurity Awareness
Rights of Data Subjects
Anonymization
Ransomware
Data Processing
Right to Erasure
Confidentiality
Backup
Right to Damages
Data Security
Lawful Access
Rights of Data Subjects
Network Security
Multi-Factor Authentication
Penalties
Malware
Privacy Notice
Data Protection Officer
Data Processor
Vulnerability
Firewalls
Cloud Security
Identity Theft
Right to Access
Compliance
Right to rectify
Cybersecurity
Data Minimization
Consent
Data Privacy Notice
Integration
Right to File a Complaint
Cyber Attacks
Privacy Policy
Privacy Impact Assessment
Data Storage
Personal Data
Risk Management
Access Control
Data Breach Notification
Strong Password
Data Consent
Sensitive Personal Information