Never leavedocumentswith PIunattendedprivacyissuesPersonalInfoI know whatadministrativeuse of PI isParticipatein privacytrainingLimitaccessto PIOnly use PIfor thepurpose itwascollectedSensitiveDataseekconsent fornew orconsistentuse of PII report privacybreaches to mydirectreport/privacyteamKnow of theadministrativeuse of PIUnderstandmyobligationsunder thePrivacy ActprivacypoliciesandproceduresIdentityI am aware oftheconsequencesof a privacybreachKnow thedifferentforms ofPIScammersKnow how torespond to aprivacybreachIdentifyprivacyrisksI knowwhat aBreach isLock mycomputerwhen IleaveConfidentialReportanysuspiciousactivityHackersNever leavedocumentswith PIunattendedprivacyissuesPersonalInfoI know whatadministrativeuse of PI isParticipatein privacytrainingLimitaccessto PIOnly use PIfor thepurpose itwascollectedSensitiveDataseekconsent fornew orconsistentuse of PII report privacybreaches to mydirectreport/privacyteamKnow of theadministrativeuse of PIUnderstandmyobligationsunder thePrivacy ActprivacypoliciesandproceduresIdentityI am aware oftheconsequencesof a privacybreachKnow thedifferentforms ofPIScammersKnow how torespond to aprivacybreachIdentifyprivacyrisksI knowwhat aBreach isLock mycomputerwhen IleaveConfidentialReportanysuspiciousactivityHackers

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Never leave documents with PI unattended
  2. privacy issues
  3. Personal Info
  4. I know what administrative use of PI is
  5. Participate in privacy training
  6. Limit access to PI
  7. Only use PI for the purpose it was collected
  8. Sensitive Data
  9. seek consent for new or consistent use of PI
  10. I report privacy breaches to my direct report/privacy team
  11. Know of the administrative use of PI
  12. Understand my obligations under the Privacy Act
  13. privacy policies and procedures
  14. Identity
  15. I am aware of the consequences of a privacy breach
  16. Know the different forms of PI
  17. Scammers
  18. Know how to respond to a privacy breach
  19. Identify privacy risks
  20. I know what a Breach is
  21. Lock my computer when I leave
  22. Confidential
  23. Report any suspicious activity
  24. Hackers