DataMinimizationDataProtectionOfficerStrongPasswordCybersecurityAwarenessBackupDataPrivacyNoticePrivacyPolicyIntegrationDataRetentionVulnerabilityNationalPrivacyCommissionDisclosureNetworkSecurityTransparencyPhishingDataConsentAccessControlLawfulAccessDataSubjectPrivacyImpactAssessmentRight toFile aComplaintAnonymizationDataProcessorConfidentialityFirewallsRight toDamagesDataRecoveryMulti-FactorAuthenticationIdentityTheftCompliancePrivacyNoticeDataStorageRighttorectifyPenaltiesMalwareRightsof DataSubjectsDataControllerDataSecurityRansomwareIncidentReportContainmentDataBreachConsentRightsof DataSubjectsDataBreachNotificationRighttoAccessRight toErasureCloudSecurityEncryptionIntegrationRiskManagementDataProcessingCybersecurityCyberAttacksPersonalDataSensitivePersonalInformationDataMinimizationDataProtectionOfficerStrongPasswordCybersecurityAwarenessBackupDataPrivacyNoticePrivacyPolicyIntegrationDataRetentionVulnerabilityNationalPrivacyCommissionDisclosureNetworkSecurityTransparencyPhishingDataConsentAccessControlLawfulAccessDataSubjectPrivacyImpactAssessmentRight toFile aComplaintAnonymizationDataProcessorConfidentialityFirewallsRight toDamagesDataRecoveryMulti-FactorAuthenticationIdentityTheftCompliancePrivacyNoticeDataStorageRighttorectifyPenaltiesMalwareRightsof DataSubjectsDataControllerDataSecurityRansomwareIncidentReportContainmentDataBreachConsentRightsof DataSubjectsDataBreachNotificationRighttoAccessRight toErasureCloudSecurityEncryptionIntegrationRiskManagementDataProcessingCybersecurityCyberAttacksPersonalDataSensitivePersonalInformation

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Minimization
  2. Data Protection Officer
  3. Strong Password
  4. Cybersecurity Awareness
  5. Backup
  6. Data Privacy Notice
  7. Privacy Policy
  8. Integration
  9. Data Retention
  10. Vulnerability
  11. National Privacy Commission
  12. Disclosure
  13. Network Security
  14. Transparency
  15. Phishing
  16. Data Consent
  17. Access Control
  18. Lawful Access
  19. Data Subject
  20. Privacy Impact Assessment
  21. Right to File a Complaint
  22. Anonymization
  23. Data Processor
  24. Confidentiality
  25. Firewalls
  26. Right to Damages
  27. Data Recovery
  28. Multi-Factor Authentication
  29. Identity Theft
  30. Compliance
  31. Privacy Notice
  32. Data Storage
  33. Right to rectify
  34. Penalties
  35. Malware
  36. Rights of Data Subjects
  37. Data Controller
  38. Data Security
  39. Ransomware
  40. Incident Report
  41. Containment
  42. Data Breach
  43. Consent
  44. Rights of Data Subjects
  45. Data Breach Notification
  46. Right to Access
  47. Right to Erasure
  48. Cloud Security
  49. Encryption
  50. Integration
  51. Risk Management
  52. Data Processing
  53. Cybersecurity
  54. Cyber Attacks
  55. Personal Data
  56. Sensitive Personal Information