NetworkSecurityBackupPrivacyImpactAssessmentRight toDamagesContainmentFirewallsDisclosureIdentityTheftCybersecurityStrongPasswordIntegrationSensitivePersonalInformationRiskManagementDataBreachNotificationPersonalDataDataSecurityComplianceMulti-FactorAuthenticationEncryptionDataRetentionPenaltiesRansomwareDataMinimizationRighttoAccessPhishingDataBreachCybersecurityAwarenessAccessControlMalwareDataConsentDataControllerPrivacyNoticeIncidentReportConsentDataSubjectCyberAttacksConfidentialityDataProcessorDataProcessingRighttorectifyIntegrationDataStorageVulnerabilityPrivacyPolicyRightsof DataSubjectsNationalPrivacyCommissionRight toFile aComplaintDataProtectionOfficerLawfulAccessDataRecoveryDataPrivacyNoticeAnonymizationRight toErasureCloudSecurityTransparencyRightsof DataSubjectsNetworkSecurityBackupPrivacyImpactAssessmentRight toDamagesContainmentFirewallsDisclosureIdentityTheftCybersecurityStrongPasswordIntegrationSensitivePersonalInformationRiskManagementDataBreachNotificationPersonalDataDataSecurityComplianceMulti-FactorAuthenticationEncryptionDataRetentionPenaltiesRansomwareDataMinimizationRighttoAccessPhishingDataBreachCybersecurityAwarenessAccessControlMalwareDataConsentDataControllerPrivacyNoticeIncidentReportConsentDataSubjectCyberAttacksConfidentialityDataProcessorDataProcessingRighttorectifyIntegrationDataStorageVulnerabilityPrivacyPolicyRightsof DataSubjectsNationalPrivacyCommissionRight toFile aComplaintDataProtectionOfficerLawfulAccessDataRecoveryDataPrivacyNoticeAnonymizationRight toErasureCloudSecurityTransparencyRightsof DataSubjects

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Network Security
  2. Backup
  3. Privacy Impact Assessment
  4. Right to Damages
  5. Containment
  6. Firewalls
  7. Disclosure
  8. Identity Theft
  9. Cybersecurity
  10. Strong Password
  11. Integration
  12. Sensitive Personal Information
  13. Risk Management
  14. Data Breach Notification
  15. Personal Data
  16. Data Security
  17. Compliance
  18. Multi-Factor Authentication
  19. Encryption
  20. Data Retention
  21. Penalties
  22. Ransomware
  23. Data Minimization
  24. Right to Access
  25. Phishing
  26. Data Breach
  27. Cybersecurity Awareness
  28. Access Control
  29. Malware
  30. Data Consent
  31. Data Controller
  32. Privacy Notice
  33. Incident Report
  34. Consent
  35. Data Subject
  36. Cyber Attacks
  37. Confidentiality
  38. Data Processor
  39. Data Processing
  40. Right to rectify
  41. Integration
  42. Data Storage
  43. Vulnerability
  44. Privacy Policy
  45. Rights of Data Subjects
  46. National Privacy Commission
  47. Right to File a Complaint
  48. Data Protection Officer
  49. Lawful Access
  50. Data Recovery
  51. Data Privacy Notice
  52. Anonymization
  53. Right to Erasure
  54. Cloud Security
  55. Transparency
  56. Rights of Data Subjects