ArchitectureSecurityCookiesLegalBasisConsentComPriSecPrivacybyDesignROPACrossBorderTransfersDataMappingZero TrustPrivacyPrinciplesStrategyProtectSurfaceDataDiscoveryCultureDataClassificationphotosPrivacyNoticeDataGovernancePrivacyLaws ZeroTrustPrivacyBudgetDSARsAttackerStakeholdersRoleBasedArchitectureSecurityCookiesLegalBasisConsentComPriSecPrivacybyDesignROPACrossBorderTransfersDataMappingZero TrustPrivacyPrinciplesStrategyProtectSurfaceDataDiscoveryCultureDataClassificationphotosPrivacyNoticeDataGovernancePrivacyLawsZeroTrustPrivacyBudgetDSARsAttackerStakeholdersRoleBased

Dr. Lisa McKee - Zero Trust Privacy (4/24/23) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Architecture
  2. Security
  3. Cookies
  4. Legal Basis
  5. Consent
  6. ComPriSec
  7. Privacy by Design
  8. ROPA
  9. Cross Border Transfers
  10. Data Mapping
  11. Zero Trust Privacy Principles
  12. Strategy
  13. Protect Surface
  14. Data Discovery
  15. Culture
  16. Data Classification
  17. photos
  18. Privacy Notice
  19. Data Governance
  20. Privacy Laws
  21. Zero Trust Privacy
  22. Budget
  23. DSARs
  24. Attacker
  25. Stakeholders
  26. Role Based