Protection Violation Audit Liability Regulations Requirements Resources Breach FERPA Authorization Shall Privacy Acceptable WISP Leverage Limited Data Policy SOP CISO Guideline CIO Incident User Risk Strive Passwords Rules Logs AUP Appropriate Compliance Exception Best Practice CUI Legal Privileges Expectation Use Reasonable Minimum Behavior Information Security GLBA Standard Refrain Must Procedure Designee Device Protection Violation Audit Liability Regulations Requirements Resources Breach FERPA Authorization Shall Privacy Acceptable WISP Leverage Limited Data Policy SOP CISO Guideline CIO Incident User Risk Strive Passwords Rules Logs AUP Appropriate Compliance Exception Best Practice CUI Legal Privileges Expectation Use Reasonable Minimum Behavior Information Security GLBA Standard Refrain Must Procedure Designee Device
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Protection
Violation
Audit
Liability
Regulations
Requirements
Resources
Breach
FERPA
Authorization
Shall
Privacy
Acceptable
WISP
Leverage
Limited
Data
Policy
SOP
CISO
Guideline
CIO
Incident
User
Risk
Strive
Passwords
Rules
Logs
AUP
Appropriate
Compliance
Exception
Best Practice
CUI
Legal
Privileges
Expectation
Use
Reasonable
Minimum
Behavior
Information Security
GLBA
Standard
Refrain
Must
Procedure
Designee
Device