RighttoAccessPhishingIntegrationCybersecurityFirewallsDataControllerDataSubjectDataRecoveryNetworkSecurityCybersecurityAwarenessRightsof DataSubjectsDataStorageDataBreachNotificationContainmentLawfulAccessDataProcessorRiskManagementDataMinimizationNationalPrivacyCommissionDataRetentionRight toFile aComplaintDataSecurityMulti-FactorAuthenticationIncidentReportEncryptionIntegrationRight toErasureConsentDataProtectionOfficerRightsof DataSubjectsRight toDamagesPrivacyPolicyCloudSecurityIdentityTheftCyberAttacksDataBreachPersonalDataDataProcessingPrivacyNoticePrivacyImpactAssessmentVulnerabilityConfidentialityDataPrivacyNoticeStrongPasswordBackupAccessControlRansomwareComplianceSensitivePersonalInformationTransparencyDisclosureAnonymizationMalwareRighttorectifyDataConsentPenaltiesRighttoAccessPhishingIntegrationCybersecurityFirewallsDataControllerDataSubjectDataRecoveryNetworkSecurityCybersecurityAwarenessRightsof DataSubjectsDataStorageDataBreachNotificationContainmentLawfulAccessDataProcessorRiskManagementDataMinimizationNationalPrivacyCommissionDataRetentionRight toFile aComplaintDataSecurityMulti-FactorAuthenticationIncidentReportEncryptionIntegrationRight toErasureConsentDataProtectionOfficerRightsof DataSubjectsRight toDamagesPrivacyPolicyCloudSecurityIdentityTheftCyberAttacksDataBreachPersonalDataDataProcessingPrivacyNoticePrivacyImpactAssessmentVulnerabilityConfidentialityDataPrivacyNoticeStrongPasswordBackupAccessControlRansomwareComplianceSensitivePersonalInformationTransparencyDisclosureAnonymizationMalwareRighttorectifyDataConsentPenalties

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Access
  2. Phishing
  3. Integration
  4. Cybersecurity
  5. Firewalls
  6. Data Controller
  7. Data Subject
  8. Data Recovery
  9. Network Security
  10. Cybersecurity Awareness
  11. Rights of Data Subjects
  12. Data Storage
  13. Data Breach Notification
  14. Containment
  15. Lawful Access
  16. Data Processor
  17. Risk Management
  18. Data Minimization
  19. National Privacy Commission
  20. Data Retention
  21. Right to File a Complaint
  22. Data Security
  23. Multi-Factor Authentication
  24. Incident Report
  25. Encryption
  26. Integration
  27. Right to Erasure
  28. Consent
  29. Data Protection Officer
  30. Rights of Data Subjects
  31. Right to Damages
  32. Privacy Policy
  33. Cloud Security
  34. Identity Theft
  35. Cyber Attacks
  36. Data Breach
  37. Personal Data
  38. Data Processing
  39. Privacy Notice
  40. Privacy Impact Assessment
  41. Vulnerability
  42. Confidentiality
  43. Data Privacy Notice
  44. Strong Password
  45. Backup
  46. Access Control
  47. Ransomware
  48. Compliance
  49. Sensitive Personal Information
  50. Transparency
  51. Disclosure
  52. Anonymization
  53. Malware
  54. Right to rectify
  55. Data Consent
  56. Penalties