RighttoAccessDataProcessorDataStorageDataProcessingConsentDataSecurityMalwareCybersecurityRansomwareRighttorectifyDataProtectionOfficerNationalPrivacyCommissionPrivacyImpactAssessmentIntegrationLawfulAccessConfidentialityCloudSecurityFirewallsDataControllerTransparencyIntegrationIdentityTheftRight toFile aComplaintDataPrivacyNoticeAccessControlDataBreachDataRetentionIncidentReportVulnerabilityDataConsentRight toDamagesNetworkSecurityRight toErasureSensitivePersonalInformationPrivacyNoticeEncryptionCyberAttacksAnonymizationCybersecurityAwarenessDataMinimizationBackupRightsof DataSubjectsPrivacyPolicyDataSubjectCompliancePersonalDataPenaltiesStrongPasswordRightsof DataSubjectsDataBreachNotificationRiskManagementPhishingContainmentDataRecoveryDisclosureMulti-FactorAuthenticationRighttoAccessDataProcessorDataStorageDataProcessingConsentDataSecurityMalwareCybersecurityRansomwareRighttorectifyDataProtectionOfficerNationalPrivacyCommissionPrivacyImpactAssessmentIntegrationLawfulAccessConfidentialityCloudSecurityFirewallsDataControllerTransparencyIntegrationIdentityTheftRight toFile aComplaintDataPrivacyNoticeAccessControlDataBreachDataRetentionIncidentReportVulnerabilityDataConsentRight toDamagesNetworkSecurityRight toErasureSensitivePersonalInformationPrivacyNoticeEncryptionCyberAttacksAnonymizationCybersecurityAwarenessDataMinimizationBackupRightsof DataSubjectsPrivacyPolicyDataSubjectCompliancePersonalDataPenaltiesStrongPasswordRightsof DataSubjectsDataBreachNotificationRiskManagementPhishingContainmentDataRecoveryDisclosureMulti-FactorAuthentication

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Access
  2. Data Processor
  3. Data Storage
  4. Data Processing
  5. Consent
  6. Data Security
  7. Malware
  8. Cybersecurity
  9. Ransomware
  10. Right to rectify
  11. Data Protection Officer
  12. National Privacy Commission
  13. Privacy Impact Assessment
  14. Integration
  15. Lawful Access
  16. Confidentiality
  17. Cloud Security
  18. Firewalls
  19. Data Controller
  20. Transparency
  21. Integration
  22. Identity Theft
  23. Right to File a Complaint
  24. Data Privacy Notice
  25. Access Control
  26. Data Breach
  27. Data Retention
  28. Incident Report
  29. Vulnerability
  30. Data Consent
  31. Right to Damages
  32. Network Security
  33. Right to Erasure
  34. Sensitive Personal Information
  35. Privacy Notice
  36. Encryption
  37. Cyber Attacks
  38. Anonymization
  39. Cybersecurity Awareness
  40. Data Minimization
  41. Backup
  42. Rights of Data Subjects
  43. Privacy Policy
  44. Data Subject
  45. Compliance
  46. Personal Data
  47. Penalties
  48. Strong Password
  49. Rights of Data Subjects
  50. Data Breach Notification
  51. Risk Management
  52. Phishing
  53. Containment
  54. Data Recovery
  55. Disclosure
  56. Multi-Factor Authentication