DataProtectionOfficerIdentityTheftVulnerabilityBackupStrongPasswordRightsof DataSubjectsDataProcessorDataPrivacyNoticeDataSecurityPersonalDataRighttorectifyAnonymizationPenaltiesAccessControlPrivacyNoticeIncidentReportDataProcessingDataRetentionRansomwareNationalPrivacyCommissionContainmentIntegrationDataStoragePhishingDataBreachNotificationRight toDamagesDataBreachConfidentialityComplianceRight toErasureEncryptionMulti-FactorAuthenticationRighttoAccessPrivacyPolicyCyberAttacksDisclosureTransparencyNetworkSecurityCybersecurityAwarenessDataControllerCloudSecurityRight toFile aComplaintMalwareRiskManagementCybersecurityFirewallsDataSubjectLawfulAccessDataMinimizationDataConsentDataRecoveryPrivacyImpactAssessmentIntegrationSensitivePersonalInformationRightsof DataSubjectsConsentDataProtectionOfficerIdentityTheftVulnerabilityBackupStrongPasswordRightsof DataSubjectsDataProcessorDataPrivacyNoticeDataSecurityPersonalDataRighttorectifyAnonymizationPenaltiesAccessControlPrivacyNoticeIncidentReportDataProcessingDataRetentionRansomwareNationalPrivacyCommissionContainmentIntegrationDataStoragePhishingDataBreachNotificationRight toDamagesDataBreachConfidentialityComplianceRight toErasureEncryptionMulti-FactorAuthenticationRighttoAccessPrivacyPolicyCyberAttacksDisclosureTransparencyNetworkSecurityCybersecurityAwarenessDataControllerCloudSecurityRight toFile aComplaintMalwareRiskManagementCybersecurityFirewallsDataSubjectLawfulAccessDataMinimizationDataConsentDataRecoveryPrivacyImpactAssessmentIntegrationSensitivePersonalInformationRightsof DataSubjectsConsent

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Protection Officer
  2. Identity Theft
  3. Vulnerability
  4. Backup
  5. Strong Password
  6. Rights of Data Subjects
  7. Data Processor
  8. Data Privacy Notice
  9. Data Security
  10. Personal Data
  11. Right to rectify
  12. Anonymization
  13. Penalties
  14. Access Control
  15. Privacy Notice
  16. Incident Report
  17. Data Processing
  18. Data Retention
  19. Ransomware
  20. National Privacy Commission
  21. Containment
  22. Integration
  23. Data Storage
  24. Phishing
  25. Data Breach Notification
  26. Right to Damages
  27. Data Breach
  28. Confidentiality
  29. Compliance
  30. Right to Erasure
  31. Encryption
  32. Multi-Factor Authentication
  33. Right to Access
  34. Privacy Policy
  35. Cyber Attacks
  36. Disclosure
  37. Transparency
  38. Network Security
  39. Cybersecurity Awareness
  40. Data Controller
  41. Cloud Security
  42. Right to File a Complaint
  43. Malware
  44. Risk Management
  45. Cybersecurity
  46. Firewalls
  47. Data Subject
  48. Lawful Access
  49. Data Minimization
  50. Data Consent
  51. Data Recovery
  52. Privacy Impact Assessment
  53. Integration
  54. Sensitive Personal Information
  55. Rights of Data Subjects
  56. Consent