Only use PIfor thepurpose itwascollectedI knowwhat aBreach isseekconsent fornew orconsistentuse of PIScammersKnow of theadministrativeuse of PIIdentifyprivacyrisksReportanysuspiciousactivityHackersIdentityConfidentialLock mycomputerwhen IleaveNever leavedocumentswith PIunattendedKnow thedifferentforms ofPII know whatadministrativeuse of PI isprivacypoliciesandproceduresSensitiveDataUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachLimitaccessto PIParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachprivacyissuesPersonalInfoI report privacybreaches to mydirectreport/privacyteamOnly use PIfor thepurpose itwascollectedI knowwhat aBreach isseekconsent fornew orconsistentuse of PIScammersKnow of theadministrativeuse of PIIdentifyprivacyrisksReportanysuspiciousactivityHackersIdentityConfidentialLock mycomputerwhen IleaveNever leavedocumentswith PIunattendedKnow thedifferentforms ofPII know whatadministrativeuse of PI isprivacypoliciesandproceduresSensitiveDataUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachLimitaccessto PIParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachprivacyissuesPersonalInfoI report privacybreaches to mydirectreport/privacyteam

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Only use PI for the purpose it was collected
  2. I know what a Breach is
  3. seek consent for new or consistent use of PI
  4. Scammers
  5. Know of the administrative use of PI
  6. Identify privacy risks
  7. Report any suspicious activity
  8. Hackers
  9. Identity
  10. Confidential
  11. Lock my computer when I leave
  12. Never leave documents with PI unattended
  13. Know the different forms of PI
  14. I know what administrative use of PI is
  15. privacy policies and procedures
  16. Sensitive Data
  17. Understand my obligations under the Privacy Act
  18. Know how to respond to a privacy breach
  19. Limit access to PI
  20. Participate in privacy training
  21. I am aware of the consequences of a privacy breach
  22. privacy issues
  23. Personal Info
  24. I report privacy breaches to my direct report/privacy team