VulnerabilityRansomwareCybersecurityIntegrationTransparencySensitivePersonalInformationRighttorectifyNetworkSecurityCloudSecurityDataControllerIncidentReportPrivacyImpactAssessmentDataProcessorComplianceDataBreachNotificationMalwareDataProtectionOfficerDataSubjectRight toFile aComplaintConsentNationalPrivacyCommissionDataSecurityAccessControlIdentityTheftConfidentialityDataPrivacyNoticeEncryptionPersonalDataPenaltiesLawfulAccessRight toDamagesDataProcessingStrongPasswordAnonymizationRightsof DataSubjectsRighttoAccessIntegrationCyberAttacksBackupPhishingPrivacyNoticeDataMinimizationDataStoragePrivacyPolicyCybersecurityAwarenessRight toErasureRightsof DataSubjectsMulti-FactorAuthenticationRiskManagementFirewallsDataRetentionDisclosureDataConsentContainmentDataBreachDataRecoveryVulnerabilityRansomwareCybersecurityIntegrationTransparencySensitivePersonalInformationRighttorectifyNetworkSecurityCloudSecurityDataControllerIncidentReportPrivacyImpactAssessmentDataProcessorComplianceDataBreachNotificationMalwareDataProtectionOfficerDataSubjectRight toFile aComplaintConsentNationalPrivacyCommissionDataSecurityAccessControlIdentityTheftConfidentialityDataPrivacyNoticeEncryptionPersonalDataPenaltiesLawfulAccessRight toDamagesDataProcessingStrongPasswordAnonymizationRightsof DataSubjectsRighttoAccessIntegrationCyberAttacksBackupPhishingPrivacyNoticeDataMinimizationDataStoragePrivacyPolicyCybersecurityAwarenessRight toErasureRightsof DataSubjectsMulti-FactorAuthenticationRiskManagementFirewallsDataRetentionDisclosureDataConsentContainmentDataBreachDataRecovery

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Vulnerability
  2. Ransomware
  3. Cybersecurity
  4. Integration
  5. Transparency
  6. Sensitive Personal Information
  7. Right to rectify
  8. Network Security
  9. Cloud Security
  10. Data Controller
  11. Incident Report
  12. Privacy Impact Assessment
  13. Data Processor
  14. Compliance
  15. Data Breach Notification
  16. Malware
  17. Data Protection Officer
  18. Data Subject
  19. Right to File a Complaint
  20. Consent
  21. National Privacy Commission
  22. Data Security
  23. Access Control
  24. Identity Theft
  25. Confidentiality
  26. Data Privacy Notice
  27. Encryption
  28. Personal Data
  29. Penalties
  30. Lawful Access
  31. Right to Damages
  32. Data Processing
  33. Strong Password
  34. Anonymization
  35. Rights of Data Subjects
  36. Right to Access
  37. Integration
  38. Cyber Attacks
  39. Backup
  40. Phishing
  41. Privacy Notice
  42. Data Minimization
  43. Data Storage
  44. Privacy Policy
  45. Cybersecurity Awareness
  46. Right to Erasure
  47. Rights of Data Subjects
  48. Multi-Factor Authentication
  49. Risk Management
  50. Firewalls
  51. Data Retention
  52. Disclosure
  53. Data Consent
  54. Containment
  55. Data Breach
  56. Data Recovery