2 examples of Tier 2 What risk handled by RSE? Define non- malicious What info can share with TLs/SME? 4 Nevers 2 examples of Tier 3 Proactive vs reactive teams Define malicious List 4 teams under Trust Ways to design for trust What risk handled by PF? Tier for Chargeback List out 4 risk handled by ACI? Tier for safety cases ToS vs Community Standards What risk handled by UKO? 2 examples of Tier 2 What risk handled by RSE? Define non- malicious What info can share with TLs/SME? 4 Nevers 2 examples of Tier 3 Proactive vs reactive teams Define malicious List 4 teams under Trust Ways to design for trust What risk handled by PF? Tier for Chargeback List out 4 risk handled by ACI? Tier for safety cases ToS vs Community Standards What risk handled by UKO?
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
2 examples of Tier 2
What risk handled by RSE?
Define non-malicious
What info can share with TLs/SME?
4 Nevers
2 examples of Tier 3
Proactive vs reactive teams
Define malicious
List 4 teams under Trust
Ways to design for trust
What risk handled by PF?
Tier for Chargeback
List out 4 risk handled by ACI?
Tier for safety cases
ToS vs Community Standards
What risk handled by UKO?