TransparencyDataProtectionOfficerDataSecurityDataProcessingDataSubjectMalwareCybersecurityAwarenessPersonalDataRighttorectifyPrivacyImpactAssessmentDataRetentionAccessControlDataBreachNotificationVulnerabilityCyberAttacksDataMinimizationDataControllerBackupNetworkSecurityConsentDataProcessorRight toErasureCloudSecurityDataStorageLawfulAccessIntegrationRight toFile aComplaintFirewallsNationalPrivacyCommissionRight toDamagesRansomwareCybersecurityRightsof DataSubjectsIdentityTheftIntegrationComplianceConfidentialityRightsof DataSubjectsDataConsentIncidentReportEncryptionSensitivePersonalInformationDataRecoveryDataBreachContainmentRiskManagementDataPrivacyNoticeRighttoAccessPrivacyNoticeStrongPasswordDisclosureAnonymizationMulti-FactorAuthenticationPenaltiesPrivacyPolicyPhishingTransparencyDataProtectionOfficerDataSecurityDataProcessingDataSubjectMalwareCybersecurityAwarenessPersonalDataRighttorectifyPrivacyImpactAssessmentDataRetentionAccessControlDataBreachNotificationVulnerabilityCyberAttacksDataMinimizationDataControllerBackupNetworkSecurityConsentDataProcessorRight toErasureCloudSecurityDataStorageLawfulAccessIntegrationRight toFile aComplaintFirewallsNationalPrivacyCommissionRight toDamagesRansomwareCybersecurityRightsof DataSubjectsIdentityTheftIntegrationComplianceConfidentialityRightsof DataSubjectsDataConsentIncidentReportEncryptionSensitivePersonalInformationDataRecoveryDataBreachContainmentRiskManagementDataPrivacyNoticeRighttoAccessPrivacyNoticeStrongPasswordDisclosureAnonymizationMulti-FactorAuthenticationPenaltiesPrivacyPolicyPhishing

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Transparency
  2. Data Protection Officer
  3. Data Security
  4. Data Processing
  5. Data Subject
  6. Malware
  7. Cybersecurity Awareness
  8. Personal Data
  9. Right to rectify
  10. Privacy Impact Assessment
  11. Data Retention
  12. Access Control
  13. Data Breach Notification
  14. Vulnerability
  15. Cyber Attacks
  16. Data Minimization
  17. Data Controller
  18. Backup
  19. Network Security
  20. Consent
  21. Data Processor
  22. Right to Erasure
  23. Cloud Security
  24. Data Storage
  25. Lawful Access
  26. Integration
  27. Right to File a Complaint
  28. Firewalls
  29. National Privacy Commission
  30. Right to Damages
  31. Ransomware
  32. Cybersecurity
  33. Rights of Data Subjects
  34. Identity Theft
  35. Integration
  36. Compliance
  37. Confidentiality
  38. Rights of Data Subjects
  39. Data Consent
  40. Incident Report
  41. Encryption
  42. Sensitive Personal Information
  43. Data Recovery
  44. Data Breach
  45. Containment
  46. Risk Management
  47. Data Privacy Notice
  48. Right to Access
  49. Privacy Notice
  50. Strong Password
  51. Disclosure
  52. Anonymization
  53. Multi-Factor Authentication
  54. Penalties
  55. Privacy Policy
  56. Phishing