DataPrivacyNoticeDataMinimizationRightsof DataSubjectsRiskManagementIdentityTheftCloudSecurityStrongPasswordPrivacyImpactAssessmentMulti-FactorAuthenticationContainmentTransparencyMalwareDisclosureAccessControlRighttorectifyPrivacyNoticeRightsof DataSubjectsPrivacyPolicyNetworkSecurityFirewallsDataConsentAnonymizationRansomwareDataProcessingCyberAttacksSensitivePersonalInformationCybersecurityDataProtectionOfficerRighttoAccessDataControllerRight toErasureBackupRight toDamagesDataBreachNotificationNationalPrivacyCommissionCybersecurityAwarenessIncidentReportConsentPersonalDataComplianceRight toFile aComplaintDataSubjectPhishingDataRetentionIntegrationVulnerabilityDataBreachDataProcessorEncryptionDataRecoveryIntegrationLawfulAccessDataSecurityDataStorageConfidentialityPenaltiesDataPrivacyNoticeDataMinimizationRightsof DataSubjectsRiskManagementIdentityTheftCloudSecurityStrongPasswordPrivacyImpactAssessmentMulti-FactorAuthenticationContainmentTransparencyMalwareDisclosureAccessControlRighttorectifyPrivacyNoticeRightsof DataSubjectsPrivacyPolicyNetworkSecurityFirewallsDataConsentAnonymizationRansomwareDataProcessingCyberAttacksSensitivePersonalInformationCybersecurityDataProtectionOfficerRighttoAccessDataControllerRight toErasureBackupRight toDamagesDataBreachNotificationNationalPrivacyCommissionCybersecurityAwarenessIncidentReportConsentPersonalDataComplianceRight toFile aComplaintDataSubjectPhishingDataRetentionIntegrationVulnerabilityDataBreachDataProcessorEncryptionDataRecoveryIntegrationLawfulAccessDataSecurityDataStorageConfidentialityPenalties

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Privacy Notice
  2. Data Minimization
  3. Rights of Data Subjects
  4. Risk Management
  5. Identity Theft
  6. Cloud Security
  7. Strong Password
  8. Privacy Impact Assessment
  9. Multi-Factor Authentication
  10. Containment
  11. Transparency
  12. Malware
  13. Disclosure
  14. Access Control
  15. Right to rectify
  16. Privacy Notice
  17. Rights of Data Subjects
  18. Privacy Policy
  19. Network Security
  20. Firewalls
  21. Data Consent
  22. Anonymization
  23. Ransomware
  24. Data Processing
  25. Cyber Attacks
  26. Sensitive Personal Information
  27. Cybersecurity
  28. Data Protection Officer
  29. Right to Access
  30. Data Controller
  31. Right to Erasure
  32. Backup
  33. Right to Damages
  34. Data Breach Notification
  35. National Privacy Commission
  36. Cybersecurity Awareness
  37. Incident Report
  38. Consent
  39. Personal Data
  40. Compliance
  41. Right to File a Complaint
  42. Data Subject
  43. Phishing
  44. Data Retention
  45. Integration
  46. Vulnerability
  47. Data Breach
  48. Data Processor
  49. Encryption
  50. Data Recovery
  51. Integration
  52. Lawful Access
  53. Data Security
  54. Data Storage
  55. Confidentiality
  56. Penalties