RiskRetentionCybersecurity PhishingEmailsInsiderThreatNotificationHackerDataBreachCyber-attackMalware7ZipInternetSocialEngineeringPrivacyPolicyCSAAccountabilityCyberSecurityFive(5)DeemedConsentFirewallWi-FiNine(9)C.A.R.EITSecurityBitLockerSocialEngineeringBack-upDataProtectionDPOConfidentialSmartDevicesPDPAHackerCybercrimeBusinesscontinuitymanagementRansomwareAvailabilityITSupportPersonalDataIntegrityCleanDeskPolicyEncryptionDataClassificationPasswordIncidentResponseDigitalSecurityRestrictedBring yourowndevice(BYOD)PDPCRiskRetentionCybersecurityPhishingEmailsInsiderThreatNotificationHackerDataBreachCyber-attackMalware7ZipInternetSocialEngineeringPrivacyPolicyCSAAccountabilityCyberSecurityFive(5)DeemedConsentFirewallWi-FiNine(9)C.A.R.EITSecurityBitLockerSocialEngineeringBack-upDataProtectionDPOConfidentialSmartDevicesPDPAHackerCybercrimeBusinesscontinuitymanagementRansomwareAvailabilityITSupportPersonalDataIntegrityCleanDeskPolicyEncryptionDataClassificationPasswordIncidentResponseDigitalSecurityRestrictedBring yourowndevice(BYOD)PDPC

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Risk
  2. Retention
  3. Cybersecurity
  4. Phishing Emails
  5. Insider Threat
  6. Notification
  7. Hacker
  8. Data Breach
  9. Cyber-attack
  10. Malware
  11. 7Zip
  12. Internet
  13. Social Engineering
  14. Privacy Policy
  15. CSA
  16. Accountability
  17. Cyber Security
  18. Five (5)
  19. Deemed Consent
  20. Firewall
  21. Wi-Fi
  22. Nine (9)
  23. C.A.R.E
  24. IT Security
  25. BitLocker
  26. Social Engineering
  27. Back-up
  28. Data Protection
  29. DPO
  30. Confidential
  31. Smart Devices
  32. PDPA
  33. Hacker
  34. Cybercrime
  35. Business continuity management
  36. Ransomware
  37. Availability
  38. IT Support
  39. Personal Data
  40. Integrity
  41. Clean Desk Policy
  42. Encryption
  43. Data Classification
  44. Password
  45. Incident Response
  46. Digital Security
  47. Restricted
  48. Bring your own device (BYOD)
  49. PDPC