PrivacyNoticeLegalBasisCookiesPrivacybyDesignArchitectureRoleBasedPrivacyLawsComPriSecCultureAttackerDSARsStakeholdersProtectSurfaceROPADataMappingDataGovernanceStrategy ZeroTrustPrivacyphotosSecurityDataClassificationCrossBorderTransfersConsentBudgetDataDiscoveryZero TrustPrivacyPrinciplesPrivacyNoticeLegalBasisCookiesPrivacybyDesignArchitectureRoleBasedPrivacyLawsComPriSecCultureAttackerDSARsStakeholdersProtectSurfaceROPADataMappingDataGovernanceStrategyZeroTrustPrivacyphotosSecurityDataClassificationCrossBorderTransfersConsentBudgetDataDiscoveryZero TrustPrivacyPrinciples

Dr. Lisa McKee - Zero Trust Privacy (4/24/23) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Privacy Notice
  2. Legal Basis
  3. Cookies
  4. Privacy by Design
  5. Architecture
  6. Role Based
  7. Privacy Laws
  8. ComPriSec
  9. Culture
  10. Attacker
  11. DSARs
  12. Stakeholders
  13. Protect Surface
  14. ROPA
  15. Data Mapping
  16. Data Governance
  17. Strategy
  18. Zero Trust Privacy
  19. photos
  20. Security
  21. Data Classification
  22. Cross Border Transfers
  23. Consent
  24. Budget
  25. Data Discovery
  26. Zero Trust Privacy Principles