SensitivePersonalInformationPrivacyNoticeDisclosureRightsof DataSubjectsNetworkSecurityRightsof DataSubjectsCybersecurityAwarenessRight toFile aComplaintTransparencyPhishingDataRecoveryPrivacyImpactAssessmentDataRetentionIntegrationDataSubjectDataStorageVulnerabilityIntegrationContainmentCyberAttacksCloudSecurityIdentityTheftDataSecurityPenaltiesAnonymizationDataConsentPersonalDataBackupDataProcessingDataBreachFirewallsAccessControlNationalPrivacyCommissionMulti-FactorAuthenticationRighttoAccessPrivacyPolicyDataProcessorStrongPasswordDataMinimizationRighttorectifyEncryptionDataBreachNotificationRiskManagementConsentConfidentialityComplianceLawfulAccessRight toDamagesRight toErasureCybersecurityDataProtectionOfficerMalwareIncidentReportDataPrivacyNoticeDataControllerRansomwareSensitivePersonalInformationPrivacyNoticeDisclosureRightsof DataSubjectsNetworkSecurityRightsof DataSubjectsCybersecurityAwarenessRight toFile aComplaintTransparencyPhishingDataRecoveryPrivacyImpactAssessmentDataRetentionIntegrationDataSubjectDataStorageVulnerabilityIntegrationContainmentCyberAttacksCloudSecurityIdentityTheftDataSecurityPenaltiesAnonymizationDataConsentPersonalDataBackupDataProcessingDataBreachFirewallsAccessControlNationalPrivacyCommissionMulti-FactorAuthenticationRighttoAccessPrivacyPolicyDataProcessorStrongPasswordDataMinimizationRighttorectifyEncryptionDataBreachNotificationRiskManagementConsentConfidentialityComplianceLawfulAccessRight toDamagesRight toErasureCybersecurityDataProtectionOfficerMalwareIncidentReportDataPrivacyNoticeDataControllerRansomware

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Sensitive Personal Information
  2. Privacy Notice
  3. Disclosure
  4. Rights of Data Subjects
  5. Network Security
  6. Rights of Data Subjects
  7. Cybersecurity Awareness
  8. Right to File a Complaint
  9. Transparency
  10. Phishing
  11. Data Recovery
  12. Privacy Impact Assessment
  13. Data Retention
  14. Integration
  15. Data Subject
  16. Data Storage
  17. Vulnerability
  18. Integration
  19. Containment
  20. Cyber Attacks
  21. Cloud Security
  22. Identity Theft
  23. Data Security
  24. Penalties
  25. Anonymization
  26. Data Consent
  27. Personal Data
  28. Backup
  29. Data Processing
  30. Data Breach
  31. Firewalls
  32. Access Control
  33. National Privacy Commission
  34. Multi-Factor Authentication
  35. Right to Access
  36. Privacy Policy
  37. Data Processor
  38. Strong Password
  39. Data Minimization
  40. Right to rectify
  41. Encryption
  42. Data Breach Notification
  43. Risk Management
  44. Consent
  45. Confidentiality
  46. Compliance
  47. Lawful Access
  48. Right to Damages
  49. Right to Erasure
  50. Cybersecurity
  51. Data Protection Officer
  52. Malware
  53. Incident Report
  54. Data Privacy Notice
  55. Data Controller
  56. Ransomware