Confidentiality Multi-Factor Authentication Integration Anonymization Privacy Impact Assessment Data Security Data Breach Notification Containment Disclosure Right to Damages Rights of Data Subjects Phishing Privacy Notice Data Minimization Data Privacy Notice Right to File a Complaint Access Control National Privacy Commission Data Storage Identity Theft Cybersecurity Risk Management Malware Data Breach Cybersecurity Awareness Data Controller Personal Data Data Retention Cloud Security Backup Penalties Sensitive Personal Information Firewalls Compliance Rights of Data Subjects Encryption Transparency Data Processing Data Processor Privacy Policy Data Consent Data Recovery Right to rectify Incident Report Right to Access Network Security Right to Erasure Data Subject Ransomware Data Protection Officer Lawful Access Strong Password Integration Vulnerability Cyber Attacks Consent Confidentiality Multi-Factor Authentication Integration Anonymization Privacy Impact Assessment Data Security Data Breach Notification Containment Disclosure Right to Damages Rights of Data Subjects Phishing Privacy Notice Data Minimization Data Privacy Notice Right to File a Complaint Access Control National Privacy Commission Data Storage Identity Theft Cybersecurity Risk Management Malware Data Breach Cybersecurity Awareness Data Controller Personal Data Data Retention Cloud Security Backup Penalties Sensitive Personal Information Firewalls Compliance Rights of Data Subjects Encryption Transparency Data Processing Data Processor Privacy Policy Data Consent Data Recovery Right to rectify Incident Report Right to Access Network Security Right to Erasure Data Subject Ransomware Data Protection Officer Lawful Access Strong Password Integration Vulnerability Cyber Attacks Consent
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Confidentiality
Multi-Factor Authentication
Integration
Anonymization
Privacy Impact Assessment
Data Security
Data Breach Notification
Containment
Disclosure
Right to Damages
Rights of Data Subjects
Phishing
Privacy Notice
Data Minimization
Data Privacy Notice
Right to File a Complaint
Access Control
National Privacy Commission
Data Storage
Identity Theft
Cybersecurity
Risk Management
Malware
Data Breach
Cybersecurity Awareness
Data Controller
Personal Data
Data Retention
Cloud Security
Backup
Penalties
Sensitive Personal Information
Firewalls
Compliance
Rights of Data Subjects
Encryption
Transparency
Data Processing
Data Processor
Privacy Policy
Data Consent
Data Recovery
Right to rectify
Incident Report
Right to Access
Network Security
Right to Erasure
Data Subject
Ransomware
Data Protection Officer
Lawful Access
Strong Password
Integration
Vulnerability
Cyber Attacks
Consent