DataRetentionRansomwareDataSubjectEncryptionDisclosureDataBreachNotificationMulti-FactorAuthenticationLawfulAccessRiskManagementRight toFile aComplaintDataPrivacyNoticeIntegrationCloudSecurityPhishingSensitivePersonalInformationConsentComplianceAccessControlCybersecurityCybersecurityAwarenessIntegrationDataBreachDataControllerDataSecurityDataProcessingPersonalDataBackupContainmentRight toErasureDataRecoveryDataStorageRight toDamagesPrivacyPolicyRighttoAccessRightsof DataSubjectsConfidentialityDataMinimizationPrivacyImpactAssessmentPenaltiesTransparencyIdentityTheftIncidentReportRighttorectifyDataProcessorDataProtectionOfficerNationalPrivacyCommissionVulnerabilityNetworkSecurityDataConsentAnonymizationStrongPasswordPrivacyNoticeMalwareCyberAttacksFirewallsRightsof DataSubjectsDataRetentionRansomwareDataSubjectEncryptionDisclosureDataBreachNotificationMulti-FactorAuthenticationLawfulAccessRiskManagementRight toFile aComplaintDataPrivacyNoticeIntegrationCloudSecurityPhishingSensitivePersonalInformationConsentComplianceAccessControlCybersecurityCybersecurityAwarenessIntegrationDataBreachDataControllerDataSecurityDataProcessingPersonalDataBackupContainmentRight toErasureDataRecoveryDataStorageRight toDamagesPrivacyPolicyRighttoAccessRightsof DataSubjectsConfidentialityDataMinimizationPrivacyImpactAssessmentPenaltiesTransparencyIdentityTheftIncidentReportRighttorectifyDataProcessorDataProtectionOfficerNationalPrivacyCommissionVulnerabilityNetworkSecurityDataConsentAnonymizationStrongPasswordPrivacyNoticeMalwareCyberAttacksFirewallsRightsof DataSubjects

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Retention
  2. Ransomware
  3. Data Subject
  4. Encryption
  5. Disclosure
  6. Data Breach Notification
  7. Multi-Factor Authentication
  8. Lawful Access
  9. Risk Management
  10. Right to File a Complaint
  11. Data Privacy Notice
  12. Integration
  13. Cloud Security
  14. Phishing
  15. Sensitive Personal Information
  16. Consent
  17. Compliance
  18. Access Control
  19. Cybersecurity
  20. Cybersecurity Awareness
  21. Integration
  22. Data Breach
  23. Data Controller
  24. Data Security
  25. Data Processing
  26. Personal Data
  27. Backup
  28. Containment
  29. Right to Erasure
  30. Data Recovery
  31. Data Storage
  32. Right to Damages
  33. Privacy Policy
  34. Right to Access
  35. Rights of Data Subjects
  36. Confidentiality
  37. Data Minimization
  38. Privacy Impact Assessment
  39. Penalties
  40. Transparency
  41. Identity Theft
  42. Incident Report
  43. Right to rectify
  44. Data Processor
  45. Data Protection Officer
  46. National Privacy Commission
  47. Vulnerability
  48. Network Security
  49. Data Consent
  50. Anonymization
  51. Strong Password
  52. Privacy Notice
  53. Malware
  54. Cyber Attacks
  55. Firewalls
  56. Rights of Data Subjects