DataMinimizationIntegrationRighttoAccessDataRetentionIdentityTheftBackupPrivacyNoticeRansomwareTransparencyDataStorageDataProcessingMalwareCyberAttacksDataBreachIntegrationDataConsentEncryptionAccessControlDataBreachNotificationNationalPrivacyCommissionRiskManagementRightsof DataSubjectsRight toDamagesPrivacyPolicyRightsof DataSubjectsVulnerabilityComplianceIncidentReportPhishingConsentDataSecurityNetworkSecurityCloudSecurityFirewallsConfidentialityStrongPasswordDataProcessorRight toFile aComplaintContainmentRighttorectifyCybersecurityDataSubjectSensitivePersonalInformationAnonymizationRight toErasureDataControllerDisclosureLawfulAccessCybersecurityAwarenessDataPrivacyNoticeDataRecoveryMulti-FactorAuthenticationPenaltiesPrivacyImpactAssessmentDataProtectionOfficerPersonalDataDataMinimizationIntegrationRighttoAccessDataRetentionIdentityTheftBackupPrivacyNoticeRansomwareTransparencyDataStorageDataProcessingMalwareCyberAttacksDataBreachIntegrationDataConsentEncryptionAccessControlDataBreachNotificationNationalPrivacyCommissionRiskManagementRightsof DataSubjectsRight toDamagesPrivacyPolicyRightsof DataSubjectsVulnerabilityComplianceIncidentReportPhishingConsentDataSecurityNetworkSecurityCloudSecurityFirewallsConfidentialityStrongPasswordDataProcessorRight toFile aComplaintContainmentRighttorectifyCybersecurityDataSubjectSensitivePersonalInformationAnonymizationRight toErasureDataControllerDisclosureLawfulAccessCybersecurityAwarenessDataPrivacyNoticeDataRecoveryMulti-FactorAuthenticationPenaltiesPrivacyImpactAssessmentDataProtectionOfficerPersonalData

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Minimization
  2. Integration
  3. Right to Access
  4. Data Retention
  5. Identity Theft
  6. Backup
  7. Privacy Notice
  8. Ransomware
  9. Transparency
  10. Data Storage
  11. Data Processing
  12. Malware
  13. Cyber Attacks
  14. Data Breach
  15. Integration
  16. Data Consent
  17. Encryption
  18. Access Control
  19. Data Breach Notification
  20. National Privacy Commission
  21. Risk Management
  22. Rights of Data Subjects
  23. Right to Damages
  24. Privacy Policy
  25. Rights of Data Subjects
  26. Vulnerability
  27. Compliance
  28. Incident Report
  29. Phishing
  30. Consent
  31. Data Security
  32. Network Security
  33. Cloud Security
  34. Firewalls
  35. Confidentiality
  36. Strong Password
  37. Data Processor
  38. Right to File a Complaint
  39. Containment
  40. Right to rectify
  41. Cybersecurity
  42. Data Subject
  43. Sensitive Personal Information
  44. Anonymization
  45. Right to Erasure
  46. Data Controller
  47. Disclosure
  48. Lawful Access
  49. Cybersecurity Awareness
  50. Data Privacy Notice
  51. Data Recovery
  52. Multi-Factor Authentication
  53. Penalties
  54. Privacy Impact Assessment
  55. Data Protection Officer
  56. Personal Data