IntegrationPenaltiesRight toDamagesConsentDataConsentLawfulAccessDataBreachCyberAttacksDataPrivacyNoticeRiskManagementDataSecurityStrongPasswordPrivacyNoticeTransparencyRight toFile aComplaintMulti-FactorAuthenticationDataRetentionSensitivePersonalInformationDataProcessingRight toErasureRightsof DataSubjectsComplianceRansomwareDataStorageFirewallsPhishingCybersecurityAwarenessNationalPrivacyCommissionAnonymizationVulnerabilityBackupDataMinimizationRighttorectifyNetworkSecurityDisclosureDataBreachNotificationCloudSecurityDataRecoveryPrivacyImpactAssessmentDataProcessorConfidentialityIncidentReportDataProtectionOfficerAccessControlDataSubjectRighttoAccessCybersecurityEncryptionIntegrationRightsof DataSubjectsIdentityTheftPrivacyPolicyContainmentMalwarePersonalDataDataControllerIntegrationPenaltiesRight toDamagesConsentDataConsentLawfulAccessDataBreachCyberAttacksDataPrivacyNoticeRiskManagementDataSecurityStrongPasswordPrivacyNoticeTransparencyRight toFile aComplaintMulti-FactorAuthenticationDataRetentionSensitivePersonalInformationDataProcessingRight toErasureRightsof DataSubjectsComplianceRansomwareDataStorageFirewallsPhishingCybersecurityAwarenessNationalPrivacyCommissionAnonymizationVulnerabilityBackupDataMinimizationRighttorectifyNetworkSecurityDisclosureDataBreachNotificationCloudSecurityDataRecoveryPrivacyImpactAssessmentDataProcessorConfidentialityIncidentReportDataProtectionOfficerAccessControlDataSubjectRighttoAccessCybersecurityEncryptionIntegrationRightsof DataSubjectsIdentityTheftPrivacyPolicyContainmentMalwarePersonalDataDataController

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Integration
  2. Penalties
  3. Right to Damages
  4. Consent
  5. Data Consent
  6. Lawful Access
  7. Data Breach
  8. Cyber Attacks
  9. Data Privacy Notice
  10. Risk Management
  11. Data Security
  12. Strong Password
  13. Privacy Notice
  14. Transparency
  15. Right to File a Complaint
  16. Multi-Factor Authentication
  17. Data Retention
  18. Sensitive Personal Information
  19. Data Processing
  20. Right to Erasure
  21. Rights of Data Subjects
  22. Compliance
  23. Ransomware
  24. Data Storage
  25. Firewalls
  26. Phishing
  27. Cybersecurity Awareness
  28. National Privacy Commission
  29. Anonymization
  30. Vulnerability
  31. Backup
  32. Data Minimization
  33. Right to rectify
  34. Network Security
  35. Disclosure
  36. Data Breach Notification
  37. Cloud Security
  38. Data Recovery
  39. Privacy Impact Assessment
  40. Data Processor
  41. Confidentiality
  42. Incident Report
  43. Data Protection Officer
  44. Access Control
  45. Data Subject
  46. Right to Access
  47. Cybersecurity
  48. Encryption
  49. Integration
  50. Rights of Data Subjects
  51. Identity Theft
  52. Privacy Policy
  53. Containment
  54. Malware
  55. Personal Data
  56. Data Controller