DataRecoveryDataProcessingPersonalDataConsentVulnerabilityDataBreachNotificationComplianceNationalPrivacyCommissionCybersecurityAwarenessIntegrationRightsof DataSubjectsIdentityTheftConfidentialityDataSubjectRiskManagementDisclosureDataStorageLawfulAccessEncryptionCybersecurityIncidentReportRight toDamagesMalwareSensitivePersonalInformationRighttorectifyNetworkSecurityCyberAttacksRight toFile aComplaintPrivacyPolicyStrongPasswordMulti-FactorAuthenticationIntegrationPrivacyImpactAssessmentBackupRight toErasureDataPrivacyNoticeDataSecurityPhishingDataMinimizationPrivacyNoticeDataProcessorCloudSecurityFirewallsDataControllerRightsof DataSubjectsRansomwareTransparencyAccessControlAnonymizationContainmentRighttoAccessDataProtectionOfficerPenaltiesDataRetentionDataConsentDataBreachDataRecoveryDataProcessingPersonalDataConsentVulnerabilityDataBreachNotificationComplianceNationalPrivacyCommissionCybersecurityAwarenessIntegrationRightsof DataSubjectsIdentityTheftConfidentialityDataSubjectRiskManagementDisclosureDataStorageLawfulAccessEncryptionCybersecurityIncidentReportRight toDamagesMalwareSensitivePersonalInformationRighttorectifyNetworkSecurityCyberAttacksRight toFile aComplaintPrivacyPolicyStrongPasswordMulti-FactorAuthenticationIntegrationPrivacyImpactAssessmentBackupRight toErasureDataPrivacyNoticeDataSecurityPhishingDataMinimizationPrivacyNoticeDataProcessorCloudSecurityFirewallsDataControllerRightsof DataSubjectsRansomwareTransparencyAccessControlAnonymizationContainmentRighttoAccessDataProtectionOfficerPenaltiesDataRetentionDataConsentDataBreach

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Recovery
  2. Data Processing
  3. Personal Data
  4. Consent
  5. Vulnerability
  6. Data Breach Notification
  7. Compliance
  8. National Privacy Commission
  9. Cybersecurity Awareness
  10. Integration
  11. Rights of Data Subjects
  12. Identity Theft
  13. Confidentiality
  14. Data Subject
  15. Risk Management
  16. Disclosure
  17. Data Storage
  18. Lawful Access
  19. Encryption
  20. Cybersecurity
  21. Incident Report
  22. Right to Damages
  23. Malware
  24. Sensitive Personal Information
  25. Right to rectify
  26. Network Security
  27. Cyber Attacks
  28. Right to File a Complaint
  29. Privacy Policy
  30. Strong Password
  31. Multi-Factor Authentication
  32. Integration
  33. Privacy Impact Assessment
  34. Backup
  35. Right to Erasure
  36. Data Privacy Notice
  37. Data Security
  38. Phishing
  39. Data Minimization
  40. Privacy Notice
  41. Data Processor
  42. Cloud Security
  43. Firewalls
  44. Data Controller
  45. Rights of Data Subjects
  46. Ransomware
  47. Transparency
  48. Access Control
  49. Anonymization
  50. Containment
  51. Right to Access
  52. Data Protection Officer
  53. Penalties
  54. Data Retention
  55. Data Consent
  56. Data Breach