CloudSecurityCyberAttacksPersonalDataDataMinimizationRiskManagementNetworkSecurityRighttorectifyDataRetentionTransparencyFirewallsBackupComplianceRightsof DataSubjectsRight toErasureDataStorageIncidentReportIdentityTheftDataSubjectRighttoAccessStrongPasswordAccessControlIntegrationVulnerabilityPhishingRansomwareCybersecurityCybersecurityAwarenessDataRecoveryAnonymizationEncryptionConsentDataBreachRight toDamagesPrivacyNoticeDisclosureLawfulAccessDataBreachNotificationPrivacyPolicyPrivacyImpactAssessmentRight toFile aComplaintDataProtectionOfficerSensitivePersonalInformationPenaltiesContainmentDataPrivacyNoticeIntegrationMulti-FactorAuthenticationDataProcessorDataConsentDataControllerDataSecurityNationalPrivacyCommissionDataProcessingConfidentialityMalwareRightsof DataSubjectsCloudSecurityCyberAttacksPersonalDataDataMinimizationRiskManagementNetworkSecurityRighttorectifyDataRetentionTransparencyFirewallsBackupComplianceRightsof DataSubjectsRight toErasureDataStorageIncidentReportIdentityTheftDataSubjectRighttoAccessStrongPasswordAccessControlIntegrationVulnerabilityPhishingRansomwareCybersecurityCybersecurityAwarenessDataRecoveryAnonymizationEncryptionConsentDataBreachRight toDamagesPrivacyNoticeDisclosureLawfulAccessDataBreachNotificationPrivacyPolicyPrivacyImpactAssessmentRight toFile aComplaintDataProtectionOfficerSensitivePersonalInformationPenaltiesContainmentDataPrivacyNoticeIntegrationMulti-FactorAuthenticationDataProcessorDataConsentDataControllerDataSecurityNationalPrivacyCommissionDataProcessingConfidentialityMalwareRightsof DataSubjects

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cloud Security
  2. Cyber Attacks
  3. Personal Data
  4. Data Minimization
  5. Risk Management
  6. Network Security
  7. Right to rectify
  8. Data Retention
  9. Transparency
  10. Firewalls
  11. Backup
  12. Compliance
  13. Rights of Data Subjects
  14. Right to Erasure
  15. Data Storage
  16. Incident Report
  17. Identity Theft
  18. Data Subject
  19. Right to Access
  20. Strong Password
  21. Access Control
  22. Integration
  23. Vulnerability
  24. Phishing
  25. Ransomware
  26. Cybersecurity
  27. Cybersecurity Awareness
  28. Data Recovery
  29. Anonymization
  30. Encryption
  31. Consent
  32. Data Breach
  33. Right to Damages
  34. Privacy Notice
  35. Disclosure
  36. Lawful Access
  37. Data Breach Notification
  38. Privacy Policy
  39. Privacy Impact Assessment
  40. Right to File a Complaint
  41. Data Protection Officer
  42. Sensitive Personal Information
  43. Penalties
  44. Containment
  45. Data Privacy Notice
  46. Integration
  47. Multi-Factor Authentication
  48. Data Processor
  49. Data Consent
  50. Data Controller
  51. Data Security
  52. National Privacy Commission
  53. Data Processing
  54. Confidentiality
  55. Malware
  56. Rights of Data Subjects