SecurityThreatsBreachRightto AuditDataProcessingAgreementsCustomerTrustRiskPrivacyDataMappingDueDiligenceSecurityFinancialRiskRatingsCrossBorderTransfersConsentDSARsStandardContractualClausesLocationPrivacyHarmsBrandContractsCloudComplianceDataRetentionOngoingMonitoringSecurityThreatsBreachRightto AuditDataProcessingAgreementsCustomerTrustRiskPrivacyDataMappingDueDiligenceSecurityFinancialRiskRatingsCrossBorderTransfersConsentDSARsStandardContractualClausesLocationPrivacyHarmsBrandContractsCloudComplianceDataRetentionOngoingMonitoring

Dr. Lisa McKee - Third Party Risk Management (5/9/24) - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Security Threats
  2. Breach
  3. Right to Audit
  4. Data Processing Agreements
  5. Customer Trust
  6. Risk
  7. Privacy
  8. Data Mapping
  9. Due Diligence
  10. Security
  11. Financial
  12. Risk Ratings
  13. Cross Border Transfers
  14. Consent
  15. DSARs
  16. Standard Contractual Clauses
  17. Location
  18. Privacy Harms
  19. Brand
  20. Contracts
  21. Cloud
  22. Compliance
  23. Data Retention
  24. Ongoing Monitoring