Ways todesignfor trustWhat infocan sharewithTLs/SME?What riskhandledby UKO?List 4teamsunderTrustTier forChargeback2examplesof Tier 3ToS vsCommunityStandards What riskhandledby RSE?DefinemaliciousProactivevsreactiveteams2examplesof Tier 2What riskhandledby PF?Definenon-maliciousTier forsafetycases4NeversList out 4riskhandledby ACI?Ways todesignfor trustWhat infocan sharewithTLs/SME?What riskhandledby UKO?List 4teamsunderTrustTier forChargeback2examplesof Tier 3ToS vsCommunityStandards What riskhandledby RSE?DefinemaliciousProactivevsreactiveteams2examplesof Tier 2What riskhandledby PF?Definenon-maliciousTier forsafetycases4NeversList out 4riskhandledby ACI?

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Ways to design for trust
  2. What info can share with TLs/SME?
  3. What risk handled by UKO?
  4. List 4 teams under Trust
  5. Tier for Chargeback
  6. 2 examples of Tier 3
  7. ToS vs Community Standards
  8. What risk handled by RSE?
  9. Define malicious
  10. Proactive vs reactive teams
  11. 2 examples of Tier 2
  12. What risk handled by PF?
  13. Define non-malicious
  14. Tier for safety cases
  15. 4 Nevers
  16. List out 4 risk handled by ACI?