ConfidentialityRansomwareLawfulAccessPhishingRighttoAccessIdentityTheftPenaltiesTransparencyRightsof DataSubjectsDataRetentionRighttorectifyBackupDataBreachDataStorageIncidentReportDisclosureCyberAttacksCloudSecurityNationalPrivacyCommissionDataSecurityPersonalDataRight toDamagesStrongPasswordIntegrationNetworkSecurityCybersecurityAwarenessPrivacyPolicyRight toFile aComplaintAccessControlPrivacyImpactAssessmentDataBreachNotificationDataProcessingDataProcessorAnonymizationEncryptionVulnerabilityIntegrationMulti-FactorAuthenticationDataMinimizationDataProtectionOfficerDataRecoveryRight toErasureDataControllerDataPrivacyNoticeRiskManagementFirewallsComplianceDataConsentSensitivePersonalInformationContainmentRightsof DataSubjectsConsentCybersecurityMalwareDataSubjectPrivacyNoticeConfidentialityRansomwareLawfulAccessPhishingRighttoAccessIdentityTheftPenaltiesTransparencyRightsof DataSubjectsDataRetentionRighttorectifyBackupDataBreachDataStorageIncidentReportDisclosureCyberAttacksCloudSecurityNationalPrivacyCommissionDataSecurityPersonalDataRight toDamagesStrongPasswordIntegrationNetworkSecurityCybersecurityAwarenessPrivacyPolicyRight toFile aComplaintAccessControlPrivacyImpactAssessmentDataBreachNotificationDataProcessingDataProcessorAnonymizationEncryptionVulnerabilityIntegrationMulti-FactorAuthenticationDataMinimizationDataProtectionOfficerDataRecoveryRight toErasureDataControllerDataPrivacyNoticeRiskManagementFirewallsComplianceDataConsentSensitivePersonalInformationContainmentRightsof DataSubjectsConsentCybersecurityMalwareDataSubjectPrivacyNotice

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Confidentiality
  2. Ransomware
  3. Lawful Access
  4. Phishing
  5. Right to Access
  6. Identity Theft
  7. Penalties
  8. Transparency
  9. Rights of Data Subjects
  10. Data Retention
  11. Right to rectify
  12. Backup
  13. Data Breach
  14. Data Storage
  15. Incident Report
  16. Disclosure
  17. Cyber Attacks
  18. Cloud Security
  19. National Privacy Commission
  20. Data Security
  21. Personal Data
  22. Right to Damages
  23. Strong Password
  24. Integration
  25. Network Security
  26. Cybersecurity Awareness
  27. Privacy Policy
  28. Right to File a Complaint
  29. Access Control
  30. Privacy Impact Assessment
  31. Data Breach Notification
  32. Data Processing
  33. Data Processor
  34. Anonymization
  35. Encryption
  36. Vulnerability
  37. Integration
  38. Multi-Factor Authentication
  39. Data Minimization
  40. Data Protection Officer
  41. Data Recovery
  42. Right to Erasure
  43. Data Controller
  44. Data Privacy Notice
  45. Risk Management
  46. Firewalls
  47. Compliance
  48. Data Consent
  49. Sensitive Personal Information
  50. Containment
  51. Rights of Data Subjects
  52. Consent
  53. Cybersecurity
  54. Malware
  55. Data Subject
  56. Privacy Notice