2 examples of Tier 2 Ways to design for trust Tier for safety cases ToS vs Community Standards What risk handled by UKO? 4 Nevers 2 examples of Tier 3 Tier for Chargeback What risk handled by RSE? Define non- malicious Define malicious List out 4 risk handled by ACI? What info can share with TLs/SME? Proactive vs reactive teams List 4 teams under Trust What risk handled by PF? 2 examples of Tier 2 Ways to design for trust Tier for safety cases ToS vs Community Standards What risk handled by UKO? 4 Nevers 2 examples of Tier 3 Tier for Chargeback What risk handled by RSE? Define non- malicious Define malicious List out 4 risk handled by ACI? What info can share with TLs/SME? Proactive vs reactive teams List 4 teams under Trust What risk handled by PF?
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
2 examples of Tier 2
Ways to design for trust
Tier for safety cases
ToS vs Community Standards
What risk handled by UKO?
4 Nevers
2 examples of Tier 3
Tier for Chargeback
What risk handled by RSE?
Define non-malicious
Define malicious
List out 4 risk handled by ACI?
What info can share with TLs/SME?
Proactive vs reactive teams
List 4 teams under Trust
What risk handled by PF?