DataRetentionDataConsentRightsof DataSubjectsIntegrationFirewallsCybersecurityDisclosureRighttorectifyNetworkSecurityDataProcessingAccessControlDataStorageDataBreachPrivacyNoticeIdentityTheftRighttoAccessRiskManagementPrivacyImpactAssessmentRight toFile aComplaintContainmentDataMinimizationBackupStrongPasswordPenaltiesConfidentialityPrivacyPolicyMulti-FactorAuthenticationCyberAttacksPhishingDataControllerRight toErasureConsentVulnerabilityDataProcessorDataProtectionOfficerDataRecoveryDataPrivacyNoticeRight toDamagesEncryptionCloudSecurityComplianceDataSubjectPersonalDataCybersecurityAwarenessDataBreachNotificationLawfulAccessDataSecurityIncidentReportRansomwareSensitivePersonalInformationNationalPrivacyCommissionIntegrationTransparencyAnonymizationMalwareRightsof DataSubjectsDataRetentionDataConsentRightsof DataSubjectsIntegrationFirewallsCybersecurityDisclosureRighttorectifyNetworkSecurityDataProcessingAccessControlDataStorageDataBreachPrivacyNoticeIdentityTheftRighttoAccessRiskManagementPrivacyImpactAssessmentRight toFile aComplaintContainmentDataMinimizationBackupStrongPasswordPenaltiesConfidentialityPrivacyPolicyMulti-FactorAuthenticationCyberAttacksPhishingDataControllerRight toErasureConsentVulnerabilityDataProcessorDataProtectionOfficerDataRecoveryDataPrivacyNoticeRight toDamagesEncryptionCloudSecurityComplianceDataSubjectPersonalDataCybersecurityAwarenessDataBreachNotificationLawfulAccessDataSecurityIncidentReportRansomwareSensitivePersonalInformationNationalPrivacyCommissionIntegrationTransparencyAnonymizationMalwareRightsof DataSubjects

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Retention
  2. Data Consent
  3. Rights of Data Subjects
  4. Integration
  5. Firewalls
  6. Cybersecurity
  7. Disclosure
  8. Right to rectify
  9. Network Security
  10. Data Processing
  11. Access Control
  12. Data Storage
  13. Data Breach
  14. Privacy Notice
  15. Identity Theft
  16. Right to Access
  17. Risk Management
  18. Privacy Impact Assessment
  19. Right to File a Complaint
  20. Containment
  21. Data Minimization
  22. Backup
  23. Strong Password
  24. Penalties
  25. Confidentiality
  26. Privacy Policy
  27. Multi-Factor Authentication
  28. Cyber Attacks
  29. Phishing
  30. Data Controller
  31. Right to Erasure
  32. Consent
  33. Vulnerability
  34. Data Processor
  35. Data Protection Officer
  36. Data Recovery
  37. Data Privacy Notice
  38. Right to Damages
  39. Encryption
  40. Cloud Security
  41. Compliance
  42. Data Subject
  43. Personal Data
  44. Cybersecurity Awareness
  45. Data Breach Notification
  46. Lawful Access
  47. Data Security
  48. Incident Report
  49. Ransomware
  50. Sensitive Personal Information
  51. National Privacy Commission
  52. Integration
  53. Transparency
  54. Anonymization
  55. Malware
  56. Rights of Data Subjects