EncryptionCybersecurityAnonymizationConsentRight toErasureRight toDamagesMalwareRight toFile aComplaintCyberAttacksDataProtectionOfficerIntegrationRightsof DataSubjectsRightsof DataSubjectsPrivacyPolicyIntegrationPhishingSensitivePersonalInformationDataSubjectIdentityTheftDataRecoveryDataBreachNotificationConfidentialityPersonalDataDataMinimizationRighttorectifyDataProcessorCybersecurityAwarenessIncidentReportDataStorageDataRetentionDisclosureContainmentDataSecurityVulnerabilityMulti-FactorAuthenticationNetworkSecurityLawfulAccessPrivacyImpactAssessmentPrivacyNoticeRansomwareBackupDataConsentNationalPrivacyCommissionAccessControlFirewallsComplianceStrongPasswordDataPrivacyNoticeDataBreachRiskManagementDataControllerCloudSecurityRighttoAccessTransparencyDataProcessingPenaltiesEncryptionCybersecurityAnonymizationConsentRight toErasureRight toDamagesMalwareRight toFile aComplaintCyberAttacksDataProtectionOfficerIntegrationRightsof DataSubjectsRightsof DataSubjectsPrivacyPolicyIntegrationPhishingSensitivePersonalInformationDataSubjectIdentityTheftDataRecoveryDataBreachNotificationConfidentialityPersonalDataDataMinimizationRighttorectifyDataProcessorCybersecurityAwarenessIncidentReportDataStorageDataRetentionDisclosureContainmentDataSecurityVulnerabilityMulti-FactorAuthenticationNetworkSecurityLawfulAccessPrivacyImpactAssessmentPrivacyNoticeRansomwareBackupDataConsentNationalPrivacyCommissionAccessControlFirewallsComplianceStrongPasswordDataPrivacyNoticeDataBreachRiskManagementDataControllerCloudSecurityRighttoAccessTransparencyDataProcessingPenalties

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Encryption
  2. Cybersecurity
  3. Anonymization
  4. Consent
  5. Right to Erasure
  6. Right to Damages
  7. Malware
  8. Right to File a Complaint
  9. Cyber Attacks
  10. Data Protection Officer
  11. Integration
  12. Rights of Data Subjects
  13. Rights of Data Subjects
  14. Privacy Policy
  15. Integration
  16. Phishing
  17. Sensitive Personal Information
  18. Data Subject
  19. Identity Theft
  20. Data Recovery
  21. Data Breach Notification
  22. Confidentiality
  23. Personal Data
  24. Data Minimization
  25. Right to rectify
  26. Data Processor
  27. Cybersecurity Awareness
  28. Incident Report
  29. Data Storage
  30. Data Retention
  31. Disclosure
  32. Containment
  33. Data Security
  34. Vulnerability
  35. Multi-Factor Authentication
  36. Network Security
  37. Lawful Access
  38. Privacy Impact Assessment
  39. Privacy Notice
  40. Ransomware
  41. Backup
  42. Data Consent
  43. National Privacy Commission
  44. Access Control
  45. Firewalls
  46. Compliance
  47. Strong Password
  48. Data Privacy Notice
  49. Data Breach
  50. Risk Management
  51. Data Controller
  52. Cloud Security
  53. Right to Access
  54. Transparency
  55. Data Processing
  56. Penalties