Identity Theft Cyber Attacks Data Subject Right to Access Personal Data Compliance Transparency Data Controller Incident Report Data Security Backup Privacy Notice Strong Password Anonymization Cloud Security Firewalls Lawful Access Encryption Consent Phishing Penalties Rights of Data Subjects Right to Damages Disclosure Privacy Policy Integration Integration Data Consent Rights of Data Subjects Data Privacy Notice Data Minimization Data Protection Officer Risk Management Data Breach Cybersecurity Sensitive Personal Information Data Breach Notification Data Recovery Right to Erasure Data Retention Privacy Impact Assessment Vulnerability Right to File a Complaint Malware Cybersecurity Awareness Right to rectify Data Processing Ransomware Containment Access Control Confidentiality Multi-Factor Authentication Data Storage Data Processor National Privacy Commission Network Security Identity Theft Cyber Attacks Data Subject Right to Access Personal Data Compliance Transparency Data Controller Incident Report Data Security Backup Privacy Notice Strong Password Anonymization Cloud Security Firewalls Lawful Access Encryption Consent Phishing Penalties Rights of Data Subjects Right to Damages Disclosure Privacy Policy Integration Integration Data Consent Rights of Data Subjects Data Privacy Notice Data Minimization Data Protection Officer Risk Management Data Breach Cybersecurity Sensitive Personal Information Data Breach Notification Data Recovery Right to Erasure Data Retention Privacy Impact Assessment Vulnerability Right to File a Complaint Malware Cybersecurity Awareness Right to rectify Data Processing Ransomware Containment Access Control Confidentiality Multi-Factor Authentication Data Storage Data Processor National Privacy Commission Network Security
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Identity Theft
Cyber Attacks
Data Subject
Right to Access
Personal Data
Compliance
Transparency
Data Controller
Incident Report
Data Security
Backup
Privacy Notice
Strong Password
Anonymization
Cloud Security
Firewalls
Lawful Access
Encryption
Consent
Phishing
Penalties
Rights of Data Subjects
Right to Damages
Disclosure
Privacy Policy
Integration
Integration
Data Consent
Rights of Data Subjects
Data Privacy Notice
Data Minimization
Data Protection Officer
Risk Management
Data Breach
Cybersecurity
Sensitive Personal Information
Data Breach Notification
Data Recovery
Right to Erasure
Data Retention
Privacy Impact Assessment
Vulnerability
Right to File a Complaint
Malware
Cybersecurity Awareness
Right to rectify
Data Processing
Ransomware
Containment
Access Control
Confidentiality
Multi-Factor Authentication
Data Storage
Data Processor
National Privacy Commission
Network Security