Backup Rights of Data Subjects Disclosure Privacy Impact Assessment Data Processor Data Breach Right to Access Vulnerability Right to Erasure Consent Transparency Right to rectify Cybersecurity Awareness Integration Anonymization Ransomware Strong Password Incident Report Data Protection Officer Data Retention Data Consent Access Control Rights of Data Subjects Risk Management Multi-Factor Authentication Data Privacy Notice Data Processing Data Recovery Cloud Security Integration Right to Damages Data Minimization Personal Data Privacy Notice Compliance Network Security Encryption Data Security Data Storage Cyber Attacks Containment Firewalls Confidentiality Lawful Access Sensitive Personal Information National Privacy Commission Data Controller Cybersecurity Right to File a Complaint Privacy Policy Penalties Malware Data Subject Phishing Identity Theft Data Breach Notification Backup Rights of Data Subjects Disclosure Privacy Impact Assessment Data Processor Data Breach Right to Access Vulnerability Right to Erasure Consent Transparency Right to rectify Cybersecurity Awareness Integration Anonymization Ransomware Strong Password Incident Report Data Protection Officer Data Retention Data Consent Access Control Rights of Data Subjects Risk Management Multi-Factor Authentication Data Privacy Notice Data Processing Data Recovery Cloud Security Integration Right to Damages Data Minimization Personal Data Privacy Notice Compliance Network Security Encryption Data Security Data Storage Cyber Attacks Containment Firewalls Confidentiality Lawful Access Sensitive Personal Information National Privacy Commission Data Controller Cybersecurity Right to File a Complaint Privacy Policy Penalties Malware Data Subject Phishing Identity Theft Data Breach Notification
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Backup
Rights of Data Subjects
Disclosure
Privacy Impact Assessment
Data Processor
Data Breach
Right to Access
Vulnerability
Right to Erasure
Consent
Transparency
Right to rectify
Cybersecurity Awareness
Integration
Anonymization
Ransomware
Strong Password
Incident Report
Data Protection Officer
Data Retention
Data Consent
Access Control
Rights of Data Subjects
Risk Management
Multi-Factor Authentication
Data Privacy Notice
Data Processing
Data Recovery
Cloud Security
Integration
Right to Damages
Data Minimization
Personal Data
Privacy Notice
Compliance
Network Security
Encryption
Data Security
Data Storage
Cyber Attacks
Containment
Firewalls
Confidentiality
Lawful Access
Sensitive Personal Information
National Privacy Commission
Data Controller
Cybersecurity
Right to File a Complaint
Privacy Policy
Penalties
Malware
Data Subject
Phishing
Identity Theft
Data Breach Notification