DataProtectionOfficerIdentityTheftLawfulAccessCybersecurityMulti-FactorAuthenticationPenaltiesEncryptionConfidentialityDisclosurePrivacyNoticeAnonymizationRight toDamagesRiskManagementPrivacyPolicyDataSubjectDataBreachCybersecurityAwarenessContainmentComplianceRighttorectifyDataControllerDataSecurityPhishingDataRetentionDataBreachNotificationPrivacyImpactAssessmentDataConsentRight toFile aComplaintIntegrationIncidentReportIntegrationDataProcessorPersonalDataAccessControlDataStorageFirewallsRighttoAccessConsentDataProcessingDataPrivacyNoticeNetworkSecurityVulnerabilityTransparencyDataMinimizationStrongPasswordRansomwareBackupCloudSecurityNationalPrivacyCommissionDataRecoveryRightsof DataSubjectsRight toErasureRightsof DataSubjectsCyberAttacksSensitivePersonalInformationMalwareDataProtectionOfficerIdentityTheftLawfulAccessCybersecurityMulti-FactorAuthenticationPenaltiesEncryptionConfidentialityDisclosurePrivacyNoticeAnonymizationRight toDamagesRiskManagementPrivacyPolicyDataSubjectDataBreachCybersecurityAwarenessContainmentComplianceRighttorectifyDataControllerDataSecurityPhishingDataRetentionDataBreachNotificationPrivacyImpactAssessmentDataConsentRight toFile aComplaintIntegrationIncidentReportIntegrationDataProcessorPersonalDataAccessControlDataStorageFirewallsRighttoAccessConsentDataProcessingDataPrivacyNoticeNetworkSecurityVulnerabilityTransparencyDataMinimizationStrongPasswordRansomwareBackupCloudSecurityNationalPrivacyCommissionDataRecoveryRightsof DataSubjectsRight toErasureRightsof DataSubjectsCyberAttacksSensitivePersonalInformationMalware

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Protection Officer
  2. Identity Theft
  3. Lawful Access
  4. Cybersecurity
  5. Multi-Factor Authentication
  6. Penalties
  7. Encryption
  8. Confidentiality
  9. Disclosure
  10. Privacy Notice
  11. Anonymization
  12. Right to Damages
  13. Risk Management
  14. Privacy Policy
  15. Data Subject
  16. Data Breach
  17. Cybersecurity Awareness
  18. Containment
  19. Compliance
  20. Right to rectify
  21. Data Controller
  22. Data Security
  23. Phishing
  24. Data Retention
  25. Data Breach Notification
  26. Privacy Impact Assessment
  27. Data Consent
  28. Right to File a Complaint
  29. Integration
  30. Incident Report
  31. Integration
  32. Data Processor
  33. Personal Data
  34. Access Control
  35. Data Storage
  36. Firewalls
  37. Right to Access
  38. Consent
  39. Data Processing
  40. Data Privacy Notice
  41. Network Security
  42. Vulnerability
  43. Transparency
  44. Data Minimization
  45. Strong Password
  46. Ransomware
  47. Backup
  48. Cloud Security
  49. National Privacy Commission
  50. Data Recovery
  51. Rights of Data Subjects
  52. Right to Erasure
  53. Rights of Data Subjects
  54. Cyber Attacks
  55. Sensitive Personal Information
  56. Malware