DataBreachPrivacyImpactAssessmentDataProcessorCyberAttacksIntegrationDataProcessingBackupConsentConfidentialityAccessControlVulnerabilityMalwareIdentityTheftIntegrationTransparencyDataControllerRightsof DataSubjectsCybersecurityAwarenessRighttoAccessDataSecurityDataRecoveryLawfulAccessDataMinimizationDisclosureDataRetentionDataPrivacyNoticePrivacyPolicyIncidentReportNationalPrivacyCommissionRight toFile aComplaintDataProtectionOfficerCybersecurityPenaltiesRightsof DataSubjectsAnonymizationComplianceEncryptionPrivacyNoticeMulti-FactorAuthenticationStrongPasswordPhishingNetworkSecurityRansomwareDataStorageDataConsentContainmentRight toDamagesSensitivePersonalInformationCloudSecurityRiskManagementDataSubjectRight toErasureRighttorectifyDataBreachNotificationFirewallsPersonalDataDataBreachPrivacyImpactAssessmentDataProcessorCyberAttacksIntegrationDataProcessingBackupConsentConfidentialityAccessControlVulnerabilityMalwareIdentityTheftIntegrationTransparencyDataControllerRightsof DataSubjectsCybersecurityAwarenessRighttoAccessDataSecurityDataRecoveryLawfulAccessDataMinimizationDisclosureDataRetentionDataPrivacyNoticePrivacyPolicyIncidentReportNationalPrivacyCommissionRight toFile aComplaintDataProtectionOfficerCybersecurityPenaltiesRightsof DataSubjectsAnonymizationComplianceEncryptionPrivacyNoticeMulti-FactorAuthenticationStrongPasswordPhishingNetworkSecurityRansomwareDataStorageDataConsentContainmentRight toDamagesSensitivePersonalInformationCloudSecurityRiskManagementDataSubjectRight toErasureRighttorectifyDataBreachNotificationFirewallsPersonalData

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Breach
  2. Privacy Impact Assessment
  3. Data Processor
  4. Cyber Attacks
  5. Integration
  6. Data Processing
  7. Backup
  8. Consent
  9. Confidentiality
  10. Access Control
  11. Vulnerability
  12. Malware
  13. Identity Theft
  14. Integration
  15. Transparency
  16. Data Controller
  17. Rights of Data Subjects
  18. Cybersecurity Awareness
  19. Right to Access
  20. Data Security
  21. Data Recovery
  22. Lawful Access
  23. Data Minimization
  24. Disclosure
  25. Data Retention
  26. Data Privacy Notice
  27. Privacy Policy
  28. Incident Report
  29. National Privacy Commission
  30. Right to File a Complaint
  31. Data Protection Officer
  32. Cybersecurity
  33. Penalties
  34. Rights of Data Subjects
  35. Anonymization
  36. Compliance
  37. Encryption
  38. Privacy Notice
  39. Multi-Factor Authentication
  40. Strong Password
  41. Phishing
  42. Network Security
  43. Ransomware
  44. Data Storage
  45. Data Consent
  46. Containment
  47. Right to Damages
  48. Sensitive Personal Information
  49. Cloud Security
  50. Risk Management
  51. Data Subject
  52. Right to Erasure
  53. Right to rectify
  54. Data Breach Notification
  55. Firewalls
  56. Personal Data