PrivacyNoticeInformationSecurityContactSharing/ShareVendorPolicySPIIHandlerSystemPrivacyOfficerConsultationPrivacyOfficerArtificialIntelligence(AI)ProcessingActivityPIIBusinessOwnerStandardsComplianceSecurityforPrivacySafeguardDataMinimizationRetainClassificationProtectionor ProtectTransparencyContractTermsPurposeDisclosurePrivacyRiskConsultDataPrivacyDisposalSPIIPrivacyPrinciplesUserRetentionIncidentRiskAssessmentDataBreachConsentAssetAccessCollectPrivacyNoticeInformationSecurityContactSharing/ShareVendorPolicySPIIHandlerSystemPrivacyOfficerConsultationPrivacyOfficerArtificialIntelligence(AI)ProcessingActivityPIIBusinessOwnerStandardsComplianceSecurityforPrivacySafeguardDataMinimizationRetainClassificationProtectionor ProtectTransparencyContractTermsPurposeDisclosurePrivacyRiskConsultDataPrivacyDisposalSPIIPrivacyPrinciplesUserRetentionIncidentRiskAssessmentDataBreachConsentAssetAccessCollect

BINGO for Privacy - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Privacy Notice
  2. Information Security Contact
  3. Sharing/Share
  4. Vendor
  5. Policy
  6. SPII Handler
  7. System Privacy Officer
  8. Consultation
  9. Privacy Officer
  10. Artificial Intelligence (AI)
  11. Processing Activity
  12. PII
  13. Business Owner
  14. Standards
  15. Compliance
  16. Security for Privacy
  17. Safeguard
  18. Data Minimization
  19. Retain
  20. Classification
  21. Protection or Protect
  22. Transparency
  23. Contract Terms
  24. Purpose
  25. Disclosure
  26. Privacy Risk
  27. Consult
  28. Data Privacy
  29. Disposal
  30. SPII
  31. Privacy Principles
  32. User
  33. Retention
  34. Incident
  35. Risk Assessment
  36. Data Breach
  37. Consent
  38. Asset
  39. Access
  40. Collect