AvailabilityPDPARisk CyberSecurityITSecurityAccountabilityCybersecurityCybercrimeMalwareFirewallHackerNine(9)PrivacyPolicyInsiderThreatConfidentialSocialEngineeringDeemedConsentIntegrityPasswordDataBreachIncidentResponseNotificationDataProtectionC.A.R.ECleanDeskPolicyRestrictedEncryptionRetentionRansomwareBring yourowndevice(BYOD)Wi-FiBusinesscontinuitymanagementCyber-attackITSupportBitLockerBack-upPDPCDPO7ZipDataClassificationSocialEngineeringSmartDevicesPersonalDataPhishingEmailsDigitalSecurityInternetHackerCSAFive(5)AvailabilityPDPARiskCyberSecurityITSecurityAccountabilityCybersecurityCybercrimeMalwareFirewallHackerNine(9)PrivacyPolicyInsiderThreatConfidentialSocialEngineeringDeemedConsentIntegrityPasswordDataBreachIncidentResponseNotificationDataProtectionC.A.R.ECleanDeskPolicyRestrictedEncryptionRetentionRansomwareBring yourowndevice(BYOD)Wi-FiBusinesscontinuitymanagementCyber-attackITSupportBitLockerBack-upPDPCDPO7ZipDataClassificationSocialEngineeringSmartDevicesPersonalDataPhishingEmailsDigitalSecurityInternetHackerCSAFive(5)

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Availability
  2. PDPA
  3. Risk
  4. Cyber Security
  5. IT Security
  6. Accountability
  7. Cybersecurity
  8. Cybercrime
  9. Malware
  10. Firewall
  11. Hacker
  12. Nine (9)
  13. Privacy Policy
  14. Insider Threat
  15. Confidential
  16. Social Engineering
  17. Deemed Consent
  18. Integrity
  19. Password
  20. Data Breach
  21. Incident Response
  22. Notification
  23. Data Protection
  24. C.A.R.E
  25. Clean Desk Policy
  26. Restricted
  27. Encryption
  28. Retention
  29. Ransomware
  30. Bring your own device (BYOD)
  31. Wi-Fi
  32. Business continuity management
  33. Cyber-attack
  34. IT Support
  35. BitLocker
  36. Back-up
  37. PDPC
  38. DPO
  39. 7Zip
  40. Data Classification
  41. Social Engineering
  42. Smart Devices
  43. Personal Data
  44. Phishing Emails
  45. Digital Security
  46. Internet
  47. Hacker
  48. CSA
  49. Five (5)