PrivacyNoticeRight toFile aComplaintIntegrationCybersecurityAwarenessTransparencyIntegrationPrivacyPolicyRight toDamagesDataProtectionOfficerLawfulAccessDataProcessorCyberAttacksConfidentialityNationalPrivacyCommissionRiskManagementSensitivePersonalInformationRightsof DataSubjectsDataControllerDataMinimizationDataProcessingDataRetentionAnonymizationComplianceDataBreachDataConsentCloudSecurityDisclosureNetworkSecurityAccessControlRighttoAccessMulti-FactorAuthenticationDataSecurityContainmentMalwareEncryptionDataStorageBackupRight toErasurePenaltiesIdentityTheftCybersecurityConsentRightsof DataSubjectsVulnerabilityDataRecoveryStrongPasswordDataSubjectRansomwareDataBreachNotificationPersonalDataPhishingFirewallsRighttorectifyDataPrivacyNoticeIncidentReportPrivacyImpactAssessmentPrivacyNoticeRight toFile aComplaintIntegrationCybersecurityAwarenessTransparencyIntegrationPrivacyPolicyRight toDamagesDataProtectionOfficerLawfulAccessDataProcessorCyberAttacksConfidentialityNationalPrivacyCommissionRiskManagementSensitivePersonalInformationRightsof DataSubjectsDataControllerDataMinimizationDataProcessingDataRetentionAnonymizationComplianceDataBreachDataConsentCloudSecurityDisclosureNetworkSecurityAccessControlRighttoAccessMulti-FactorAuthenticationDataSecurityContainmentMalwareEncryptionDataStorageBackupRight toErasurePenaltiesIdentityTheftCybersecurityConsentRightsof DataSubjectsVulnerabilityDataRecoveryStrongPasswordDataSubjectRansomwareDataBreachNotificationPersonalDataPhishingFirewallsRighttorectifyDataPrivacyNoticeIncidentReportPrivacyImpactAssessment

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Privacy Notice
  2. Right to File a Complaint
  3. Integration
  4. Cybersecurity Awareness
  5. Transparency
  6. Integration
  7. Privacy Policy
  8. Right to Damages
  9. Data Protection Officer
  10. Lawful Access
  11. Data Processor
  12. Cyber Attacks
  13. Confidentiality
  14. National Privacy Commission
  15. Risk Management
  16. Sensitive Personal Information
  17. Rights of Data Subjects
  18. Data Controller
  19. Data Minimization
  20. Data Processing
  21. Data Retention
  22. Anonymization
  23. Compliance
  24. Data Breach
  25. Data Consent
  26. Cloud Security
  27. Disclosure
  28. Network Security
  29. Access Control
  30. Right to Access
  31. Multi-Factor Authentication
  32. Data Security
  33. Containment
  34. Malware
  35. Encryption
  36. Data Storage
  37. Backup
  38. Right to Erasure
  39. Penalties
  40. Identity Theft
  41. Cybersecurity
  42. Consent
  43. Rights of Data Subjects
  44. Vulnerability
  45. Data Recovery
  46. Strong Password
  47. Data Subject
  48. Ransomware
  49. Data Breach Notification
  50. Personal Data
  51. Phishing
  52. Firewalls
  53. Right to rectify
  54. Data Privacy Notice
  55. Incident Report
  56. Privacy Impact Assessment