What infocan sharewithTLs/SME?Ways todesignfor trust2examplesof Tier 2Definenon-maliciousWhat riskhandledby PF?List out 4riskhandledby ACI?DefinemaliciousProactivevsreactiveteamsWhat riskhandledby RSE?Tier forsafetycasesTier forChargebackWhat riskhandledby UKO?List 4teamsunderTrust4Nevers2examplesof Tier 3ToS vsCommunityStandards What infocan sharewithTLs/SME?Ways todesignfor trust2examplesof Tier 2Definenon-maliciousWhat riskhandledby PF?List out 4riskhandledby ACI?DefinemaliciousProactivevsreactiveteamsWhat riskhandledby RSE?Tier forsafetycasesTier forChargebackWhat riskhandledby UKO?List 4teamsunderTrust4Nevers2examplesof Tier 3ToS vsCommunityStandards 

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. What info can share with TLs/SME?
  2. Ways to design for trust
  3. 2 examples of Tier 2
  4. Define non-malicious
  5. What risk handled by PF?
  6. List out 4 risk handled by ACI?
  7. Define malicious
  8. Proactive vs reactive teams
  9. What risk handled by RSE?
  10. Tier for safety cases
  11. Tier for Chargeback
  12. What risk handled by UKO?
  13. List 4 teams under Trust
  14. 4 Nevers
  15. 2 examples of Tier 3
  16. ToS vs Community Standards