DataStorageCyberAttacksRight toFile aComplaintConsentFirewallsMalwareDataBreachNotificationCloudSecurityCybersecurityDisclosurePrivacyNoticeDataControllerMulti-FactorAuthenticationRighttoAccessDataSubjectDataBreachDataProcessorRight toDamagesStrongPasswordDataProtectionOfficerDataRetentionDataProcessingPrivacyPolicyDataPrivacyNoticeVulnerabilityEncryptionRightsof DataSubjectsIncidentReportContainmentDataSecurityRightsof DataSubjectsPenaltiesPersonalDataPhishingDataRecoveryPrivacyImpactAssessmentSensitivePersonalInformationNationalPrivacyCommissionIdentityTheftAnonymizationRansomwareTransparencyDataConsentNetworkSecurityAccessControlConfidentialityComplianceRight toErasureLawfulAccessRiskManagementCybersecurityAwarenessIntegrationBackupDataMinimizationIntegrationRighttorectifyDataStorageCyberAttacksRight toFile aComplaintConsentFirewallsMalwareDataBreachNotificationCloudSecurityCybersecurityDisclosurePrivacyNoticeDataControllerMulti-FactorAuthenticationRighttoAccessDataSubjectDataBreachDataProcessorRight toDamagesStrongPasswordDataProtectionOfficerDataRetentionDataProcessingPrivacyPolicyDataPrivacyNoticeVulnerabilityEncryptionRightsof DataSubjectsIncidentReportContainmentDataSecurityRightsof DataSubjectsPenaltiesPersonalDataPhishingDataRecoveryPrivacyImpactAssessmentSensitivePersonalInformationNationalPrivacyCommissionIdentityTheftAnonymizationRansomwareTransparencyDataConsentNetworkSecurityAccessControlConfidentialityComplianceRight toErasureLawfulAccessRiskManagementCybersecurityAwarenessIntegrationBackupDataMinimizationIntegrationRighttorectify

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Storage
  2. Cyber Attacks
  3. Right to File a Complaint
  4. Consent
  5. Firewalls
  6. Malware
  7. Data Breach Notification
  8. Cloud Security
  9. Cybersecurity
  10. Disclosure
  11. Privacy Notice
  12. Data Controller
  13. Multi-Factor Authentication
  14. Right to Access
  15. Data Subject
  16. Data Breach
  17. Data Processor
  18. Right to Damages
  19. Strong Password
  20. Data Protection Officer
  21. Data Retention
  22. Data Processing
  23. Privacy Policy
  24. Data Privacy Notice
  25. Vulnerability
  26. Encryption
  27. Rights of Data Subjects
  28. Incident Report
  29. Containment
  30. Data Security
  31. Rights of Data Subjects
  32. Penalties
  33. Personal Data
  34. Phishing
  35. Data Recovery
  36. Privacy Impact Assessment
  37. Sensitive Personal Information
  38. National Privacy Commission
  39. Identity Theft
  40. Anonymization
  41. Ransomware
  42. Transparency
  43. Data Consent
  44. Network Security
  45. Access Control
  46. Confidentiality
  47. Compliance
  48. Right to Erasure
  49. Lawful Access
  50. Risk Management
  51. Cybersecurity Awareness
  52. Integration
  53. Backup
  54. Data Minimization
  55. Integration
  56. Right to rectify