Rights of Data Subjects Network Security Cybersecurity Awareness Cyber Attacks Privacy Notice Data Breach Notification Lawful Access Confidentiality Data Storage Integration Privacy Impact Assessment Multi-Factor Authentication Personal Data Data Security Ransomware Identity Theft Data Recovery Transparency Cloud Security Risk Management Incident Report Data Controller Cybersecurity Data Protection Officer Phishing Disclosure Vulnerability Right to File a Complaint Penalties Data Subject Containment Backup Compliance Integration National Privacy Commission Privacy Policy Data Processor Sensitive Personal Information Anonymization Data Breach Data Retention Firewalls Consent Right to Access Data Privacy Notice Data Consent Data Processing Right to rectify Right to Damages Access Control Strong Password Right to Erasure Data Minimization Rights of Data Subjects Malware Encryption Rights of Data Subjects Network Security Cybersecurity Awareness Cyber Attacks Privacy Notice Data Breach Notification Lawful Access Confidentiality Data Storage Integration Privacy Impact Assessment Multi-Factor Authentication Personal Data Data Security Ransomware Identity Theft Data Recovery Transparency Cloud Security Risk Management Incident Report Data Controller Cybersecurity Data Protection Officer Phishing Disclosure Vulnerability Right to File a Complaint Penalties Data Subject Containment Backup Compliance Integration National Privacy Commission Privacy Policy Data Processor Sensitive Personal Information Anonymization Data Breach Data Retention Firewalls Consent Right to Access Data Privacy Notice Data Consent Data Processing Right to rectify Right to Damages Access Control Strong Password Right to Erasure Data Minimization Rights of Data Subjects Malware Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Rights of Data Subjects
Network Security
Cybersecurity Awareness
Cyber Attacks
Privacy Notice
Data Breach Notification
Lawful Access
Confidentiality
Data Storage
Integration
Privacy Impact Assessment
Multi-Factor Authentication
Personal Data
Data Security
Ransomware
Identity Theft
Data Recovery
Transparency
Cloud Security
Risk Management
Incident Report
Data Controller
Cybersecurity
Data Protection Officer
Phishing
Disclosure
Vulnerability
Right to File a Complaint
Penalties
Data Subject
Containment
Backup
Compliance
Integration
National Privacy Commission
Privacy Policy
Data Processor
Sensitive Personal Information
Anonymization
Data Breach
Data Retention
Firewalls
Consent
Right to Access
Data Privacy Notice
Data Consent
Data Processing
Right to rectify
Right to Damages
Access Control
Strong Password
Right to Erasure
Data Minimization
Rights of Data Subjects
Malware
Encryption