TransparencyRight toDamagesPrivacyPolicyRightsof DataSubjectsDisclosureDataRecoveryNetworkSecurityEncryptionDataPrivacyNoticeDataConsentConfidentialitySensitivePersonalInformationRightsof DataSubjectsConsentRight toErasureDataStorageDataSecurityDataProtectionOfficerContainmentRansomwareRighttorectifyCloudSecurityVulnerabilityDataBreachNotificationDataControllerDataRetentionFirewallsComplianceStrongPasswordDataBreachMalwareCybersecurityAwarenessDataMinimizationCyberAttacksDataProcessingIdentityTheftAnonymizationIncidentReportRight toFile aComplaintLawfulAccessCybersecurityRighttoAccessIntegrationMulti-FactorAuthenticationPersonalDataPrivacyImpactAssessmentDataProcessorIntegrationRiskManagementAccessControlPrivacyNoticeBackupDataSubjectPenaltiesNationalPrivacyCommissionPhishingTransparencyRight toDamagesPrivacyPolicyRightsof DataSubjectsDisclosureDataRecoveryNetworkSecurityEncryptionDataPrivacyNoticeDataConsentConfidentialitySensitivePersonalInformationRightsof DataSubjectsConsentRight toErasureDataStorageDataSecurityDataProtectionOfficerContainmentRansomwareRighttorectifyCloudSecurityVulnerabilityDataBreachNotificationDataControllerDataRetentionFirewallsComplianceStrongPasswordDataBreachMalwareCybersecurityAwarenessDataMinimizationCyberAttacksDataProcessingIdentityTheftAnonymizationIncidentReportRight toFile aComplaintLawfulAccessCybersecurityRighttoAccessIntegrationMulti-FactorAuthenticationPersonalDataPrivacyImpactAssessmentDataProcessorIntegrationRiskManagementAccessControlPrivacyNoticeBackupDataSubjectPenaltiesNationalPrivacyCommissionPhishing

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Transparency
  2. Right to Damages
  3. Privacy Policy
  4. Rights of Data Subjects
  5. Disclosure
  6. Data Recovery
  7. Network Security
  8. Encryption
  9. Data Privacy Notice
  10. Data Consent
  11. Confidentiality
  12. Sensitive Personal Information
  13. Rights of Data Subjects
  14. Consent
  15. Right to Erasure
  16. Data Storage
  17. Data Security
  18. Data Protection Officer
  19. Containment
  20. Ransomware
  21. Right to rectify
  22. Cloud Security
  23. Vulnerability
  24. Data Breach Notification
  25. Data Controller
  26. Data Retention
  27. Firewalls
  28. Compliance
  29. Strong Password
  30. Data Breach
  31. Malware
  32. Cybersecurity Awareness
  33. Data Minimization
  34. Cyber Attacks
  35. Data Processing
  36. Identity Theft
  37. Anonymization
  38. Incident Report
  39. Right to File a Complaint
  40. Lawful Access
  41. Cybersecurity
  42. Right to Access
  43. Integration
  44. Multi-Factor Authentication
  45. Personal Data
  46. Privacy Impact Assessment
  47. Data Processor
  48. Integration
  49. Risk Management
  50. Access Control
  51. Privacy Notice
  52. Backup
  53. Data Subject
  54. Penalties
  55. National Privacy Commission
  56. Phishing