DataRecoveryDataSecurityRightsof DataSubjectsDataBreachNotificationAccessControlRight toDamagesFirewallsMulti-FactorAuthenticationConsentRighttorectifyPrivacyPolicyNationalPrivacyCommissionCyberAttacksPhishingRight toErasureDataSubjectLawfulAccessDataPrivacyNoticeComplianceCloudSecurityTransparencyDataRetentionIdentityTheftPersonalDataPrivacyImpactAssessmentPenaltiesRightsof DataSubjectsContainmentNetworkSecurityStrongPasswordDataBreachBackupSensitivePersonalInformationIntegrationAnonymizationDataProcessorCybersecurityDataProcessingDataMinimizationRight toFile aComplaintDataProtectionOfficerPrivacyNoticeDataStorageMalwareCybersecurityAwarenessRansomwareConfidentialityDisclosureDataControllerEncryptionRiskManagementRighttoAccessIntegrationDataConsentIncidentReportVulnerabilityDataRecoveryDataSecurityRightsof DataSubjectsDataBreachNotificationAccessControlRight toDamagesFirewallsMulti-FactorAuthenticationConsentRighttorectifyPrivacyPolicyNationalPrivacyCommissionCyberAttacksPhishingRight toErasureDataSubjectLawfulAccessDataPrivacyNoticeComplianceCloudSecurityTransparencyDataRetentionIdentityTheftPersonalDataPrivacyImpactAssessmentPenaltiesRightsof DataSubjectsContainmentNetworkSecurityStrongPasswordDataBreachBackupSensitivePersonalInformationIntegrationAnonymizationDataProcessorCybersecurityDataProcessingDataMinimizationRight toFile aComplaintDataProtectionOfficerPrivacyNoticeDataStorageMalwareCybersecurityAwarenessRansomwareConfidentialityDisclosureDataControllerEncryptionRiskManagementRighttoAccessIntegrationDataConsentIncidentReportVulnerability

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Recovery
  2. Data Security
  3. Rights of Data Subjects
  4. Data Breach Notification
  5. Access Control
  6. Right to Damages
  7. Firewalls
  8. Multi-Factor Authentication
  9. Consent
  10. Right to rectify
  11. Privacy Policy
  12. National Privacy Commission
  13. Cyber Attacks
  14. Phishing
  15. Right to Erasure
  16. Data Subject
  17. Lawful Access
  18. Data Privacy Notice
  19. Compliance
  20. Cloud Security
  21. Transparency
  22. Data Retention
  23. Identity Theft
  24. Personal Data
  25. Privacy Impact Assessment
  26. Penalties
  27. Rights of Data Subjects
  28. Containment
  29. Network Security
  30. Strong Password
  31. Data Breach
  32. Backup
  33. Sensitive Personal Information
  34. Integration
  35. Anonymization
  36. Data Processor
  37. Cybersecurity
  38. Data Processing
  39. Data Minimization
  40. Right to File a Complaint
  41. Data Protection Officer
  42. Privacy Notice
  43. Data Storage
  44. Malware
  45. Cybersecurity Awareness
  46. Ransomware
  47. Confidentiality
  48. Disclosure
  49. Data Controller
  50. Encryption
  51. Risk Management
  52. Right to Access
  53. Integration
  54. Data Consent
  55. Incident Report
  56. Vulnerability