DataRecoveryRight toFile aComplaintPhishingContainmentDataSecurityDataSubjectRightsof DataSubjectsRighttoAccessPrivacyNoticeEncryptionIntegrationVulnerabilityDataProcessingSensitivePersonalInformationCloudSecurityCybersecurityAwarenessCompliancePrivacyPolicyPersonalDataPenaltiesRighttorectifyMulti-FactorAuthenticationDisclosureNetworkSecurityStrongPasswordDataProtectionOfficerDataBreachNotificationBackupDataStorageConsentRansomwareDataRetentionRightsof DataSubjectsFirewallsDataConsentDataControllerIntegrationDataPrivacyNoticePrivacyImpactAssessmentCybersecurityMalwareNationalPrivacyCommissionLawfulAccessConfidentialityTransparencyDataMinimizationIncidentReportRiskManagementCyberAttacksIdentityTheftAccessControlAnonymizationRight toErasureDataBreachDataProcessorRight toDamagesDataRecoveryRight toFile aComplaintPhishingContainmentDataSecurityDataSubjectRightsof DataSubjectsRighttoAccessPrivacyNoticeEncryptionIntegrationVulnerabilityDataProcessingSensitivePersonalInformationCloudSecurityCybersecurityAwarenessCompliancePrivacyPolicyPersonalDataPenaltiesRighttorectifyMulti-FactorAuthenticationDisclosureNetworkSecurityStrongPasswordDataProtectionOfficerDataBreachNotificationBackupDataStorageConsentRansomwareDataRetentionRightsof DataSubjectsFirewallsDataConsentDataControllerIntegrationDataPrivacyNoticePrivacyImpactAssessmentCybersecurityMalwareNationalPrivacyCommissionLawfulAccessConfidentialityTransparencyDataMinimizationIncidentReportRiskManagementCyberAttacksIdentityTheftAccessControlAnonymizationRight toErasureDataBreachDataProcessorRight toDamages

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Recovery
  2. Right to File a Complaint
  3. Phishing
  4. Containment
  5. Data Security
  6. Data Subject
  7. Rights of Data Subjects
  8. Right to Access
  9. Privacy Notice
  10. Encryption
  11. Integration
  12. Vulnerability
  13. Data Processing
  14. Sensitive Personal Information
  15. Cloud Security
  16. Cybersecurity Awareness
  17. Compliance
  18. Privacy Policy
  19. Personal Data
  20. Penalties
  21. Right to rectify
  22. Multi-Factor Authentication
  23. Disclosure
  24. Network Security
  25. Strong Password
  26. Data Protection Officer
  27. Data Breach Notification
  28. Backup
  29. Data Storage
  30. Consent
  31. Ransomware
  32. Data Retention
  33. Rights of Data Subjects
  34. Firewalls
  35. Data Consent
  36. Data Controller
  37. Integration
  38. Data Privacy Notice
  39. Privacy Impact Assessment
  40. Cybersecurity
  41. Malware
  42. National Privacy Commission
  43. Lawful Access
  44. Confidentiality
  45. Transparency
  46. Data Minimization
  47. Incident Report
  48. Risk Management
  49. Cyber Attacks
  50. Identity Theft
  51. Access Control
  52. Anonymization
  53. Right to Erasure
  54. Data Breach
  55. Data Processor
  56. Right to Damages