Phishingfraudulent practice ofsending emails or othermessages purporting to befrom reputable companiesin order to induceindividuals to revealpersonal information, suchas passwords and creditcard numbers.PasswordUsed to signintoapplications onyour computeror unlock yourphone or tablet.Cookiesmall files ofinformation thata web servergenerates andsends to a webbrowser(D)PIAWhat isrequired for anythird-party thatprocessespersonalinformationLegitimatePurposepersonal datacan only becollected andprocessed forspecific, explicit,_______.Spamany kind ofunwanted,unsolicited digitalcommunicationthat gets sent outin bulk.Datainformation thathas beentranslated into aform that isefficient formovement orprocessingPersonalInformationName,address,phonenumber, ss#Scamadishonestschemeor a fraudRetentionPreservationofdata/personalinformationConsentPermission forsomething tohappen oragreement todo something.DataBreacha security incidentthat compromisesthe confidentiality,integrity, oravailability ofpersonalinformationPrivacyOfficera professional whomanages andmonitors anorganization'scompliance withprivacy laws andpoliciesGDPREuropeanPrivacyAct/LawBiometricDatapersonal data that isderived from aperson's physical,physiological, orbehavioralcharacteristics thatcan be used toidentify them.BUISOa senior-levelprofessional whomanages informationsecurity and providesguidance for strategicplanning andoperations.Phishingfraudulent practice ofsending emails or othermessages purporting to befrom reputable companiesin order to induceindividuals to revealpersonal information, suchas passwords and creditcard numbers.PasswordUsed to signintoapplications onyour computeror unlock yourphone or tablet.Cookiesmall files ofinformation thata web servergenerates andsends to a webbrowser(D)PIAWhat isrequired for anythird-party thatprocessespersonalinformationLegitimatePurposepersonal datacan only becollected andprocessed forspecific, explicit,_______.Spamany kind ofunwanted,unsolicited digitalcommunicationthat gets sent outin bulk.Datainformation thathas beentranslated into aform that isefficient formovement orprocessingPersonalInformationName,address,phonenumber, ss#Scamadishonestschemeor a fraudRetentionPreservationofdata/personalinformationConsentPermission forsomething tohappen oragreement todo something.DataBreacha security incidentthat compromisesthe confidentiality,integrity, oravailability ofpersonalinformationPrivacyOfficera professional whomanages andmonitors anorganization'scompliance withprivacy laws andpoliciesGDPREuropeanPrivacyAct/LawBiometricDatapersonal data that isderived from aperson's physical,physiological, orbehavioralcharacteristics thatcan be used toidentify them.BUISOa senior-levelprofessional whomanages informationsecurity and providesguidance for strategicplanning andoperations.

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
    Phishing
  2. Used to sign into applications on your computer or unlock your phone or tablet.
    Password
  3. small files of information that a web server generates and sends to a web browser
    Cookie
  4. What is required for any third-party that processes personal information
    (D)PIA
  5. personal data can only be collected and processed for specific, explicit, _______.
    Legitimate Purpose
  6. any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
    Spam
  7. information that has been translated into a form that is efficient for movement or processing
    Data
  8. Name, address, phone number, ss#
    Personal Information
  9. a dishonest scheme or a fraud
    Scam
  10. Preservation of data/personal information
    Retention
  11. Permission for something to happen or agreement to do something.
    Consent
  12. a security incident that compromises the confidentiality, integrity, or availability of personal information
    Data Breach
  13. a professional who manages and monitors an organization's compliance with privacy laws and policies
    Privacy Officer
  14. European Privacy Act/Law
    GDPR
  15. personal data that is derived from a person's physical, physiological, or behavioral characteristics that can be used to identify them.
    Biometric Data
  16. a senior-level professional who manages information security and provides guidance for strategic planning and operations.
    BUISO