DataBreachNotificationDataMinimizationConfidentialityDataRetentionNationalPrivacyCommissionDataProcessorDataBreachRight toFile aComplaintDataRecoverySensitivePersonalInformationPrivacyNoticeLawfulAccessBackupPersonalDataCyberAttacksNetworkSecurityMulti-FactorAuthenticationDataProcessingPrivacyImpactAssessmentPenaltiesFirewallsDataControllerContainmentIntegrationDataProtectionOfficerRight toDamagesIdentityTheftConsentTransparencyPhishingRightsof DataSubjectsIncidentReportDataConsentDataSecurityComplianceCybersecurityPrivacyPolicyDisclosureStrongPasswordAnonymizationRansomwareVulnerabilityRighttoAccessCloudSecurityEncryptionIntegrationMalwareRight toErasureDataPrivacyNoticeAccessControlRighttorectifyDataStorageRightsof DataSubjectsCybersecurityAwarenessRiskManagementDataSubjectDataBreachNotificationDataMinimizationConfidentialityDataRetentionNationalPrivacyCommissionDataProcessorDataBreachRight toFile aComplaintDataRecoverySensitivePersonalInformationPrivacyNoticeLawfulAccessBackupPersonalDataCyberAttacksNetworkSecurityMulti-FactorAuthenticationDataProcessingPrivacyImpactAssessmentPenaltiesFirewallsDataControllerContainmentIntegrationDataProtectionOfficerRight toDamagesIdentityTheftConsentTransparencyPhishingRightsof DataSubjectsIncidentReportDataConsentDataSecurityComplianceCybersecurityPrivacyPolicyDisclosureStrongPasswordAnonymizationRansomwareVulnerabilityRighttoAccessCloudSecurityEncryptionIntegrationMalwareRight toErasureDataPrivacyNoticeAccessControlRighttorectifyDataStorageRightsof DataSubjectsCybersecurityAwarenessRiskManagementDataSubject

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Breach Notification
  2. Data Minimization
  3. Confidentiality
  4. Data Retention
  5. National Privacy Commission
  6. Data Processor
  7. Data Breach
  8. Right to File a Complaint
  9. Data Recovery
  10. Sensitive Personal Information
  11. Privacy Notice
  12. Lawful Access
  13. Backup
  14. Personal Data
  15. Cyber Attacks
  16. Network Security
  17. Multi-Factor Authentication
  18. Data Processing
  19. Privacy Impact Assessment
  20. Penalties
  21. Firewalls
  22. Data Controller
  23. Containment
  24. Integration
  25. Data Protection Officer
  26. Right to Damages
  27. Identity Theft
  28. Consent
  29. Transparency
  30. Phishing
  31. Rights of Data Subjects
  32. Incident Report
  33. Data Consent
  34. Data Security
  35. Compliance
  36. Cybersecurity
  37. Privacy Policy
  38. Disclosure
  39. Strong Password
  40. Anonymization
  41. Ransomware
  42. Vulnerability
  43. Right to Access
  44. Cloud Security
  45. Encryption
  46. Integration
  47. Malware
  48. Right to Erasure
  49. Data Privacy Notice
  50. Access Control
  51. Right to rectify
  52. Data Storage
  53. Rights of Data Subjects
  54. Cybersecurity Awareness
  55. Risk Management
  56. Data Subject