Incident Report Anonymization Strong Password Data Minimization Right to Erasure Consent Cybersecurity Awareness Data Storage Encryption National Privacy Commission Confidentiality Containment Network Security Disclosure Data Privacy Notice Rights of Data Subjects Privacy Notice Personal Data Ransomware Identity Theft Integration Backup Data Processor Integration Data Consent Right to File a Complaint Cloud Security Cyber Attacks Data Breach Notification Data Protection Officer Privacy Policy Malware Data Security Right to Access Penalties Phishing Transparency Right to Damages Firewalls Right to rectify Rights of Data Subjects Data Recovery Lawful Access Compliance Access Control Risk Management Privacy Impact Assessment Vulnerability Data Subject Multi-Factor Authentication Data Controller Data Breach Sensitive Personal Information Data Processing Cybersecurity Data Retention Incident Report Anonymization Strong Password Data Minimization Right to Erasure Consent Cybersecurity Awareness Data Storage Encryption National Privacy Commission Confidentiality Containment Network Security Disclosure Data Privacy Notice Rights of Data Subjects Privacy Notice Personal Data Ransomware Identity Theft Integration Backup Data Processor Integration Data Consent Right to File a Complaint Cloud Security Cyber Attacks Data Breach Notification Data Protection Officer Privacy Policy Malware Data Security Right to Access Penalties Phishing Transparency Right to Damages Firewalls Right to rectify Rights of Data Subjects Data Recovery Lawful Access Compliance Access Control Risk Management Privacy Impact Assessment Vulnerability Data Subject Multi-Factor Authentication Data Controller Data Breach Sensitive Personal Information Data Processing Cybersecurity Data Retention
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Incident Report
Anonymization
Strong Password
Data Minimization
Right to Erasure
Consent
Cybersecurity Awareness
Data Storage
Encryption
National Privacy Commission
Confidentiality
Containment
Network Security
Disclosure
Data Privacy Notice
Rights of Data Subjects
Privacy Notice
Personal Data
Ransomware
Identity Theft
Integration
Backup
Data Processor
Integration
Data Consent
Right to File a Complaint
Cloud Security
Cyber Attacks
Data Breach Notification
Data Protection Officer
Privacy Policy
Malware
Data Security
Right to Access
Penalties
Phishing
Transparency
Right to Damages
Firewalls
Right to rectify
Rights of Data Subjects
Data Recovery
Lawful Access
Compliance
Access Control
Risk Management
Privacy Impact Assessment
Vulnerability
Data Subject
Multi-Factor Authentication
Data Controller
Data Breach
Sensitive Personal Information
Data Processing
Cybersecurity
Data Retention