DeemedConsentDigitalSecuritySocialEngineeringCybercrime ITSecurityRetentionSocialEngineeringNine(9)InternetHackerMalwareHackerPrivacyPolicyFirewallConfidentialNotificationPasswordPersonalDataDPODataClassificationRiskDataProtectionCleanDeskPolicyAvailabilityRansomwareCSAITSupportBusinesscontinuitymanagementIntegrityPDPCCyber-attackFive(5)IncidentResponseSmartDevicesCyberSecurityAccountabilityCybersecurityEncryptionC.A.R.E7ZipDataBreachWi-FiPDPAPhishingEmailsBitLockerBring yourowndevice(BYOD)Back-upRestrictedInsiderThreatDeemedConsentDigitalSecuritySocialEngineeringCybercrimeITSecurityRetentionSocialEngineeringNine(9)InternetHackerMalwareHackerPrivacyPolicyFirewallConfidentialNotificationPasswordPersonalDataDPODataClassificationRiskDataProtectionCleanDeskPolicyAvailabilityRansomwareCSAITSupportBusinesscontinuitymanagementIntegrityPDPCCyber-attackFive(5)IncidentResponseSmartDevicesCyberSecurityAccountabilityCybersecurityEncryptionC.A.R.E7ZipDataBreachWi-FiPDPAPhishingEmailsBitLockerBring yourowndevice(BYOD)Back-upRestrictedInsiderThreat

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Deemed Consent
  2. Digital Security
  3. Social Engineering
  4. Cybercrime
  5. IT Security
  6. Retention
  7. Social Engineering
  8. Nine (9)
  9. Internet
  10. Hacker
  11. Malware
  12. Hacker
  13. Privacy Policy
  14. Firewall
  15. Confidential
  16. Notification
  17. Password
  18. Personal Data
  19. DPO
  20. Data Classification
  21. Risk
  22. Data Protection
  23. Clean Desk Policy
  24. Availability
  25. Ransomware
  26. CSA
  27. IT Support
  28. Business continuity management
  29. Integrity
  30. PDPC
  31. Cyber-attack
  32. Five (5)
  33. Incident Response
  34. Smart Devices
  35. Cyber Security
  36. Accountability
  37. Cybersecurity
  38. Encryption
  39. C.A.R.E
  40. 7Zip
  41. Data Breach
  42. Wi-Fi
  43. PDPA
  44. Phishing Emails
  45. BitLocker
  46. Bring your own device (BYOD)
  47. Back-up
  48. Restricted
  49. Insider Threat