BackupRightsof DataSubjectsDisclosurePrivacyImpactAssessmentDataProcessorDataBreachRighttoAccessVulnerabilityRight toErasureConsentTransparencyRighttorectifyCybersecurityAwarenessIntegrationAnonymizationRansomwareStrongPasswordIncidentReportDataProtectionOfficerDataRetentionDataConsentAccessControlRightsof DataSubjectsRiskManagementMulti-FactorAuthenticationDataPrivacyNoticeDataProcessingDataRecoveryCloudSecurityIntegrationRight toDamagesDataMinimizationPersonalDataPrivacyNoticeComplianceNetworkSecurityEncryptionDataSecurityDataStorageCyberAttacksContainmentFirewallsConfidentialityLawfulAccessSensitivePersonalInformationNationalPrivacyCommissionDataControllerCybersecurityRight toFile aComplaintPrivacyPolicyPenaltiesMalwareDataSubjectPhishingIdentityTheftDataBreachNotificationBackupRightsof DataSubjectsDisclosurePrivacyImpactAssessmentDataProcessorDataBreachRighttoAccessVulnerabilityRight toErasureConsentTransparencyRighttorectifyCybersecurityAwarenessIntegrationAnonymizationRansomwareStrongPasswordIncidentReportDataProtectionOfficerDataRetentionDataConsentAccessControlRightsof DataSubjectsRiskManagementMulti-FactorAuthenticationDataPrivacyNoticeDataProcessingDataRecoveryCloudSecurityIntegrationRight toDamagesDataMinimizationPersonalDataPrivacyNoticeComplianceNetworkSecurityEncryptionDataSecurityDataStorageCyberAttacksContainmentFirewallsConfidentialityLawfulAccessSensitivePersonalInformationNationalPrivacyCommissionDataControllerCybersecurityRight toFile aComplaintPrivacyPolicyPenaltiesMalwareDataSubjectPhishingIdentityTheftDataBreachNotification

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Backup
  2. Rights of Data Subjects
  3. Disclosure
  4. Privacy Impact Assessment
  5. Data Processor
  6. Data Breach
  7. Right to Access
  8. Vulnerability
  9. Right to Erasure
  10. Consent
  11. Transparency
  12. Right to rectify
  13. Cybersecurity Awareness
  14. Integration
  15. Anonymization
  16. Ransomware
  17. Strong Password
  18. Incident Report
  19. Data Protection Officer
  20. Data Retention
  21. Data Consent
  22. Access Control
  23. Rights of Data Subjects
  24. Risk Management
  25. Multi-Factor Authentication
  26. Data Privacy Notice
  27. Data Processing
  28. Data Recovery
  29. Cloud Security
  30. Integration
  31. Right to Damages
  32. Data Minimization
  33. Personal Data
  34. Privacy Notice
  35. Compliance
  36. Network Security
  37. Encryption
  38. Data Security
  39. Data Storage
  40. Cyber Attacks
  41. Containment
  42. Firewalls
  43. Confidentiality
  44. Lawful Access
  45. Sensitive Personal Information
  46. National Privacy Commission
  47. Data Controller
  48. Cybersecurity
  49. Right to File a Complaint
  50. Privacy Policy
  51. Penalties
  52. Malware
  53. Data Subject
  54. Phishing
  55. Identity Theft
  56. Data Breach Notification