FICOSCORESONLINESECURITYCLONEPHISHINGLATEFEESREPORTFEDERALTRADECOMMISSION(FTC)EQUIFAXCREDITCARDNUMBERPREVENTIONCREDITBUREAUSLAWENFORCEMENTCREDITCARDNUMBERCREDITLIMITSMONITORVISHINGINTERESTRATESBENEFITSDEBTCOLLECTORPROTECTIONCREDITREPAIRLAWSUITSOCIALSECURITYCARDIDENTITYTHEFTFRAUDSKIMMERSEXPERIANANNUALPERCENTAGERATE (APR)CREDITSCORECREDITCARDSSCAMMERSMISHINGAPPLICATIONCREDITHISTORYPHISHINGSTRONGPASSWORDVICTIMTRANSUNIONPERSONALINFORMATIONWHALINGEMAILSCAMSCREDITREPORTSECURITYBREACHFICOSCORESONLINESECURITYCLONEPHISHINGLATEFEESREPORTFEDERALTRADECOMMISSION(FTC)EQUIFAXCREDITCARDNUMBERPREVENTIONCREDITBUREAUSLAWENFORCEMENTCREDITCARDNUMBERCREDITLIMITSMONITORVISHINGINTERESTRATESBENEFITSDEBTCOLLECTORPROTECTIONCREDITREPAIRLAWSUITSOCIALSECURITYCARDIDENTITYTHEFTFRAUDSKIMMERSEXPERIANANNUALPERCENTAGERATE (APR)CREDITSCORECREDITCARDSSCAMMERSMISHINGAPPLICATIONCREDITHISTORYPHISHINGSTRONGPASSWORDVICTIMTRANSUNIONPERSONALINFORMATIONWHALINGEMAILSCAMSCREDITREPORTSECURITYBREACH

CREDIT & IDENTITY THEFT - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
  1. FICO SCORES
  2. ONLINE SECURITY
  3. CLONE PHISHING
  4. LATE FEES
  5. REPORT
  6. FEDERAL TRADE COMMISSION (FTC)
  7. EQUIFAX
  8. CREDIT CARD NUMBER
  9. PREVENTION
  10. CREDIT BUREAUS
  11. LAW ENFORCEMENT
  12. CREDIT CARD NUMBER
  13. CREDIT LIMITS
  14. MONITOR
  15. VISHING
  16. INTEREST RATES
  17. BENEFITS
  18. DEBT COLLECTOR
  19. PROTECTION
  20. CREDIT REPAIR
  21. LAWSUIT
  22. SOCIAL SECURITY CARD
  23. IDENTITY THEFT
  24. FRAUD
  25. SKIMMERS
  26. EXPERIAN
  27. ANNUAL PERCENTAGE RATE (APR)
  28. CREDIT SCORE
  29. CREDIT CARDS
  30. SCAMMER
  31. SMISHING
  32. APPLICATION
  33. CREDIT HISTORY
  34. PHISHING
  35. STRONG PASSWORD
  36. VICTIM
  37. TRANSUNION
  38. PERSONAL INFORMATION
  39. WHALING
  40. EMAIL SCAMS
  41. CREDIT REPORT
  42. SECURITY BREACH