RansomwareDataPrivacyNoticeDataMinimizationDataSecurityCloudSecurityFirewallsComplianceIncidentReportBackupTransparencyAccessControlPhishingCybersecurityLawfulAccessMulti-FactorAuthenticationIntegrationStrongPasswordCybersecurityAwarenessRight toErasureDataControllerPersonalDataPenaltiesRiskManagementNationalPrivacyCommissionConfidentialityAnonymizationDataConsentRight toDamagesConsentDataRetentionIntegrationContainmentDataSubjectVulnerabilityMalwareDataProcessorPrivacyNoticeEncryptionCyberAttacksDataRecoveryIdentityTheftNetworkSecuritySensitivePersonalInformationDataProcessingPrivacyImpactAssessmentDataStorageDataBreachRight toFile aComplaintDataProtectionOfficerRighttorectifyPrivacyPolicyRightsof DataSubjectsDataBreachNotificationRighttoAccessRightsof DataSubjectsDisclosureRansomwareDataPrivacyNoticeDataMinimizationDataSecurityCloudSecurityFirewallsComplianceIncidentReportBackupTransparencyAccessControlPhishingCybersecurityLawfulAccessMulti-FactorAuthenticationIntegrationStrongPasswordCybersecurityAwarenessRight toErasureDataControllerPersonalDataPenaltiesRiskManagementNationalPrivacyCommissionConfidentialityAnonymizationDataConsentRight toDamagesConsentDataRetentionIntegrationContainmentDataSubjectVulnerabilityMalwareDataProcessorPrivacyNoticeEncryptionCyberAttacksDataRecoveryIdentityTheftNetworkSecuritySensitivePersonalInformationDataProcessingPrivacyImpactAssessmentDataStorageDataBreachRight toFile aComplaintDataProtectionOfficerRighttorectifyPrivacyPolicyRightsof DataSubjectsDataBreachNotificationRighttoAccessRightsof DataSubjectsDisclosure

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Ransomware
  2. Data Privacy Notice
  3. Data Minimization
  4. Data Security
  5. Cloud Security
  6. Firewalls
  7. Compliance
  8. Incident Report
  9. Backup
  10. Transparency
  11. Access Control
  12. Phishing
  13. Cybersecurity
  14. Lawful Access
  15. Multi-Factor Authentication
  16. Integration
  17. Strong Password
  18. Cybersecurity Awareness
  19. Right to Erasure
  20. Data Controller
  21. Personal Data
  22. Penalties
  23. Risk Management
  24. National Privacy Commission
  25. Confidentiality
  26. Anonymization
  27. Data Consent
  28. Right to Damages
  29. Consent
  30. Data Retention
  31. Integration
  32. Containment
  33. Data Subject
  34. Vulnerability
  35. Malware
  36. Data Processor
  37. Privacy Notice
  38. Encryption
  39. Cyber Attacks
  40. Data Recovery
  41. Identity Theft
  42. Network Security
  43. Sensitive Personal Information
  44. Data Processing
  45. Privacy Impact Assessment
  46. Data Storage
  47. Data Breach
  48. Right to File a Complaint
  49. Data Protection Officer
  50. Right to rectify
  51. Privacy Policy
  52. Rights of Data Subjects
  53. Data Breach Notification
  54. Right to Access
  55. Rights of Data Subjects
  56. Disclosure