FirewallsRighttorectifyLawfulAccessPenaltiesCybersecurityPrivacyImpactAssessmentRighttoAccessDataRecoveryIdentityTheftComplianceVulnerabilityBackupCyberAttacksContainmentMulti-FactorAuthenticationRightsof DataSubjectsStrongPasswordAnonymizationIntegrationRightsof DataSubjectsPersonalDataDataProtectionOfficerDataConsentRiskManagementDisclosureDataBreachIntegrationPrivacyPolicyIncidentReportDataControllerDataMinimizationDataSecurityPhishingRight toErasureSensitivePersonalInformationConfidentialityDataProcessorNetworkSecurityDataStorageEncryptionPrivacyNoticeRansomwareNationalPrivacyCommissionConsentDataProcessingRight toFile aComplaintDataBreachNotificationRight toDamagesAccessControlDataRetentionMalwareCloudSecurityDataPrivacyNoticeDataSubjectCybersecurityAwarenessTransparencyFirewallsRighttorectifyLawfulAccessPenaltiesCybersecurityPrivacyImpactAssessmentRighttoAccessDataRecoveryIdentityTheftComplianceVulnerabilityBackupCyberAttacksContainmentMulti-FactorAuthenticationRightsof DataSubjectsStrongPasswordAnonymizationIntegrationRightsof DataSubjectsPersonalDataDataProtectionOfficerDataConsentRiskManagementDisclosureDataBreachIntegrationPrivacyPolicyIncidentReportDataControllerDataMinimizationDataSecurityPhishingRight toErasureSensitivePersonalInformationConfidentialityDataProcessorNetworkSecurityDataStorageEncryptionPrivacyNoticeRansomwareNationalPrivacyCommissionConsentDataProcessingRight toFile aComplaintDataBreachNotificationRight toDamagesAccessControlDataRetentionMalwareCloudSecurityDataPrivacyNoticeDataSubjectCybersecurityAwarenessTransparency

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Firewalls
  2. Right to rectify
  3. Lawful Access
  4. Penalties
  5. Cybersecurity
  6. Privacy Impact Assessment
  7. Right to Access
  8. Data Recovery
  9. Identity Theft
  10. Compliance
  11. Vulnerability
  12. Backup
  13. Cyber Attacks
  14. Containment
  15. Multi-Factor Authentication
  16. Rights of Data Subjects
  17. Strong Password
  18. Anonymization
  19. Integration
  20. Rights of Data Subjects
  21. Personal Data
  22. Data Protection Officer
  23. Data Consent
  24. Risk Management
  25. Disclosure
  26. Data Breach
  27. Integration
  28. Privacy Policy
  29. Incident Report
  30. Data Controller
  31. Data Minimization
  32. Data Security
  33. Phishing
  34. Right to Erasure
  35. Sensitive Personal Information
  36. Confidentiality
  37. Data Processor
  38. Network Security
  39. Data Storage
  40. Encryption
  41. Privacy Notice
  42. Ransomware
  43. National Privacy Commission
  44. Consent
  45. Data Processing
  46. Right to File a Complaint
  47. Data Breach Notification
  48. Right to Damages
  49. Access Control
  50. Data Retention
  51. Malware
  52. Cloud Security
  53. Data Privacy Notice
  54. Data Subject
  55. Cybersecurity Awareness
  56. Transparency