CyberSecurityDeemedConsentC.A.R.EDataClassificationBring yourowndevice(BYOD)IncidentResponsePasswordEncryptionPDPCDataProtection7ZipMalwareFirewallBitLockerCleanDeskPolicyHackerITSupportNotificationInsiderThreatDataBreachBack-upRestrictedCSAInternetRiskPDPASocialEngineeringRetentionCyber-attackHackerWi-FiNine(9)DPOAccountabilityDigitalSecurityPrivacyPolicyConfidentialCybersecurityFive(5)CybercrimeRansomwarePersonalDataSocialEngineeringSmartDevicesAvailabilityIntegrityBusinesscontinuitymanagementPhishingEmailsITSecurityCyberSecurityDeemedConsentC.A.R.EDataClassificationBring yourowndevice(BYOD)IncidentResponsePasswordEncryptionPDPCDataProtection7ZipMalwareFirewallBitLockerCleanDeskPolicyHackerITSupportNotificationInsiderThreatDataBreachBack-upRestrictedCSAInternetRiskPDPASocialEngineeringRetentionCyber-attackHackerWi-FiNine(9)DPOAccountabilityDigitalSecurityPrivacyPolicyConfidentialCybersecurityFive(5)CybercrimeRansomwarePersonalDataSocialEngineeringSmartDevicesAvailabilityIntegrityBusinesscontinuitymanagementPhishingEmailsITSecurity

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Cyber Security
  2. Deemed Consent
  3. C.A.R.E
  4. Data Classification
  5. Bring your own device (BYOD)
  6. Incident Response
  7. Password
  8. Encryption
  9. PDPC
  10. Data Protection
  11. 7Zip
  12. Malware
  13. Firewall
  14. BitLocker
  15. Clean Desk Policy
  16. Hacker
  17. IT Support
  18. Notification
  19. Insider Threat
  20. Data Breach
  21. Back-up
  22. Restricted
  23. CSA
  24. Internet
  25. Risk
  26. PDPA
  27. Social Engineering
  28. Retention
  29. Cyber-attack
  30. Hacker
  31. Wi-Fi
  32. Nine (9)
  33. DPO
  34. Accountability
  35. Digital Security
  36. Privacy Policy
  37. Confidential
  38. Cybersecurity
  39. Five (5)
  40. Cybercrime
  41. Ransomware
  42. Personal Data
  43. Social Engineering
  44. Smart Devices
  45. Availability
  46. Integrity
  47. Business continuity management
  48. Phishing Emails
  49. IT Security