Ways todesignfor trustWhat infocan sharewithTLs/SME?2examplesof Tier 3DefinemaliciousList out 4riskhandledby ACI?Tier forChargebackWhat riskhandledby UKO?Tier forsafetycasesWhat riskhandledby PF?ToS vsCommunityStandards Definenon-maliciousProactivevsreactiveteamsWhat riskhandledby RSE?4Nevers2examplesof Tier 2List 4teamsunderTrustWays todesignfor trustWhat infocan sharewithTLs/SME?2examplesof Tier 3DefinemaliciousList out 4riskhandledby ACI?Tier forChargebackWhat riskhandledby UKO?Tier forsafetycasesWhat riskhandledby PF?ToS vsCommunityStandards Definenon-maliciousProactivevsreactiveteamsWhat riskhandledby RSE?4Nevers2examplesof Tier 2List 4teamsunderTrust

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Ways to design for trust
  2. What info can share with TLs/SME?
  3. 2 examples of Tier 3
  4. Define malicious
  5. List out 4 risk handled by ACI?
  6. Tier for Chargeback
  7. What risk handled by UKO?
  8. Tier for safety cases
  9. What risk handled by PF?
  10. ToS vs Community Standards
  11. Define non-malicious
  12. Proactive vs reactive teams
  13. What risk handled by RSE?
  14. 4 Nevers
  15. 2 examples of Tier 2
  16. List 4 teams under Trust