CybersecurityAwarenessDataMinimizationCloudSecurityPrivacyPolicyAccessControlDataStorageRiskManagementDataConsentRansomwareRighttoAccessDataRetentionDataBreachDataProtectionOfficerMulti-FactorAuthenticationAnonymizationEncryptionCyberAttacksContainmentPenaltiesPhishingBackupNetworkSecurityRightsof DataSubjectsDataProcessorDataSecurityPersonalDataIdentityTheftDataRecoveryDataBreachNotificationRighttorectifyComplianceSensitivePersonalInformationConfidentialityDataProcessingDataSubjectDataControllerMalwareIntegrationLawfulAccessRightsof DataSubjectsVulnerabilityIntegrationPrivacyNoticeRight toDamagesNationalPrivacyCommissionCybersecurityDataPrivacyNoticeDisclosureConsentStrongPasswordRight toErasureTransparencyPrivacyImpactAssessmentIncidentReportFirewallsRight toFile aComplaintCybersecurityAwarenessDataMinimizationCloudSecurityPrivacyPolicyAccessControlDataStorageRiskManagementDataConsentRansomwareRighttoAccessDataRetentionDataBreachDataProtectionOfficerMulti-FactorAuthenticationAnonymizationEncryptionCyberAttacksContainmentPenaltiesPhishingBackupNetworkSecurityRightsof DataSubjectsDataProcessorDataSecurityPersonalDataIdentityTheftDataRecoveryDataBreachNotificationRighttorectifyComplianceSensitivePersonalInformationConfidentialityDataProcessingDataSubjectDataControllerMalwareIntegrationLawfulAccessRightsof DataSubjectsVulnerabilityIntegrationPrivacyNoticeRight toDamagesNationalPrivacyCommissionCybersecurityDataPrivacyNoticeDisclosureConsentStrongPasswordRight toErasureTransparencyPrivacyImpactAssessmentIncidentReportFirewallsRight toFile aComplaint

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cybersecurity Awareness
  2. Data Minimization
  3. Cloud Security
  4. Privacy Policy
  5. Access Control
  6. Data Storage
  7. Risk Management
  8. Data Consent
  9. Ransomware
  10. Right to Access
  11. Data Retention
  12. Data Breach
  13. Data Protection Officer
  14. Multi-Factor Authentication
  15. Anonymization
  16. Encryption
  17. Cyber Attacks
  18. Containment
  19. Penalties
  20. Phishing
  21. Backup
  22. Network Security
  23. Rights of Data Subjects
  24. Data Processor
  25. Data Security
  26. Personal Data
  27. Identity Theft
  28. Data Recovery
  29. Data Breach Notification
  30. Right to rectify
  31. Compliance
  32. Sensitive Personal Information
  33. Confidentiality
  34. Data Processing
  35. Data Subject
  36. Data Controller
  37. Malware
  38. Integration
  39. Lawful Access
  40. Rights of Data Subjects
  41. Vulnerability
  42. Integration
  43. Privacy Notice
  44. Right to Damages
  45. National Privacy Commission
  46. Cybersecurity
  47. Data Privacy Notice
  48. Disclosure
  49. Consent
  50. Strong Password
  51. Right to Erasure
  52. Transparency
  53. Privacy Impact Assessment
  54. Incident Report
  55. Firewalls
  56. Right to File a Complaint