StrongPasswordPenaltiesDataBreachRight toErasureDataBreachNotificationDataSecurityPhishingContainmentCloudSecurityDisclosureDataRetentionIntegrationPrivacyPolicyDataProcessingNationalPrivacyCommissionDataControllerRansomwareDataPrivacyNoticeMalwareNetworkSecurityDataMinimizationRighttoAccessIncidentReportAccessControlDataStorageRighttorectifyCompliancePrivacyImpactAssessmentRightsof DataSubjectsRightsof DataSubjectsAnonymizationMulti-FactorAuthenticationDataSubjectRiskManagementDataRecoveryPrivacyNoticeEncryptionConsentRight toFile aComplaintIntegrationBackupLawfulAccessCybersecurityTransparencyPersonalDataCybersecurityAwarenessIdentityTheftRight toDamagesDataConsentFirewallsSensitivePersonalInformationConfidentialityDataProcessorVulnerabilityDataProtectionOfficerCyberAttacksStrongPasswordPenaltiesDataBreachRight toErasureDataBreachNotificationDataSecurityPhishingContainmentCloudSecurityDisclosureDataRetentionIntegrationPrivacyPolicyDataProcessingNationalPrivacyCommissionDataControllerRansomwareDataPrivacyNoticeMalwareNetworkSecurityDataMinimizationRighttoAccessIncidentReportAccessControlDataStorageRighttorectifyCompliancePrivacyImpactAssessmentRightsof DataSubjectsRightsof DataSubjectsAnonymizationMulti-FactorAuthenticationDataSubjectRiskManagementDataRecoveryPrivacyNoticeEncryptionConsentRight toFile aComplaintIntegrationBackupLawfulAccessCybersecurityTransparencyPersonalDataCybersecurityAwarenessIdentityTheftRight toDamagesDataConsentFirewallsSensitivePersonalInformationConfidentialityDataProcessorVulnerabilityDataProtectionOfficerCyberAttacks

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Strong Password
  2. Penalties
  3. Data Breach
  4. Right to Erasure
  5. Data Breach Notification
  6. Data Security
  7. Phishing
  8. Containment
  9. Cloud Security
  10. Disclosure
  11. Data Retention
  12. Integration
  13. Privacy Policy
  14. Data Processing
  15. National Privacy Commission
  16. Data Controller
  17. Ransomware
  18. Data Privacy Notice
  19. Malware
  20. Network Security
  21. Data Minimization
  22. Right to Access
  23. Incident Report
  24. Access Control
  25. Data Storage
  26. Right to rectify
  27. Compliance
  28. Privacy Impact Assessment
  29. Rights of Data Subjects
  30. Rights of Data Subjects
  31. Anonymization
  32. Multi-Factor Authentication
  33. Data Subject
  34. Risk Management
  35. Data Recovery
  36. Privacy Notice
  37. Encryption
  38. Consent
  39. Right to File a Complaint
  40. Integration
  41. Backup
  42. Lawful Access
  43. Cybersecurity
  44. Transparency
  45. Personal Data
  46. Cybersecurity Awareness
  47. Identity Theft
  48. Right to Damages
  49. Data Consent
  50. Firewalls
  51. Sensitive Personal Information
  52. Confidentiality
  53. Data Processor
  54. Vulnerability
  55. Data Protection Officer
  56. Cyber Attacks