RighttoAccessContainmentDataMinimizationStrongPasswordDataStorageDisclosurePenaltiesConfidentialityEncryptionRight toErasureRightsof DataSubjectsIntegrationMulti-FactorAuthenticationAnonymizationIntegrationRiskManagementRightsof DataSubjectsRight toDamagesCyberAttacksDataProtectionOfficerFirewallsDataSubjectRighttorectifyNetworkSecurityDataControllerCloudSecurityDataPrivacyNoticeMalwarePhishingPrivacyPolicyVulnerabilityDataBreachNotificationDataConsentDataBreachDataProcessingConsentLawfulAccessSensitivePersonalInformationDataSecurityIdentityTheftPrivacyNoticePrivacyImpactAssessmentTransparencyComplianceNationalPrivacyCommissionRansomwarePersonalDataCybersecurityDataRecoveryDataRetentionDataProcessorIncidentReportCybersecurityAwarenessBackupRight toFile aComplaintAccessControlRighttoAccessContainmentDataMinimizationStrongPasswordDataStorageDisclosurePenaltiesConfidentialityEncryptionRight toErasureRightsof DataSubjectsIntegrationMulti-FactorAuthenticationAnonymizationIntegrationRiskManagementRightsof DataSubjectsRight toDamagesCyberAttacksDataProtectionOfficerFirewallsDataSubjectRighttorectifyNetworkSecurityDataControllerCloudSecurityDataPrivacyNoticeMalwarePhishingPrivacyPolicyVulnerabilityDataBreachNotificationDataConsentDataBreachDataProcessingConsentLawfulAccessSensitivePersonalInformationDataSecurityIdentityTheftPrivacyNoticePrivacyImpactAssessmentTransparencyComplianceNationalPrivacyCommissionRansomwarePersonalDataCybersecurityDataRecoveryDataRetentionDataProcessorIncidentReportCybersecurityAwarenessBackupRight toFile aComplaintAccessControl

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Access
  2. Containment
  3. Data Minimization
  4. Strong Password
  5. Data Storage
  6. Disclosure
  7. Penalties
  8. Confidentiality
  9. Encryption
  10. Right to Erasure
  11. Rights of Data Subjects
  12. Integration
  13. Multi-Factor Authentication
  14. Anonymization
  15. Integration
  16. Risk Management
  17. Rights of Data Subjects
  18. Right to Damages
  19. Cyber Attacks
  20. Data Protection Officer
  21. Firewalls
  22. Data Subject
  23. Right to rectify
  24. Network Security
  25. Data Controller
  26. Cloud Security
  27. Data Privacy Notice
  28. Malware
  29. Phishing
  30. Privacy Policy
  31. Vulnerability
  32. Data Breach Notification
  33. Data Consent
  34. Data Breach
  35. Data Processing
  36. Consent
  37. Lawful Access
  38. Sensitive Personal Information
  39. Data Security
  40. Identity Theft
  41. Privacy Notice
  42. Privacy Impact Assessment
  43. Transparency
  44. Compliance
  45. National Privacy Commission
  46. Ransomware
  47. Personal Data
  48. Cybersecurity
  49. Data Recovery
  50. Data Retention
  51. Data Processor
  52. Incident Report
  53. Cybersecurity Awareness
  54. Backup
  55. Right to File a Complaint
  56. Access Control