Cybersecurity Awareness Data Breach Right to Access Penalties Right to Erasure Strong Password Integration Anonymization Containment Lawful Access Data Controller Phishing Cloud Security Data Processor Access Control Data Storage Rights of Data Subjects Ransomware Malware Data Retention Encryption Data Subject Multi-Factor Authentication Data Recovery Data Consent Data Breach Notification Sensitive Personal Information Vulnerability Cybersecurity Identity Theft Compliance National Privacy Commission Confidentiality Right to Damages Transparency Personal Data Network Security Privacy Notice Consent Risk Management Data Processing Privacy Policy Firewalls Incident Report Right to rectify Data Security Integration Data Minimization Data Protection Officer Disclosure Data Privacy Notice Rights of Data Subjects Cyber Attacks Privacy Impact Assessment Right to File a Complaint Backup Cybersecurity Awareness Data Breach Right to Access Penalties Right to Erasure Strong Password Integration Anonymization Containment Lawful Access Data Controller Phishing Cloud Security Data Processor Access Control Data Storage Rights of Data Subjects Ransomware Malware Data Retention Encryption Data Subject Multi-Factor Authentication Data Recovery Data Consent Data Breach Notification Sensitive Personal Information Vulnerability Cybersecurity Identity Theft Compliance National Privacy Commission Confidentiality Right to Damages Transparency Personal Data Network Security Privacy Notice Consent Risk Management Data Processing Privacy Policy Firewalls Incident Report Right to rectify Data Security Integration Data Minimization Data Protection Officer Disclosure Data Privacy Notice Rights of Data Subjects Cyber Attacks Privacy Impact Assessment Right to File a Complaint Backup
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Cybersecurity Awareness
Data Breach
Right to Access
Penalties
Right to Erasure
Strong Password
Integration
Anonymization
Containment
Lawful Access
Data Controller
Phishing
Cloud Security
Data Processor
Access Control
Data Storage
Rights of Data Subjects
Ransomware
Malware
Data Retention
Encryption
Data Subject
Multi-Factor Authentication
Data Recovery
Data Consent
Data Breach Notification
Sensitive Personal Information
Vulnerability
Cybersecurity
Identity Theft
Compliance
National Privacy Commission
Confidentiality
Right to Damages
Transparency
Personal Data
Network Security
Privacy Notice
Consent
Risk Management
Data Processing
Privacy Policy
Firewalls
Incident Report
Right to rectify
Data Security
Integration
Data Minimization
Data Protection Officer
Disclosure
Data Privacy Notice
Rights of Data Subjects
Cyber Attacks
Privacy Impact Assessment
Right to File a Complaint
Backup