DataControllerDataStorageDataMinimizationDataProtectionOfficerRight toDamagesMalwareDataConsentPhishingDataSecurityRightsof DataSubjectsIncidentReportIntegrationPrivacyNoticeConsentDataBreachComplianceEncryptionRightsof DataSubjectsPersonalDataFirewallsRansomwareCyberAttacksDataPrivacyNoticeRiskManagementDataProcessorRight toFile aComplaintPenaltiesPrivacyImpactAssessmentConfidentialityCloudSecurityDataProcessingMulti-FactorAuthenticationDataBreachNotificationAccessControlNetworkSecurityNationalPrivacyCommissionStrongPasswordRight toErasureContainmentDataSubjectIdentityTheftDataRecoveryPrivacyPolicyVulnerabilityBackupDisclosureRighttorectifyRighttoAccessCybersecurityAwarenessDataRetentionCybersecurityAnonymizationTransparencyLawfulAccessIntegrationSensitivePersonalInformationDataControllerDataStorageDataMinimizationDataProtectionOfficerRight toDamagesMalwareDataConsentPhishingDataSecurityRightsof DataSubjectsIncidentReportIntegrationPrivacyNoticeConsentDataBreachComplianceEncryptionRightsof DataSubjectsPersonalDataFirewallsRansomwareCyberAttacksDataPrivacyNoticeRiskManagementDataProcessorRight toFile aComplaintPenaltiesPrivacyImpactAssessmentConfidentialityCloudSecurityDataProcessingMulti-FactorAuthenticationDataBreachNotificationAccessControlNetworkSecurityNationalPrivacyCommissionStrongPasswordRight toErasureContainmentDataSubjectIdentityTheftDataRecoveryPrivacyPolicyVulnerabilityBackupDisclosureRighttorectifyRighttoAccessCybersecurityAwarenessDataRetentionCybersecurityAnonymizationTransparencyLawfulAccessIntegrationSensitivePersonalInformation

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Controller
  2. Data Storage
  3. Data Minimization
  4. Data Protection Officer
  5. Right to Damages
  6. Malware
  7. Data Consent
  8. Phishing
  9. Data Security
  10. Rights of Data Subjects
  11. Incident Report
  12. Integration
  13. Privacy Notice
  14. Consent
  15. Data Breach
  16. Compliance
  17. Encryption
  18. Rights of Data Subjects
  19. Personal Data
  20. Firewalls
  21. Ransomware
  22. Cyber Attacks
  23. Data Privacy Notice
  24. Risk Management
  25. Data Processor
  26. Right to File a Complaint
  27. Penalties
  28. Privacy Impact Assessment
  29. Confidentiality
  30. Cloud Security
  31. Data Processing
  32. Multi-Factor Authentication
  33. Data Breach Notification
  34. Access Control
  35. Network Security
  36. National Privacy Commission
  37. Strong Password
  38. Right to Erasure
  39. Containment
  40. Data Subject
  41. Identity Theft
  42. Data Recovery
  43. Privacy Policy
  44. Vulnerability
  45. Backup
  46. Disclosure
  47. Right to rectify
  48. Right to Access
  49. Cybersecurity Awareness
  50. Data Retention
  51. Cybersecurity
  52. Anonymization
  53. Transparency
  54. Lawful Access
  55. Integration
  56. Sensitive Personal Information