DataBreachCybercrimePDPCPersonalDataNine(9)PDPA MalwareDataProtectionITSecurityInsiderThreatITSupportDigitalSecurityNotificationDPOInternetRestrictedHackerRetentionSocialEngineeringC.A.R.EDeemedConsentFive(5)PhishingEmailsBring yourowndevice(BYOD)HackerAccountabilityAvailabilitySmartDevicesRansomwareCSAFirewallCyberSecurityBack-upPrivacyPolicyIncidentResponseSocialEngineering7ZipBitLockerEncryptionCybersecurityPasswordWi-FiCyber-attackDataClassificationRiskBusinesscontinuitymanagementCleanDeskPolicyIntegrityConfidentialDataBreachCybercrimePDPCPersonalDataNine(9)PDPAMalwareDataProtectionITSecurityInsiderThreatITSupportDigitalSecurityNotificationDPOInternetRestrictedHackerRetentionSocialEngineeringC.A.R.EDeemedConsentFive(5)PhishingEmailsBring yourowndevice(BYOD)HackerAccountabilityAvailabilitySmartDevicesRansomwareCSAFirewallCyberSecurityBack-upPrivacyPolicyIncidentResponseSocialEngineering7ZipBitLockerEncryptionCybersecurityPasswordWi-FiCyber-attackDataClassificationRiskBusinesscontinuitymanagementCleanDeskPolicyIntegrityConfidential

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Data Breach
  2. Cybercrime
  3. PDPC
  4. Personal Data
  5. Nine (9)
  6. PDPA
  7. Malware
  8. Data Protection
  9. IT Security
  10. Insider Threat
  11. IT Support
  12. Digital Security
  13. Notification
  14. DPO
  15. Internet
  16. Restricted
  17. Hacker
  18. Retention
  19. Social Engineering
  20. C.A.R.E
  21. Deemed Consent
  22. Five (5)
  23. Phishing Emails
  24. Bring your own device (BYOD)
  25. Hacker
  26. Accountability
  27. Availability
  28. Smart Devices
  29. Ransomware
  30. CSA
  31. Firewall
  32. Cyber Security
  33. Back-up
  34. Privacy Policy
  35. Incident Response
  36. Social Engineering
  37. 7Zip
  38. BitLocker
  39. Encryption
  40. Cybersecurity
  41. Password
  42. Wi-Fi
  43. Cyber-attack
  44. Data Classification
  45. Risk
  46. Business continuity management
  47. Clean Desk Policy
  48. Integrity
  49. Confidential