PrivacybyDesignDSARsAttackerSecurityArchitectureConsentPrivacyNoticephotosLegalBasisDataClassificationZero TrustPrivacyPrinciplesBudgetDataMappingStrategyComPriSecRoleBasedDataDiscoveryCrossBorderTransfersPrivacyLawsProtectSurfaceROPACultureStakeholdersDataGovernanceCookies ZeroTrustPrivacyPrivacybyDesignDSARsAttackerSecurityArchitectureConsentPrivacyNoticephotosLegalBasisDataClassificationZero TrustPrivacyPrinciplesBudgetDataMappingStrategyComPriSecRoleBasedDataDiscoveryCrossBorderTransfersPrivacyLawsProtectSurfaceROPACultureStakeholdersDataGovernanceCookiesZeroTrustPrivacy

Dr. Lisa McKee - Zero Trust Privacy (4/24/23) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Privacy by Design
  2. DSARs
  3. Attacker
  4. Security
  5. Architecture
  6. Consent
  7. Privacy Notice
  8. photos
  9. Legal Basis
  10. Data Classification
  11. Zero Trust Privacy Principles
  12. Budget
  13. Data Mapping
  14. Strategy
  15. ComPriSec
  16. Role Based
  17. Data Discovery
  18. Cross Border Transfers
  19. Privacy Laws
  20. Protect Surface
  21. ROPA
  22. Culture
  23. Stakeholders
  24. Data Governance
  25. Cookies
  26. Zero Trust Privacy