Data Breach Notification Disclosure National Privacy Commission Access Control Cybersecurity Awareness Malware Right to Erasure Data Recovery Vulnerability Sensitive Personal Information Identity Theft Cyber Attacks Consent Right to rectify Anonymization Penalties Ransomware Data Processor Data Retention Data Minimization Data Consent Incident Report Privacy Policy Data Storage Integration Confidentiality Right to Damages Cloud Security Right to Access Privacy Impact Assessment Rights of Data Subjects Data Processing Right to File a Complaint Encryption Data Controller Integration Phishing Personal Data Rights of Data Subjects Privacy Notice Strong Password Lawful Access Transparency Containment Firewalls Network Security Data Security Compliance Data Subject Data Protection Officer Data Privacy Notice Cybersecurity Data Breach Multi-Factor Authentication Risk Management Backup Data Breach Notification Disclosure National Privacy Commission Access Control Cybersecurity Awareness Malware Right to Erasure Data Recovery Vulnerability Sensitive Personal Information Identity Theft Cyber Attacks Consent Right to rectify Anonymization Penalties Ransomware Data Processor Data Retention Data Minimization Data Consent Incident Report Privacy Policy Data Storage Integration Confidentiality Right to Damages Cloud Security Right to Access Privacy Impact Assessment Rights of Data Subjects Data Processing Right to File a Complaint Encryption Data Controller Integration Phishing Personal Data Rights of Data Subjects Privacy Notice Strong Password Lawful Access Transparency Containment Firewalls Network Security Data Security Compliance Data Subject Data Protection Officer Data Privacy Notice Cybersecurity Data Breach Multi-Factor Authentication Risk Management Backup
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach Notification
Disclosure
National Privacy Commission
Access Control
Cybersecurity Awareness
Malware
Right to Erasure
Data Recovery
Vulnerability
Sensitive Personal Information
Identity Theft
Cyber Attacks
Consent
Right to rectify
Anonymization
Penalties
Ransomware
Data Processor
Data Retention
Data Minimization
Data Consent
Incident Report
Privacy Policy
Data Storage
Integration
Confidentiality
Right to Damages
Cloud Security
Right to Access
Privacy Impact Assessment
Rights of Data Subjects
Data Processing
Right to File a Complaint
Encryption
Data Controller
Integration
Phishing
Personal Data
Rights of Data Subjects
Privacy Notice
Strong Password
Lawful Access
Transparency
Containment
Firewalls
Network Security
Data Security
Compliance
Data Subject
Data Protection Officer
Data Privacy Notice
Cybersecurity
Data Breach
Multi-Factor Authentication
Risk Management
Backup