Encryption Cybersecurity Anonymization Consent Right to Erasure Right to Damages Malware Right to File a Complaint Cyber Attacks Data Protection Officer Integration Rights of Data Subjects Rights of Data Subjects Privacy Policy Integration Phishing Sensitive Personal Information Data Subject Identity Theft Data Recovery Data Breach Notification Confidentiality Personal Data Data Minimization Right to rectify Data Processor Cybersecurity Awareness Incident Report Data Storage Data Retention Disclosure Containment Data Security Vulnerability Multi-Factor Authentication Network Security Lawful Access Privacy Impact Assessment Privacy Notice Ransomware Backup Data Consent National Privacy Commission Access Control Firewalls Compliance Strong Password Data Privacy Notice Data Breach Risk Management Data Controller Cloud Security Right to Access Transparency Data Processing Penalties Encryption Cybersecurity Anonymization Consent Right to Erasure Right to Damages Malware Right to File a Complaint Cyber Attacks Data Protection Officer Integration Rights of Data Subjects Rights of Data Subjects Privacy Policy Integration Phishing Sensitive Personal Information Data Subject Identity Theft Data Recovery Data Breach Notification Confidentiality Personal Data Data Minimization Right to rectify Data Processor Cybersecurity Awareness Incident Report Data Storage Data Retention Disclosure Containment Data Security Vulnerability Multi-Factor Authentication Network Security Lawful Access Privacy Impact Assessment Privacy Notice Ransomware Backup Data Consent National Privacy Commission Access Control Firewalls Compliance Strong Password Data Privacy Notice Data Breach Risk Management Data Controller Cloud Security Right to Access Transparency Data Processing Penalties
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Encryption
Cybersecurity
Anonymization
Consent
Right to Erasure
Right to Damages
Malware
Right to File a Complaint
Cyber Attacks
Data Protection Officer
Integration
Rights of Data Subjects
Rights of Data Subjects
Privacy Policy
Integration
Phishing
Sensitive Personal Information
Data Subject
Identity Theft
Data Recovery
Data Breach Notification
Confidentiality
Personal Data
Data Minimization
Right to rectify
Data Processor
Cybersecurity Awareness
Incident Report
Data Storage
Data Retention
Disclosure
Containment
Data Security
Vulnerability
Multi-Factor Authentication
Network Security
Lawful Access
Privacy Impact Assessment
Privacy Notice
Ransomware
Backup
Data Consent
National Privacy Commission
Access Control
Firewalls
Compliance
Strong Password
Data Privacy Notice
Data Breach
Risk Management
Data Controller
Cloud Security
Right to Access
Transparency
Data Processing
Penalties