RiskManagementComplianceDataBreachNationalPrivacyCommissionIdentityTheftRightsof DataSubjectsPenaltiesPrivacyPolicyDataPrivacyNoticePhishingLawfulAccessDataProcessorRightsof DataSubjectsPersonalDataConsentConfidentialityDataSubjectSensitivePersonalInformationCybersecurityRight toDamagesRansomwareDisclosureContainmentCyberAttacksIntegrationDataControllerDataSecurityIntegrationNetworkSecurityMalwareBackupDataBreachNotificationAnonymizationStrongPasswordCybersecurityAwarenessTransparencyRight toErasureCloudSecurityDataMinimizationFirewallsMulti-FactorAuthenticationDataStorageDataRecoveryPrivacyImpactAssessmentRighttoAccessRighttorectifyVulnerabilityAccessControlDataRetentionDataProcessingEncryptionRight toFile aComplaintPrivacyNoticeDataProtectionOfficerIncidentReportDataConsentRiskManagementComplianceDataBreachNationalPrivacyCommissionIdentityTheftRightsof DataSubjectsPenaltiesPrivacyPolicyDataPrivacyNoticePhishingLawfulAccessDataProcessorRightsof DataSubjectsPersonalDataConsentConfidentialityDataSubjectSensitivePersonalInformationCybersecurityRight toDamagesRansomwareDisclosureContainmentCyberAttacksIntegrationDataControllerDataSecurityIntegrationNetworkSecurityMalwareBackupDataBreachNotificationAnonymizationStrongPasswordCybersecurityAwarenessTransparencyRight toErasureCloudSecurityDataMinimizationFirewallsMulti-FactorAuthenticationDataStorageDataRecoveryPrivacyImpactAssessmentRighttoAccessRighttorectifyVulnerabilityAccessControlDataRetentionDataProcessingEncryptionRight toFile aComplaintPrivacyNoticeDataProtectionOfficerIncidentReportDataConsent

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Risk Management
  2. Compliance
  3. Data Breach
  4. National Privacy Commission
  5. Identity Theft
  6. Rights of Data Subjects
  7. Penalties
  8. Privacy Policy
  9. Data Privacy Notice
  10. Phishing
  11. Lawful Access
  12. Data Processor
  13. Rights of Data Subjects
  14. Personal Data
  15. Consent
  16. Confidentiality
  17. Data Subject
  18. Sensitive Personal Information
  19. Cybersecurity
  20. Right to Damages
  21. Ransomware
  22. Disclosure
  23. Containment
  24. Cyber Attacks
  25. Integration
  26. Data Controller
  27. Data Security
  28. Integration
  29. Network Security
  30. Malware
  31. Backup
  32. Data Breach Notification
  33. Anonymization
  34. Strong Password
  35. Cybersecurity Awareness
  36. Transparency
  37. Right to Erasure
  38. Cloud Security
  39. Data Minimization
  40. Firewalls
  41. Multi-Factor Authentication
  42. Data Storage
  43. Data Recovery
  44. Privacy Impact Assessment
  45. Right to Access
  46. Right to rectify
  47. Vulnerability
  48. Access Control
  49. Data Retention
  50. Data Processing
  51. Encryption
  52. Right to File a Complaint
  53. Privacy Notice
  54. Data Protection Officer
  55. Incident Report
  56. Data Consent