Rightsof DataSubjectsDataBreachNotificationDataProcessorAnonymizationPrivacyPolicyIntegrationIntegrationConsentMalwarePhishingIncidentReportRighttoAccessContainmentFirewallsBackupCompliancePenaltiesConfidentialityNationalPrivacyCommissionIdentityTheftMulti-FactorAuthenticationLawfulAccessPrivacyImpactAssessmentDataMinimizationDataRetentionAccessControlPersonalDataRight toDamagesRiskManagementCloudSecurityRighttorectifyDataProcessingDataProtectionOfficerDataBreachRight toErasureRight toFile aComplaintDataSecurityDataConsentTransparencyStrongPasswordCybersecurityDataSubjectEncryptionDataStoragePrivacyNoticeVulnerabilityDataPrivacyNoticeDataControllerRansomwareCybersecurityAwarenessRightsof DataSubjectsCyberAttacksDataRecoverySensitivePersonalInformationNetworkSecurityDisclosureRightsof DataSubjectsDataBreachNotificationDataProcessorAnonymizationPrivacyPolicyIntegrationIntegrationConsentMalwarePhishingIncidentReportRighttoAccessContainmentFirewallsBackupCompliancePenaltiesConfidentialityNationalPrivacyCommissionIdentityTheftMulti-FactorAuthenticationLawfulAccessPrivacyImpactAssessmentDataMinimizationDataRetentionAccessControlPersonalDataRight toDamagesRiskManagementCloudSecurityRighttorectifyDataProcessingDataProtectionOfficerDataBreachRight toErasureRight toFile aComplaintDataSecurityDataConsentTransparencyStrongPasswordCybersecurityDataSubjectEncryptionDataStoragePrivacyNoticeVulnerabilityDataPrivacyNoticeDataControllerRansomwareCybersecurityAwarenessRightsof DataSubjectsCyberAttacksDataRecoverySensitivePersonalInformationNetworkSecurityDisclosure

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Rights of Data Subjects
  2. Data Breach Notification
  3. Data Processor
  4. Anonymization
  5. Privacy Policy
  6. Integration
  7. Integration
  8. Consent
  9. Malware
  10. Phishing
  11. Incident Report
  12. Right to Access
  13. Containment
  14. Firewalls
  15. Backup
  16. Compliance
  17. Penalties
  18. Confidentiality
  19. National Privacy Commission
  20. Identity Theft
  21. Multi-Factor Authentication
  22. Lawful Access
  23. Privacy Impact Assessment
  24. Data Minimization
  25. Data Retention
  26. Access Control
  27. Personal Data
  28. Right to Damages
  29. Risk Management
  30. Cloud Security
  31. Right to rectify
  32. Data Processing
  33. Data Protection Officer
  34. Data Breach
  35. Right to Erasure
  36. Right to File a Complaint
  37. Data Security
  38. Data Consent
  39. Transparency
  40. Strong Password
  41. Cybersecurity
  42. Data Subject
  43. Encryption
  44. Data Storage
  45. Privacy Notice
  46. Vulnerability
  47. Data Privacy Notice
  48. Data Controller
  49. Ransomware
  50. Cybersecurity Awareness
  51. Rights of Data Subjects
  52. Cyber Attacks
  53. Data Recovery
  54. Sensitive Personal Information
  55. Network Security
  56. Disclosure