MalwareRiskManagementDataRetentionCyberAttacksDataConsentIncidentReportAnonymizationRansomwareDataControllerCybersecurityRight toErasureDataProcessingDataProtectionOfficerRightsof DataSubjectsIntegrationDataMinimizationPhishingLawfulAccessDataSubjectContainmentFirewallsAccessControlDataBreachNotificationDataStoragePenaltiesPersonalDataStrongPasswordMulti-FactorAuthenticationDataPrivacyNoticeRighttoAccessComplianceEncryptionIntegrationRighttorectifyVulnerabilityNationalPrivacyCommissionCybersecurityAwarenessRight toDamagesSensitivePersonalInformationIdentityTheftDataSecurityCloudSecurityPrivacyPolicyDataBreachConfidentialityNetworkSecurityDataRecoveryConsentPrivacyNoticeRight toFile aComplaintBackupDisclosureDataProcessorTransparencyRightsof DataSubjectsPrivacyImpactAssessmentMalwareRiskManagementDataRetentionCyberAttacksDataConsentIncidentReportAnonymizationRansomwareDataControllerCybersecurityRight toErasureDataProcessingDataProtectionOfficerRightsof DataSubjectsIntegrationDataMinimizationPhishingLawfulAccessDataSubjectContainmentFirewallsAccessControlDataBreachNotificationDataStoragePenaltiesPersonalDataStrongPasswordMulti-FactorAuthenticationDataPrivacyNoticeRighttoAccessComplianceEncryptionIntegrationRighttorectifyVulnerabilityNationalPrivacyCommissionCybersecurityAwarenessRight toDamagesSensitivePersonalInformationIdentityTheftDataSecurityCloudSecurityPrivacyPolicyDataBreachConfidentialityNetworkSecurityDataRecoveryConsentPrivacyNoticeRight toFile aComplaintBackupDisclosureDataProcessorTransparencyRightsof DataSubjectsPrivacyImpactAssessment

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Malware
  2. Risk Management
  3. Data Retention
  4. Cyber Attacks
  5. Data Consent
  6. Incident Report
  7. Anonymization
  8. Ransomware
  9. Data Controller
  10. Cybersecurity
  11. Right to Erasure
  12. Data Processing
  13. Data Protection Officer
  14. Rights of Data Subjects
  15. Integration
  16. Data Minimization
  17. Phishing
  18. Lawful Access
  19. Data Subject
  20. Containment
  21. Firewalls
  22. Access Control
  23. Data Breach Notification
  24. Data Storage
  25. Penalties
  26. Personal Data
  27. Strong Password
  28. Multi-Factor Authentication
  29. Data Privacy Notice
  30. Right to Access
  31. Compliance
  32. Encryption
  33. Integration
  34. Right to rectify
  35. Vulnerability
  36. National Privacy Commission
  37. Cybersecurity Awareness
  38. Right to Damages
  39. Sensitive Personal Information
  40. Identity Theft
  41. Data Security
  42. Cloud Security
  43. Privacy Policy
  44. Data Breach
  45. Confidentiality
  46. Network Security
  47. Data Recovery
  48. Consent
  49. Privacy Notice
  50. Right to File a Complaint
  51. Backup
  52. Disclosure
  53. Data Processor
  54. Transparency
  55. Rights of Data Subjects
  56. Privacy Impact Assessment