IncidentReportPenaltiesRightsof DataSubjectsCybersecurityAwarenessSensitivePersonalInformationDataProcessingDataProcessorPrivacyNoticePhishingIntegrationTransparencyNationalPrivacyCommissionRight toFile aComplaintRight toErasureDataConsentAnonymizationBackupPrivacyPolicyLawfulAccessEncryptionPersonalDataAccessControlComplianceStrongPasswordDataRecoveryMulti-FactorAuthenticationDataBreachNotificationRight toDamagesDataSecurityIdentityTheftConsentConfidentialityDataControllerDataPrivacyNoticeDataMinimizationPrivacyImpactAssessmentCyberAttacksDataProtectionOfficerMalwareVulnerabilityRighttoAccessDataStorageDataSubjectIntegrationNetworkSecurityRightsof DataSubjectsFirewallsCloudSecurityRiskManagementDataRetentionRighttorectifyContainmentDataBreachCybersecurityDisclosureRansomwareIncidentReportPenaltiesRightsof DataSubjectsCybersecurityAwarenessSensitivePersonalInformationDataProcessingDataProcessorPrivacyNoticePhishingIntegrationTransparencyNationalPrivacyCommissionRight toFile aComplaintRight toErasureDataConsentAnonymizationBackupPrivacyPolicyLawfulAccessEncryptionPersonalDataAccessControlComplianceStrongPasswordDataRecoveryMulti-FactorAuthenticationDataBreachNotificationRight toDamagesDataSecurityIdentityTheftConsentConfidentialityDataControllerDataPrivacyNoticeDataMinimizationPrivacyImpactAssessmentCyberAttacksDataProtectionOfficerMalwareVulnerabilityRighttoAccessDataStorageDataSubjectIntegrationNetworkSecurityRightsof DataSubjectsFirewallsCloudSecurityRiskManagementDataRetentionRighttorectifyContainmentDataBreachCybersecurityDisclosureRansomware

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Incident Report
  2. Penalties
  3. Rights of Data Subjects
  4. Cybersecurity Awareness
  5. Sensitive Personal Information
  6. Data Processing
  7. Data Processor
  8. Privacy Notice
  9. Phishing
  10. Integration
  11. Transparency
  12. National Privacy Commission
  13. Right to File a Complaint
  14. Right to Erasure
  15. Data Consent
  16. Anonymization
  17. Backup
  18. Privacy Policy
  19. Lawful Access
  20. Encryption
  21. Personal Data
  22. Access Control
  23. Compliance
  24. Strong Password
  25. Data Recovery
  26. Multi-Factor Authentication
  27. Data Breach Notification
  28. Right to Damages
  29. Data Security
  30. Identity Theft
  31. Consent
  32. Confidentiality
  33. Data Controller
  34. Data Privacy Notice
  35. Data Minimization
  36. Privacy Impact Assessment
  37. Cyber Attacks
  38. Data Protection Officer
  39. Malware
  40. Vulnerability
  41. Right to Access
  42. Data Storage
  43. Data Subject
  44. Integration
  45. Network Security
  46. Rights of Data Subjects
  47. Firewalls
  48. Cloud Security
  49. Risk Management
  50. Data Retention
  51. Right to rectify
  52. Containment
  53. Data Breach
  54. Cybersecurity
  55. Disclosure
  56. Ransomware