CybersecurityMulti-FactorAuthenticationDataSubjectPrivacyNoticeDataMinimizationConfidentialityRiskManagementDataConsentCybersecurityAwarenessStrongPasswordDataBreachNotificationConsentRighttorectifyDataStorageDataBreachComplianceDataPrivacyNoticeRighttoAccessCyberAttacksDisclosureNationalPrivacyCommissionFirewallsDataControllerIncidentReportIntegrationRightsof DataSubjectsRansomwareTransparencyRightsof DataSubjectsPrivacyImpactAssessmentRight toErasureContainmentMalwareDataRecoveryAccessControlSensitivePersonalInformationDataSecurityAnonymizationDataProcessorCloudSecurityRight toDamagesPenaltiesIntegrationPhishingEncryptionDataProtectionOfficerIdentityTheftBackupNetworkSecurityPrivacyPolicyVulnerabilityDataProcessingRight toFile aComplaintLawfulAccessDataRetentionPersonalDataCybersecurityMulti-FactorAuthenticationDataSubjectPrivacyNoticeDataMinimizationConfidentialityRiskManagementDataConsentCybersecurityAwarenessStrongPasswordDataBreachNotificationConsentRighttorectifyDataStorageDataBreachComplianceDataPrivacyNoticeRighttoAccessCyberAttacksDisclosureNationalPrivacyCommissionFirewallsDataControllerIncidentReportIntegrationRightsof DataSubjectsRansomwareTransparencyRightsof DataSubjectsPrivacyImpactAssessmentRight toErasureContainmentMalwareDataRecoveryAccessControlSensitivePersonalInformationDataSecurityAnonymizationDataProcessorCloudSecurityRight toDamagesPenaltiesIntegrationPhishingEncryptionDataProtectionOfficerIdentityTheftBackupNetworkSecurityPrivacyPolicyVulnerabilityDataProcessingRight toFile aComplaintLawfulAccessDataRetentionPersonalData

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cybersecurity
  2. Multi-Factor Authentication
  3. Data Subject
  4. Privacy Notice
  5. Data Minimization
  6. Confidentiality
  7. Risk Management
  8. Data Consent
  9. Cybersecurity Awareness
  10. Strong Password
  11. Data Breach Notification
  12. Consent
  13. Right to rectify
  14. Data Storage
  15. Data Breach
  16. Compliance
  17. Data Privacy Notice
  18. Right to Access
  19. Cyber Attacks
  20. Disclosure
  21. National Privacy Commission
  22. Firewalls
  23. Data Controller
  24. Incident Report
  25. Integration
  26. Rights of Data Subjects
  27. Ransomware
  28. Transparency
  29. Rights of Data Subjects
  30. Privacy Impact Assessment
  31. Right to Erasure
  32. Containment
  33. Malware
  34. Data Recovery
  35. Access Control
  36. Sensitive Personal Information
  37. Data Security
  38. Anonymization
  39. Data Processor
  40. Cloud Security
  41. Right to Damages
  42. Penalties
  43. Integration
  44. Phishing
  45. Encryption
  46. Data Protection Officer
  47. Identity Theft
  48. Backup
  49. Network Security
  50. Privacy Policy
  51. Vulnerability
  52. Data Processing
  53. Right to File a Complaint
  54. Lawful Access
  55. Data Retention
  56. Personal Data