AvailabilityPassword RansomwareBitLockerCyber-attackIncidentResponseSocialEngineeringSmartDevicesEncryptionPhishingEmailsDataClassificationCyberSecurityPDPCHackerCleanDeskPolicyNotification7ZipMalwareBusinesscontinuitymanagementRetentionCybersecurityInternetBring yourowndevice(BYOD)DigitalSecurityDeemedConsentDPORiskCSACybercrimeAccountabilityDataProtectionSocialEngineeringFirewallC.A.R.EIntegrityPrivacyPolicyITSupportWi-FiITSecurityInsiderThreatPDPANine(9)HackerDataBreachFive(5)PersonalDataConfidentialBack-upRestrictedAvailabilityPasswordRansomwareBitLockerCyber-attackIncidentResponseSocialEngineeringSmartDevicesEncryptionPhishingEmailsDataClassificationCyberSecurityPDPCHackerCleanDeskPolicyNotification7ZipMalwareBusinesscontinuitymanagementRetentionCybersecurityInternetBring yourowndevice(BYOD)DigitalSecurityDeemedConsentDPORiskCSACybercrimeAccountabilityDataProtectionSocialEngineeringFirewallC.A.R.EIntegrityPrivacyPolicyITSupportWi-FiITSecurityInsiderThreatPDPANine(9)HackerDataBreachFive(5)PersonalDataConfidentialBack-upRestricted

Compliance Initiative - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Availability
  2. Password
  3. Ransomware
  4. BitLocker
  5. Cyber-attack
  6. Incident Response
  7. Social Engineering
  8. Smart Devices
  9. Encryption
  10. Phishing Emails
  11. Data Classification
  12. Cyber Security
  13. PDPC
  14. Hacker
  15. Clean Desk Policy
  16. Notification
  17. 7Zip
  18. Malware
  19. Business continuity management
  20. Retention
  21. Cybersecurity
  22. Internet
  23. Bring your own device (BYOD)
  24. Digital Security
  25. Deemed Consent
  26. DPO
  27. Risk
  28. CSA
  29. Cybercrime
  30. Accountability
  31. Data Protection
  32. Social Engineering
  33. Firewall
  34. C.A.R.E
  35. Integrity
  36. Privacy Policy
  37. IT Support
  38. Wi-Fi
  39. IT Security
  40. Insider Threat
  41. PDPA
  42. Nine (9)
  43. Hacker
  44. Data Breach
  45. Five (5)
  46. Personal Data
  47. Confidential
  48. Back-up
  49. Restricted