AnonymizationAccessControlVulnerabilityLawfulAccessRightsof DataSubjectsCybersecurityTransparencyConfidentialityIdentityTheftNationalPrivacyCommissionDataSubjectIncidentReportPhishingFirewallsRiskManagementCompliancePrivacyPolicyDataPrivacyNoticeDataRetentionNetworkSecurityPrivacyImpactAssessmentPrivacyNoticeStrongPasswordDataStorageDataProcessorContainmentIntegrationRighttorectifyDataSecurityIntegrationRight toDamagesDisclosureDataControllerDataBreachNotificationCloudSecurityEncryptionRight toErasureConsentDataBreachMalwareMulti-FactorAuthenticationDataProcessingDataConsentRightsof DataSubjectsSensitivePersonalInformationDataMinimizationRighttoAccessDataRecoveryRansomwareDataProtectionOfficerPersonalDataRight toFile aComplaintBackupCyberAttacksPenaltiesCybersecurityAwarenessAnonymizationAccessControlVulnerabilityLawfulAccessRightsof DataSubjectsCybersecurityTransparencyConfidentialityIdentityTheftNationalPrivacyCommissionDataSubjectIncidentReportPhishingFirewallsRiskManagementCompliancePrivacyPolicyDataPrivacyNoticeDataRetentionNetworkSecurityPrivacyImpactAssessmentPrivacyNoticeStrongPasswordDataStorageDataProcessorContainmentIntegrationRighttorectifyDataSecurityIntegrationRight toDamagesDisclosureDataControllerDataBreachNotificationCloudSecurityEncryptionRight toErasureConsentDataBreachMalwareMulti-FactorAuthenticationDataProcessingDataConsentRightsof DataSubjectsSensitivePersonalInformationDataMinimizationRighttoAccessDataRecoveryRansomwareDataProtectionOfficerPersonalDataRight toFile aComplaintBackupCyberAttacksPenaltiesCybersecurityAwareness

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Anonymization
  2. Access Control
  3. Vulnerability
  4. Lawful Access
  5. Rights of Data Subjects
  6. Cybersecurity
  7. Transparency
  8. Confidentiality
  9. Identity Theft
  10. National Privacy Commission
  11. Data Subject
  12. Incident Report
  13. Phishing
  14. Firewalls
  15. Risk Management
  16. Compliance
  17. Privacy Policy
  18. Data Privacy Notice
  19. Data Retention
  20. Network Security
  21. Privacy Impact Assessment
  22. Privacy Notice
  23. Strong Password
  24. Data Storage
  25. Data Processor
  26. Containment
  27. Integration
  28. Right to rectify
  29. Data Security
  30. Integration
  31. Right to Damages
  32. Disclosure
  33. Data Controller
  34. Data Breach Notification
  35. Cloud Security
  36. Encryption
  37. Right to Erasure
  38. Consent
  39. Data Breach
  40. Malware
  41. Multi-Factor Authentication
  42. Data Processing
  43. Data Consent
  44. Rights of Data Subjects
  45. Sensitive Personal Information
  46. Data Minimization
  47. Right to Access
  48. Data Recovery
  49. Ransomware
  50. Data Protection Officer
  51. Personal Data
  52. Right to File a Complaint
  53. Backup
  54. Cyber Attacks
  55. Penalties
  56. Cybersecurity Awareness