Risk Management Right to rectify Data Consent Data Breach Notification Data Recovery Multi-Factor Authentication Compliance Data Security Firewalls Confidentiality Privacy Policy Data Retention Personal Data Access Control Integration Malware Privacy Impact Assessment Data Processing Containment Right to Erasure Data Storage Backup Ransomware Privacy Notice Data Subject Data Processor Cybersecurity Incident Report Data Protection Officer Lawful Access Cyber Attacks Network Security Right to File a Complaint Data Breach Rights of Data Subjects Data Privacy Notice Integration Cybersecurity Awareness Rights of Data Subjects National Privacy Commission Right to Access Cloud Security Right to Damages Phishing Sensitive Personal Information Data Controller Disclosure Anonymization Strong Password Transparency Identity Theft Penalties Vulnerability Data Minimization Consent Encryption Risk Management Right to rectify Data Consent Data Breach Notification Data Recovery Multi-Factor Authentication Compliance Data Security Firewalls Confidentiality Privacy Policy Data Retention Personal Data Access Control Integration Malware Privacy Impact Assessment Data Processing Containment Right to Erasure Data Storage Backup Ransomware Privacy Notice Data Subject Data Processor Cybersecurity Incident Report Data Protection Officer Lawful Access Cyber Attacks Network Security Right to File a Complaint Data Breach Rights of Data Subjects Data Privacy Notice Integration Cybersecurity Awareness Rights of Data Subjects National Privacy Commission Right to Access Cloud Security Right to Damages Phishing Sensitive Personal Information Data Controller Disclosure Anonymization Strong Password Transparency Identity Theft Penalties Vulnerability Data Minimization Consent Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk Management
Right to rectify
Data Consent
Data Breach Notification
Data Recovery
Multi-Factor Authentication
Compliance
Data Security
Firewalls
Confidentiality
Privacy Policy
Data Retention
Personal Data
Access Control
Integration
Malware
Privacy Impact Assessment
Data Processing
Containment
Right to Erasure
Data Storage
Backup
Ransomware
Privacy Notice
Data Subject
Data Processor
Cybersecurity
Incident Report
Data Protection Officer
Lawful Access
Cyber Attacks
Network Security
Right to File a Complaint
Data Breach
Rights of Data Subjects
Data Privacy Notice
Integration
Cybersecurity Awareness
Rights of Data Subjects
National Privacy Commission
Right to Access
Cloud Security
Right to Damages
Phishing
Sensitive Personal Information
Data Controller
Disclosure
Anonymization
Strong Password
Transparency
Identity Theft
Penalties
Vulnerability
Data Minimization
Consent
Encryption