ConsentConfidentialityPersonalDataBackupRighttorectifyRight toFile aComplaintDataControllerRight toErasureDataProtectionOfficerDataMinimizationDataBreachNotificationDataBreachComplianceCloudSecurityRightsof DataSubjectsVulnerabilityIntegrationRightsof DataSubjectsPrivacyPolicyDataRetentionNetworkSecurityPrivacyNoticePenaltiesDataSubjectTransparencyDataStorageCybersecurityAwarenessRansomwareLawfulAccessAnonymizationStrongPasswordMulti-FactorAuthenticationContainmentIdentityTheftDataPrivacyNoticeCybersecurityRight toDamagesPhishingIntegrationRighttoAccessFirewallsMalwareRiskManagementDataRecoveryDataProcessingDataSecuritySensitivePersonalInformationEncryptionNationalPrivacyCommissionDataProcessorIncidentReportPrivacyImpactAssessmentAccessControlDataConsentCyberAttacksDisclosureConsentConfidentialityPersonalDataBackupRighttorectifyRight toFile aComplaintDataControllerRight toErasureDataProtectionOfficerDataMinimizationDataBreachNotificationDataBreachComplianceCloudSecurityRightsof DataSubjectsVulnerabilityIntegrationRightsof DataSubjectsPrivacyPolicyDataRetentionNetworkSecurityPrivacyNoticePenaltiesDataSubjectTransparencyDataStorageCybersecurityAwarenessRansomwareLawfulAccessAnonymizationStrongPasswordMulti-FactorAuthenticationContainmentIdentityTheftDataPrivacyNoticeCybersecurityRight toDamagesPhishingIntegrationRighttoAccessFirewallsMalwareRiskManagementDataRecoveryDataProcessingDataSecuritySensitivePersonalInformationEncryptionNationalPrivacyCommissionDataProcessorIncidentReportPrivacyImpactAssessmentAccessControlDataConsentCyberAttacksDisclosure

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Consent
  2. Confidentiality
  3. Personal Data
  4. Backup
  5. Right to rectify
  6. Right to File a Complaint
  7. Data Controller
  8. Right to Erasure
  9. Data Protection Officer
  10. Data Minimization
  11. Data Breach Notification
  12. Data Breach
  13. Compliance
  14. Cloud Security
  15. Rights of Data Subjects
  16. Vulnerability
  17. Integration
  18. Rights of Data Subjects
  19. Privacy Policy
  20. Data Retention
  21. Network Security
  22. Privacy Notice
  23. Penalties
  24. Data Subject
  25. Transparency
  26. Data Storage
  27. Cybersecurity Awareness
  28. Ransomware
  29. Lawful Access
  30. Anonymization
  31. Strong Password
  32. Multi-Factor Authentication
  33. Containment
  34. Identity Theft
  35. Data Privacy Notice
  36. Cybersecurity
  37. Right to Damages
  38. Phishing
  39. Integration
  40. Right to Access
  41. Firewalls
  42. Malware
  43. Risk Management
  44. Data Recovery
  45. Data Processing
  46. Data Security
  47. Sensitive Personal Information
  48. Encryption
  49. National Privacy Commission
  50. Data Processor
  51. Incident Report
  52. Privacy Impact Assessment
  53. Access Control
  54. Data Consent
  55. Cyber Attacks
  56. Disclosure