FirewallAccountabilityFive(5) HackerBusinesscontinuitymanagementCleanDeskPolicyDeemedConsentPhishingEmailsWi-Fi7ZipCyber-attackCybersecurityCSADPOHackerPrivacyPolicyPDPCDataClassificationBack-upITSecurityAvailabilityITSupportNine(9)MalwareSocialEngineeringBring yourowndevice(BYOD)RestrictedDigitalSecurityInternetRansomwareDataProtectionC.A.R.EIntegrityInsiderThreatBitLockerRiskNotificationIncidentResponseRetentionPersonalDataSmartDevicesPDPACyberSecurityConfidentialSocialEngineeringDataBreachPasswordCybercrimeEncryptionFirewallAccountabilityFive(5)HackerBusinesscontinuitymanagementCleanDeskPolicyDeemedConsentPhishingEmailsWi-Fi7ZipCyber-attackCybersecurityCSADPOHackerPrivacyPolicyPDPCDataClassificationBack-upITSecurityAvailabilityITSupportNine(9)MalwareSocialEngineeringBring yourowndevice(BYOD)RestrictedDigitalSecurityInternetRansomwareDataProtectionC.A.R.EIntegrityInsiderThreatBitLockerRiskNotificationIncidentResponseRetentionPersonalDataSmartDevicesPDPACyberSecurityConfidentialSocialEngineeringDataBreachPasswordCybercrimeEncryption

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Firewall
  2. Accountability
  3. Five (5)
  4. Hacker
  5. Business continuity management
  6. Clean Desk Policy
  7. Deemed Consent
  8. Phishing Emails
  9. Wi-Fi
  10. 7Zip
  11. Cyber-attack
  12. Cybersecurity
  13. CSA
  14. DPO
  15. Hacker
  16. Privacy Policy
  17. PDPC
  18. Data Classification
  19. Back-up
  20. IT Security
  21. Availability
  22. IT Support
  23. Nine (9)
  24. Malware
  25. Social Engineering
  26. Bring your own device (BYOD)
  27. Restricted
  28. Digital Security
  29. Internet
  30. Ransomware
  31. Data Protection
  32. C.A.R.E
  33. Integrity
  34. Insider Threat
  35. BitLocker
  36. Risk
  37. Notification
  38. Incident Response
  39. Retention
  40. Personal Data
  41. Smart Devices
  42. PDPA
  43. Cyber Security
  44. Confidential
  45. Social Engineering
  46. Data Breach
  47. Password
  48. Cybercrime
  49. Encryption