RighttorectifyRight toFile aComplaintDataMinimizationRansomwareDataRetentionConfidentialityDataSecurityDataRecoveryIntegrationDataBreachNotificationPrivacyImpactAssessmentContainmentCybersecurityAwarenessBackupRighttoAccessVulnerabilityMalwareCybersecurityDataProcessingDataConsentPhishingAccessControlComplianceRiskManagementSensitivePersonalInformationCloudSecurityFirewallsPrivacyPolicyIncidentReportDataStorageTransparencyDisclosureMulti-FactorAuthenticationDataPrivacyNoticeDataSubjectConsentCyberAttacksEncryptionIntegrationRightsof DataSubjectsDataBreachPrivacyNoticePenaltiesDataProtectionOfficerLawfulAccessRight toDamagesDataProcessorAnonymizationNationalPrivacyCommissionNetworkSecurityPersonalDataStrongPasswordIdentityTheftDataControllerRight toErasureRightsof DataSubjectsRighttorectifyRight toFile aComplaintDataMinimizationRansomwareDataRetentionConfidentialityDataSecurityDataRecoveryIntegrationDataBreachNotificationPrivacyImpactAssessmentContainmentCybersecurityAwarenessBackupRighttoAccessVulnerabilityMalwareCybersecurityDataProcessingDataConsentPhishingAccessControlComplianceRiskManagementSensitivePersonalInformationCloudSecurityFirewallsPrivacyPolicyIncidentReportDataStorageTransparencyDisclosureMulti-FactorAuthenticationDataPrivacyNoticeDataSubjectConsentCyberAttacksEncryptionIntegrationRightsof DataSubjectsDataBreachPrivacyNoticePenaltiesDataProtectionOfficerLawfulAccessRight toDamagesDataProcessorAnonymizationNationalPrivacyCommissionNetworkSecurityPersonalDataStrongPasswordIdentityTheftDataControllerRight toErasureRightsof DataSubjects

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to rectify
  2. Right to File a Complaint
  3. Data Minimization
  4. Ransomware
  5. Data Retention
  6. Confidentiality
  7. Data Security
  8. Data Recovery
  9. Integration
  10. Data Breach Notification
  11. Privacy Impact Assessment
  12. Containment
  13. Cybersecurity Awareness
  14. Backup
  15. Right to Access
  16. Vulnerability
  17. Malware
  18. Cybersecurity
  19. Data Processing
  20. Data Consent
  21. Phishing
  22. Access Control
  23. Compliance
  24. Risk Management
  25. Sensitive Personal Information
  26. Cloud Security
  27. Firewalls
  28. Privacy Policy
  29. Incident Report
  30. Data Storage
  31. Transparency
  32. Disclosure
  33. Multi-Factor Authentication
  34. Data Privacy Notice
  35. Data Subject
  36. Consent
  37. Cyber Attacks
  38. Encryption
  39. Integration
  40. Rights of Data Subjects
  41. Data Breach
  42. Privacy Notice
  43. Penalties
  44. Data Protection Officer
  45. Lawful Access
  46. Right to Damages
  47. Data Processor
  48. Anonymization
  49. National Privacy Commission
  50. Network Security
  51. Personal Data
  52. Strong Password
  53. Identity Theft
  54. Data Controller
  55. Right to Erasure
  56. Rights of Data Subjects