CybersecurityAwarenessDataBreachRighttoAccessPenaltiesRight toErasureStrongPasswordIntegrationAnonymizationContainmentLawfulAccessDataControllerPhishingCloudSecurityDataProcessorAccessControlDataStorageRightsof DataSubjectsRansomwareMalwareDataRetentionEncryptionDataSubjectMulti-FactorAuthenticationDataRecoveryDataConsentDataBreachNotificationSensitivePersonalInformationVulnerabilityCybersecurityIdentityTheftComplianceNationalPrivacyCommissionConfidentialityRight toDamagesTransparencyPersonalDataNetworkSecurityPrivacyNoticeConsentRiskManagementDataProcessingPrivacyPolicyFirewallsIncidentReportRighttorectifyDataSecurityIntegrationDataMinimizationDataProtectionOfficerDisclosureDataPrivacyNoticeRightsof DataSubjectsCyberAttacksPrivacyImpactAssessmentRight toFile aComplaintBackupCybersecurityAwarenessDataBreachRighttoAccessPenaltiesRight toErasureStrongPasswordIntegrationAnonymizationContainmentLawfulAccessDataControllerPhishingCloudSecurityDataProcessorAccessControlDataStorageRightsof DataSubjectsRansomwareMalwareDataRetentionEncryptionDataSubjectMulti-FactorAuthenticationDataRecoveryDataConsentDataBreachNotificationSensitivePersonalInformationVulnerabilityCybersecurityIdentityTheftComplianceNationalPrivacyCommissionConfidentialityRight toDamagesTransparencyPersonalDataNetworkSecurityPrivacyNoticeConsentRiskManagementDataProcessingPrivacyPolicyFirewallsIncidentReportRighttorectifyDataSecurityIntegrationDataMinimizationDataProtectionOfficerDisclosureDataPrivacyNoticeRightsof DataSubjectsCyberAttacksPrivacyImpactAssessmentRight toFile aComplaintBackup

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cybersecurity Awareness
  2. Data Breach
  3. Right to Access
  4. Penalties
  5. Right to Erasure
  6. Strong Password
  7. Integration
  8. Anonymization
  9. Containment
  10. Lawful Access
  11. Data Controller
  12. Phishing
  13. Cloud Security
  14. Data Processor
  15. Access Control
  16. Data Storage
  17. Rights of Data Subjects
  18. Ransomware
  19. Malware
  20. Data Retention
  21. Encryption
  22. Data Subject
  23. Multi-Factor Authentication
  24. Data Recovery
  25. Data Consent
  26. Data Breach Notification
  27. Sensitive Personal Information
  28. Vulnerability
  29. Cybersecurity
  30. Identity Theft
  31. Compliance
  32. National Privacy Commission
  33. Confidentiality
  34. Right to Damages
  35. Transparency
  36. Personal Data
  37. Network Security
  38. Privacy Notice
  39. Consent
  40. Risk Management
  41. Data Processing
  42. Privacy Policy
  43. Firewalls
  44. Incident Report
  45. Right to rectify
  46. Data Security
  47. Integration
  48. Data Minimization
  49. Data Protection Officer
  50. Disclosure
  51. Data Privacy Notice
  52. Rights of Data Subjects
  53. Cyber Attacks
  54. Privacy Impact Assessment
  55. Right to File a Complaint
  56. Backup