ContractTermsSPIIHandlerPIIPrivacyNoticeDisposalUserProtectionor ProtectPrivacyOfficerArtificialIntelligence(AI)AccessSystemPrivacyOfficerVendorDataMinimizationSPIIRetentionClassificationProcessingActivityComplianceIncidentDisclosureConsultAssetTransparencyInformationSecurityContactSafeguardStandardsRetainConsentPrivacyRiskCollectPolicyDataPrivacySharing/ShareSecurityforPrivacyPrivacyPrinciplesPurposeRiskAssessmentDataBreachBusinessOwnerConsultationContractTermsSPIIHandlerPIIPrivacyNoticeDisposalUserProtectionor ProtectPrivacyOfficerArtificialIntelligence(AI)AccessSystemPrivacyOfficerVendorDataMinimizationSPIIRetentionClassificationProcessingActivityComplianceIncidentDisclosureConsultAssetTransparencyInformationSecurityContactSafeguardStandardsRetainConsentPrivacyRiskCollectPolicyDataPrivacySharing/ShareSecurityforPrivacyPrivacyPrinciplesPurposeRiskAssessmentDataBreachBusinessOwnerConsultation

BINGO for Privacy - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Contract Terms
  2. SPII Handler
  3. PII
  4. Privacy Notice
  5. Disposal
  6. User
  7. Protection or Protect
  8. Privacy Officer
  9. Artificial Intelligence (AI)
  10. Access
  11. System Privacy Officer
  12. Vendor
  13. Data Minimization
  14. SPII
  15. Retention
  16. Classification
  17. Processing Activity
  18. Compliance
  19. Incident
  20. Disclosure
  21. Consult
  22. Asset
  23. Transparency
  24. Information Security Contact
  25. Safeguard
  26. Standards
  27. Retain
  28. Consent
  29. Privacy Risk
  30. Collect
  31. Policy
  32. Data Privacy
  33. Sharing/Share
  34. Security for Privacy
  35. Privacy Principles
  36. Purpose
  37. Risk Assessment
  38. Data Breach
  39. Business Owner
  40. Consultation