NationalPrivacyCommissionStrongPasswordDisclosureDataControllerIntegrationPrivacyPolicyIncidentReportContainmentBackupDataStorageRight toFile aComplaintPrivacyImpactAssessmentPersonalDataDataBreachRansomwareRighttoAccessNetworkSecurityLawfulAccessDataSecurityDataConsentMulti-FactorAuthenticationRiskManagementDataRecoveryFirewallsAccessControlIdentityTheftIntegrationCyberAttacksConfidentialityDataRetentionPhishingRightsof DataSubjectsPenaltiesCloudSecurityRight toErasureVulnerabilityAnonymizationPrivacyNoticeDataBreachNotificationDataPrivacyNoticeDataProtectionOfficerSensitivePersonalInformationCybersecurityAwarenessDataSubjectRightsof DataSubjectsDataMinimizationDataProcessorMalwareEncryptionDataProcessingRight toDamagesRighttorectifyComplianceConsentCybersecurityTransparencyNationalPrivacyCommissionStrongPasswordDisclosureDataControllerIntegrationPrivacyPolicyIncidentReportContainmentBackupDataStorageRight toFile aComplaintPrivacyImpactAssessmentPersonalDataDataBreachRansomwareRighttoAccessNetworkSecurityLawfulAccessDataSecurityDataConsentMulti-FactorAuthenticationRiskManagementDataRecoveryFirewallsAccessControlIdentityTheftIntegrationCyberAttacksConfidentialityDataRetentionPhishingRightsof DataSubjectsPenaltiesCloudSecurityRight toErasureVulnerabilityAnonymizationPrivacyNoticeDataBreachNotificationDataPrivacyNoticeDataProtectionOfficerSensitivePersonalInformationCybersecurityAwarenessDataSubjectRightsof DataSubjectsDataMinimizationDataProcessorMalwareEncryptionDataProcessingRight toDamagesRighttorectifyComplianceConsentCybersecurityTransparency

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. National Privacy Commission
  2. Strong Password
  3. Disclosure
  4. Data Controller
  5. Integration
  6. Privacy Policy
  7. Incident Report
  8. Containment
  9. Backup
  10. Data Storage
  11. Right to File a Complaint
  12. Privacy Impact Assessment
  13. Personal Data
  14. Data Breach
  15. Ransomware
  16. Right to Access
  17. Network Security
  18. Lawful Access
  19. Data Security
  20. Data Consent
  21. Multi-Factor Authentication
  22. Risk Management
  23. Data Recovery
  24. Firewalls
  25. Access Control
  26. Identity Theft
  27. Integration
  28. Cyber Attacks
  29. Confidentiality
  30. Data Retention
  31. Phishing
  32. Rights of Data Subjects
  33. Penalties
  34. Cloud Security
  35. Right to Erasure
  36. Vulnerability
  37. Anonymization
  38. Privacy Notice
  39. Data Breach Notification
  40. Data Privacy Notice
  41. Data Protection Officer
  42. Sensitive Personal Information
  43. Cybersecurity Awareness
  44. Data Subject
  45. Rights of Data Subjects
  46. Data Minimization
  47. Data Processor
  48. Malware
  49. Encryption
  50. Data Processing
  51. Right to Damages
  52. Right to rectify
  53. Compliance
  54. Consent
  55. Cybersecurity
  56. Transparency