Five(5)PersonalDataFirewall MalwareDataBreachITSupportConfidentialCybersecurityCleanDeskPolicyAccountabilityDataProtectionIncidentResponseBring yourowndevice(BYOD)IntegrityRestrictedCybercrimeBack-upNine(9)PrivacyPolicyInternetCyber-attackPasswordDigitalSecurityPDPCPDPACyberSecurityBusinesscontinuitymanagementC.A.R.EHackerBitLockerInsiderThreatCSARetentionSmartDevicesDeemedConsent7ZipITSecurityNotificationSocialEngineeringPhishingEmailsRiskWi-FiAvailabilityDataClassificationRansomwareHackerDPOSocialEngineeringEncryptionFive(5)PersonalDataFirewallMalwareDataBreachITSupportConfidentialCybersecurityCleanDeskPolicyAccountabilityDataProtectionIncidentResponseBring yourowndevice(BYOD)IntegrityRestrictedCybercrimeBack-upNine(9)PrivacyPolicyInternetCyber-attackPasswordDigitalSecurityPDPCPDPACyberSecurityBusinesscontinuitymanagementC.A.R.EHackerBitLockerInsiderThreatCSARetentionSmartDevicesDeemedConsent7ZipITSecurityNotificationSocialEngineeringPhishingEmailsRiskWi-FiAvailabilityDataClassificationRansomwareHackerDPOSocialEngineeringEncryption

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Five (5)
  2. Personal Data
  3. Firewall
  4. Malware
  5. Data Breach
  6. IT Support
  7. Confidential
  8. Cybersecurity
  9. Clean Desk Policy
  10. Accountability
  11. Data Protection
  12. Incident Response
  13. Bring your own device (BYOD)
  14. Integrity
  15. Restricted
  16. Cybercrime
  17. Back-up
  18. Nine (9)
  19. Privacy Policy
  20. Internet
  21. Cyber-attack
  22. Password
  23. Digital Security
  24. PDPC
  25. PDPA
  26. Cyber Security
  27. Business continuity management
  28. C.A.R.E
  29. Hacker
  30. BitLocker
  31. Insider Threat
  32. CSA
  33. Retention
  34. Smart Devices
  35. Deemed Consent
  36. 7Zip
  37. IT Security
  38. Notification
  39. Social Engineering
  40. Phishing Emails
  41. Risk
  42. Wi-Fi
  43. Availability
  44. Data Classification
  45. Ransomware
  46. Hacker
  47. DPO
  48. Social Engineering
  49. Encryption