NetworkSecurityRight toDamagesRight toFile aComplaintPhishingTransparencyIntegrationDataProcessingAnonymizationRighttoAccessConfidentialityDataBreachMalwareDataStoragePrivacyNoticeDataBreachNotificationRansomwarePenaltiesRightsof DataSubjectsBackupDataSubjectRightsof DataSubjectsDataPrivacyNoticeLawfulAccessConsentRiskManagementFirewallsMulti-FactorAuthenticationDataProtectionOfficerRighttorectifyDataMinimizationPrivacyPolicyPersonalDataNationalPrivacyCommissionCybersecurityAwarenessDataRetentionIntegrationStrongPasswordCyberAttacksComplianceIncidentReportIdentityTheftCybersecurityDataSecurityRight toErasureDataControllerSensitivePersonalInformationDisclosureVulnerabilityDataConsentCloudSecurityContainmentEncryptionAccessControlDataProcessorPrivacyImpactAssessmentDataRecoveryNetworkSecurityRight toDamagesRight toFile aComplaintPhishingTransparencyIntegrationDataProcessingAnonymizationRighttoAccessConfidentialityDataBreachMalwareDataStoragePrivacyNoticeDataBreachNotificationRansomwarePenaltiesRightsof DataSubjectsBackupDataSubjectRightsof DataSubjectsDataPrivacyNoticeLawfulAccessConsentRiskManagementFirewallsMulti-FactorAuthenticationDataProtectionOfficerRighttorectifyDataMinimizationPrivacyPolicyPersonalDataNationalPrivacyCommissionCybersecurityAwarenessDataRetentionIntegrationStrongPasswordCyberAttacksComplianceIncidentReportIdentityTheftCybersecurityDataSecurityRight toErasureDataControllerSensitivePersonalInformationDisclosureVulnerabilityDataConsentCloudSecurityContainmentEncryptionAccessControlDataProcessorPrivacyImpactAssessmentDataRecovery

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Network Security
  2. Right to Damages
  3. Right to File a Complaint
  4. Phishing
  5. Transparency
  6. Integration
  7. Data Processing
  8. Anonymization
  9. Right to Access
  10. Confidentiality
  11. Data Breach
  12. Malware
  13. Data Storage
  14. Privacy Notice
  15. Data Breach Notification
  16. Ransomware
  17. Penalties
  18. Rights of Data Subjects
  19. Backup
  20. Data Subject
  21. Rights of Data Subjects
  22. Data Privacy Notice
  23. Lawful Access
  24. Consent
  25. Risk Management
  26. Firewalls
  27. Multi-Factor Authentication
  28. Data Protection Officer
  29. Right to rectify
  30. Data Minimization
  31. Privacy Policy
  32. Personal Data
  33. National Privacy Commission
  34. Cybersecurity Awareness
  35. Data Retention
  36. Integration
  37. Strong Password
  38. Cyber Attacks
  39. Compliance
  40. Incident Report
  41. Identity Theft
  42. Cybersecurity
  43. Data Security
  44. Right to Erasure
  45. Data Controller
  46. Sensitive Personal Information
  47. Disclosure
  48. Vulnerability
  49. Data Consent
  50. Cloud Security
  51. Containment
  52. Encryption
  53. Access Control
  54. Data Processor
  55. Privacy Impact Assessment
  56. Data Recovery