Multi-FactorAuthenticationCybersecurityAccessControlComplianceCloudSecurityIdentityTheftDataSubjectRansomwareIncidentReportDataRetentionVulnerabilityConfidentialityStrongPasswordCyberAttacksPenaltiesLawfulAccessDataBreachNotificationRiskManagementDisclosureSensitivePersonalInformationRightsof DataSubjectsDataControllerDataSecurityPhishingFirewallsEncryptionContainmentTransparencyPersonalDataRight toFile aComplaintIntegrationNetworkSecurityAnonymizationRighttoAccessRightsof DataSubjectsDataProcessingDataRecoveryBackupRighttorectifyCybersecurityAwarenessPrivacyImpactAssessmentDataProcessorMalwareNationalPrivacyCommissionDataBreachDataPrivacyNoticePrivacyPolicyRight toDamagesDataConsentDataStorageDataProtectionOfficerConsentDataMinimizationIntegrationPrivacyNoticeRight toErasureMulti-FactorAuthenticationCybersecurityAccessControlComplianceCloudSecurityIdentityTheftDataSubjectRansomwareIncidentReportDataRetentionVulnerabilityConfidentialityStrongPasswordCyberAttacksPenaltiesLawfulAccessDataBreachNotificationRiskManagementDisclosureSensitivePersonalInformationRightsof DataSubjectsDataControllerDataSecurityPhishingFirewallsEncryptionContainmentTransparencyPersonalDataRight toFile aComplaintIntegrationNetworkSecurityAnonymizationRighttoAccessRightsof DataSubjectsDataProcessingDataRecoveryBackupRighttorectifyCybersecurityAwarenessPrivacyImpactAssessmentDataProcessorMalwareNationalPrivacyCommissionDataBreachDataPrivacyNoticePrivacyPolicyRight toDamagesDataConsentDataStorageDataProtectionOfficerConsentDataMinimizationIntegrationPrivacyNoticeRight toErasure

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Multi-Factor Authentication
  2. Cybersecurity
  3. Access Control
  4. Compliance
  5. Cloud Security
  6. Identity Theft
  7. Data Subject
  8. Ransomware
  9. Incident Report
  10. Data Retention
  11. Vulnerability
  12. Confidentiality
  13. Strong Password
  14. Cyber Attacks
  15. Penalties
  16. Lawful Access
  17. Data Breach Notification
  18. Risk Management
  19. Disclosure
  20. Sensitive Personal Information
  21. Rights of Data Subjects
  22. Data Controller
  23. Data Security
  24. Phishing
  25. Firewalls
  26. Encryption
  27. Containment
  28. Transparency
  29. Personal Data
  30. Right to File a Complaint
  31. Integration
  32. Network Security
  33. Anonymization
  34. Right to Access
  35. Rights of Data Subjects
  36. Data Processing
  37. Data Recovery
  38. Backup
  39. Right to rectify
  40. Cybersecurity Awareness
  41. Privacy Impact Assessment
  42. Data Processor
  43. Malware
  44. National Privacy Commission
  45. Data Breach
  46. Data Privacy Notice
  47. Privacy Policy
  48. Right to Damages
  49. Data Consent
  50. Data Storage
  51. Data Protection Officer
  52. Consent
  53. Data Minimization
  54. Integration
  55. Privacy Notice
  56. Right to Erasure