Cloud Security Cyber Attacks Personal Data Data Minimization Risk Management Network Security Right to rectify Data Retention Transparency Firewalls Backup Compliance Rights of Data Subjects Right to Erasure Data Storage Incident Report Identity Theft Data Subject Right to Access Strong Password Access Control Integration Vulnerability Phishing Ransomware Cybersecurity Cybersecurity Awareness Data Recovery Anonymization Encryption Consent Data Breach Right to Damages Privacy Notice Disclosure Lawful Access Data Breach Notification Privacy Policy Privacy Impact Assessment Right to File a Complaint Data Protection Officer Sensitive Personal Information Penalties Containment Data Privacy Notice Integration Multi-Factor Authentication Data Processor Data Consent Data Controller Data Security National Privacy Commission Data Processing Confidentiality Malware Rights of Data Subjects Cloud Security Cyber Attacks Personal Data Data Minimization Risk Management Network Security Right to rectify Data Retention Transparency Firewalls Backup Compliance Rights of Data Subjects Right to Erasure Data Storage Incident Report Identity Theft Data Subject Right to Access Strong Password Access Control Integration Vulnerability Phishing Ransomware Cybersecurity Cybersecurity Awareness Data Recovery Anonymization Encryption Consent Data Breach Right to Damages Privacy Notice Disclosure Lawful Access Data Breach Notification Privacy Policy Privacy Impact Assessment Right to File a Complaint Data Protection Officer Sensitive Personal Information Penalties Containment Data Privacy Notice Integration Multi-Factor Authentication Data Processor Data Consent Data Controller Data Security National Privacy Commission Data Processing Confidentiality Malware Rights of Data Subjects
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cloud Security
Cyber Attacks
Personal Data
Data Minimization
Risk Management
Network Security
Right to rectify
Data Retention
Transparency
Firewalls
Backup
Compliance
Rights of Data Subjects
Right to Erasure
Data Storage
Incident Report
Identity Theft
Data Subject
Right to Access
Strong Password
Access Control
Integration
Vulnerability
Phishing
Ransomware
Cybersecurity
Cybersecurity Awareness
Data Recovery
Anonymization
Encryption
Consent
Data Breach
Right to Damages
Privacy Notice
Disclosure
Lawful Access
Data Breach Notification
Privacy Policy
Privacy Impact Assessment
Right to File a Complaint
Data Protection Officer
Sensitive Personal Information
Penalties
Containment
Data Privacy Notice
Integration
Multi-Factor Authentication
Data Processor
Data Consent
Data Controller
Data Security
National Privacy Commission
Data Processing
Confidentiality
Malware
Rights of Data Subjects