AnonymizationRighttorectifyFirewallsMulti-FactorAuthenticationRight toDamagesIdentityTheftDataProcessorCybersecurityAwarenessConfidentialityDataConsentMalwareDataProcessingContainmentNationalPrivacyCommissionDataSubjectDataControllerDataRetentionPrivacyImpactAssessmentEncryptionStrongPasswordPrivacyPolicyCyberAttacksRighttoAccessRansomwareDataRecoveryDisclosureDataBreachNotificationRiskManagementCloudSecurityDataStorageNetworkSecurityAccessControlIntegrationPersonalDataTransparencyDataSecurityRight toFile aComplaintPrivacyNoticeDataPrivacyNoticeRight toErasureIncidentReportRightsof DataSubjectsPhishingConsentIntegrationCybersecurityDataMinimizationVulnerabilityPenaltiesLawfulAccessRightsof DataSubjectsDataBreachComplianceSensitivePersonalInformationDataProtectionOfficerBackupAnonymizationRighttorectifyFirewallsMulti-FactorAuthenticationRight toDamagesIdentityTheftDataProcessorCybersecurityAwarenessConfidentialityDataConsentMalwareDataProcessingContainmentNationalPrivacyCommissionDataSubjectDataControllerDataRetentionPrivacyImpactAssessmentEncryptionStrongPasswordPrivacyPolicyCyberAttacksRighttoAccessRansomwareDataRecoveryDisclosureDataBreachNotificationRiskManagementCloudSecurityDataStorageNetworkSecurityAccessControlIntegrationPersonalDataTransparencyDataSecurityRight toFile aComplaintPrivacyNoticeDataPrivacyNoticeRight toErasureIncidentReportRightsof DataSubjectsPhishingConsentIntegrationCybersecurityDataMinimizationVulnerabilityPenaltiesLawfulAccessRightsof DataSubjectsDataBreachComplianceSensitivePersonalInformationDataProtectionOfficerBackup

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Anonymization
  2. Right to rectify
  3. Firewalls
  4. Multi-Factor Authentication
  5. Right to Damages
  6. Identity Theft
  7. Data Processor
  8. Cybersecurity Awareness
  9. Confidentiality
  10. Data Consent
  11. Malware
  12. Data Processing
  13. Containment
  14. National Privacy Commission
  15. Data Subject
  16. Data Controller
  17. Data Retention
  18. Privacy Impact Assessment
  19. Encryption
  20. Strong Password
  21. Privacy Policy
  22. Cyber Attacks
  23. Right to Access
  24. Ransomware
  25. Data Recovery
  26. Disclosure
  27. Data Breach Notification
  28. Risk Management
  29. Cloud Security
  30. Data Storage
  31. Network Security
  32. Access Control
  33. Integration
  34. Personal Data
  35. Transparency
  36. Data Security
  37. Right to File a Complaint
  38. Privacy Notice
  39. Data Privacy Notice
  40. Right to Erasure
  41. Incident Report
  42. Rights of Data Subjects
  43. Phishing
  44. Consent
  45. Integration
  46. Cybersecurity
  47. Data Minimization
  48. Vulnerability
  49. Penalties
  50. Lawful Access
  51. Rights of Data Subjects
  52. Data Breach
  53. Compliance
  54. Sensitive Personal Information
  55. Data Protection Officer
  56. Backup