Integration Anonymization Compliance Data Minimization Sensitive Personal Information Data Privacy Notice Vulnerability Lawful Access Right to Damages Identity Theft National Privacy Commission Right to Access Integration Cyber Attacks Data Storage Privacy Impact Assessment Personal Data Ransomware Rights of Data Subjects Data Processing Data Protection Officer Incident Report Phishing Transparency Backup Confidentiality Data Recovery Privacy Policy Right to Erasure Data Breach Containment Cybersecurity Multi-Factor Authentication Data Breach Notification Consent Encryption Right to rectify Data Controller Data Subject Data Security Penalties Right to File a Complaint Data Processor Disclosure Data Consent Privacy Notice Data Retention Strong Password Network Security Rights of Data Subjects Risk Management Access Control Cloud Security Firewalls Malware Cybersecurity Awareness Integration Anonymization Compliance Data Minimization Sensitive Personal Information Data Privacy Notice Vulnerability Lawful Access Right to Damages Identity Theft National Privacy Commission Right to Access Integration Cyber Attacks Data Storage Privacy Impact Assessment Personal Data Ransomware Rights of Data Subjects Data Processing Data Protection Officer Incident Report Phishing Transparency Backup Confidentiality Data Recovery Privacy Policy Right to Erasure Data Breach Containment Cybersecurity Multi-Factor Authentication Data Breach Notification Consent Encryption Right to rectify Data Controller Data Subject Data Security Penalties Right to File a Complaint Data Processor Disclosure Data Consent Privacy Notice Data Retention Strong Password Network Security Rights of Data Subjects Risk Management Access Control Cloud Security Firewalls Malware Cybersecurity Awareness
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Integration
Anonymization
Compliance
Data Minimization
Sensitive Personal Information
Data Privacy Notice
Vulnerability
Lawful Access
Right to Damages
Identity Theft
National Privacy Commission
Right to Access
Integration
Cyber Attacks
Data Storage
Privacy Impact Assessment
Personal Data
Ransomware
Rights of Data Subjects
Data Processing
Data Protection Officer
Incident Report
Phishing
Transparency
Backup
Confidentiality
Data Recovery
Privacy Policy
Right to Erasure
Data Breach
Containment
Cybersecurity
Multi-Factor Authentication
Data Breach Notification
Consent
Encryption
Right to rectify
Data Controller
Data Subject
Data Security
Penalties
Right to File a Complaint
Data Processor
Disclosure
Data Consent
Privacy Notice
Data Retention
Strong Password
Network Security
Rights of Data Subjects
Risk Management
Access Control
Cloud Security
Firewalls
Malware
Cybersecurity Awareness