Personal Data Cloud Security Transparency Privacy Notice Strong Password Compliance Multi-Factor Authentication National Privacy Commission Data Breach Access Control Sensitive Personal Information Cybersecurity Right to Erasure Lawful Access Anonymization Backup Data Privacy Notice Network Security Ransomware Data Controller Firewalls Penalties Right to rectify Data Recovery Phishing Data Retention Consent Malware Cyber Attacks Vulnerability Risk Management Identity Theft Data Security Privacy Impact Assessment Rights of Data Subjects Data Processing Disclosure Right to Damages Right to Access Data Protection Officer Integration Rights of Data Subjects Data Consent Containment Right to File a Complaint Data Minimization Data Storage Integration Data Subject Confidentiality Data Breach Notification Privacy Policy Data Processor Cybersecurity Awareness Incident Report Encryption Personal Data Cloud Security Transparency Privacy Notice Strong Password Compliance Multi-Factor Authentication National Privacy Commission Data Breach Access Control Sensitive Personal Information Cybersecurity Right to Erasure Lawful Access Anonymization Backup Data Privacy Notice Network Security Ransomware Data Controller Firewalls Penalties Right to rectify Data Recovery Phishing Data Retention Consent Malware Cyber Attacks Vulnerability Risk Management Identity Theft Data Security Privacy Impact Assessment Rights of Data Subjects Data Processing Disclosure Right to Damages Right to Access Data Protection Officer Integration Rights of Data Subjects Data Consent Containment Right to File a Complaint Data Minimization Data Storage Integration Data Subject Confidentiality Data Breach Notification Privacy Policy Data Processor Cybersecurity Awareness Incident Report Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Personal Data
Cloud Security
Transparency
Privacy Notice
Strong Password
Compliance
Multi-Factor Authentication
National Privacy Commission
Data Breach
Access Control
Sensitive Personal Information
Cybersecurity
Right to Erasure
Lawful Access
Anonymization
Backup
Data Privacy Notice
Network Security
Ransomware
Data Controller
Firewalls
Penalties
Right to rectify
Data Recovery
Phishing
Data Retention
Consent
Malware
Cyber Attacks
Vulnerability
Risk Management
Identity Theft
Data Security
Privacy Impact Assessment
Rights of Data Subjects
Data Processing
Disclosure
Right to Damages
Right to Access
Data Protection Officer
Integration
Rights of Data Subjects
Data Consent
Containment
Right to File a Complaint
Data Minimization
Data Storage
Integration
Data Subject
Confidentiality
Data Breach Notification
Privacy Policy
Data Processor
Cybersecurity Awareness
Incident Report
Encryption