Data Breach Firewalls National Privacy Commission Sensitive Personal Information Phishing Cloud Security Data Breach Notification Data Retention Containment Data Processor Rights of Data Subjects Integration Disclosure Vulnerability Integration Data Security Right to Access Cybersecurity Consent Malware Right to Erasure Data Subject Data Privacy Notice Ransomware Privacy Notice Privacy Impact Assessment Multi-Factor Authentication Personal Data Strong Password Data Controller Backup Data Storage Penalties Encryption Rights of Data Subjects Compliance Data Processing Privacy Policy Anonymization Network Security Confidentiality Data Recovery Data Consent Access Control Right to File a Complaint Data Protection Officer Cybersecurity Awareness Right to Damages Cyber Attacks Transparency Lawful Access Data Minimization Identity Theft Incident Report Right to rectify Risk Management Data Breach Firewalls National Privacy Commission Sensitive Personal Information Phishing Cloud Security Data Breach Notification Data Retention Containment Data Processor Rights of Data Subjects Integration Disclosure Vulnerability Integration Data Security Right to Access Cybersecurity Consent Malware Right to Erasure Data Subject Data Privacy Notice Ransomware Privacy Notice Privacy Impact Assessment Multi-Factor Authentication Personal Data Strong Password Data Controller Backup Data Storage Penalties Encryption Rights of Data Subjects Compliance Data Processing Privacy Policy Anonymization Network Security Confidentiality Data Recovery Data Consent Access Control Right to File a Complaint Data Protection Officer Cybersecurity Awareness Right to Damages Cyber Attacks Transparency Lawful Access Data Minimization Identity Theft Incident Report Right to rectify Risk Management
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
Firewalls
National Privacy Commission
Sensitive Personal Information
Phishing
Cloud Security
Data Breach Notification
Data Retention
Containment
Data Processor
Rights of Data Subjects
Integration
Disclosure
Vulnerability
Integration
Data Security
Right to Access
Cybersecurity
Consent
Malware
Right to Erasure
Data Subject
Data Privacy Notice
Ransomware
Privacy Notice
Privacy Impact Assessment
Multi-Factor Authentication
Personal Data
Strong Password
Data Controller
Backup
Data Storage
Penalties
Encryption
Rights of Data Subjects
Compliance
Data Processing
Privacy Policy
Anonymization
Network Security
Confidentiality
Data Recovery
Data Consent
Access Control
Right to File a Complaint
Data Protection Officer
Cybersecurity Awareness
Right to Damages
Cyber Attacks
Transparency
Lawful Access
Data Minimization
Identity Theft
Incident Report
Right to rectify
Risk Management