ConsentDataControllerRighttoAccessDataStoragePenaltiesAccessControlNetworkSecurityIntegrationDataBreachNotificationSensitivePersonalInformationIntegrationDataBreachRight toDamagesRight toErasureMulti-FactorAuthenticationCybersecurityAwarenessPhishingStrongPasswordRansomwareDataProcessorPrivacyImpactAssessmentRightsof DataSubjectsMalwareEncryptionConfidentialityDataProtectionOfficerCybersecurityPersonalDataNationalPrivacyCommissionDataRecoveryDataProcessingDataMinimizationDisclosureDataSubjectDataPrivacyNoticeDataConsentRiskManagementPrivacyPolicyBackupContainmentPrivacyNoticeTransparencyDataSecurityRightsof DataSubjectsRight toFile aComplaintRighttorectifyVulnerabilityIdentityTheftCloudSecurityIncidentReportLawfulAccessAnonymizationComplianceFirewallsCyberAttacksDataRetentionConsentDataControllerRighttoAccessDataStoragePenaltiesAccessControlNetworkSecurityIntegrationDataBreachNotificationSensitivePersonalInformationIntegrationDataBreachRight toDamagesRight toErasureMulti-FactorAuthenticationCybersecurityAwarenessPhishingStrongPasswordRansomwareDataProcessorPrivacyImpactAssessmentRightsof DataSubjectsMalwareEncryptionConfidentialityDataProtectionOfficerCybersecurityPersonalDataNationalPrivacyCommissionDataRecoveryDataProcessingDataMinimizationDisclosureDataSubjectDataPrivacyNoticeDataConsentRiskManagementPrivacyPolicyBackupContainmentPrivacyNoticeTransparencyDataSecurityRightsof DataSubjectsRight toFile aComplaintRighttorectifyVulnerabilityIdentityTheftCloudSecurityIncidentReportLawfulAccessAnonymizationComplianceFirewallsCyberAttacksDataRetention

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Consent
  2. Data Controller
  3. Right to Access
  4. Data Storage
  5. Penalties
  6. Access Control
  7. Network Security
  8. Integration
  9. Data Breach Notification
  10. Sensitive Personal Information
  11. Integration
  12. Data Breach
  13. Right to Damages
  14. Right to Erasure
  15. Multi-Factor Authentication
  16. Cybersecurity Awareness
  17. Phishing
  18. Strong Password
  19. Ransomware
  20. Data Processor
  21. Privacy Impact Assessment
  22. Rights of Data Subjects
  23. Malware
  24. Encryption
  25. Confidentiality
  26. Data Protection Officer
  27. Cybersecurity
  28. Personal Data
  29. National Privacy Commission
  30. Data Recovery
  31. Data Processing
  32. Data Minimization
  33. Disclosure
  34. Data Subject
  35. Data Privacy Notice
  36. Data Consent
  37. Risk Management
  38. Privacy Policy
  39. Backup
  40. Containment
  41. Privacy Notice
  42. Transparency
  43. Data Security
  44. Rights of Data Subjects
  45. Right to File a Complaint
  46. Right to rectify
  47. Vulnerability
  48. Identity Theft
  49. Cloud Security
  50. Incident Report
  51. Lawful Access
  52. Anonymization
  53. Compliance
  54. Firewalls
  55. Cyber Attacks
  56. Data Retention