WaveBucketRemediationbuyinMAPEnumerationAssetOwnershipmovefastEnforcementmachinelearningBestPracticesStorageGDPROKRCAFEthinkoutside ofthe boxSecurityimpaccAttestationOn thesamepageballparkComplianceOKRsGoldenMeanDataquarantinebasicsecuritymaturityRFCmetamateDataUnderstandingEnterpriseDataProtectionThird-PartyApplicationsDataGovernanceClassificationbusinessvalueAccess tocontainersalignmentSynergyPolicytl;drlowhangingfruitMovetheneedle.SchematizationPrestoDriverwin-winEnforcementOneCatalogDataControlsOnboardingPipelineActionitemDataLifecyclesafeguardsilosDashboardDataLifecycleWaveBucketRemediationbuyinMAPEnumerationAssetOwnershipmovefastEnforcementmachinelearningBestPracticesStorageGDPROKRCAFEthinkoutside ofthe boxSecurityimpaccAttestationOn thesamepageballparkComplianceOKRsGoldenMeanDataquarantinebasicsecuritymaturityRFCmetamateDataUnderstandingEnterpriseDataProtectionThird-PartyApplicationsDataGovernanceClassificationbusinessvalueAccess tocontainersalignmentSynergyPolicytl;drlowhangingfruitMovetheneedle.SchematizationPrestoDriverwin-winEnforcementOneCatalogDataControlsOnboardingPipelineActionitemDataLifecyclesafeguardsilosDashboardDataLifecycle

Corp Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
  1. Wave
  2. Bucket
  3. Remediation
  4. buy in
  5. MAP
  6. Enumeration
  7. Asset Ownership
  8. move fast
  9. Enforcement
  10. machine learning
  11. Best Practices
  12. Storage
  13. GDPR
  14. OKR
  15. CAFE
  16. think outside of the box
  17. Security
  18. impacc
  19. Attestation
  20. On the same page
  21. ball park
  22. Compliance
  23. OKRs
  24. Golden Mean
  25. Data quarantine
  26. basic security maturity
  27. RFC
  28. metamate
  29. Data Understanding
  30. Enterprise Data Protection
  31. Third-Party Applications
  32. Data Governance
  33. Classification
  34. business value
  35. Access to containers
  36. alignment
  37. Synergy
  38. Policy
  39. tl;dr
  40. low hanging fruit
  41. Move the needle.
  42. Schematization
  43. Presto Driver
  44. win-win
  45. Enforcement
  46. One Catalog
  47. Data Controls
  48. Onboarding
  49. Pipeline
  50. Action item
  51. Data Lifecycle
  52. safeguard
  53. silos
  54. Dashboard
  55. Data Lifecycle