Know thedifferentforms ofPIKnow of theadministrativeuse of PIParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachprivacypoliciesandproceduresLock mycomputerwhen IleaveLimitaccessto PII report privacybreaches to mydirectreport/privacyteamHackersI know whatadministrativeuse of PI isOnly use PIfor thepurpose itwascollectedIdentifyprivacyrisksScammersNever leavedocumentswith PIunattendedKnow how torespond to aprivacybreachI knowwhat aBreach isConfidentialprivacyissuesseekconsent fornew orconsistentuse of PIIdentityReportanysuspiciousactivityUnderstandmyobligationsunder thePrivacy ActPersonalInfoSensitiveDataKnow thedifferentforms ofPIKnow of theadministrativeuse of PIParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachprivacypoliciesandproceduresLock mycomputerwhen IleaveLimitaccessto PII report privacybreaches to mydirectreport/privacyteamHackersI know whatadministrativeuse of PI isOnly use PIfor thepurpose itwascollectedIdentifyprivacyrisksScammersNever leavedocumentswith PIunattendedKnow how torespond to aprivacybreachI knowwhat aBreach isConfidentialprivacyissuesseekconsent fornew orconsistentuse of PIIdentityReportanysuspiciousactivityUnderstandmyobligationsunder thePrivacy ActPersonalInfoSensitiveData

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Know the different forms of PI
  2. Know of the administrative use of PI
  3. Participate in privacy training
  4. I am aware of the consequences of a privacy breach
  5. privacy policies and procedures
  6. Lock my computer when I leave
  7. Limit access to PI
  8. I report privacy breaches to my direct report/privacy team
  9. Hackers
  10. I know what administrative use of PI is
  11. Only use PI for the purpose it was collected
  12. Identify privacy risks
  13. Scammers
  14. Never leave documents with PI unattended
  15. Know how to respond to a privacy breach
  16. I know what a Breach is
  17. Confidential
  18. privacy issues
  19. seek consent for new or consistent use of PI
  20. Identity
  21. Report any suspicious activity
  22. Understand my obligations under the Privacy Act
  23. Personal Info
  24. Sensitive Data