ContainmentIntegrationPrivacyNoticeCloudSecurityDataProcessingMalwareDataRecoveryDataBreachNotificationPenaltiesDataRetentionBackupIncidentReportStrongPasswordConfidentialityRiskManagementDataBreachDataSubjectDataConsentCyberAttacksDataStorageCybersecurityAwarenessConsentRighttorectifyDataControllerAnonymizationComplianceRight toErasureDataSecurityPrivacyPolicyRightsof DataSubjectsAccessControlNetworkSecurityRight toFile aComplaintRight toDamagesMulti-FactorAuthenticationDataMinimizationSensitivePersonalInformationRighttoAccessPhishingIdentityTheftDisclosureVulnerabilityFirewallsDataProcessorDataPrivacyNoticePrivacyImpactAssessmentEncryptionPersonalDataRansomwareIntegrationLawfulAccessCybersecurityTransparencyDataProtectionOfficerRightsof DataSubjectsNationalPrivacyCommissionContainmentIntegrationPrivacyNoticeCloudSecurityDataProcessingMalwareDataRecoveryDataBreachNotificationPenaltiesDataRetentionBackupIncidentReportStrongPasswordConfidentialityRiskManagementDataBreachDataSubjectDataConsentCyberAttacksDataStorageCybersecurityAwarenessConsentRighttorectifyDataControllerAnonymizationComplianceRight toErasureDataSecurityPrivacyPolicyRightsof DataSubjectsAccessControlNetworkSecurityRight toFile aComplaintRight toDamagesMulti-FactorAuthenticationDataMinimizationSensitivePersonalInformationRighttoAccessPhishingIdentityTheftDisclosureVulnerabilityFirewallsDataProcessorDataPrivacyNoticePrivacyImpactAssessmentEncryptionPersonalDataRansomwareIntegrationLawfulAccessCybersecurityTransparencyDataProtectionOfficerRightsof DataSubjectsNationalPrivacyCommission

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Containment
  2. Integration
  3. Privacy Notice
  4. Cloud Security
  5. Data Processing
  6. Malware
  7. Data Recovery
  8. Data Breach Notification
  9. Penalties
  10. Data Retention
  11. Backup
  12. Incident Report
  13. Strong Password
  14. Confidentiality
  15. Risk Management
  16. Data Breach
  17. Data Subject
  18. Data Consent
  19. Cyber Attacks
  20. Data Storage
  21. Cybersecurity Awareness
  22. Consent
  23. Right to rectify
  24. Data Controller
  25. Anonymization
  26. Compliance
  27. Right to Erasure
  28. Data Security
  29. Privacy Policy
  30. Rights of Data Subjects
  31. Access Control
  32. Network Security
  33. Right to File a Complaint
  34. Right to Damages
  35. Multi-Factor Authentication
  36. Data Minimization
  37. Sensitive Personal Information
  38. Right to Access
  39. Phishing
  40. Identity Theft
  41. Disclosure
  42. Vulnerability
  43. Firewalls
  44. Data Processor
  45. Data Privacy Notice
  46. Privacy Impact Assessment
  47. Encryption
  48. Personal Data
  49. Ransomware
  50. Integration
  51. Lawful Access
  52. Cybersecurity
  53. Transparency
  54. Data Protection Officer
  55. Rights of Data Subjects
  56. National Privacy Commission