Rightsof DataSubjectsLawfulAccessIncidentReportContainmentMalwareEncryptionDataMinimizationTransparencyIdentityTheftPenaltiesDisclosurePrivacyNoticeCybersecurityAwarenessNetworkSecurityRight toErasureRansomwareRiskManagementDataProtectionOfficerRightsof DataSubjectsPersonalDataDataBreachRight toDamagesDataConsentFirewallsConfidentialityDataProcessingDataSubjectPrivacyImpactAssessmentDataBreachNotificationDataStorageAccessControlStrongPasswordCyberAttacksPhishingDataRecoveryDataControllerDataRetentionDataSecurityCybersecurityAnonymizationComplianceRighttorectifyIntegrationRighttoAccessRight toFile aComplaintDataProcessorConsentIntegrationMulti-FactorAuthenticationCloudSecurityVulnerabilityPrivacyPolicyNationalPrivacyCommissionSensitivePersonalInformationDataPrivacyNoticeBackupRightsof DataSubjectsLawfulAccessIncidentReportContainmentMalwareEncryptionDataMinimizationTransparencyIdentityTheftPenaltiesDisclosurePrivacyNoticeCybersecurityAwarenessNetworkSecurityRight toErasureRansomwareRiskManagementDataProtectionOfficerRightsof DataSubjectsPersonalDataDataBreachRight toDamagesDataConsentFirewallsConfidentialityDataProcessingDataSubjectPrivacyImpactAssessmentDataBreachNotificationDataStorageAccessControlStrongPasswordCyberAttacksPhishingDataRecoveryDataControllerDataRetentionDataSecurityCybersecurityAnonymizationComplianceRighttorectifyIntegrationRighttoAccessRight toFile aComplaintDataProcessorConsentIntegrationMulti-FactorAuthenticationCloudSecurityVulnerabilityPrivacyPolicyNationalPrivacyCommissionSensitivePersonalInformationDataPrivacyNoticeBackup

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Rights of Data Subjects
  2. Lawful Access
  3. Incident Report
  4. Containment
  5. Malware
  6. Encryption
  7. Data Minimization
  8. Transparency
  9. Identity Theft
  10. Penalties
  11. Disclosure
  12. Privacy Notice
  13. Cybersecurity Awareness
  14. Network Security
  15. Right to Erasure
  16. Ransomware
  17. Risk Management
  18. Data Protection Officer
  19. Rights of Data Subjects
  20. Personal Data
  21. Data Breach
  22. Right to Damages
  23. Data Consent
  24. Firewalls
  25. Confidentiality
  26. Data Processing
  27. Data Subject
  28. Privacy Impact Assessment
  29. Data Breach Notification
  30. Data Storage
  31. Access Control
  32. Strong Password
  33. Cyber Attacks
  34. Phishing
  35. Data Recovery
  36. Data Controller
  37. Data Retention
  38. Data Security
  39. Cybersecurity
  40. Anonymization
  41. Compliance
  42. Right to rectify
  43. Integration
  44. Right to Access
  45. Right to File a Complaint
  46. Data Processor
  47. Consent
  48. Integration
  49. Multi-Factor Authentication
  50. Cloud Security
  51. Vulnerability
  52. Privacy Policy
  53. National Privacy Commission
  54. Sensitive Personal Information
  55. Data Privacy Notice
  56. Backup