Consent Data Controller Right to Access Data Storage Penalties Access Control Network Security Integration Data Breach Notification Sensitive Personal Information Integration Data Breach Right to Damages Right to Erasure Multi-Factor Authentication Cybersecurity Awareness Phishing Strong Password Ransomware Data Processor Privacy Impact Assessment Rights of Data Subjects Malware Encryption Confidentiality Data Protection Officer Cybersecurity Personal Data National Privacy Commission Data Recovery Data Processing Data Minimization Disclosure Data Subject Data Privacy Notice Data Consent Risk Management Privacy Policy Backup Containment Privacy Notice Transparency Data Security Rights of Data Subjects Right to File a Complaint Right to rectify Vulnerability Identity Theft Cloud Security Incident Report Lawful Access Anonymization Compliance Firewalls Cyber Attacks Data Retention Consent Data Controller Right to Access Data Storage Penalties Access Control Network Security Integration Data Breach Notification Sensitive Personal Information Integration Data Breach Right to Damages Right to Erasure Multi-Factor Authentication Cybersecurity Awareness Phishing Strong Password Ransomware Data Processor Privacy Impact Assessment Rights of Data Subjects Malware Encryption Confidentiality Data Protection Officer Cybersecurity Personal Data National Privacy Commission Data Recovery Data Processing Data Minimization Disclosure Data Subject Data Privacy Notice Data Consent Risk Management Privacy Policy Backup Containment Privacy Notice Transparency Data Security Rights of Data Subjects Right to File a Complaint Right to rectify Vulnerability Identity Theft Cloud Security Incident Report Lawful Access Anonymization Compliance Firewalls Cyber Attacks Data Retention
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Consent
Data Controller
Right to Access
Data Storage
Penalties
Access Control
Network Security
Integration
Data Breach Notification
Sensitive Personal Information
Integration
Data Breach
Right to Damages
Right to Erasure
Multi-Factor Authentication
Cybersecurity Awareness
Phishing
Strong Password
Ransomware
Data Processor
Privacy Impact Assessment
Rights of Data Subjects
Malware
Encryption
Confidentiality
Data Protection Officer
Cybersecurity
Personal Data
National Privacy Commission
Data Recovery
Data Processing
Data Minimization
Disclosure
Data Subject
Data Privacy Notice
Data Consent
Risk Management
Privacy Policy
Backup
Containment
Privacy Notice
Transparency
Data Security
Rights of Data Subjects
Right to File a Complaint
Right to rectify
Vulnerability
Identity Theft
Cloud Security
Incident Report
Lawful Access
Anonymization
Compliance
Firewalls
Cyber Attacks
Data Retention