Data Subject Multi-Factor Authentication Disclosure Right to rectify Integration Containment Vulnerability Penalties Access Control Ransomware Compliance Backup Data Breach Notification Strong Password Data Storage Data Controller National Privacy Commission Data Processing Incident Report Malware Data Protection Officer Sensitive Personal Information Data Processor Privacy Impact Assessment Transparency Data Consent Data Security Consent Right to File a Complaint Identity Theft Encryption Right to Erasure Firewalls Data Privacy Notice Data Breach Cybersecurity Awareness Right to Access Cyber Attacks Network Security Privacy Notice Data Recovery Data Minimization Lawful Access Integration Anonymization Personal Data Phishing Right to Damages Rights of Data Subjects Rights of Data Subjects Risk Management Data Retention Cloud Security Cybersecurity Confidentiality Privacy Policy Data Subject Multi-Factor Authentication Disclosure Right to rectify Integration Containment Vulnerability Penalties Access Control Ransomware Compliance Backup Data Breach Notification Strong Password Data Storage Data Controller National Privacy Commission Data Processing Incident Report Malware Data Protection Officer Sensitive Personal Information Data Processor Privacy Impact Assessment Transparency Data Consent Data Security Consent Right to File a Complaint Identity Theft Encryption Right to Erasure Firewalls Data Privacy Notice Data Breach Cybersecurity Awareness Right to Access Cyber Attacks Network Security Privacy Notice Data Recovery Data Minimization Lawful Access Integration Anonymization Personal Data Phishing Right to Damages Rights of Data Subjects Rights of Data Subjects Risk Management Data Retention Cloud Security Cybersecurity Confidentiality Privacy Policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Subject
Multi-Factor Authentication
Disclosure
Right to rectify
Integration
Containment
Vulnerability
Penalties
Access Control
Ransomware
Compliance
Backup
Data Breach Notification
Strong Password
Data Storage
Data Controller
National Privacy Commission
Data Processing
Incident Report
Malware
Data Protection Officer
Sensitive Personal Information
Data Processor
Privacy Impact Assessment
Transparency
Data Consent
Data Security
Consent
Right to File a Complaint
Identity Theft
Encryption
Right to Erasure
Firewalls
Data Privacy Notice
Data Breach
Cybersecurity Awareness
Right to Access
Cyber Attacks
Network Security
Privacy Notice
Data Recovery
Data Minimization
Lawful Access
Integration
Anonymization
Personal Data
Phishing
Right to Damages
Rights of Data Subjects
Rights of Data Subjects
Risk Management
Data Retention
Cloud Security
Cybersecurity
Confidentiality
Privacy Policy