EncryptionDataBreachContainmentDisclosureTransparencyNationalPrivacyCommissionDataRetentionDataSubjectIntegrationIncidentReportDataControllerDataRecoveryPhishingCybersecurityAwarenessRightsof DataSubjectsAnonymizationRansomwareDataProcessingRight toErasureConfidentialityBackupRight toDamagesDataSecurityLawfulAccessRightsof DataSubjectsNetworkSecurityMulti-FactorAuthenticationPenaltiesMalwarePrivacyNoticeDataProtectionOfficerDataProcessorVulnerabilityFirewallsCloudSecurityIdentityTheftRighttoAccessComplianceRighttorectifyCybersecurityDataMinimizationConsentDataPrivacyNoticeIntegrationRight toFile aComplaintCyberAttacksPrivacyPolicyPrivacyImpactAssessmentDataStoragePersonalDataRiskManagementAccessControlDataBreachNotificationStrongPasswordDataConsentSensitivePersonalInformationEncryptionDataBreachContainmentDisclosureTransparencyNationalPrivacyCommissionDataRetentionDataSubjectIntegrationIncidentReportDataControllerDataRecoveryPhishingCybersecurityAwarenessRightsof DataSubjectsAnonymizationRansomwareDataProcessingRight toErasureConfidentialityBackupRight toDamagesDataSecurityLawfulAccessRightsof DataSubjectsNetworkSecurityMulti-FactorAuthenticationPenaltiesMalwarePrivacyNoticeDataProtectionOfficerDataProcessorVulnerabilityFirewallsCloudSecurityIdentityTheftRighttoAccessComplianceRighttorectifyCybersecurityDataMinimizationConsentDataPrivacyNoticeIntegrationRight toFile aComplaintCyberAttacksPrivacyPolicyPrivacyImpactAssessmentDataStoragePersonalDataRiskManagementAccessControlDataBreachNotificationStrongPasswordDataConsentSensitivePersonalInformation

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Encryption
  2. Data Breach
  3. Containment
  4. Disclosure
  5. Transparency
  6. National Privacy Commission
  7. Data Retention
  8. Data Subject
  9. Integration
  10. Incident Report
  11. Data Controller
  12. Data Recovery
  13. Phishing
  14. Cybersecurity Awareness
  15. Rights of Data Subjects
  16. Anonymization
  17. Ransomware
  18. Data Processing
  19. Right to Erasure
  20. Confidentiality
  21. Backup
  22. Right to Damages
  23. Data Security
  24. Lawful Access
  25. Rights of Data Subjects
  26. Network Security
  27. Multi-Factor Authentication
  28. Penalties
  29. Malware
  30. Privacy Notice
  31. Data Protection Officer
  32. Data Processor
  33. Vulnerability
  34. Firewalls
  35. Cloud Security
  36. Identity Theft
  37. Right to Access
  38. Compliance
  39. Right to rectify
  40. Cybersecurity
  41. Data Minimization
  42. Consent
  43. Data Privacy Notice
  44. Integration
  45. Right to File a Complaint
  46. Cyber Attacks
  47. Privacy Policy
  48. Privacy Impact Assessment
  49. Data Storage
  50. Personal Data
  51. Risk Management
  52. Access Control
  53. Data Breach Notification
  54. Strong Password
  55. Data Consent
  56. Sensitive Personal Information