Zero TrustPrivacyPrinciplesProtectSurfaceLegalBasisStrategyPrivacyLawsCrossBorderTransfersDataClassificationROPASecurityStakeholdersPrivacyNotice ZeroTrustPrivacyphotosDataDiscoveryBudgetPrivacybyDesignCultureDataGovernanceCookiesAttackerRoleBasedConsentDSARsArchitectureComPriSecDataMappingZero TrustPrivacyPrinciplesProtectSurfaceLegalBasisStrategyPrivacyLawsCrossBorderTransfersDataClassificationROPASecurityStakeholdersPrivacyNoticeZeroTrustPrivacyphotosDataDiscoveryBudgetPrivacybyDesignCultureDataGovernanceCookiesAttackerRoleBasedConsentDSARsArchitectureComPriSecDataMapping

Dr. Lisa McKee - Zero Trust Privacy (4/24/23) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Zero Trust Privacy Principles
  2. Protect Surface
  3. Legal Basis
  4. Strategy
  5. Privacy Laws
  6. Cross Border Transfers
  7. Data Classification
  8. ROPA
  9. Security
  10. Stakeholders
  11. Privacy Notice
  12. Zero Trust Privacy
  13. photos
  14. Data Discovery
  15. Budget
  16. Privacy by Design
  17. Culture
  18. Data Governance
  19. Cookies
  20. Attacker
  21. Role Based
  22. Consent
  23. DSARs
  24. Architecture
  25. ComPriSec
  26. Data Mapping