ContainmentBackupCyberAttacksRight toDamagesDataRecoveryStrongPasswordAnonymizationDataSubjectRighttoAccessDataMinimizationDataControllerDataPrivacyNoticeDataBreachDisclosurePrivacyPolicyVulnerabilityNationalPrivacyCommissionNetworkSecurityLawfulAccessPrivacyImpactAssessmentRansomwareIntegrationPenaltiesAccessControlDataProcessingIntegrationDataBreachNotificationDataConsentConsentEncryptionRight toFile aComplaintPrivacyNoticeCybersecurityPersonalDataDataStorageDataProtectionOfficerCloudSecurityFirewallsRightsof DataSubjectsMalwareIdentityTheftDataSecurityPhishingDataRetentionRightsof DataSubjectsSensitivePersonalInformationCybersecurityAwarenessRiskManagementRight toErasureComplianceTransparencyMulti-FactorAuthenticationRighttorectifyConfidentialityDataProcessorIncidentReportContainmentBackupCyberAttacksRight toDamagesDataRecoveryStrongPasswordAnonymizationDataSubjectRighttoAccessDataMinimizationDataControllerDataPrivacyNoticeDataBreachDisclosurePrivacyPolicyVulnerabilityNationalPrivacyCommissionNetworkSecurityLawfulAccessPrivacyImpactAssessmentRansomwareIntegrationPenaltiesAccessControlDataProcessingIntegrationDataBreachNotificationDataConsentConsentEncryptionRight toFile aComplaintPrivacyNoticeCybersecurityPersonalDataDataStorageDataProtectionOfficerCloudSecurityFirewallsRightsof DataSubjectsMalwareIdentityTheftDataSecurityPhishingDataRetentionRightsof DataSubjectsSensitivePersonalInformationCybersecurityAwarenessRiskManagementRight toErasureComplianceTransparencyMulti-FactorAuthenticationRighttorectifyConfidentialityDataProcessorIncidentReport

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Containment
  2. Backup
  3. Cyber Attacks
  4. Right to Damages
  5. Data Recovery
  6. Strong Password
  7. Anonymization
  8. Data Subject
  9. Right to Access
  10. Data Minimization
  11. Data Controller
  12. Data Privacy Notice
  13. Data Breach
  14. Disclosure
  15. Privacy Policy
  16. Vulnerability
  17. National Privacy Commission
  18. Network Security
  19. Lawful Access
  20. Privacy Impact Assessment
  21. Ransomware
  22. Integration
  23. Penalties
  24. Access Control
  25. Data Processing
  26. Integration
  27. Data Breach Notification
  28. Data Consent
  29. Consent
  30. Encryption
  31. Right to File a Complaint
  32. Privacy Notice
  33. Cybersecurity
  34. Personal Data
  35. Data Storage
  36. Data Protection Officer
  37. Cloud Security
  38. Firewalls
  39. Rights of Data Subjects
  40. Malware
  41. Identity Theft
  42. Data Security
  43. Phishing
  44. Data Retention
  45. Rights of Data Subjects
  46. Sensitive Personal Information
  47. Cybersecurity Awareness
  48. Risk Management
  49. Right to Erasure
  50. Compliance
  51. Transparency
  52. Multi-Factor Authentication
  53. Right to rectify
  54. Confidentiality
  55. Data Processor
  56. Incident Report