Impact Contribution Define Unique Identifier Quality Data Breach Editor Viewer Collect Results Based Accountability (RBA) Causation Data Protection Community Contribution Data Validation Data Management Cybersecurity Impact Measurement and Management (IMM) Leverage Objective Bar Chart Data Retention Policy Who Access Control Key Impact Indicator (KII) Analyze Qualitative data Quantitative data Impact Attribution Outlier Descriptive Analytics Correlation What Protected Health Information (PHI) Distinct Count String Better off Personally Identifiable Information (PII) Cluster Chart Diagnostic Analytics Impact Framework Prescriptive Analytics Data Privacy Dimension Data Governance Pie Chart Org Admin Multi-Factor Authentication (MFA) Theme(s) Predictive Analytics Outcomes Impact Contribution Define Unique Identifier Quality Data Breach Editor Viewer Collect Results Based Accountability (RBA) Causation Data Protection Community Contribution Data Validation Data Management Cybersecurity Impact Measurement and Management (IMM) Leverage Objective Bar Chart Data Retention Policy Who Access Control Key Impact Indicator (KII) Analyze Qualitative data Quantitative data Impact Attribution Outlier Descriptive Analytics Correlation What Protected Health Information (PHI) Distinct Count String Better off Personally Identifiable Information (PII) Cluster Chart Diagnostic Analytics Impact Framework Prescriptive Analytics Data Privacy Dimension Data Governance Pie Chart Org Admin Multi-Factor Authentication (MFA) Theme(s) Predictive Analytics Outcomes
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Impact Contribution
Define
Unique Identifier
Quality
Data Breach
Editor
Viewer
Collect
Results Based Accountability (RBA)
Causation
Data Protection
Community Contribution
Data Validation
Data Management
Cybersecurity
Impact Measurement and Management (IMM)
Leverage
Objective
Bar Chart
Data Retention Policy
Who
Access Control
Key Impact Indicator (KII)
Analyze
Qualitative data
Quantitative data
Impact Attribution
Outlier
Descriptive Analytics
Correlation
What
Protected Health Information (PHI)
Distinct Count
String
Better off
Personally Identifiable Information (PII)
Cluster Chart
Diagnostic Analytics
Impact Framework
Prescriptive Analytics
Data Privacy
Dimension
Data Governance
Pie Chart
Org Admin
Multi-Factor Authentication (MFA)
Theme(s)
Predictive Analytics
Outcomes