SensitivePersonalInformationDataControllerCloudSecurityDataPrivacyNoticeFirewallsPrivacyPolicyIntegrationDataRetentionNationalPrivacyCommissionDataProtectionOfficerDataSubjectPenaltiesEncryptionDataBreachDisclosureLawfulAccessDataBreachNotificationConsentMalwarePrivacyNoticeRiskManagementCyberAttacksDataProcessingPrivacyImpactAssessmentNetworkSecurityDataProcessorDataMinimizationRightsof DataSubjectsRightsof DataSubjectsMulti-FactorAuthenticationIntegrationIdentityTheftDataConsentAnonymizationRighttorectifyBackupStrongPasswordRighttoAccessCybersecurityPersonalDataRight toDamagesRight toErasureRansomwarePhishingDataRecoveryComplianceAccessControlConfidentialityTransparencyCybersecurityAwarenessDataSecurityIncidentReportRight toFile aComplaintVulnerabilityDataStorageContainmentSensitivePersonalInformationDataControllerCloudSecurityDataPrivacyNoticeFirewallsPrivacyPolicyIntegrationDataRetentionNationalPrivacyCommissionDataProtectionOfficerDataSubjectPenaltiesEncryptionDataBreachDisclosureLawfulAccessDataBreachNotificationConsentMalwarePrivacyNoticeRiskManagementCyberAttacksDataProcessingPrivacyImpactAssessmentNetworkSecurityDataProcessorDataMinimizationRightsof DataSubjectsRightsof DataSubjectsMulti-FactorAuthenticationIntegrationIdentityTheftDataConsentAnonymizationRighttorectifyBackupStrongPasswordRighttoAccessCybersecurityPersonalDataRight toDamagesRight toErasureRansomwarePhishingDataRecoveryComplianceAccessControlConfidentialityTransparencyCybersecurityAwarenessDataSecurityIncidentReportRight toFile aComplaintVulnerabilityDataStorageContainment

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Sensitive Personal Information
  2. Data Controller
  3. Cloud Security
  4. Data Privacy Notice
  5. Firewalls
  6. Privacy Policy
  7. Integration
  8. Data Retention
  9. National Privacy Commission
  10. Data Protection Officer
  11. Data Subject
  12. Penalties
  13. Encryption
  14. Data Breach
  15. Disclosure
  16. Lawful Access
  17. Data Breach Notification
  18. Consent
  19. Malware
  20. Privacy Notice
  21. Risk Management
  22. Cyber Attacks
  23. Data Processing
  24. Privacy Impact Assessment
  25. Network Security
  26. Data Processor
  27. Data Minimization
  28. Rights of Data Subjects
  29. Rights of Data Subjects
  30. Multi-Factor Authentication
  31. Integration
  32. Identity Theft
  33. Data Consent
  34. Anonymization
  35. Right to rectify
  36. Backup
  37. Strong Password
  38. Right to Access
  39. Cybersecurity
  40. Personal Data
  41. Right to Damages
  42. Right to Erasure
  43. Ransomware
  44. Phishing
  45. Data Recovery
  46. Compliance
  47. Access Control
  48. Confidentiality
  49. Transparency
  50. Cybersecurity Awareness
  51. Data Security
  52. Incident Report
  53. Right to File a Complaint
  54. Vulnerability
  55. Data Storage
  56. Containment