ConfidentialityMulti-FactorAuthenticationIntegrationAnonymizationPrivacyImpactAssessmentDataSecurityDataBreachNotificationContainmentDisclosureRight toDamagesRightsof DataSubjectsPhishingPrivacyNoticeDataMinimizationDataPrivacyNoticeRight toFile aComplaintAccessControlNationalPrivacyCommissionDataStorageIdentityTheftCybersecurityRiskManagementMalwareDataBreachCybersecurityAwarenessDataControllerPersonalDataDataRetentionCloudSecurityBackupPenaltiesSensitivePersonalInformationFirewallsComplianceRightsof DataSubjectsEncryptionTransparencyDataProcessingDataProcessorPrivacyPolicyDataConsentDataRecoveryRighttorectifyIncidentReportRighttoAccessNetworkSecurityRight toErasureDataSubjectRansomwareDataProtectionOfficerLawfulAccessStrongPasswordIntegrationVulnerabilityCyberAttacksConsentConfidentialityMulti-FactorAuthenticationIntegrationAnonymizationPrivacyImpactAssessmentDataSecurityDataBreachNotificationContainmentDisclosureRight toDamagesRightsof DataSubjectsPhishingPrivacyNoticeDataMinimizationDataPrivacyNoticeRight toFile aComplaintAccessControlNationalPrivacyCommissionDataStorageIdentityTheftCybersecurityRiskManagementMalwareDataBreachCybersecurityAwarenessDataControllerPersonalDataDataRetentionCloudSecurityBackupPenaltiesSensitivePersonalInformationFirewallsComplianceRightsof DataSubjectsEncryptionTransparencyDataProcessingDataProcessorPrivacyPolicyDataConsentDataRecoveryRighttorectifyIncidentReportRighttoAccessNetworkSecurityRight toErasureDataSubjectRansomwareDataProtectionOfficerLawfulAccessStrongPasswordIntegrationVulnerabilityCyberAttacksConsent

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Confidentiality
  2. Multi-Factor Authentication
  3. Integration
  4. Anonymization
  5. Privacy Impact Assessment
  6. Data Security
  7. Data Breach Notification
  8. Containment
  9. Disclosure
  10. Right to Damages
  11. Rights of Data Subjects
  12. Phishing
  13. Privacy Notice
  14. Data Minimization
  15. Data Privacy Notice
  16. Right to File a Complaint
  17. Access Control
  18. National Privacy Commission
  19. Data Storage
  20. Identity Theft
  21. Cybersecurity
  22. Risk Management
  23. Malware
  24. Data Breach
  25. Cybersecurity Awareness
  26. Data Controller
  27. Personal Data
  28. Data Retention
  29. Cloud Security
  30. Backup
  31. Penalties
  32. Sensitive Personal Information
  33. Firewalls
  34. Compliance
  35. Rights of Data Subjects
  36. Encryption
  37. Transparency
  38. Data Processing
  39. Data Processor
  40. Privacy Policy
  41. Data Consent
  42. Data Recovery
  43. Right to rectify
  44. Incident Report
  45. Right to Access
  46. Network Security
  47. Right to Erasure
  48. Data Subject
  49. Ransomware
  50. Data Protection Officer
  51. Lawful Access
  52. Strong Password
  53. Integration
  54. Vulnerability
  55. Cyber Attacks
  56. Consent