DataMinimizationConsentIncidentReportRiskManagementCybersecurityAwarenessStrongPasswordAccessControlIntegrationDataProcessingConfidentialityDataBreachNotificationNetworkSecurityCyberAttacksDataProtectionOfficerRight toDamagesEncryptionComplianceRighttoAccessDataRetentionMalwareRight toFile aComplaintRight toErasurePenaltiesFirewallsPrivacyImpactAssessmentDataPrivacyNoticePhishingIdentityTheftCybersecurityTransparencySensitivePersonalInformationNationalPrivacyCommissionIntegrationContainmentLawfulAccessDataControllerDataConsentPersonalDataRightsof DataSubjectsRightsof DataSubjectsDisclosureRighttorectifyDataStorageDataRecoveryDataProcessorRansomwarePrivacyNoticeDataSecurityAnonymizationMulti-FactorAuthenticationCloudSecurityVulnerabilityBackupDataBreachPrivacyPolicyDataSubjectDataMinimizationConsentIncidentReportRiskManagementCybersecurityAwarenessStrongPasswordAccessControlIntegrationDataProcessingConfidentialityDataBreachNotificationNetworkSecurityCyberAttacksDataProtectionOfficerRight toDamagesEncryptionComplianceRighttoAccessDataRetentionMalwareRight toFile aComplaintRight toErasurePenaltiesFirewallsPrivacyImpactAssessmentDataPrivacyNoticePhishingIdentityTheftCybersecurityTransparencySensitivePersonalInformationNationalPrivacyCommissionIntegrationContainmentLawfulAccessDataControllerDataConsentPersonalDataRightsof DataSubjectsRightsof DataSubjectsDisclosureRighttorectifyDataStorageDataRecoveryDataProcessorRansomwarePrivacyNoticeDataSecurityAnonymizationMulti-FactorAuthenticationCloudSecurityVulnerabilityBackupDataBreachPrivacyPolicyDataSubject

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Minimization
  2. Consent
  3. Incident Report
  4. Risk Management
  5. Cybersecurity Awareness
  6. Strong Password
  7. Access Control
  8. Integration
  9. Data Processing
  10. Confidentiality
  11. Data Breach Notification
  12. Network Security
  13. Cyber Attacks
  14. Data Protection Officer
  15. Right to Damages
  16. Encryption
  17. Compliance
  18. Right to Access
  19. Data Retention
  20. Malware
  21. Right to File a Complaint
  22. Right to Erasure
  23. Penalties
  24. Firewalls
  25. Privacy Impact Assessment
  26. Data Privacy Notice
  27. Phishing
  28. Identity Theft
  29. Cybersecurity
  30. Transparency
  31. Sensitive Personal Information
  32. National Privacy Commission
  33. Integration
  34. Containment
  35. Lawful Access
  36. Data Controller
  37. Data Consent
  38. Personal Data
  39. Rights of Data Subjects
  40. Rights of Data Subjects
  41. Disclosure
  42. Right to rectify
  43. Data Storage
  44. Data Recovery
  45. Data Processor
  46. Ransomware
  47. Privacy Notice
  48. Data Security
  49. Anonymization
  50. Multi-Factor Authentication
  51. Cloud Security
  52. Vulnerability
  53. Backup
  54. Data Breach
  55. Privacy Policy
  56. Data Subject