Right toErasureNetworkSecurityComplianceCyberAttacksRightsof DataSubjectsPenaltiesIntegrationConsentIncidentReportCybersecurityAwarenessDataProcessorRightsof DataSubjectsBackupIntegrationIdentityTheftCybersecurityDataStorageRiskManagementPhishingMalwareDataRecoveryDataPrivacyNoticeTransparencyDataProcessingDataSecurityPersonalDataDataControllerSensitivePersonalInformationRighttoAccessRighttorectifyDataSubjectConfidentialityDataMinimizationDataConsentMulti-FactorAuthenticationRansomwareAccessControlLawfulAccessVulnerabilityPrivacyPolicyFirewallsStrongPasswordPrivacyImpactAssessmentAnonymizationCloudSecurityDataBreachNotificationEncryptionRight toDamagesPrivacyNoticeDisclosureNationalPrivacyCommissionContainmentDataProtectionOfficerDataRetentionDataBreachRight toFile aComplaintRight toErasureNetworkSecurityComplianceCyberAttacksRightsof DataSubjectsPenaltiesIntegrationConsentIncidentReportCybersecurityAwarenessDataProcessorRightsof DataSubjectsBackupIntegrationIdentityTheftCybersecurityDataStorageRiskManagementPhishingMalwareDataRecoveryDataPrivacyNoticeTransparencyDataProcessingDataSecurityPersonalDataDataControllerSensitivePersonalInformationRighttoAccessRighttorectifyDataSubjectConfidentialityDataMinimizationDataConsentMulti-FactorAuthenticationRansomwareAccessControlLawfulAccessVulnerabilityPrivacyPolicyFirewallsStrongPasswordPrivacyImpactAssessmentAnonymizationCloudSecurityDataBreachNotificationEncryptionRight toDamagesPrivacyNoticeDisclosureNationalPrivacyCommissionContainmentDataProtectionOfficerDataRetentionDataBreachRight toFile aComplaint

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Erasure
  2. Network Security
  3. Compliance
  4. Cyber Attacks
  5. Rights of Data Subjects
  6. Penalties
  7. Integration
  8. Consent
  9. Incident Report
  10. Cybersecurity Awareness
  11. Data Processor
  12. Rights of Data Subjects
  13. Backup
  14. Integration
  15. Identity Theft
  16. Cybersecurity
  17. Data Storage
  18. Risk Management
  19. Phishing
  20. Malware
  21. Data Recovery
  22. Data Privacy Notice
  23. Transparency
  24. Data Processing
  25. Data Security
  26. Personal Data
  27. Data Controller
  28. Sensitive Personal Information
  29. Right to Access
  30. Right to rectify
  31. Data Subject
  32. Confidentiality
  33. Data Minimization
  34. Data Consent
  35. Multi-Factor Authentication
  36. Ransomware
  37. Access Control
  38. Lawful Access
  39. Vulnerability
  40. Privacy Policy
  41. Firewalls
  42. Strong Password
  43. Privacy Impact Assessment
  44. Anonymization
  45. Cloud Security
  46. Data Breach Notification
  47. Encryption
  48. Right to Damages
  49. Privacy Notice
  50. Disclosure
  51. National Privacy Commission
  52. Containment
  53. Data Protection Officer
  54. Data Retention
  55. Data Breach
  56. Right to File a Complaint