Malware Risk Management Data Retention Cyber Attacks Data Consent Incident Report Anonymization Ransomware Data Controller Cybersecurity Right to Erasure Data Processing Data Protection Officer Rights of Data Subjects Integration Data Minimization Phishing Lawful Access Data Subject Containment Firewalls Access Control Data Breach Notification Data Storage Penalties Personal Data Strong Password Multi-Factor Authentication Data Privacy Notice Right to Access Compliance Encryption Integration Right to rectify Vulnerability National Privacy Commission Cybersecurity Awareness Right to Damages Sensitive Personal Information Identity Theft Data Security Cloud Security Privacy Policy Data Breach Confidentiality Network Security Data Recovery Consent Privacy Notice Right to File a Complaint Backup Disclosure Data Processor Transparency Rights of Data Subjects Privacy Impact Assessment Malware Risk Management Data Retention Cyber Attacks Data Consent Incident Report Anonymization Ransomware Data Controller Cybersecurity Right to Erasure Data Processing Data Protection Officer Rights of Data Subjects Integration Data Minimization Phishing Lawful Access Data Subject Containment Firewalls Access Control Data Breach Notification Data Storage Penalties Personal Data Strong Password Multi-Factor Authentication Data Privacy Notice Right to Access Compliance Encryption Integration Right to rectify Vulnerability National Privacy Commission Cybersecurity Awareness Right to Damages Sensitive Personal Information Identity Theft Data Security Cloud Security Privacy Policy Data Breach Confidentiality Network Security Data Recovery Consent Privacy Notice Right to File a Complaint Backup Disclosure Data Processor Transparency Rights of Data Subjects Privacy Impact Assessment
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malware
Risk Management
Data Retention
Cyber Attacks
Data Consent
Incident Report
Anonymization
Ransomware
Data Controller
Cybersecurity
Right to Erasure
Data Processing
Data Protection Officer
Rights of Data Subjects
Integration
Data Minimization
Phishing
Lawful Access
Data Subject
Containment
Firewalls
Access Control
Data Breach Notification
Data Storage
Penalties
Personal Data
Strong Password
Multi-Factor Authentication
Data Privacy Notice
Right to Access
Compliance
Encryption
Integration
Right to rectify
Vulnerability
National Privacy Commission
Cybersecurity Awareness
Right to Damages
Sensitive Personal Information
Identity Theft
Data Security
Cloud Security
Privacy Policy
Data Breach
Confidentiality
Network Security
Data Recovery
Consent
Privacy Notice
Right to File a Complaint
Backup
Disclosure
Data Processor
Transparency
Rights of Data Subjects
Privacy Impact Assessment