ProactivevsreactiveteamsToS vsCommunityStandards List 4teamsunderTrust2examplesof Tier 22examplesof Tier 3What riskhandledby RSE?Tier forsafetycasesWhat infocan sharewithTLs/SME?Ways todesignfor trustWhat riskhandledby PF?What riskhandledby UKO?Definenon-malicious4NeversTier forChargebackList out 4riskhandledby ACI?DefinemaliciousProactivevsreactiveteamsToS vsCommunityStandards List 4teamsunderTrust2examplesof Tier 22examplesof Tier 3What riskhandledby RSE?Tier forsafetycasesWhat infocan sharewithTLs/SME?Ways todesignfor trustWhat riskhandledby PF?What riskhandledby UKO?Definenon-malicious4NeversTier forChargebackList out 4riskhandledby ACI?Definemalicious

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Proactive vs reactive teams
  2. ToS vs Community Standards
  3. List 4 teams under Trust
  4. 2 examples of Tier 2
  5. 2 examples of Tier 3
  6. What risk handled by RSE?
  7. Tier for safety cases
  8. What info can share with TLs/SME?
  9. Ways to design for trust
  10. What risk handled by PF?
  11. What risk handled by UKO?
  12. Define non-malicious
  13. 4 Nevers
  14. Tier for Chargeback
  15. List out 4 risk handled by ACI?
  16. Define malicious