FirewallsSensitivePersonalInformationIdentityTheftRight toDamagesRightsof DataSubjectsConfidentialityDataBreachNotificationPenaltiesPrivacyPolicyContainmentDataRetentionAccessControlCybersecurityDataMinimizationDataSubjectDataStorageMulti-FactorAuthenticationRiskManagementDataProcessorIntegrationRight toErasurePhishingCloudSecurityPersonalDataRightsof DataSubjectsCyberAttacksNationalPrivacyCommissionVulnerabilityDataSecurityDataBreachLawfulAccessDataRecoveryPrivacyImpactAssessmentNetworkSecurityConsentRighttoAccessDataProcessingMalwareEncryptionDataPrivacyNoticeDisclosureIncidentReportAnonymizationDataControllerRighttorectifyRight toFile aComplaintBackupIntegrationPrivacyNoticeDataProtectionOfficerDataConsentStrongPasswordTransparencyComplianceRansomwareCybersecurityAwarenessFirewallsSensitivePersonalInformationIdentityTheftRight toDamagesRightsof DataSubjectsConfidentialityDataBreachNotificationPenaltiesPrivacyPolicyContainmentDataRetentionAccessControlCybersecurityDataMinimizationDataSubjectDataStorageMulti-FactorAuthenticationRiskManagementDataProcessorIntegrationRight toErasurePhishingCloudSecurityPersonalDataRightsof DataSubjectsCyberAttacksNationalPrivacyCommissionVulnerabilityDataSecurityDataBreachLawfulAccessDataRecoveryPrivacyImpactAssessmentNetworkSecurityConsentRighttoAccessDataProcessingMalwareEncryptionDataPrivacyNoticeDisclosureIncidentReportAnonymizationDataControllerRighttorectifyRight toFile aComplaintBackupIntegrationPrivacyNoticeDataProtectionOfficerDataConsentStrongPasswordTransparencyComplianceRansomwareCybersecurityAwareness

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Firewalls
  2. Sensitive Personal Information
  3. Identity Theft
  4. Right to Damages
  5. Rights of Data Subjects
  6. Confidentiality
  7. Data Breach Notification
  8. Penalties
  9. Privacy Policy
  10. Containment
  11. Data Retention
  12. Access Control
  13. Cybersecurity
  14. Data Minimization
  15. Data Subject
  16. Data Storage
  17. Multi-Factor Authentication
  18. Risk Management
  19. Data Processor
  20. Integration
  21. Right to Erasure
  22. Phishing
  23. Cloud Security
  24. Personal Data
  25. Rights of Data Subjects
  26. Cyber Attacks
  27. National Privacy Commission
  28. Vulnerability
  29. Data Security
  30. Data Breach
  31. Lawful Access
  32. Data Recovery
  33. Privacy Impact Assessment
  34. Network Security
  35. Consent
  36. Right to Access
  37. Data Processing
  38. Malware
  39. Encryption
  40. Data Privacy Notice
  41. Disclosure
  42. Incident Report
  43. Anonymization
  44. Data Controller
  45. Right to rectify
  46. Right to File a Complaint
  47. Backup
  48. Integration
  49. Privacy Notice
  50. Data Protection Officer
  51. Data Consent
  52. Strong Password
  53. Transparency
  54. Compliance
  55. Ransomware
  56. Cybersecurity Awareness