DPOInsiderThreatAvailabilityDataProtectionPrivacyPolicy ITSupportBitLockerDeemedConsentRansomwareConfidentialDigitalSecurityC.A.R.EPersonalDataCybercrimeIntegrityITSecurityDataBreachCleanDeskPolicyInternetMalwareNine(9)CyberSecurityEncryptionBack-upPDPADataClassificationSocialEngineeringCyber-attackCSANotificationPDPCFirewallPasswordHackerHacker7ZipFive(5)AccountabilityIncidentResponseCybersecurityRestrictedRetentionWi-FiPhishingEmailsRiskSocialEngineeringSmartDevicesBusinesscontinuitymanagementBring yourowndevice(BYOD)DPOInsiderThreatAvailabilityDataProtectionPrivacyPolicyITSupportBitLockerDeemedConsentRansomwareConfidentialDigitalSecurityC.A.R.EPersonalDataCybercrimeIntegrityITSecurityDataBreachCleanDeskPolicyInternetMalwareNine(9)CyberSecurityEncryptionBack-upPDPADataClassificationSocialEngineeringCyber-attackCSANotificationPDPCFirewallPasswordHackerHacker7ZipFive(5)AccountabilityIncidentResponseCybersecurityRestrictedRetentionWi-FiPhishingEmailsRiskSocialEngineeringSmartDevicesBusinesscontinuitymanagementBring yourowndevice(BYOD)

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. DPO
  2. Insider Threat
  3. Availability
  4. Data Protection
  5. Privacy Policy
  6. IT Support
  7. BitLocker
  8. Deemed Consent
  9. Ransomware
  10. Confidential
  11. Digital Security
  12. C.A.R.E
  13. Personal Data
  14. Cybercrime
  15. Integrity
  16. IT Security
  17. Data Breach
  18. Clean Desk Policy
  19. Internet
  20. Malware
  21. Nine (9)
  22. Cyber Security
  23. Encryption
  24. Back-up
  25. PDPA
  26. Data Classification
  27. Social Engineering
  28. Cyber-attack
  29. CSA
  30. Notification
  31. PDPC
  32. Firewall
  33. Password
  34. Hacker
  35. Hacker
  36. 7Zip
  37. Five (5)
  38. Accountability
  39. Incident Response
  40. Cybersecurity
  41. Restricted
  42. Retention
  43. Wi-Fi
  44. Phishing Emails
  45. Risk
  46. Social Engineering
  47. Smart Devices
  48. Business continuity management
  49. Bring your own device (BYOD)