Understandmyobligationsunder thePrivacy ActLimitaccessto PIConfidentialKnow thedifferentforms ofPIKnow how torespond to aprivacybreachHackersIdentityseekconsent fornew orconsistentuse of PIScammersI knowwhat aBreach isIdentifyprivacyrisksNever leavedocumentswith PIunattendedI report privacybreaches to mydirectreport/privacyteamReportanysuspiciousactivityParticipatein privacytrainingprivacypoliciesandproceduresKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachPersonalInfoLock mycomputerwhen IleaveOnly use PIfor thepurpose itwascollectedI know whatadministrativeuse of PI isprivacyissuesSensitiveDataUnderstandmyobligationsunder thePrivacy ActLimitaccessto PIConfidentialKnow thedifferentforms ofPIKnow how torespond to aprivacybreachHackersIdentityseekconsent fornew orconsistentuse of PIScammersI knowwhat aBreach isIdentifyprivacyrisksNever leavedocumentswith PIunattendedI report privacybreaches to mydirectreport/privacyteamReportanysuspiciousactivityParticipatein privacytrainingprivacypoliciesandproceduresKnow of theadministrativeuse of PII am aware oftheconsequencesof a privacybreachPersonalInfoLock mycomputerwhen IleaveOnly use PIfor thepurpose itwascollectedI know whatadministrativeuse of PI isprivacyissuesSensitiveData

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Understand my obligations under the Privacy Act
  2. Limit access to PI
  3. Confidential
  4. Know the different forms of PI
  5. Know how to respond to a privacy breach
  6. Hackers
  7. Identity
  8. seek consent for new or consistent use of PI
  9. Scammers
  10. I know what a Breach is
  11. Identify privacy risks
  12. Never leave documents with PI unattended
  13. I report privacy breaches to my direct report/privacy team
  14. Report any suspicious activity
  15. Participate in privacy training
  16. privacy policies and procedures
  17. Know of the administrative use of PI
  18. I am aware of the consequences of a privacy breach
  19. Personal Info
  20. Lock my computer when I leave
  21. Only use PI for the purpose it was collected
  22. I know what administrative use of PI is
  23. privacy issues
  24. Sensitive Data