Only use PIfor thepurpose itwascollectedLimitaccessto PII know whatadministrativeuse of PI isKnow how torespond to aprivacybreachKnow of theadministrativeuse of PIReportanysuspiciousactivityLock mycomputerwhen IleaveConfidentialI knowwhat aBreach isPersonalInfoSensitiveDataI am aware oftheconsequencesof a privacybreachIdentityprivacyissuesHackersIdentifyprivacyrisksKnow thedifferentforms ofPIUnderstandmyobligationsunder thePrivacy ActScammersI report privacybreaches to mydirectreport/privacyteamseekconsent fornew orconsistentuse of PINever leavedocumentswith PIunattendedprivacypoliciesandproceduresParticipatein privacytrainingOnly use PIfor thepurpose itwascollectedLimitaccessto PII know whatadministrativeuse of PI isKnow how torespond to aprivacybreachKnow of theadministrativeuse of PIReportanysuspiciousactivityLock mycomputerwhen IleaveConfidentialI knowwhat aBreach isPersonalInfoSensitiveDataI am aware oftheconsequencesof a privacybreachIdentityprivacyissuesHackersIdentifyprivacyrisksKnow thedifferentforms ofPIUnderstandmyobligationsunder thePrivacy ActScammersI report privacybreaches to mydirectreport/privacyteamseekconsent fornew orconsistentuse of PINever leavedocumentswith PIunattendedprivacypoliciesandproceduresParticipatein privacytraining

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Only use PI for the purpose it was collected
  2. Limit access to PI
  3. I know what administrative use of PI is
  4. Know how to respond to a privacy breach
  5. Know of the administrative use of PI
  6. Report any suspicious activity
  7. Lock my computer when I leave
  8. Confidential
  9. I know what a Breach is
  10. Personal Info
  11. Sensitive Data
  12. I am aware of the consequences of a privacy breach
  13. Identity
  14. privacy issues
  15. Hackers
  16. Identify privacy risks
  17. Know the different forms of PI
  18. Understand my obligations under the Privacy Act
  19. Scammers
  20. I report privacy breaches to my direct report/privacy team
  21. seek consent for new or consistent use of PI
  22. Never leave documents with PI unattended
  23. privacy policies and procedures
  24. Participate in privacy training