ConfidentialityMulti-FactorAuthenticationPrivacyNoticeRiskManagementContainmentBackupTransparencyRight toErasurePrivacyPolicyFirewallsRight toFile aComplaintDataBreachDataControllerDataProcessingVulnerabilityCloudSecurityAccessControlDisclosureDataMinimizationDataBreachNotificationPrivacyImpactAssessmentDataSecurityCybersecurityRight toDamagesDataPrivacyNoticeComplianceDataRetentionDataSubjectCybersecurityAwarenessIntegrationDataProtectionOfficerDataStoragePersonalDataPhishingNationalPrivacyCommissionDataRecoveryMalwareRighttoAccessIncidentReportIntegrationPenaltiesSensitivePersonalInformationIdentityTheftAnonymizationDataConsentRightsof DataSubjectsCyberAttacksLawfulAccessRightsof DataSubjectsConsentDataProcessorRighttorectifyStrongPasswordEncryptionNetworkSecurityRansomwareConfidentialityMulti-FactorAuthenticationPrivacyNoticeRiskManagementContainmentBackupTransparencyRight toErasurePrivacyPolicyFirewallsRight toFile aComplaintDataBreachDataControllerDataProcessingVulnerabilityCloudSecurityAccessControlDisclosureDataMinimizationDataBreachNotificationPrivacyImpactAssessmentDataSecurityCybersecurityRight toDamagesDataPrivacyNoticeComplianceDataRetentionDataSubjectCybersecurityAwarenessIntegrationDataProtectionOfficerDataStoragePersonalDataPhishingNationalPrivacyCommissionDataRecoveryMalwareRighttoAccessIncidentReportIntegrationPenaltiesSensitivePersonalInformationIdentityTheftAnonymizationDataConsentRightsof DataSubjectsCyberAttacksLawfulAccessRightsof DataSubjectsConsentDataProcessorRighttorectifyStrongPasswordEncryptionNetworkSecurityRansomware

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Confidentiality
  2. Multi-Factor Authentication
  3. Privacy Notice
  4. Risk Management
  5. Containment
  6. Backup
  7. Transparency
  8. Right to Erasure
  9. Privacy Policy
  10. Firewalls
  11. Right to File a Complaint
  12. Data Breach
  13. Data Controller
  14. Data Processing
  15. Vulnerability
  16. Cloud Security
  17. Access Control
  18. Disclosure
  19. Data Minimization
  20. Data Breach Notification
  21. Privacy Impact Assessment
  22. Data Security
  23. Cybersecurity
  24. Right to Damages
  25. Data Privacy Notice
  26. Compliance
  27. Data Retention
  28. Data Subject
  29. Cybersecurity Awareness
  30. Integration
  31. Data Protection Officer
  32. Data Storage
  33. Personal Data
  34. Phishing
  35. National Privacy Commission
  36. Data Recovery
  37. Malware
  38. Right to Access
  39. Incident Report
  40. Integration
  41. Penalties
  42. Sensitive Personal Information
  43. Identity Theft
  44. Anonymization
  45. Data Consent
  46. Rights of Data Subjects
  47. Cyber Attacks
  48. Lawful Access
  49. Rights of Data Subjects
  50. Consent
  51. Data Processor
  52. Right to rectify
  53. Strong Password
  54. Encryption
  55. Network Security
  56. Ransomware