privacypoliciesandproceduresLimitaccessto PIReportanysuspiciousactivityKnow how torespond to aprivacybreachSensitiveDataConfidentialUnderstandmyobligationsunder thePrivacy ActParticipatein privacytrainingNever leavedocumentswith PIunattendedI know whatadministrativeuse of PI isI knowwhat aBreach isLock mycomputerwhen IleaveKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachprivacyissuesHackersPersonalInfoIdentityOnly use PIfor thepurpose itwascollectedseekconsent fornew orconsistentuse of PIScammersIdentifyprivacyrisksKnow thedifferentforms ofPII report privacybreaches to mydirectreport/privacyteamprivacypoliciesandproceduresLimitaccessto PIReportanysuspiciousactivityKnow how torespond to aprivacybreachSensitiveDataConfidentialUnderstandmyobligationsunder thePrivacy ActParticipatein privacytrainingNever leavedocumentswith PIunattendedI know whatadministrativeuse of PI isI knowwhat aBreach isLock mycomputerwhen IleaveKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachprivacyissuesHackersPersonalInfoIdentityOnly use PIfor thepurpose itwascollectedseekconsent fornew orconsistentuse of PIScammersIdentifyprivacyrisksKnow thedifferentforms ofPII report privacybreaches to mydirectreport/privacyteam

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. privacy policies and procedures
  2. Limit access to PI
  3. Report any suspicious activity
  4. Know how to respond to a privacy breach
  5. Sensitive Data
  6. Confidential
  7. Understand my obligations under the Privacy Act
  8. Participate in privacy training
  9. Never leave documents with PI unattended
  10. I know what administrative use of PI is
  11. I know what a Breach is
  12. Lock my computer when I leave
  13. Know of the administrative use of PI
  14. I am aware of the consequences of a privacy breach
  15. privacy issues
  16. Hackers
  17. Personal Info
  18. Identity
  19. Only use PI for the purpose it was collected
  20. seek consent for new or consistent use of PI
  21. Scammers
  22. Identify privacy risks
  23. Know the different forms of PI
  24. I report privacy breaches to my direct report/privacy team