Rightsof DataSubjectsNetworkSecurityCybersecurityAwarenessCyberAttacksPrivacyNoticeDataBreachNotificationLawfulAccessConfidentialityDataStorageIntegrationPrivacyImpactAssessmentMulti-FactorAuthenticationPersonalDataDataSecurityRansomwareIdentityTheftDataRecoveryTransparencyCloudSecurityRiskManagementIncidentReportDataControllerCybersecurityDataProtectionOfficerPhishingDisclosureVulnerabilityRight toFile aComplaintPenaltiesDataSubjectContainmentBackupComplianceIntegrationNationalPrivacyCommissionPrivacyPolicyDataProcessorSensitivePersonalInformationAnonymizationDataBreachDataRetentionFirewallsConsentRighttoAccessDataPrivacyNoticeDataConsentDataProcessingRighttorectifyRight toDamagesAccessControlStrongPasswordRight toErasureDataMinimizationRightsof DataSubjectsMalwareEncryptionRightsof DataSubjectsNetworkSecurityCybersecurityAwarenessCyberAttacksPrivacyNoticeDataBreachNotificationLawfulAccessConfidentialityDataStorageIntegrationPrivacyImpactAssessmentMulti-FactorAuthenticationPersonalDataDataSecurityRansomwareIdentityTheftDataRecoveryTransparencyCloudSecurityRiskManagementIncidentReportDataControllerCybersecurityDataProtectionOfficerPhishingDisclosureVulnerabilityRight toFile aComplaintPenaltiesDataSubjectContainmentBackupComplianceIntegrationNationalPrivacyCommissionPrivacyPolicyDataProcessorSensitivePersonalInformationAnonymizationDataBreachDataRetentionFirewallsConsentRighttoAccessDataPrivacyNoticeDataConsentDataProcessingRighttorectifyRight toDamagesAccessControlStrongPasswordRight toErasureDataMinimizationRightsof DataSubjectsMalwareEncryption

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Rights of Data Subjects
  2. Network Security
  3. Cybersecurity Awareness
  4. Cyber Attacks
  5. Privacy Notice
  6. Data Breach Notification
  7. Lawful Access
  8. Confidentiality
  9. Data Storage
  10. Integration
  11. Privacy Impact Assessment
  12. Multi-Factor Authentication
  13. Personal Data
  14. Data Security
  15. Ransomware
  16. Identity Theft
  17. Data Recovery
  18. Transparency
  19. Cloud Security
  20. Risk Management
  21. Incident Report
  22. Data Controller
  23. Cybersecurity
  24. Data Protection Officer
  25. Phishing
  26. Disclosure
  27. Vulnerability
  28. Right to File a Complaint
  29. Penalties
  30. Data Subject
  31. Containment
  32. Backup
  33. Compliance
  34. Integration
  35. National Privacy Commission
  36. Privacy Policy
  37. Data Processor
  38. Sensitive Personal Information
  39. Anonymization
  40. Data Breach
  41. Data Retention
  42. Firewalls
  43. Consent
  44. Right to Access
  45. Data Privacy Notice
  46. Data Consent
  47. Data Processing
  48. Right to rectify
  49. Right to Damages
  50. Access Control
  51. Strong Password
  52. Right to Erasure
  53. Data Minimization
  54. Rights of Data Subjects
  55. Malware
  56. Encryption