Right toDamagesDataPrivacyNoticeConsentCybersecurityDataProcessorAccessControlDataSubjectDataConsentDisclosurePersonalDataEncryptionPrivacyPolicyAnonymizationNationalPrivacyCommissionCyberAttacksMulti-FactorAuthenticationCloudSecurityDataStoragePrivacyNoticeDataRecoveryDataSecurityRighttoAccessDataRetentionIntegrationRighttorectifyMalwareCybersecurityAwarenessTransparencyRight toErasureIdentityTheftDataProcessingLawfulAccessPhishingRight toFile aComplaintDataProtectionOfficerDataControllerDataBreachPenaltiesIncidentReportDataBreachNotificationRightsof DataSubjectsVulnerabilityNetworkSecuritySensitivePersonalInformationRansomwareContainmentStrongPasswordFirewallsBackupConfidentialityRightsof DataSubjectsCompliancePrivacyImpactAssessmentDataMinimizationRiskManagementIntegrationRight toDamagesDataPrivacyNoticeConsentCybersecurityDataProcessorAccessControlDataSubjectDataConsentDisclosurePersonalDataEncryptionPrivacyPolicyAnonymizationNationalPrivacyCommissionCyberAttacksMulti-FactorAuthenticationCloudSecurityDataStoragePrivacyNoticeDataRecoveryDataSecurityRighttoAccessDataRetentionIntegrationRighttorectifyMalwareCybersecurityAwarenessTransparencyRight toErasureIdentityTheftDataProcessingLawfulAccessPhishingRight toFile aComplaintDataProtectionOfficerDataControllerDataBreachPenaltiesIncidentReportDataBreachNotificationRightsof DataSubjectsVulnerabilityNetworkSecuritySensitivePersonalInformationRansomwareContainmentStrongPasswordFirewallsBackupConfidentialityRightsof DataSubjectsCompliancePrivacyImpactAssessmentDataMinimizationRiskManagementIntegration

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Damages
  2. Data Privacy Notice
  3. Consent
  4. Cybersecurity
  5. Data Processor
  6. Access Control
  7. Data Subject
  8. Data Consent
  9. Disclosure
  10. Personal Data
  11. Encryption
  12. Privacy Policy
  13. Anonymization
  14. National Privacy Commission
  15. Cyber Attacks
  16. Multi-Factor Authentication
  17. Cloud Security
  18. Data Storage
  19. Privacy Notice
  20. Data Recovery
  21. Data Security
  22. Right to Access
  23. Data Retention
  24. Integration
  25. Right to rectify
  26. Malware
  27. Cybersecurity Awareness
  28. Transparency
  29. Right to Erasure
  30. Identity Theft
  31. Data Processing
  32. Lawful Access
  33. Phishing
  34. Right to File a Complaint
  35. Data Protection Officer
  36. Data Controller
  37. Data Breach
  38. Penalties
  39. Incident Report
  40. Data Breach Notification
  41. Rights of Data Subjects
  42. Vulnerability
  43. Network Security
  44. Sensitive Personal Information
  45. Ransomware
  46. Containment
  47. Strong Password
  48. Firewalls
  49. Backup
  50. Confidentiality
  51. Rights of Data Subjects
  52. Compliance
  53. Privacy Impact Assessment
  54. Data Minimization
  55. Risk Management
  56. Integration