2examplesof Tier 2What riskhandledby RSE?Definenon-maliciousWhat infocan sharewithTLs/SME?4Nevers2examplesof Tier 3ProactivevsreactiveteamsDefinemaliciousList 4teamsunderTrustWays todesignfor trustWhat riskhandledby PF?Tier forChargebackList out 4riskhandledby ACI?Tier forsafetycasesToS vsCommunityStandards What riskhandledby UKO?2examplesof Tier 2What riskhandledby RSE?Definenon-maliciousWhat infocan sharewithTLs/SME?4Nevers2examplesof Tier 3ProactivevsreactiveteamsDefinemaliciousList 4teamsunderTrustWays todesignfor trustWhat riskhandledby PF?Tier forChargebackList out 4riskhandledby ACI?Tier forsafetycasesToS vsCommunityStandards What riskhandledby UKO?

Day 2 Intro to Trust CS Recap - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. 2 examples of Tier 2
  2. What risk handled by RSE?
  3. Define non-malicious
  4. What info can share with TLs/SME?
  5. 4 Nevers
  6. 2 examples of Tier 3
  7. Proactive vs reactive teams
  8. Define malicious
  9. List 4 teams under Trust
  10. Ways to design for trust
  11. What risk handled by PF?
  12. Tier for Chargeback
  13. List out 4 risk handled by ACI?
  14. Tier for safety cases
  15. ToS vs Community Standards
  16. What risk handled by UKO?