PrivacyImpactAssessmentEncryptionRansomwareRightsof DataSubjectsComplianceIdentityTheftConfidentialityPhishingBackupTransparencyCloudSecurityRightsof DataSubjectsConsentRight toErasurePrivacyPolicyRighttorectifyDataConsentMalwareNationalPrivacyCommissionDataBreachDataStorageRight toFile aComplaintDataProcessorDataMinimizationDataRetentionDataSecuritySensitivePersonalInformationAccessControlDisclosureCybersecurityContainmentDataControllerRighttoAccessIntegrationAnonymizationCyberAttacksRight toDamagesCybersecurityAwarenessIncidentReportRiskManagementPenaltiesStrongPasswordLawfulAccessVulnerabilityMulti-FactorAuthenticationPrivacyNoticeDataPrivacyNoticeDataProcessingDataProtectionOfficerFirewallsDataBreachNotificationPersonalDataIntegrationDataRecoveryNetworkSecurityDataSubjectPrivacyImpactAssessmentEncryptionRansomwareRightsof DataSubjectsComplianceIdentityTheftConfidentialityPhishingBackupTransparencyCloudSecurityRightsof DataSubjectsConsentRight toErasurePrivacyPolicyRighttorectifyDataConsentMalwareNationalPrivacyCommissionDataBreachDataStorageRight toFile aComplaintDataProcessorDataMinimizationDataRetentionDataSecuritySensitivePersonalInformationAccessControlDisclosureCybersecurityContainmentDataControllerRighttoAccessIntegrationAnonymizationCyberAttacksRight toDamagesCybersecurityAwarenessIncidentReportRiskManagementPenaltiesStrongPasswordLawfulAccessVulnerabilityMulti-FactorAuthenticationPrivacyNoticeDataPrivacyNoticeDataProcessingDataProtectionOfficerFirewallsDataBreachNotificationPersonalDataIntegrationDataRecoveryNetworkSecurityDataSubject

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Privacy Impact Assessment
  2. Encryption
  3. Ransomware
  4. Rights of Data Subjects
  5. Compliance
  6. Identity Theft
  7. Confidentiality
  8. Phishing
  9. Backup
  10. Transparency
  11. Cloud Security
  12. Rights of Data Subjects
  13. Consent
  14. Right to Erasure
  15. Privacy Policy
  16. Right to rectify
  17. Data Consent
  18. Malware
  19. National Privacy Commission
  20. Data Breach
  21. Data Storage
  22. Right to File a Complaint
  23. Data Processor
  24. Data Minimization
  25. Data Retention
  26. Data Security
  27. Sensitive Personal Information
  28. Access Control
  29. Disclosure
  30. Cybersecurity
  31. Containment
  32. Data Controller
  33. Right to Access
  34. Integration
  35. Anonymization
  36. Cyber Attacks
  37. Right to Damages
  38. Cybersecurity Awareness
  39. Incident Report
  40. Risk Management
  41. Penalties
  42. Strong Password
  43. Lawful Access
  44. Vulnerability
  45. Multi-Factor Authentication
  46. Privacy Notice
  47. Data Privacy Notice
  48. Data Processing
  49. Data Protection Officer
  50. Firewalls
  51. Data Breach Notification
  52. Personal Data
  53. Integration
  54. Data Recovery
  55. Network Security
  56. Data Subject