CybersecurityDataBreachNotificationStrongPasswordRiskManagementPrivacyImpactAssessmentIntegrationConsentDataRecoveryFirewallsDataControllerDisclosureIdentityTheftDataBreachBackupRightsof DataSubjectsIncidentReportRighttorectifyNetworkSecurityDataSubjectCloudSecurityPrivacyPolicyCybersecurityAwarenessPenaltiesDataConsentMulti-FactorAuthenticationDataPrivacyNoticeAnonymizationPrivacyNoticeAccessControlNationalPrivacyCommissionEncryptionDataProcessingIntegrationSensitivePersonalInformationContainmentTransparencyRansomwareDataProcessorMalwareDataRetentionDataSecurityRightsof DataSubjectsConfidentialityCyberAttacksDataStorageRight toDamagesLawfulAccessRight toFile aComplaintRight toErasureVulnerabilityDataMinimizationRighttoAccessDataProtectionOfficerCompliancePersonalDataPhishingCybersecurityDataBreachNotificationStrongPasswordRiskManagementPrivacyImpactAssessmentIntegrationConsentDataRecoveryFirewallsDataControllerDisclosureIdentityTheftDataBreachBackupRightsof DataSubjectsIncidentReportRighttorectifyNetworkSecurityDataSubjectCloudSecurityPrivacyPolicyCybersecurityAwarenessPenaltiesDataConsentMulti-FactorAuthenticationDataPrivacyNoticeAnonymizationPrivacyNoticeAccessControlNationalPrivacyCommissionEncryptionDataProcessingIntegrationSensitivePersonalInformationContainmentTransparencyRansomwareDataProcessorMalwareDataRetentionDataSecurityRightsof DataSubjectsConfidentialityCyberAttacksDataStorageRight toDamagesLawfulAccessRight toFile aComplaintRight toErasureVulnerabilityDataMinimizationRighttoAccessDataProtectionOfficerCompliancePersonalDataPhishing

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cybersecurity
  2. Data Breach Notification
  3. Strong Password
  4. Risk Management
  5. Privacy Impact Assessment
  6. Integration
  7. Consent
  8. Data Recovery
  9. Firewalls
  10. Data Controller
  11. Disclosure
  12. Identity Theft
  13. Data Breach
  14. Backup
  15. Rights of Data Subjects
  16. Incident Report
  17. Right to rectify
  18. Network Security
  19. Data Subject
  20. Cloud Security
  21. Privacy Policy
  22. Cybersecurity Awareness
  23. Penalties
  24. Data Consent
  25. Multi-Factor Authentication
  26. Data Privacy Notice
  27. Anonymization
  28. Privacy Notice
  29. Access Control
  30. National Privacy Commission
  31. Encryption
  32. Data Processing
  33. Integration
  34. Sensitive Personal Information
  35. Containment
  36. Transparency
  37. Ransomware
  38. Data Processor
  39. Malware
  40. Data Retention
  41. Data Security
  42. Rights of Data Subjects
  43. Confidentiality
  44. Cyber Attacks
  45. Data Storage
  46. Right to Damages
  47. Lawful Access
  48. Right to File a Complaint
  49. Right to Erasure
  50. Vulnerability
  51. Data Minimization
  52. Right to Access
  53. Data Protection Officer
  54. Compliance
  55. Personal Data
  56. Phishing