DataPrivacyNoticePenaltiesAnonymizationSensitivePersonalInformationDataStorageCloudSecurityRiskManagementCybersecurityMulti-FactorAuthenticationContainmentRightsof DataSubjectsPhishingDataControllerStrongPasswordCybersecurityAwarenessIntegrationVulnerabilityConfidentialityDataRecoveryRight toDamagesFirewallsComplianceEncryptionPrivacyNoticeTransparencyPrivacyImpactAssessmentNationalPrivacyCommissionNetworkSecurityIncidentReportMalwarePersonalDataAccessControlRight toErasurePrivacyPolicyRight toFile aComplaintDataProtectionOfficerLawfulAccessDataProcessingIntegrationDataBreachRighttorectifyDataProcessorDisclosureDataBreachNotificationBackupDataSubjectRightsof DataSubjectsRansomwareConsentIdentityTheftDataConsentCyberAttacksRighttoAccessDataSecurityDataRetentionDataMinimizationDataPrivacyNoticePenaltiesAnonymizationSensitivePersonalInformationDataStorageCloudSecurityRiskManagementCybersecurityMulti-FactorAuthenticationContainmentRightsof DataSubjectsPhishingDataControllerStrongPasswordCybersecurityAwarenessIntegrationVulnerabilityConfidentialityDataRecoveryRight toDamagesFirewallsComplianceEncryptionPrivacyNoticeTransparencyPrivacyImpactAssessmentNationalPrivacyCommissionNetworkSecurityIncidentReportMalwarePersonalDataAccessControlRight toErasurePrivacyPolicyRight toFile aComplaintDataProtectionOfficerLawfulAccessDataProcessingIntegrationDataBreachRighttorectifyDataProcessorDisclosureDataBreachNotificationBackupDataSubjectRightsof DataSubjectsRansomwareConsentIdentityTheftDataConsentCyberAttacksRighttoAccessDataSecurityDataRetentionDataMinimization

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Privacy Notice
  2. Penalties
  3. Anonymization
  4. Sensitive Personal Information
  5. Data Storage
  6. Cloud Security
  7. Risk Management
  8. Cybersecurity
  9. Multi-Factor Authentication
  10. Containment
  11. Rights of Data Subjects
  12. Phishing
  13. Data Controller
  14. Strong Password
  15. Cybersecurity Awareness
  16. Integration
  17. Vulnerability
  18. Confidentiality
  19. Data Recovery
  20. Right to Damages
  21. Firewalls
  22. Compliance
  23. Encryption
  24. Privacy Notice
  25. Transparency
  26. Privacy Impact Assessment
  27. National Privacy Commission
  28. Network Security
  29. Incident Report
  30. Malware
  31. Personal Data
  32. Access Control
  33. Right to Erasure
  34. Privacy Policy
  35. Right to File a Complaint
  36. Data Protection Officer
  37. Lawful Access
  38. Data Processing
  39. Integration
  40. Data Breach
  41. Right to rectify
  42. Data Processor
  43. Disclosure
  44. Data Breach Notification
  45. Backup
  46. Data Subject
  47. Rights of Data Subjects
  48. Ransomware
  49. Consent
  50. Identity Theft
  51. Data Consent
  52. Cyber Attacks
  53. Right to Access
  54. Data Security
  55. Data Retention
  56. Data Minimization