CybersecurityAnonymizationIntegrationPrivacyImpactAssessmentDataBreachNotificationDataProcessorRansomwareDataProcessingRight toErasureTransparencyEncryptionDisclosureIncidentReportConsentDataRecoveryPhishingComplianceLawfulAccessBackupRightsof DataSubjectsContainmentNationalPrivacyCommissionDataMinimizationDataProtectionOfficerNetworkSecurityDataStorageRightsof DataSubjectsDataPrivacyNoticeDataSecurityRiskManagementDataConsentMalwarePrivacyPolicyPrivacyNoticeCybersecurityAwarenessDataBreachStrongPasswordDataRetentionRight toDamagesDataSubjectVulnerabilityRighttorectifyCyberAttacksIdentityTheftRight toFile aComplaintMulti-FactorAuthenticationAccessControlIntegrationRighttoAccessPersonalDataConfidentialityCloudSecurityFirewallsDataControllerSensitivePersonalInformationPenaltiesCybersecurityAnonymizationIntegrationPrivacyImpactAssessmentDataBreachNotificationDataProcessorRansomwareDataProcessingRight toErasureTransparencyEncryptionDisclosureIncidentReportConsentDataRecoveryPhishingComplianceLawfulAccessBackupRightsof DataSubjectsContainmentNationalPrivacyCommissionDataMinimizationDataProtectionOfficerNetworkSecurityDataStorageRightsof DataSubjectsDataPrivacyNoticeDataSecurityRiskManagementDataConsentMalwarePrivacyPolicyPrivacyNoticeCybersecurityAwarenessDataBreachStrongPasswordDataRetentionRight toDamagesDataSubjectVulnerabilityRighttorectifyCyberAttacksIdentityTheftRight toFile aComplaintMulti-FactorAuthenticationAccessControlIntegrationRighttoAccessPersonalDataConfidentialityCloudSecurityFirewallsDataControllerSensitivePersonalInformationPenalties

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cybersecurity
  2. Anonymization
  3. Integration
  4. Privacy Impact Assessment
  5. Data Breach Notification
  6. Data Processor
  7. Ransomware
  8. Data Processing
  9. Right to Erasure
  10. Transparency
  11. Encryption
  12. Disclosure
  13. Incident Report
  14. Consent
  15. Data Recovery
  16. Phishing
  17. Compliance
  18. Lawful Access
  19. Backup
  20. Rights of Data Subjects
  21. Containment
  22. National Privacy Commission
  23. Data Minimization
  24. Data Protection Officer
  25. Network Security
  26. Data Storage
  27. Rights of Data Subjects
  28. Data Privacy Notice
  29. Data Security
  30. Risk Management
  31. Data Consent
  32. Malware
  33. Privacy Policy
  34. Privacy Notice
  35. Cybersecurity Awareness
  36. Data Breach
  37. Strong Password
  38. Data Retention
  39. Right to Damages
  40. Data Subject
  41. Vulnerability
  42. Right to rectify
  43. Cyber Attacks
  44. Identity Theft
  45. Right to File a Complaint
  46. Multi-Factor Authentication
  47. Access Control
  48. Integration
  49. Right to Access
  50. Personal Data
  51. Confidentiality
  52. Cloud Security
  53. Firewalls
  54. Data Controller
  55. Sensitive Personal Information
  56. Penalties