win-winDashboardOneCatalogMovetheneedle.thinkoutside ofthe boxtl;drDataquarantineballparkbasicsecuritymaturityBucketmachinelearningMAPComplianceThird-PartyApplicationsStorageAttestationimpaccSynergyActionitemPrestoDriverEnterpriseDataProtectionbusinessvaluesilosPolicyWaveAccess tocontainersPipelinelowhangingfruitOKRRemediationGoldenMeanDataControlsRFCSecuritySchematizationDataGovernanceDataUnderstandingOn thesamepageOnboardingCAFEEnforcementOKRsAssetOwnershipEnforcementClassificationGDPRmetamatesafeguardBestPracticesDataLifecyclemovefastDataLifecycleEnumerationalignmentbuyinwin-winDashboardOneCatalogMovetheneedle.thinkoutside ofthe boxtl;drDataquarantineballparkbasicsecuritymaturityBucketmachinelearningMAPComplianceThird-PartyApplicationsStorageAttestationimpaccSynergyActionitemPrestoDriverEnterpriseDataProtectionbusinessvaluesilosPolicyWaveAccess tocontainersPipelinelowhangingfruitOKRRemediationGoldenMeanDataControlsRFCSecuritySchematizationDataGovernanceDataUnderstandingOn thesamepageOnboardingCAFEEnforcementOKRsAssetOwnershipEnforcementClassificationGDPRmetamatesafeguardBestPracticesDataLifecyclemovefastDataLifecycleEnumerationalignmentbuyin

Corp Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
  1. win-win
  2. Dashboard
  3. One Catalog
  4. Move the needle.
  5. think outside of the box
  6. tl;dr
  7. Data quarantine
  8. ball park
  9. basic security maturity
  10. Bucket
  11. machine learning
  12. MAP
  13. Compliance
  14. Third-Party Applications
  15. Storage
  16. Attestation
  17. impacc
  18. Synergy
  19. Action item
  20. Presto Driver
  21. Enterprise Data Protection
  22. business value
  23. silos
  24. Policy
  25. Wave
  26. Access to containers
  27. Pipeline
  28. low hanging fruit
  29. OKR
  30. Remediation
  31. Golden Mean
  32. Data Controls
  33. RFC
  34. Security
  35. Schematization
  36. Data Governance
  37. Data Understanding
  38. On the same page
  39. Onboarding
  40. CAFE
  41. Enforcement
  42. OKRs
  43. Asset Ownership
  44. Enforcement
  45. Classification
  46. GDPR
  47. metamate
  48. safeguard
  49. Best Practices
  50. Data Lifecycle
  51. move fast
  52. Data Lifecycle
  53. Enumeration
  54. alignment
  55. buy in