EncryptionRighttorectifyNationalPrivacyCommissionConsentNetworkSecurityDataRetentionCybersecurityPrivacyPolicyAccessControlSensitivePersonalInformationMalwareIncidentReportCyberAttacksStrongPasswordConfidentialityCybersecurityAwarenessPersonalDataIntegrationRight toDamagesLawfulAccessPrivacyImpactAssessmentDataBreachNotificationDataMinimizationDataControllerDataSubjectCloudSecurityPhishingDataProtectionOfficerFirewallsPenaltiesDataBreachDisclosureDataRecoveryRiskManagementRansomwareRightsof DataSubjectsRight toErasureTransparencyBackupRight toFile aComplaintVulnerabilityRighttoAccessDataProcessingRightsof DataSubjectsDataProcessorIntegrationDataPrivacyNoticeMulti-FactorAuthenticationContainmentDataSecurityPrivacyNoticeAnonymizationDataStorageIdentityTheftDataConsentComplianceEncryptionRighttorectifyNationalPrivacyCommissionConsentNetworkSecurityDataRetentionCybersecurityPrivacyPolicyAccessControlSensitivePersonalInformationMalwareIncidentReportCyberAttacksStrongPasswordConfidentialityCybersecurityAwarenessPersonalDataIntegrationRight toDamagesLawfulAccessPrivacyImpactAssessmentDataBreachNotificationDataMinimizationDataControllerDataSubjectCloudSecurityPhishingDataProtectionOfficerFirewallsPenaltiesDataBreachDisclosureDataRecoveryRiskManagementRansomwareRightsof DataSubjectsRight toErasureTransparencyBackupRight toFile aComplaintVulnerabilityRighttoAccessDataProcessingRightsof DataSubjectsDataProcessorIntegrationDataPrivacyNoticeMulti-FactorAuthenticationContainmentDataSecurityPrivacyNoticeAnonymizationDataStorageIdentityTheftDataConsentCompliance

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Encryption
  2. Right to rectify
  3. National Privacy Commission
  4. Consent
  5. Network Security
  6. Data Retention
  7. Cybersecurity
  8. Privacy Policy
  9. Access Control
  10. Sensitive Personal Information
  11. Malware
  12. Incident Report
  13. Cyber Attacks
  14. Strong Password
  15. Confidentiality
  16. Cybersecurity Awareness
  17. Personal Data
  18. Integration
  19. Right to Damages
  20. Lawful Access
  21. Privacy Impact Assessment
  22. Data Breach Notification
  23. Data Minimization
  24. Data Controller
  25. Data Subject
  26. Cloud Security
  27. Phishing
  28. Data Protection Officer
  29. Firewalls
  30. Penalties
  31. Data Breach
  32. Disclosure
  33. Data Recovery
  34. Risk Management
  35. Ransomware
  36. Rights of Data Subjects
  37. Right to Erasure
  38. Transparency
  39. Backup
  40. Right to File a Complaint
  41. Vulnerability
  42. Right to Access
  43. Data Processing
  44. Rights of Data Subjects
  45. Data Processor
  46. Integration
  47. Data Privacy Notice
  48. Multi-Factor Authentication
  49. Containment
  50. Data Security
  51. Privacy Notice
  52. Anonymization
  53. Data Storage
  54. Identity Theft
  55. Data Consent
  56. Compliance