DataSecurityIdentityTheftComplianceDataStorageDataBreachNationalPrivacyCommissionCyberAttacksPersonalDataDataConsentConfidentialityIncidentReportBackupCloudSecurityMulti-FactorAuthenticationDataProcessingDataControllerRightsof DataSubjectsPrivacyPolicyTransparencyFirewallsLawfulAccessDataBreachNotificationCybersecurityAwarenessIntegrationDataRetentionAccessControlDataMinimizationDataSubjectDataProcessorAnonymizationIntegrationDataRecoveryContainmentNetworkSecurityRight toFile aComplaintDataProtectionOfficerRighttorectifyRansomwareCybersecurityPhishingPenaltiesStrongPasswordRightsof DataSubjectsRiskManagementConsentPrivacyImpactAssessmentDisclosurePrivacyNoticeVulnerabilityMalwareRight toErasureEncryptionSensitivePersonalInformationRighttoAccessRight toDamagesDataPrivacyNoticeDataSecurityIdentityTheftComplianceDataStorageDataBreachNationalPrivacyCommissionCyberAttacksPersonalDataDataConsentConfidentialityIncidentReportBackupCloudSecurityMulti-FactorAuthenticationDataProcessingDataControllerRightsof DataSubjectsPrivacyPolicyTransparencyFirewallsLawfulAccessDataBreachNotificationCybersecurityAwarenessIntegrationDataRetentionAccessControlDataMinimizationDataSubjectDataProcessorAnonymizationIntegrationDataRecoveryContainmentNetworkSecurityRight toFile aComplaintDataProtectionOfficerRighttorectifyRansomwareCybersecurityPhishingPenaltiesStrongPasswordRightsof DataSubjectsRiskManagementConsentPrivacyImpactAssessmentDisclosurePrivacyNoticeVulnerabilityMalwareRight toErasureEncryptionSensitivePersonalInformationRighttoAccessRight toDamagesDataPrivacyNotice

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Security
  2. Identity Theft
  3. Compliance
  4. Data Storage
  5. Data Breach
  6. National Privacy Commission
  7. Cyber Attacks
  8. Personal Data
  9. Data Consent
  10. Confidentiality
  11. Incident Report
  12. Backup
  13. Cloud Security
  14. Multi-Factor Authentication
  15. Data Processing
  16. Data Controller
  17. Rights of Data Subjects
  18. Privacy Policy
  19. Transparency
  20. Firewalls
  21. Lawful Access
  22. Data Breach Notification
  23. Cybersecurity Awareness
  24. Integration
  25. Data Retention
  26. Access Control
  27. Data Minimization
  28. Data Subject
  29. Data Processor
  30. Anonymization
  31. Integration
  32. Data Recovery
  33. Containment
  34. Network Security
  35. Right to File a Complaint
  36. Data Protection Officer
  37. Right to rectify
  38. Ransomware
  39. Cybersecurity
  40. Phishing
  41. Penalties
  42. Strong Password
  43. Rights of Data Subjects
  44. Risk Management
  45. Consent
  46. Privacy Impact Assessment
  47. Disclosure
  48. Privacy Notice
  49. Vulnerability
  50. Malware
  51. Right to Erasure
  52. Encryption
  53. Sensitive Personal Information
  54. Right to Access
  55. Right to Damages
  56. Data Privacy Notice