Define non- malicious List out 4 risk handled by ACI? What risk handled by PF? List 4 teams under Trust What info can share with TLs/SME? ToS vs Community Standards 2 examples of Tier 2 Tier for Chargeback Ways to design for trust What risk handled by UKO? 2 examples of Tier 3 Tier for safety cases Proactive vs reactive teams What risk handled by RSE? 4 Nevers Define malicious Define non- malicious List out 4 risk handled by ACI? What risk handled by PF? List 4 teams under Trust What info can share with TLs/SME? ToS vs Community Standards 2 examples of Tier 2 Tier for Chargeback Ways to design for trust What risk handled by UKO? 2 examples of Tier 3 Tier for safety cases Proactive vs reactive teams What risk handled by RSE? 4 Nevers Define malicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Define non-malicious
List out 4 risk handled by ACI?
What risk handled by PF?
List 4 teams under Trust
What info can share with TLs/SME?
ToS vs Community Standards
2 examples of Tier 2
Tier for Chargeback
Ways to design for trust
What risk handled by UKO?
2 examples of Tier 3
Tier for safety cases
Proactive vs reactive teams
What risk handled by RSE?
4 Nevers
Define malicious