IdentityI know whatadministrativeuse of PI isPersonalInfoNever leavedocumentswith PIunattendedI knowwhat aBreach isHackersConfidentialKnow of theadministrativeuse of PII report privacybreaches to mydirectreport/privacyteamKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedKnow how torespond to aprivacybreachParticipatein privacytrainingReportanysuspiciousactivityScammersseekconsent fornew orconsistentuse of PIprivacypoliciesandproceduresSensitiveDataIdentifyprivacyrisksUnderstandmyobligationsunder thePrivacy ActI am aware oftheconsequencesof a privacybreachprivacyissuesLimitaccessto PILock mycomputerwhen IleaveIdentityI know whatadministrativeuse of PI isPersonalInfoNever leavedocumentswith PIunattendedI knowwhat aBreach isHackersConfidentialKnow of theadministrativeuse of PII report privacybreaches to mydirectreport/privacyteamKnow thedifferentforms ofPIOnly use PIfor thepurpose itwascollectedKnow how torespond to aprivacybreachParticipatein privacytrainingReportanysuspiciousactivityScammersseekconsent fornew orconsistentuse of PIprivacypoliciesandproceduresSensitiveDataIdentifyprivacyrisksUnderstandmyobligationsunder thePrivacy ActI am aware oftheconsequencesof a privacybreachprivacyissuesLimitaccessto PILock mycomputerwhen Ileave

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Identity
  2. I know what administrative use of PI is
  3. Personal Info
  4. Never leave documents with PI unattended
  5. I know what a Breach is
  6. Hackers
  7. Confidential
  8. Know of the administrative use of PI
  9. I report privacy breaches to my direct report/privacy team
  10. Know the different forms of PI
  11. Only use PI for the purpose it was collected
  12. Know how to respond to a privacy breach
  13. Participate in privacy training
  14. Report any suspicious activity
  15. Scammers
  16. seek consent for new or consistent use of PI
  17. privacy policies and procedures
  18. Sensitive Data
  19. Identify privacy risks
  20. Understand my obligations under the Privacy Act
  21. I am aware of the consequences of a privacy breach
  22. privacy issues
  23. Limit access to PI
  24. Lock my computer when I leave