Firewalls Right to rectify Incident Report Right to File a Complaint Vulnerability Privacy Policy Transparency Backup Right to Erasure Lawful Access Rights of Data Subjects Cyber Attacks Integration Privacy Notice Data Processor Cloud Security Phishing Data Controller Identity Theft Data Breach Malware Strong Password Ransomware Risk Management Containment Data Consent Data Retention Right to Damages Data Processing Data Minimization Disclosure Confidentiality Compliance National Privacy Commission Access Control Sensitive Personal Information Data Subject Privacy Impact Assessment Encryption Personal Data Data Storage Right to Access Data Security Data Privacy Notice Data Breach Notification Rights of Data Subjects Data Recovery Cybersecurity Penalties Cybersecurity Awareness Network Security Integration Multi-Factor Authentication Consent Data Protection Officer Anonymization Firewalls Right to rectify Incident Report Right to File a Complaint Vulnerability Privacy Policy Transparency Backup Right to Erasure Lawful Access Rights of Data Subjects Cyber Attacks Integration Privacy Notice Data Processor Cloud Security Phishing Data Controller Identity Theft Data Breach Malware Strong Password Ransomware Risk Management Containment Data Consent Data Retention Right to Damages Data Processing Data Minimization Disclosure Confidentiality Compliance National Privacy Commission Access Control Sensitive Personal Information Data Subject Privacy Impact Assessment Encryption Personal Data Data Storage Right to Access Data Security Data Privacy Notice Data Breach Notification Rights of Data Subjects Data Recovery Cybersecurity Penalties Cybersecurity Awareness Network Security Integration Multi-Factor Authentication Consent Data Protection Officer Anonymization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewalls
Right to rectify
Incident Report
Right to File a Complaint
Vulnerability
Privacy Policy
Transparency
Backup
Right to Erasure
Lawful Access
Rights of Data Subjects
Cyber Attacks
Integration
Privacy Notice
Data Processor
Cloud Security
Phishing
Data Controller
Identity Theft
Data Breach
Malware
Strong Password
Ransomware
Risk Management
Containment
Data Consent
Data Retention
Right to Damages
Data Processing
Data Minimization
Disclosure
Confidentiality
Compliance
National Privacy Commission
Access Control
Sensitive Personal Information
Data Subject
Privacy Impact Assessment
Encryption
Personal Data
Data Storage
Right to Access
Data Security
Data Privacy Notice
Data Breach Notification
Rights of Data Subjects
Data Recovery
Cybersecurity
Penalties
Cybersecurity Awareness
Network Security
Integration
Multi-Factor Authentication
Consent
Data Protection Officer
Anonymization