DataBreachFirewallsNationalPrivacyCommissionSensitivePersonalInformationPhishingCloudSecurityDataBreachNotificationDataRetentionContainmentDataProcessorRightsof DataSubjectsIntegrationDisclosureVulnerabilityIntegrationDataSecurityRighttoAccessCybersecurityConsentMalwareRight toErasureDataSubjectDataPrivacyNoticeRansomwarePrivacyNoticePrivacyImpactAssessmentMulti-FactorAuthenticationPersonalDataStrongPasswordDataControllerBackupDataStoragePenaltiesEncryptionRightsof DataSubjectsComplianceDataProcessingPrivacyPolicyAnonymizationNetworkSecurityConfidentialityDataRecoveryDataConsentAccessControlRight toFile aComplaintDataProtectionOfficerCybersecurityAwarenessRight toDamagesCyberAttacksTransparencyLawfulAccessDataMinimizationIdentityTheftIncidentReportRighttorectifyRiskManagementDataBreachFirewallsNationalPrivacyCommissionSensitivePersonalInformationPhishingCloudSecurityDataBreachNotificationDataRetentionContainmentDataProcessorRightsof DataSubjectsIntegrationDisclosureVulnerabilityIntegrationDataSecurityRighttoAccessCybersecurityConsentMalwareRight toErasureDataSubjectDataPrivacyNoticeRansomwarePrivacyNoticePrivacyImpactAssessmentMulti-FactorAuthenticationPersonalDataStrongPasswordDataControllerBackupDataStoragePenaltiesEncryptionRightsof DataSubjectsComplianceDataProcessingPrivacyPolicyAnonymizationNetworkSecurityConfidentialityDataRecoveryDataConsentAccessControlRight toFile aComplaintDataProtectionOfficerCybersecurityAwarenessRight toDamagesCyberAttacksTransparencyLawfulAccessDataMinimizationIdentityTheftIncidentReportRighttorectifyRiskManagement

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Breach
  2. Firewalls
  3. National Privacy Commission
  4. Sensitive Personal Information
  5. Phishing
  6. Cloud Security
  7. Data Breach Notification
  8. Data Retention
  9. Containment
  10. Data Processor
  11. Rights of Data Subjects
  12. Integration
  13. Disclosure
  14. Vulnerability
  15. Integration
  16. Data Security
  17. Right to Access
  18. Cybersecurity
  19. Consent
  20. Malware
  21. Right to Erasure
  22. Data Subject
  23. Data Privacy Notice
  24. Ransomware
  25. Privacy Notice
  26. Privacy Impact Assessment
  27. Multi-Factor Authentication
  28. Personal Data
  29. Strong Password
  30. Data Controller
  31. Backup
  32. Data Storage
  33. Penalties
  34. Encryption
  35. Rights of Data Subjects
  36. Compliance
  37. Data Processing
  38. Privacy Policy
  39. Anonymization
  40. Network Security
  41. Confidentiality
  42. Data Recovery
  43. Data Consent
  44. Access Control
  45. Right to File a Complaint
  46. Data Protection Officer
  47. Cybersecurity Awareness
  48. Right to Damages
  49. Cyber Attacks
  50. Transparency
  51. Lawful Access
  52. Data Minimization
  53. Identity Theft
  54. Incident Report
  55. Right to rectify
  56. Risk Management