Know thedifferentforms ofPILimitaccessto PIKnow of theadministrativeuse of PINever leavedocumentswith PIunattendedI report privacybreaches to mydirectreport/privacyteamConfidentialKnow how torespond to aprivacybreachPersonalInfoReportanysuspiciousactivityUnderstandmyobligationsunder thePrivacy ActLock mycomputerwhen IleaveprivacypoliciesandproceduresI am aware oftheconsequencesof a privacybreachI knowwhat aBreach isI know whatadministrativeuse of PI isprivacyissuesScammersHackersseekconsent fornew orconsistentuse of PIIdentityParticipatein privacytrainingOnly use PIfor thepurpose itwascollectedSensitiveDataIdentifyprivacyrisksKnow thedifferentforms ofPILimitaccessto PIKnow of theadministrativeuse of PINever leavedocumentswith PIunattendedI report privacybreaches to mydirectreport/privacyteamConfidentialKnow how torespond to aprivacybreachPersonalInfoReportanysuspiciousactivityUnderstandmyobligationsunder thePrivacy ActLock mycomputerwhen IleaveprivacypoliciesandproceduresI am aware oftheconsequencesof a privacybreachI knowwhat aBreach isI know whatadministrativeuse of PI isprivacyissuesScammersHackersseekconsent fornew orconsistentuse of PIIdentityParticipatein privacytrainingOnly use PIfor thepurpose itwascollectedSensitiveDataIdentifyprivacyrisks

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Know the different forms of PI
  2. Limit access to PI
  3. Know of the administrative use of PI
  4. Never leave documents with PI unattended
  5. I report privacy breaches to my direct report/privacy team
  6. Confidential
  7. Know how to respond to a privacy breach
  8. Personal Info
  9. Report any suspicious activity
  10. Understand my obligations under the Privacy Act
  11. Lock my computer when I leave
  12. privacy policies and procedures
  13. I am aware of the consequences of a privacy breach
  14. I know what a Breach is
  15. I know what administrative use of PI is
  16. privacy issues
  17. Scammers
  18. Hackers
  19. seek consent for new or consistent use of PI
  20. Identity
  21. Participate in privacy training
  22. Only use PI for the purpose it was collected
  23. Sensitive Data
  24. Identify privacy risks