LawfulAccessPenaltiesContainmentRighttoAccessRightsof DataSubjectsDataPrivacyNoticeRight toFile aComplaintAccessControlFirewallsRight toErasureDisclosureDataSubjectNationalPrivacyCommissionDataBreachDataStorageCybersecurityAwarenessRightsof DataSubjectsPrivacyPolicyDataControllerIntegrationVulnerabilityConfidentialityDataRetentionComplianceRight toDamagesPersonalDataDataProcessingEncryptionMulti-FactorAuthenticationBackupRighttorectifyCyberAttacksIntegrationDataSecurityPrivacyNoticeCybersecurityCloudSecurityIdentityTheftNetworkSecurityStrongPasswordDataConsentTransparencyAnonymizationDataMinimizationConsentRansomwareIncidentReportSensitivePersonalInformationDataBreachNotificationMalwareDataRecoveryPhishingDataProtectionOfficerRiskManagementDataProcessorPrivacyImpactAssessmentLawfulAccessPenaltiesContainmentRighttoAccessRightsof DataSubjectsDataPrivacyNoticeRight toFile aComplaintAccessControlFirewallsRight toErasureDisclosureDataSubjectNationalPrivacyCommissionDataBreachDataStorageCybersecurityAwarenessRightsof DataSubjectsPrivacyPolicyDataControllerIntegrationVulnerabilityConfidentialityDataRetentionComplianceRight toDamagesPersonalDataDataProcessingEncryptionMulti-FactorAuthenticationBackupRighttorectifyCyberAttacksIntegrationDataSecurityPrivacyNoticeCybersecurityCloudSecurityIdentityTheftNetworkSecurityStrongPasswordDataConsentTransparencyAnonymizationDataMinimizationConsentRansomwareIncidentReportSensitivePersonalInformationDataBreachNotificationMalwareDataRecoveryPhishingDataProtectionOfficerRiskManagementDataProcessorPrivacyImpactAssessment

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Lawful Access
  2. Penalties
  3. Containment
  4. Right to Access
  5. Rights of Data Subjects
  6. Data Privacy Notice
  7. Right to File a Complaint
  8. Access Control
  9. Firewalls
  10. Right to Erasure
  11. Disclosure
  12. Data Subject
  13. National Privacy Commission
  14. Data Breach
  15. Data Storage
  16. Cybersecurity Awareness
  17. Rights of Data Subjects
  18. Privacy Policy
  19. Data Controller
  20. Integration
  21. Vulnerability
  22. Confidentiality
  23. Data Retention
  24. Compliance
  25. Right to Damages
  26. Personal Data
  27. Data Processing
  28. Encryption
  29. Multi-Factor Authentication
  30. Backup
  31. Right to rectify
  32. Cyber Attacks
  33. Integration
  34. Data Security
  35. Privacy Notice
  36. Cybersecurity
  37. Cloud Security
  38. Identity Theft
  39. Network Security
  40. Strong Password
  41. Data Consent
  42. Transparency
  43. Anonymization
  44. Data Minimization
  45. Consent
  46. Ransomware
  47. Incident Report
  48. Sensitive Personal Information
  49. Data Breach Notification
  50. Malware
  51. Data Recovery
  52. Phishing
  53. Data Protection Officer
  54. Risk Management
  55. Data Processor
  56. Privacy Impact Assessment