I report privacybreaches to mydirectreport/privacyteamLimitaccessto PIKnow of theadministrativeuse of PIprivacyissuesNever leavedocumentswith PIunattendedI know whatadministrativeuse of PI isIdentityI knowwhat aBreach isUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachHackersScammersIdentifyprivacyrisksPersonalInfoParticipatein privacytrainingKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedLock mycomputerwhen IleaveI am aware oftheconsequencesof a privacybreachprivacypoliciesandproceduresSensitiveDataseekconsent fornew orconsistentuse of PIReportanysuspiciousactivityConfidentialI report privacybreaches to mydirectreport/privacyteamLimitaccessto PIKnow of theadministrativeuse of PIprivacyissuesNever leavedocumentswith PIunattendedI know whatadministrativeuse of PI isIdentityI knowwhat aBreach isUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachHackersScammersIdentifyprivacyrisksPersonalInfoParticipatein privacytrainingKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedLock mycomputerwhen IleaveI am aware oftheconsequencesof a privacybreachprivacypoliciesandproceduresSensitiveDataseekconsent fornew orconsistentuse of PIReportanysuspiciousactivityConfidential

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. I report privacy breaches to my direct report/privacy team
  2. Limit access to PI
  3. Know of the administrative use of PI
  4. privacy issues
  5. Never leave documents with PI unattended
  6. I know what administrative use of PI is
  7. Identity
  8. I know what a Breach is
  9. Understand my obligations under the Privacy Act
  10. Know how to respond to a privacy breach
  11. Hackers
  12. Scammers
  13. Identify privacy risks
  14. Personal Info
  15. Participate in privacy training
  16. Know the different forms of PI
  17. Only use PI for the purpose it was collected
  18. Lock my computer when I leave
  19. I am aware of the consequences of a privacy breach
  20. privacy policies and procedures
  21. Sensitive Data
  22. seek consent for new or consistent use of PI
  23. Report any suspicious activity
  24. Confidential