DataProcessingPrivacyNoticeRightsof DataSubjectsRighttoAccessDataConsentDataPrivacyNoticeRansomwareDisclosureRight toFile aComplaintDataBreachNotificationAnonymizationPenaltiesDataStorageCyberAttacksVulnerabilityRighttorectifyContainmentEncryptionConfidentialityStrongPasswordIntegrationDataMinimizationDataBreachDataSubjectSensitivePersonalInformationCybersecurityAwarenessPrivacyImpactAssessmentRight toErasureDataRetentionCybersecurityDataSecurityNationalPrivacyCommissionNetworkSecurityMalwareComplianceConsentAccessControlDataRecoveryCloudSecurityLawfulAccessMulti-FactorAuthenticationDataProtectionOfficerIncidentReportBackupRightsof DataSubjectsFirewallsPrivacyPolicyRiskManagementPhishingTransparencyIdentityTheftDataProcessorPersonalDataDataControllerIntegrationRight toDamagesDataProcessingPrivacyNoticeRightsof DataSubjectsRighttoAccessDataConsentDataPrivacyNoticeRansomwareDisclosureRight toFile aComplaintDataBreachNotificationAnonymizationPenaltiesDataStorageCyberAttacksVulnerabilityRighttorectifyContainmentEncryptionConfidentialityStrongPasswordIntegrationDataMinimizationDataBreachDataSubjectSensitivePersonalInformationCybersecurityAwarenessPrivacyImpactAssessmentRight toErasureDataRetentionCybersecurityDataSecurityNationalPrivacyCommissionNetworkSecurityMalwareComplianceConsentAccessControlDataRecoveryCloudSecurityLawfulAccessMulti-FactorAuthenticationDataProtectionOfficerIncidentReportBackupRightsof DataSubjectsFirewallsPrivacyPolicyRiskManagementPhishingTransparencyIdentityTheftDataProcessorPersonalDataDataControllerIntegrationRight toDamages

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Processing
  2. Privacy Notice
  3. Rights of Data Subjects
  4. Right to Access
  5. Data Consent
  6. Data Privacy Notice
  7. Ransomware
  8. Disclosure
  9. Right to File a Complaint
  10. Data Breach Notification
  11. Anonymization
  12. Penalties
  13. Data Storage
  14. Cyber Attacks
  15. Vulnerability
  16. Right to rectify
  17. Containment
  18. Encryption
  19. Confidentiality
  20. Strong Password
  21. Integration
  22. Data Minimization
  23. Data Breach
  24. Data Subject
  25. Sensitive Personal Information
  26. Cybersecurity Awareness
  27. Privacy Impact Assessment
  28. Right to Erasure
  29. Data Retention
  30. Cybersecurity
  31. Data Security
  32. National Privacy Commission
  33. Network Security
  34. Malware
  35. Compliance
  36. Consent
  37. Access Control
  38. Data Recovery
  39. Cloud Security
  40. Lawful Access
  41. Multi-Factor Authentication
  42. Data Protection Officer
  43. Incident Report
  44. Backup
  45. Rights of Data Subjects
  46. Firewalls
  47. Privacy Policy
  48. Risk Management
  49. Phishing
  50. Transparency
  51. Identity Theft
  52. Data Processor
  53. Personal Data
  54. Data Controller
  55. Integration
  56. Right to Damages