Rightsof DataSubjectsDataSubjectLawfulAccessDataControllerContainmentPrivacyPolicyVulnerabilityPrivacyImpactAssessmentRansomwareAnonymizationDataPrivacyNoticeRighttoAccessDataProcessorIntegrationNetworkSecurityAccessControlSensitivePersonalInformationEncryptionTransparencyDataRetentionDataMinimizationDataStorageCybersecurityAwarenessRighttorectifyDisclosureCyberAttacksMalwareConsentPersonalDataDataBreachNotificationRight toDamagesCloudSecurityDataConsentIntegrationDataBreachConfidentialityRight toFile aComplaintBackupPhishingMulti-FactorAuthenticationComplianceIdentityTheftDataRecoveryDataSecurityPenaltiesRight toErasureRiskManagementPrivacyNoticeRightsof DataSubjectsDataProcessingCybersecurityStrongPasswordFirewallsNationalPrivacyCommissionDataProtectionOfficerIncidentReportRightsof DataSubjectsDataSubjectLawfulAccessDataControllerContainmentPrivacyPolicyVulnerabilityPrivacyImpactAssessmentRansomwareAnonymizationDataPrivacyNoticeRighttoAccessDataProcessorIntegrationNetworkSecurityAccessControlSensitivePersonalInformationEncryptionTransparencyDataRetentionDataMinimizationDataStorageCybersecurityAwarenessRighttorectifyDisclosureCyberAttacksMalwareConsentPersonalDataDataBreachNotificationRight toDamagesCloudSecurityDataConsentIntegrationDataBreachConfidentialityRight toFile aComplaintBackupPhishingMulti-FactorAuthenticationComplianceIdentityTheftDataRecoveryDataSecurityPenaltiesRight toErasureRiskManagementPrivacyNoticeRightsof DataSubjectsDataProcessingCybersecurityStrongPasswordFirewallsNationalPrivacyCommissionDataProtectionOfficerIncidentReport

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Rights of Data Subjects
  2. Data Subject
  3. Lawful Access
  4. Data Controller
  5. Containment
  6. Privacy Policy
  7. Vulnerability
  8. Privacy Impact Assessment
  9. Ransomware
  10. Anonymization
  11. Data Privacy Notice
  12. Right to Access
  13. Data Processor
  14. Integration
  15. Network Security
  16. Access Control
  17. Sensitive Personal Information
  18. Encryption
  19. Transparency
  20. Data Retention
  21. Data Minimization
  22. Data Storage
  23. Cybersecurity Awareness
  24. Right to rectify
  25. Disclosure
  26. Cyber Attacks
  27. Malware
  28. Consent
  29. Personal Data
  30. Data Breach Notification
  31. Right to Damages
  32. Cloud Security
  33. Data Consent
  34. Integration
  35. Data Breach
  36. Confidentiality
  37. Right to File a Complaint
  38. Backup
  39. Phishing
  40. Multi-Factor Authentication
  41. Compliance
  42. Identity Theft
  43. Data Recovery
  44. Data Security
  45. Penalties
  46. Right to Erasure
  47. Risk Management
  48. Privacy Notice
  49. Rights of Data Subjects
  50. Data Processing
  51. Cybersecurity
  52. Strong Password
  53. Firewalls
  54. National Privacy Commission
  55. Data Protection Officer
  56. Incident Report