ballparkAssetOwnershipDataquarantineActionitemSchematizationbuyinBucketwin-winimpaccMovetheneedle.OnboardingDataLifecycleDashboardComplianceOKRsOn thesamepageDataGovernancesafeguardEnterpriseDataProtectionEnumerationStorageRFCPrestoDriverthinkoutside ofthe boxDataLifecycleGoldenMeanPipelinebasicsecuritymaturityRemediationGDPRDataUnderstandingSynergySecuritymetamatemachinelearningmovefastlowhangingfruitOKRWaveMAPEnforcementPolicyDataControlstl;dralignmentThird-PartyApplicationsAttestationEnforcementClassificationsilosbusinessvalueOneCatalogBestPracticesCAFEAccess tocontainersballparkAssetOwnershipDataquarantineActionitemSchematizationbuyinBucketwin-winimpaccMovetheneedle.OnboardingDataLifecycleDashboardComplianceOKRsOn thesamepageDataGovernancesafeguardEnterpriseDataProtectionEnumerationStorageRFCPrestoDriverthinkoutside ofthe boxDataLifecycleGoldenMeanPipelinebasicsecuritymaturityRemediationGDPRDataUnderstandingSynergySecuritymetamatemachinelearningmovefastlowhangingfruitOKRWaveMAPEnforcementPolicyDataControlstl;dralignmentThird-PartyApplicationsAttestationEnforcementClassificationsilosbusinessvalueOneCatalogBestPracticesCAFEAccess tocontainers

Corp Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
  1. ball park
  2. Asset Ownership
  3. Data quarantine
  4. Action item
  5. Schematization
  6. buy in
  7. Bucket
  8. win-win
  9. impacc
  10. Move the needle.
  11. Onboarding
  12. Data Lifecycle
  13. Dashboard
  14. Compliance
  15. OKRs
  16. On the same page
  17. Data Governance
  18. safeguard
  19. Enterprise Data Protection
  20. Enumeration
  21. Storage
  22. RFC
  23. Presto Driver
  24. think outside of the box
  25. Data Lifecycle
  26. Golden Mean
  27. Pipeline
  28. basic security maturity
  29. Remediation
  30. GDPR
  31. Data Understanding
  32. Synergy
  33. Security
  34. metamate
  35. machine learning
  36. move fast
  37. low hanging fruit
  38. OKR
  39. Wave
  40. MAP
  41. Enforcement
  42. Policy
  43. Data Controls
  44. tl;dr
  45. alignment
  46. Third-Party Applications
  47. Attestation
  48. Enforcement
  49. Classification
  50. silos
  51. business value
  52. One Catalog
  53. Best Practices
  54. CAFE
  55. Access to containers