DataPrivacyNoticeDataBreachSensitivePersonalInformationEncryptionRighttorectifyMalwareBackupFirewallsDataSecurityRight toDamagesIntegrationDataBreachNotificationAnonymizationDataProcessingRansomwareIdentityTheftCyberAttacksCybersecurityPrivacyImpactAssessmentPhishingNationalPrivacyCommissionDataSubjectIncidentReportDataRecoveryDataConsentPrivacyPolicyPersonalDataVulnerabilityTransparencyDataProtectionOfficerAccessControlNetworkSecurityRightsof DataSubjectsDataProcessorIntegrationCybersecurityAwarenessContainmentRightsof DataSubjectsDataRetentionDisclosureDataControllerRight toErasureMulti-FactorAuthenticationConsentPenaltiesComplianceRight toFile aComplaintStrongPasswordDataMinimizationRiskManagementLawfulAccessDataStoragePrivacyNoticeCloudSecurityConfidentialityRighttoAccessDataPrivacyNoticeDataBreachSensitivePersonalInformationEncryptionRighttorectifyMalwareBackupFirewallsDataSecurityRight toDamagesIntegrationDataBreachNotificationAnonymizationDataProcessingRansomwareIdentityTheftCyberAttacksCybersecurityPrivacyImpactAssessmentPhishingNationalPrivacyCommissionDataSubjectIncidentReportDataRecoveryDataConsentPrivacyPolicyPersonalDataVulnerabilityTransparencyDataProtectionOfficerAccessControlNetworkSecurityRightsof DataSubjectsDataProcessorIntegrationCybersecurityAwarenessContainmentRightsof DataSubjectsDataRetentionDisclosureDataControllerRight toErasureMulti-FactorAuthenticationConsentPenaltiesComplianceRight toFile aComplaintStrongPasswordDataMinimizationRiskManagementLawfulAccessDataStoragePrivacyNoticeCloudSecurityConfidentialityRighttoAccess

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Privacy Notice
  2. Data Breach
  3. Sensitive Personal Information
  4. Encryption
  5. Right to rectify
  6. Malware
  7. Backup
  8. Firewalls
  9. Data Security
  10. Right to Damages
  11. Integration
  12. Data Breach Notification
  13. Anonymization
  14. Data Processing
  15. Ransomware
  16. Identity Theft
  17. Cyber Attacks
  18. Cybersecurity
  19. Privacy Impact Assessment
  20. Phishing
  21. National Privacy Commission
  22. Data Subject
  23. Incident Report
  24. Data Recovery
  25. Data Consent
  26. Privacy Policy
  27. Personal Data
  28. Vulnerability
  29. Transparency
  30. Data Protection Officer
  31. Access Control
  32. Network Security
  33. Rights of Data Subjects
  34. Data Processor
  35. Integration
  36. Cybersecurity Awareness
  37. Containment
  38. Rights of Data Subjects
  39. Data Retention
  40. Disclosure
  41. Data Controller
  42. Right to Erasure
  43. Multi-Factor Authentication
  44. Consent
  45. Penalties
  46. Compliance
  47. Right to File a Complaint
  48. Strong Password
  49. Data Minimization
  50. Risk Management
  51. Lawful Access
  52. Data Storage
  53. Privacy Notice
  54. Cloud Security
  55. Confidentiality
  56. Right to Access