Right toErasureDataBreachComplianceDataProcessingRight toDamagesCybersecurityAwarenessLawfulAccessDataProtectionOfficerCloudSecurityCyberAttacksIntegrationCybersecurityIncidentReportDataBreachNotificationPersonalDataRightsof DataSubjectsDataRetentionRight toFile aComplaintIdentityTheftDataPrivacyNoticeMulti-FactorAuthenticationRighttoAccessConfidentialityDataSecurityRighttorectifyDataStoragePrivacyNoticePrivacyPolicyRansomwarePrivacyImpactAssessmentDisclosureDataControllerPenaltiesPhishingSensitivePersonalInformationMalwareFirewallsConsentDataMinimizationDataRecoveryDataSubjectRightsof DataSubjectsDataConsentDataProcessorIntegrationTransparencyAnonymizationNationalPrivacyCommissionVulnerabilityContainmentRiskManagementNetworkSecurityBackupAccessControlStrongPasswordEncryptionRight toErasureDataBreachComplianceDataProcessingRight toDamagesCybersecurityAwarenessLawfulAccessDataProtectionOfficerCloudSecurityCyberAttacksIntegrationCybersecurityIncidentReportDataBreachNotificationPersonalDataRightsof DataSubjectsDataRetentionRight toFile aComplaintIdentityTheftDataPrivacyNoticeMulti-FactorAuthenticationRighttoAccessConfidentialityDataSecurityRighttorectifyDataStoragePrivacyNoticePrivacyPolicyRansomwarePrivacyImpactAssessmentDisclosureDataControllerPenaltiesPhishingSensitivePersonalInformationMalwareFirewallsConsentDataMinimizationDataRecoveryDataSubjectRightsof DataSubjectsDataConsentDataProcessorIntegrationTransparencyAnonymizationNationalPrivacyCommissionVulnerabilityContainmentRiskManagementNetworkSecurityBackupAccessControlStrongPasswordEncryption

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Right to Erasure
  2. Data Breach
  3. Compliance
  4. Data Processing
  5. Right to Damages
  6. Cybersecurity Awareness
  7. Lawful Access
  8. Data Protection Officer
  9. Cloud Security
  10. Cyber Attacks
  11. Integration
  12. Cybersecurity
  13. Incident Report
  14. Data Breach Notification
  15. Personal Data
  16. Rights of Data Subjects
  17. Data Retention
  18. Right to File a Complaint
  19. Identity Theft
  20. Data Privacy Notice
  21. Multi-Factor Authentication
  22. Right to Access
  23. Confidentiality
  24. Data Security
  25. Right to rectify
  26. Data Storage
  27. Privacy Notice
  28. Privacy Policy
  29. Ransomware
  30. Privacy Impact Assessment
  31. Disclosure
  32. Data Controller
  33. Penalties
  34. Phishing
  35. Sensitive Personal Information
  36. Malware
  37. Firewalls
  38. Consent
  39. Data Minimization
  40. Data Recovery
  41. Data Subject
  42. Rights of Data Subjects
  43. Data Consent
  44. Data Processor
  45. Integration
  46. Transparency
  47. Anonymization
  48. National Privacy Commission
  49. Vulnerability
  50. Containment
  51. Risk Management
  52. Network Security
  53. Backup
  54. Access Control
  55. Strong Password
  56. Encryption