Rightsof DataSubjectsIntegrationRiskManagementRighttorectifyDataProcessorPersonalDataConsentAccessControlRighttoAccessPrivacyNoticePenaltiesComplianceConfidentialityRansomwareAnonymizationFirewallsRight toFile aComplaintDataProtectionOfficerDataConsentDataPrivacyNoticeNetworkSecurityCyberAttacksCybersecurityAwarenessDataMinimizationNationalPrivacyCommissionRight toErasureMalwarePrivacyPolicyVulnerabilityTransparencyDataRetentionDataSubjectPrivacyImpactAssessmentDataStorageDataProcessingCloudSecurityDataRecoveryDataBreachNotificationDataControllerMulti-FactorAuthenticationCybersecurityPhishingIdentityTheftLawfulAccessStrongPasswordDataSecuritySensitivePersonalInformationDisclosureEncryptionRightsof DataSubjectsDataBreachIntegrationBackupRight toDamagesIncidentReportContainmentRightsof DataSubjectsIntegrationRiskManagementRighttorectifyDataProcessorPersonalDataConsentAccessControlRighttoAccessPrivacyNoticePenaltiesComplianceConfidentialityRansomwareAnonymizationFirewallsRight toFile aComplaintDataProtectionOfficerDataConsentDataPrivacyNoticeNetworkSecurityCyberAttacksCybersecurityAwarenessDataMinimizationNationalPrivacyCommissionRight toErasureMalwarePrivacyPolicyVulnerabilityTransparencyDataRetentionDataSubjectPrivacyImpactAssessmentDataStorageDataProcessingCloudSecurityDataRecoveryDataBreachNotificationDataControllerMulti-FactorAuthenticationCybersecurityPhishingIdentityTheftLawfulAccessStrongPasswordDataSecuritySensitivePersonalInformationDisclosureEncryptionRightsof DataSubjectsDataBreachIntegrationBackupRight toDamagesIncidentReportContainment

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Rights of Data Subjects
  2. Integration
  3. Risk Management
  4. Right to rectify
  5. Data Processor
  6. Personal Data
  7. Consent
  8. Access Control
  9. Right to Access
  10. Privacy Notice
  11. Penalties
  12. Compliance
  13. Confidentiality
  14. Ransomware
  15. Anonymization
  16. Firewalls
  17. Right to File a Complaint
  18. Data Protection Officer
  19. Data Consent
  20. Data Privacy Notice
  21. Network Security
  22. Cyber Attacks
  23. Cybersecurity Awareness
  24. Data Minimization
  25. National Privacy Commission
  26. Right to Erasure
  27. Malware
  28. Privacy Policy
  29. Vulnerability
  30. Transparency
  31. Data Retention
  32. Data Subject
  33. Privacy Impact Assessment
  34. Data Storage
  35. Data Processing
  36. Cloud Security
  37. Data Recovery
  38. Data Breach Notification
  39. Data Controller
  40. Multi-Factor Authentication
  41. Cybersecurity
  42. Phishing
  43. Identity Theft
  44. Lawful Access
  45. Strong Password
  46. Data Security
  47. Sensitive Personal Information
  48. Disclosure
  49. Encryption
  50. Rights of Data Subjects
  51. Data Breach
  52. Integration
  53. Backup
  54. Right to Damages
  55. Incident Report
  56. Containment