ContainmentPhishingNetworkSecurityConfidentialityAccessControlDataRetentionRight toFile aComplaintBackupStrongPasswordDataBreachNotificationPenaltiesEncryptionRightsof DataSubjectsDataProcessorPrivacyImpactAssessmentCybersecurityDataStorageCyberAttacksRighttorectifyComplianceIntegrationDataSecurityVulnerabilityRansomwareNationalPrivacyCommissionDataPrivacyNoticeDataProcessingIntegrationCloudSecurityPrivacyPolicyFirewallsAnonymizationDataConsentSensitivePersonalInformationDataRecoveryPersonalDataTransparencyDataMinimizationMalwareRight toDamagesIdentityTheftLawfulAccessDisclosureDataControllerPrivacyNoticeConsentCybersecurityAwarenessIncidentReportDataProtectionOfficerRighttoAccessRiskManagementRight toErasureRightsof DataSubjectsMulti-FactorAuthenticationDataSubjectDataBreachContainmentPhishingNetworkSecurityConfidentialityAccessControlDataRetentionRight toFile aComplaintBackupStrongPasswordDataBreachNotificationPenaltiesEncryptionRightsof DataSubjectsDataProcessorPrivacyImpactAssessmentCybersecurityDataStorageCyberAttacksRighttorectifyComplianceIntegrationDataSecurityVulnerabilityRansomwareNationalPrivacyCommissionDataPrivacyNoticeDataProcessingIntegrationCloudSecurityPrivacyPolicyFirewallsAnonymizationDataConsentSensitivePersonalInformationDataRecoveryPersonalDataTransparencyDataMinimizationMalwareRight toDamagesIdentityTheftLawfulAccessDisclosureDataControllerPrivacyNoticeConsentCybersecurityAwarenessIncidentReportDataProtectionOfficerRighttoAccessRiskManagementRight toErasureRightsof DataSubjectsMulti-FactorAuthenticationDataSubjectDataBreach

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Containment
  2. Phishing
  3. Network Security
  4. Confidentiality
  5. Access Control
  6. Data Retention
  7. Right to File a Complaint
  8. Backup
  9. Strong Password
  10. Data Breach Notification
  11. Penalties
  12. Encryption
  13. Rights of Data Subjects
  14. Data Processor
  15. Privacy Impact Assessment
  16. Cybersecurity
  17. Data Storage
  18. Cyber Attacks
  19. Right to rectify
  20. Compliance
  21. Integration
  22. Data Security
  23. Vulnerability
  24. Ransomware
  25. National Privacy Commission
  26. Data Privacy Notice
  27. Data Processing
  28. Integration
  29. Cloud Security
  30. Privacy Policy
  31. Firewalls
  32. Anonymization
  33. Data Consent
  34. Sensitive Personal Information
  35. Data Recovery
  36. Personal Data
  37. Transparency
  38. Data Minimization
  39. Malware
  40. Right to Damages
  41. Identity Theft
  42. Lawful Access
  43. Disclosure
  44. Data Controller
  45. Privacy Notice
  46. Consent
  47. Cybersecurity Awareness
  48. Incident Report
  49. Data Protection Officer
  50. Right to Access
  51. Risk Management
  52. Right to Erasure
  53. Rights of Data Subjects
  54. Multi-Factor Authentication
  55. Data Subject
  56. Data Breach