DataMinimizationMulti-FactorAuthenticationRightsof DataSubjectsCyberAttacksRansomwareVulnerabilityDataSubjectIdentityTheftPersonalDataRight toDamagesDisclosureDataPrivacyNoticeCompliancePrivacyNoticeBackupDataProcessorLawfulAccessAnonymizationMalwarePrivacyImpactAssessmentDataControllerTransparencyDataSecurityFirewallsPhishingDataProtectionOfficerRighttoAccessAccessControlDataConsentDataProcessingDataBreachCloudSecurityCybersecurityAwarenessDataRecoveryEncryptionPenaltiesPrivacyPolicyIntegrationDataBreachNotificationSensitivePersonalInformationRighttorectifyContainmentNationalPrivacyCommissionIncidentReportCybersecurityRiskManagementDataRetentionRightsof DataSubjectsNetworkSecurityRight toErasureStrongPasswordConsentConfidentialityDataStorageRight toFile aComplaintIntegrationDataMinimizationMulti-FactorAuthenticationRightsof DataSubjectsCyberAttacksRansomwareVulnerabilityDataSubjectIdentityTheftPersonalDataRight toDamagesDisclosureDataPrivacyNoticeCompliancePrivacyNoticeBackupDataProcessorLawfulAccessAnonymizationMalwarePrivacyImpactAssessmentDataControllerTransparencyDataSecurityFirewallsPhishingDataProtectionOfficerRighttoAccessAccessControlDataConsentDataProcessingDataBreachCloudSecurityCybersecurityAwarenessDataRecoveryEncryptionPenaltiesPrivacyPolicyIntegrationDataBreachNotificationSensitivePersonalInformationRighttorectifyContainmentNationalPrivacyCommissionIncidentReportCybersecurityRiskManagementDataRetentionRightsof DataSubjectsNetworkSecurityRight toErasureStrongPasswordConsentConfidentialityDataStorageRight toFile aComplaintIntegration

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Minimization
  2. Multi-Factor Authentication
  3. Rights of Data Subjects
  4. Cyber Attacks
  5. Ransomware
  6. Vulnerability
  7. Data Subject
  8. Identity Theft
  9. Personal Data
  10. Right to Damages
  11. Disclosure
  12. Data Privacy Notice
  13. Compliance
  14. Privacy Notice
  15. Backup
  16. Data Processor
  17. Lawful Access
  18. Anonymization
  19. Malware
  20. Privacy Impact Assessment
  21. Data Controller
  22. Transparency
  23. Data Security
  24. Firewalls
  25. Phishing
  26. Data Protection Officer
  27. Right to Access
  28. Access Control
  29. Data Consent
  30. Data Processing
  31. Data Breach
  32. Cloud Security
  33. Cybersecurity Awareness
  34. Data Recovery
  35. Encryption
  36. Penalties
  37. Privacy Policy
  38. Integration
  39. Data Breach Notification
  40. Sensitive Personal Information
  41. Right to rectify
  42. Containment
  43. National Privacy Commission
  44. Incident Report
  45. Cybersecurity
  46. Risk Management
  47. Data Retention
  48. Rights of Data Subjects
  49. Network Security
  50. Right to Erasure
  51. Strong Password
  52. Consent
  53. Confidentiality
  54. Data Storage
  55. Right to File a Complaint
  56. Integration