ArchitectureCookiesComPriSecDataDiscoveryDataGovernanceConsentZero TrustPrivacyPrinciplesSecurityROPABudgetStrategyAttackerCrossBorderTransfersPrivacyNoticeRoleBasedProtectSurfaceLegalBasisPrivacyLawsDataMappingDSARsphotosCulturePrivacybyDesignStakeholders ZeroTrustPrivacyDataClassificationArchitectureCookiesComPriSecDataDiscoveryDataGovernanceConsentZero TrustPrivacyPrinciplesSecurityROPABudgetStrategyAttackerCrossBorderTransfersPrivacyNoticeRoleBasedProtectSurfaceLegalBasisPrivacyLawsDataMappingDSARsphotosCulturePrivacybyDesignStakeholdersZeroTrustPrivacyDataClassification

Dr. Lisa McKee - Zero Trust Privacy (4/24/23) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Architecture
  2. Cookies
  3. ComPriSec
  4. Data Discovery
  5. Data Governance
  6. Consent
  7. Zero Trust Privacy Principles
  8. Security
  9. ROPA
  10. Budget
  11. Strategy
  12. Attacker
  13. Cross Border Transfers
  14. Privacy Notice
  15. Role Based
  16. Protect Surface
  17. Legal Basis
  18. Privacy Laws
  19. Data Mapping
  20. DSARs
  21. photos
  22. Culture
  23. Privacy by Design
  24. Stakeholders
  25. Zero Trust Privacy
  26. Data Classification