Participatein privacytrainingPersonalInfoUnderstandmyobligationsunder thePrivacy ActIdentifyprivacyrisksKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedHackersLimitaccessto PIseekconsent fornew orconsistentuse of PIConfidentialI know whatadministrativeuse of PI isI report privacybreaches to mydirectreport/privacyteamI knowwhat aBreach isIdentityKnow how torespond to aprivacybreachprivacypoliciesandproceduresNever leavedocumentswith PIunattendedKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachLock mycomputerwhen IleaveReportanysuspiciousactivityScammersSensitiveDataprivacyissuesParticipatein privacytrainingPersonalInfoUnderstandmyobligationsunder thePrivacy ActIdentifyprivacyrisksKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedHackersLimitaccessto PIseekconsent fornew orconsistentuse of PIConfidentialI know whatadministrativeuse of PI isI report privacybreaches to mydirectreport/privacyteamI knowwhat aBreach isIdentityKnow how torespond to aprivacybreachprivacypoliciesandproceduresNever leavedocumentswith PIunattendedKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachLock mycomputerwhen IleaveReportanysuspiciousactivityScammersSensitiveDataprivacyissues

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Participate in privacy training
  2. Personal Info
  3. Understand my obligations under the Privacy Act
  4. Identify privacy risks
  5. Know the different forms of PI
  6. Only use PI for the purpose it was collected
  7. Hackers
  8. Limit access to PI
  9. seek consent for new or consistent use of PI
  10. Confidential
  11. I know what administrative use of PI is
  12. I report privacy breaches to my direct report/privacy team
  13. I know what a Breach is
  14. Identity
  15. Know how to respond to a privacy breach
  16. privacy policies and procedures
  17. Never leave documents with PI unattended
  18. Know of the administrative use of PI
  19. I am aware of the consequences of a privacy breach
  20. Lock my computer when I leave
  21. Report any suspicious activity
  22. Scammers
  23. Sensitive Data
  24. privacy issues