DataRecoveryAccessControlStrongPasswordDataControllerDataMinimizationRight toDamagesMulti-FactorAuthenticationDataProtectionOfficerCompliancePrivacyNoticeIntegrationDataSubjectDataStoragePrivacyImpactAssessmentConfidentialityIntegrationDataBreachNotificationBackupPrivacyPolicyRight toErasureSensitivePersonalInformationRight toFile aComplaintCloudSecurityMalwareRighttorectifyCyberAttacksDataSecurityDataRetentionPhishingContainmentNationalPrivacyCommissionRighttoAccessFirewallsCybersecurityAwarenessEncryptionIdentityTheftRightsof DataSubjectsPersonalDataDataProcessorDataConsentDisclosureDataPrivacyNoticeIncidentReportPenaltiesRansomwareDataBreachDataProcessingLawfulAccessConsentCybersecurityRightsof DataSubjectsNetworkSecurityVulnerabilityTransparencyRiskManagementAnonymizationDataRecoveryAccessControlStrongPasswordDataControllerDataMinimizationRight toDamagesMulti-FactorAuthenticationDataProtectionOfficerCompliancePrivacyNoticeIntegrationDataSubjectDataStoragePrivacyImpactAssessmentConfidentialityIntegrationDataBreachNotificationBackupPrivacyPolicyRight toErasureSensitivePersonalInformationRight toFile aComplaintCloudSecurityMalwareRighttorectifyCyberAttacksDataSecurityDataRetentionPhishingContainmentNationalPrivacyCommissionRighttoAccessFirewallsCybersecurityAwarenessEncryptionIdentityTheftRightsof DataSubjectsPersonalDataDataProcessorDataConsentDisclosureDataPrivacyNoticeIncidentReportPenaltiesRansomwareDataBreachDataProcessingLawfulAccessConsentCybersecurityRightsof DataSubjectsNetworkSecurityVulnerabilityTransparencyRiskManagementAnonymization

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Recovery
  2. Access Control
  3. Strong Password
  4. Data Controller
  5. Data Minimization
  6. Right to Damages
  7. Multi-Factor Authentication
  8. Data Protection Officer
  9. Compliance
  10. Privacy Notice
  11. Integration
  12. Data Subject
  13. Data Storage
  14. Privacy Impact Assessment
  15. Confidentiality
  16. Integration
  17. Data Breach Notification
  18. Backup
  19. Privacy Policy
  20. Right to Erasure
  21. Sensitive Personal Information
  22. Right to File a Complaint
  23. Cloud Security
  24. Malware
  25. Right to rectify
  26. Cyber Attacks
  27. Data Security
  28. Data Retention
  29. Phishing
  30. Containment
  31. National Privacy Commission
  32. Right to Access
  33. Firewalls
  34. Cybersecurity Awareness
  35. Encryption
  36. Identity Theft
  37. Rights of Data Subjects
  38. Personal Data
  39. Data Processor
  40. Data Consent
  41. Disclosure
  42. Data Privacy Notice
  43. Incident Report
  44. Penalties
  45. Ransomware
  46. Data Breach
  47. Data Processing
  48. Lawful Access
  49. Consent
  50. Cybersecurity
  51. Rights of Data Subjects
  52. Network Security
  53. Vulnerability
  54. Transparency
  55. Risk Management
  56. Anonymization