IdentityTheftCyberAttacksDataSubjectRighttoAccessPersonalDataComplianceTransparencyDataControllerIncidentReportDataSecurityBackupPrivacyNoticeStrongPasswordAnonymizationCloudSecurityFirewallsLawfulAccessEncryptionConsentPhishingPenaltiesRightsof DataSubjectsRight toDamagesDisclosurePrivacyPolicyIntegrationIntegrationDataConsentRightsof DataSubjectsDataPrivacyNoticeDataMinimizationDataProtectionOfficerRiskManagementDataBreachCybersecuritySensitivePersonalInformationDataBreachNotificationDataRecoveryRight toErasureDataRetentionPrivacyImpactAssessmentVulnerabilityRight toFile aComplaintMalwareCybersecurityAwarenessRighttorectifyDataProcessingRansomwareContainmentAccessControlConfidentialityMulti-FactorAuthenticationDataStorageDataProcessorNationalPrivacyCommissionNetworkSecurityIdentityTheftCyberAttacksDataSubjectRighttoAccessPersonalDataComplianceTransparencyDataControllerIncidentReportDataSecurityBackupPrivacyNoticeStrongPasswordAnonymizationCloudSecurityFirewallsLawfulAccessEncryptionConsentPhishingPenaltiesRightsof DataSubjectsRight toDamagesDisclosurePrivacyPolicyIntegrationIntegrationDataConsentRightsof DataSubjectsDataPrivacyNoticeDataMinimizationDataProtectionOfficerRiskManagementDataBreachCybersecuritySensitivePersonalInformationDataBreachNotificationDataRecoveryRight toErasureDataRetentionPrivacyImpactAssessmentVulnerabilityRight toFile aComplaintMalwareCybersecurityAwarenessRighttorectifyDataProcessingRansomwareContainmentAccessControlConfidentialityMulti-FactorAuthenticationDataStorageDataProcessorNationalPrivacyCommissionNetworkSecurity

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Identity Theft
  2. Cyber Attacks
  3. Data Subject
  4. Right to Access
  5. Personal Data
  6. Compliance
  7. Transparency
  8. Data Controller
  9. Incident Report
  10. Data Security
  11. Backup
  12. Privacy Notice
  13. Strong Password
  14. Anonymization
  15. Cloud Security
  16. Firewalls
  17. Lawful Access
  18. Encryption
  19. Consent
  20. Phishing
  21. Penalties
  22. Rights of Data Subjects
  23. Right to Damages
  24. Disclosure
  25. Privacy Policy
  26. Integration
  27. Integration
  28. Data Consent
  29. Rights of Data Subjects
  30. Data Privacy Notice
  31. Data Minimization
  32. Data Protection Officer
  33. Risk Management
  34. Data Breach
  35. Cybersecurity
  36. Sensitive Personal Information
  37. Data Breach Notification
  38. Data Recovery
  39. Right to Erasure
  40. Data Retention
  41. Privacy Impact Assessment
  42. Vulnerability
  43. Right to File a Complaint
  44. Malware
  45. Cybersecurity Awareness
  46. Right to rectify
  47. Data Processing
  48. Ransomware
  49. Containment
  50. Access Control
  51. Confidentiality
  52. Multi-Factor Authentication
  53. Data Storage
  54. Data Processor
  55. National Privacy Commission
  56. Network Security