PhishingDataPrivacyNoticeIdentityTheftDataRecoveryDataBreachCybersecurityAwarenessFirewallsIncidentReportDisclosureLawfulAccessConsentContainmentAnonymizationDataRetentionRiskManagementTransparencySensitivePersonalInformationIntegrationNationalPrivacyCommissionStrongPasswordDataProtectionOfficerRansomwareRightsof DataSubjectsRightsof DataSubjectsIntegrationPrivacyPolicyMulti-FactorAuthenticationAccessControlDataProcessingVulnerabilityCloudSecurityDataControllerPersonalDataDataSubjectNetworkSecurityEncryptionRight toErasureDataStorageDataSecurityRight toFile aComplaintDataMinimizationPrivacyImpactAssessmentBackupComplianceCybersecurityRighttorectifyDataProcessorPenaltiesMalwareDataBreachNotificationRighttoAccessCyberAttacksConfidentialityRight toDamagesPrivacyNoticeDataConsentPhishingDataPrivacyNoticeIdentityTheftDataRecoveryDataBreachCybersecurityAwarenessFirewallsIncidentReportDisclosureLawfulAccessConsentContainmentAnonymizationDataRetentionRiskManagementTransparencySensitivePersonalInformationIntegrationNationalPrivacyCommissionStrongPasswordDataProtectionOfficerRansomwareRightsof DataSubjectsRightsof DataSubjectsIntegrationPrivacyPolicyMulti-FactorAuthenticationAccessControlDataProcessingVulnerabilityCloudSecurityDataControllerPersonalDataDataSubjectNetworkSecurityEncryptionRight toErasureDataStorageDataSecurityRight toFile aComplaintDataMinimizationPrivacyImpactAssessmentBackupComplianceCybersecurityRighttorectifyDataProcessorPenaltiesMalwareDataBreachNotificationRighttoAccessCyberAttacksConfidentialityRight toDamagesPrivacyNoticeDataConsent

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Phishing
  2. Data Privacy Notice
  3. Identity Theft
  4. Data Recovery
  5. Data Breach
  6. Cybersecurity Awareness
  7. Firewalls
  8. Incident Report
  9. Disclosure
  10. Lawful Access
  11. Consent
  12. Containment
  13. Anonymization
  14. Data Retention
  15. Risk Management
  16. Transparency
  17. Sensitive Personal Information
  18. Integration
  19. National Privacy Commission
  20. Strong Password
  21. Data Protection Officer
  22. Ransomware
  23. Rights of Data Subjects
  24. Rights of Data Subjects
  25. Integration
  26. Privacy Policy
  27. Multi-Factor Authentication
  28. Access Control
  29. Data Processing
  30. Vulnerability
  31. Cloud Security
  32. Data Controller
  33. Personal Data
  34. Data Subject
  35. Network Security
  36. Encryption
  37. Right to Erasure
  38. Data Storage
  39. Data Security
  40. Right to File a Complaint
  41. Data Minimization
  42. Privacy Impact Assessment
  43. Backup
  44. Compliance
  45. Cybersecurity
  46. Right to rectify
  47. Data Processor
  48. Penalties
  49. Malware
  50. Data Breach Notification
  51. Right to Access
  52. Cyber Attacks
  53. Confidentiality
  54. Right to Damages
  55. Privacy Notice
  56. Data Consent