Definenon-maliciousList out 4riskhandledby ACI?What riskhandledby PF?List 4teamsunderTrustWhat infocan sharewithTLs/SME?ToS vsCommunityStandards 2examplesof Tier 2Tier forChargebackWays todesignfor trustWhat riskhandledby UKO?2examplesof Tier 3Tier forsafetycasesProactivevsreactiveteamsWhat riskhandledby RSE?4NeversDefinemaliciousDefinenon-maliciousList out 4riskhandledby ACI?What riskhandledby PF?List 4teamsunderTrustWhat infocan sharewithTLs/SME?ToS vsCommunityStandards 2examplesof Tier 2Tier forChargebackWays todesignfor trustWhat riskhandledby UKO?2examplesof Tier 3Tier forsafetycasesProactivevsreactiveteamsWhat riskhandledby RSE?4NeversDefinemalicious

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. Define non-malicious
  2. List out 4 risk handled by ACI?
  3. What risk handled by PF?
  4. List 4 teams under Trust
  5. What info can share with TLs/SME?
  6. ToS vs Community Standards
  7. 2 examples of Tier 2
  8. Tier for Chargeback
  9. Ways to design for trust
  10. What risk handled by UKO?
  11. 2 examples of Tier 3
  12. Tier for safety cases
  13. Proactive vs reactive teams
  14. What risk handled by RSE?
  15. 4 Nevers
  16. Define malicious