Cybersecurity Anonymization Integration Privacy Impact Assessment Data Breach Notification Data Processor Ransomware Data Processing Right to Erasure Transparency Encryption Disclosure Incident Report Consent Data Recovery Phishing Compliance Lawful Access Backup Rights of Data Subjects Containment National Privacy Commission Data Minimization Data Protection Officer Network Security Data Storage Rights of Data Subjects Data Privacy Notice Data Security Risk Management Data Consent Malware Privacy Policy Privacy Notice Cybersecurity Awareness Data Breach Strong Password Data Retention Right to Damages Data Subject Vulnerability Right to rectify Cyber Attacks Identity Theft Right to File a Complaint Multi-Factor Authentication Access Control Integration Right to Access Personal Data Confidentiality Cloud Security Firewalls Data Controller Sensitive Personal Information Penalties Cybersecurity Anonymization Integration Privacy Impact Assessment Data Breach Notification Data Processor Ransomware Data Processing Right to Erasure Transparency Encryption Disclosure Incident Report Consent Data Recovery Phishing Compliance Lawful Access Backup Rights of Data Subjects Containment National Privacy Commission Data Minimization Data Protection Officer Network Security Data Storage Rights of Data Subjects Data Privacy Notice Data Security Risk Management Data Consent Malware Privacy Policy Privacy Notice Cybersecurity Awareness Data Breach Strong Password Data Retention Right to Damages Data Subject Vulnerability Right to rectify Cyber Attacks Identity Theft Right to File a Complaint Multi-Factor Authentication Access Control Integration Right to Access Personal Data Confidentiality Cloud Security Firewalls Data Controller Sensitive Personal Information Penalties
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity
Anonymization
Integration
Privacy Impact Assessment
Data Breach Notification
Data Processor
Ransomware
Data Processing
Right to Erasure
Transparency
Encryption
Disclosure
Incident Report
Consent
Data Recovery
Phishing
Compliance
Lawful Access
Backup
Rights of Data Subjects
Containment
National Privacy Commission
Data Minimization
Data Protection Officer
Network Security
Data Storage
Rights of Data Subjects
Data Privacy Notice
Data Security
Risk Management
Data Consent
Malware
Privacy Policy
Privacy Notice
Cybersecurity Awareness
Data Breach
Strong Password
Data Retention
Right to Damages
Data Subject
Vulnerability
Right to rectify
Cyber Attacks
Identity Theft
Right to File a Complaint
Multi-Factor Authentication
Access Control
Integration
Right to Access
Personal Data
Confidentiality
Cloud Security
Firewalls
Data Controller
Sensitive Personal Information
Penalties