Utah CodeUCA 53-10-108(12)(a) MisdemeanorBUCJISABCAnnuallyLOGS EnryptTesting VirtuControlledAreaUserIDPasswordBCITACuse(something) inthe wrong wayor for thewrong purposeMiningPIISpread(something,especiallyinformation)widely. CrossCutShred CuriosityCheckucjis-tac.utah.govFingerprintsSecurityBadgeInsiderThreat MDMSecurityAwarenessUCJISBasicsManual UserSecurityAgreementSocialEngineeringManualsFBIhotspotPhishing DisseminationScreenLockAuditJeffThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessMisuseUtah CodeUCA 53-10-108(12)(a) MisdemeanorBUCJISABCAnnuallyLOGS EnryptTesting VirtuControlledAreaUserIDPasswordBCITACuse(something) inthe wrong wayor for thewrong purposeMiningPIISpread(something,especiallyinformation)widely. CrossCutShred CuriosityCheckucjis-tac.utah.govFingerprintsSecurityBadgeInsiderThreat MDMSecurityAwarenessUCJISBasicsManual UserSecurityAgreementSocialEngineeringManualsFBIhotspotPhishing DisseminationScreenLockAuditJeffThe TAC serves as thepoint-of-contact forthe local agency formatters relating toCJIS informationaccessMisuse

Security Awareness Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Utah Code UCA 53-10- 108(12)(a)
  2. Misdemeanor B
  3. UCJIS
  4. ABC
  5. Annually
  6. LOGS
  7. Enrypt
  8. Testing
  9. Virtu
  10. Controlled Area
  11. User ID
  12. Password
  13. BCI
  14. TAC
  15. use (something) in the wrong way or for the wrong purpose
  16. Mining
  17. PII
  18. Spread (something, especially information) widely.
  19. Cross Cut Shred
  20. Curiosity Check
  21. ucjis-tac.utah.gov
  22. Fingerprints
  23. Security Badge
  24. Insider Threat
  25. MDM
  26. Security Awareness
  27. UCJIS Basics Manual
  28. User Security Agreement
  29. Social Engineering
  30. Manuals
  31. FBI
  32. hotspot
  33. Phishing
  34. Dissemination
  35. Screen Lock
  36. Audit
  37. Jeff
  38. The TAC serves as the point -of -contact for the local agency for matters relating to CJIS information access
  39. Misuse