Only use PIfor thepurpose itwascollectedReportanysuspiciousactivityPersonalInfoParticipatein privacytrainingNever leavedocumentswith PIunattendedIdentityScammersKnow thedifferentforms ofPII knowwhat aBreach isSensitiveDataIdentifyprivacyrisksI report privacybreaches to mydirectreport/privacyteamI am aware oftheconsequencesof a privacybreachI know whatadministrativeuse of PI isUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachHackersLock mycomputerwhen IleaveLimitaccessto PIKnow of theadministrativeuse of PIprivacyissuesConfidentialprivacypoliciesandproceduresseekconsent fornew orconsistentuse of PIOnly use PIfor thepurpose itwascollectedReportanysuspiciousactivityPersonalInfoParticipatein privacytrainingNever leavedocumentswith PIunattendedIdentityScammersKnow thedifferentforms ofPII knowwhat aBreach isSensitiveDataIdentifyprivacyrisksI report privacybreaches to mydirectreport/privacyteamI am aware oftheconsequencesof a privacybreachI know whatadministrativeuse of PI isUnderstandmyobligationsunder thePrivacy ActKnow how torespond to aprivacybreachHackersLock mycomputerwhen IleaveLimitaccessto PIKnow of theadministrativeuse of PIprivacyissuesConfidentialprivacypoliciesandproceduresseekconsent fornew orconsistentuse of PI

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Only use PI for the purpose it was collected
  2. Report any suspicious activity
  3. Personal Info
  4. Participate in privacy training
  5. Never leave documents with PI unattended
  6. Identity
  7. Scammers
  8. Know the different forms of PI
  9. I know what a Breach is
  10. Sensitive Data
  11. Identify privacy risks
  12. I report privacy breaches to my direct report/privacy team
  13. I am aware of the consequences of a privacy breach
  14. I know what administrative use of PI is
  15. Understand my obligations under the Privacy Act
  16. Know how to respond to a privacy breach
  17. Hackers
  18. Lock my computer when I leave
  19. Limit access to PI
  20. Know of the administrative use of PI
  21. privacy issues
  22. Confidential
  23. privacy policies and procedures
  24. seek consent for new or consistent use of PI