RiskManagementRighttorectifyDataConsentDataBreachNotificationDataRecoveryMulti-FactorAuthenticationComplianceDataSecurityFirewallsConfidentialityPrivacyPolicyDataRetentionPersonalDataAccessControlIntegrationMalwarePrivacyImpactAssessmentDataProcessingContainmentRight toErasureDataStorageBackupRansomwarePrivacyNoticeDataSubjectDataProcessorCybersecurityIncidentReportDataProtectionOfficerLawfulAccessCyberAttacksNetworkSecurityRight toFile aComplaintDataBreachRightsof DataSubjectsDataPrivacyNoticeIntegrationCybersecurityAwarenessRightsof DataSubjectsNationalPrivacyCommissionRighttoAccessCloudSecurityRight toDamagesPhishingSensitivePersonalInformationDataControllerDisclosureAnonymizationStrongPasswordTransparencyIdentityTheftPenaltiesVulnerabilityDataMinimizationConsentEncryptionRiskManagementRighttorectifyDataConsentDataBreachNotificationDataRecoveryMulti-FactorAuthenticationComplianceDataSecurityFirewallsConfidentialityPrivacyPolicyDataRetentionPersonalDataAccessControlIntegrationMalwarePrivacyImpactAssessmentDataProcessingContainmentRight toErasureDataStorageBackupRansomwarePrivacyNoticeDataSubjectDataProcessorCybersecurityIncidentReportDataProtectionOfficerLawfulAccessCyberAttacksNetworkSecurityRight toFile aComplaintDataBreachRightsof DataSubjectsDataPrivacyNoticeIntegrationCybersecurityAwarenessRightsof DataSubjectsNationalPrivacyCommissionRighttoAccessCloudSecurityRight toDamagesPhishingSensitivePersonalInformationDataControllerDisclosureAnonymizationStrongPasswordTransparencyIdentityTheftPenaltiesVulnerabilityDataMinimizationConsentEncryption

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Risk Management
  2. Right to rectify
  3. Data Consent
  4. Data Breach Notification
  5. Data Recovery
  6. Multi-Factor Authentication
  7. Compliance
  8. Data Security
  9. Firewalls
  10. Confidentiality
  11. Privacy Policy
  12. Data Retention
  13. Personal Data
  14. Access Control
  15. Integration
  16. Malware
  17. Privacy Impact Assessment
  18. Data Processing
  19. Containment
  20. Right to Erasure
  21. Data Storage
  22. Backup
  23. Ransomware
  24. Privacy Notice
  25. Data Subject
  26. Data Processor
  27. Cybersecurity
  28. Incident Report
  29. Data Protection Officer
  30. Lawful Access
  31. Cyber Attacks
  32. Network Security
  33. Right to File a Complaint
  34. Data Breach
  35. Rights of Data Subjects
  36. Data Privacy Notice
  37. Integration
  38. Cybersecurity Awareness
  39. Rights of Data Subjects
  40. National Privacy Commission
  41. Right to Access
  42. Cloud Security
  43. Right to Damages
  44. Phishing
  45. Sensitive Personal Information
  46. Data Controller
  47. Disclosure
  48. Anonymization
  49. Strong Password
  50. Transparency
  51. Identity Theft
  52. Penalties
  53. Vulnerability
  54. Data Minimization
  55. Consent
  56. Encryption