Data Privacy Notice Data Breach Sensitive Personal Information Encryption Right to rectify Malware Backup Firewalls Data Security Right to Damages Integration Data Breach Notification Anonymization Data Processing Ransomware Identity Theft Cyber Attacks Cybersecurity Privacy Impact Assessment Phishing National Privacy Commission Data Subject Incident Report Data Recovery Data Consent Privacy Policy Personal Data Vulnerability Transparency Data Protection Officer Access Control Network Security Rights of Data Subjects Data Processor Integration Cybersecurity Awareness Containment Rights of Data Subjects Data Retention Disclosure Data Controller Right to Erasure Multi-Factor Authentication Consent Penalties Compliance Right to File a Complaint Strong Password Data Minimization Risk Management Lawful Access Data Storage Privacy Notice Cloud Security Confidentiality Right to Access Data Privacy Notice Data Breach Sensitive Personal Information Encryption Right to rectify Malware Backup Firewalls Data Security Right to Damages Integration Data Breach Notification Anonymization Data Processing Ransomware Identity Theft Cyber Attacks Cybersecurity Privacy Impact Assessment Phishing National Privacy Commission Data Subject Incident Report Data Recovery Data Consent Privacy Policy Personal Data Vulnerability Transparency Data Protection Officer Access Control Network Security Rights of Data Subjects Data Processor Integration Cybersecurity Awareness Containment Rights of Data Subjects Data Retention Disclosure Data Controller Right to Erasure Multi-Factor Authentication Consent Penalties Compliance Right to File a Complaint Strong Password Data Minimization Risk Management Lawful Access Data Storage Privacy Notice Cloud Security Confidentiality Right to Access
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Privacy Notice
Data Breach
Sensitive Personal Information
Encryption
Right to rectify
Malware
Backup
Firewalls
Data Security
Right to Damages
Integration
Data Breach Notification
Anonymization
Data Processing
Ransomware
Identity Theft
Cyber Attacks
Cybersecurity
Privacy Impact Assessment
Phishing
National Privacy Commission
Data Subject
Incident Report
Data Recovery
Data Consent
Privacy Policy
Personal Data
Vulnerability
Transparency
Data Protection Officer
Access Control
Network Security
Rights of Data Subjects
Data Processor
Integration
Cybersecurity Awareness
Containment
Rights of Data Subjects
Data Retention
Disclosure
Data Controller
Right to Erasure
Multi-Factor Authentication
Consent
Penalties
Compliance
Right to File a Complaint
Strong Password
Data Minimization
Risk Management
Lawful Access
Data Storage
Privacy Notice
Cloud Security
Confidentiality
Right to Access