FirewallsRighttorectifyIncidentReportRight toFile aComplaintVulnerabilityPrivacyPolicyTransparencyBackupRight toErasureLawfulAccessRightsof DataSubjectsCyberAttacksIntegrationPrivacyNoticeDataProcessorCloudSecurityPhishingDataControllerIdentityTheftDataBreachMalwareStrongPasswordRansomwareRiskManagementContainmentDataConsentDataRetentionRight toDamagesDataProcessingDataMinimizationDisclosureConfidentialityComplianceNationalPrivacyCommissionAccessControlSensitivePersonalInformationDataSubjectPrivacyImpactAssessmentEncryptionPersonalDataDataStorageRighttoAccessDataSecurityDataPrivacyNoticeDataBreachNotificationRightsof DataSubjectsDataRecoveryCybersecurityPenaltiesCybersecurityAwarenessNetworkSecurityIntegrationMulti-FactorAuthenticationConsentDataProtectionOfficerAnonymizationFirewallsRighttorectifyIncidentReportRight toFile aComplaintVulnerabilityPrivacyPolicyTransparencyBackupRight toErasureLawfulAccessRightsof DataSubjectsCyberAttacksIntegrationPrivacyNoticeDataProcessorCloudSecurityPhishingDataControllerIdentityTheftDataBreachMalwareStrongPasswordRansomwareRiskManagementContainmentDataConsentDataRetentionRight toDamagesDataProcessingDataMinimizationDisclosureConfidentialityComplianceNationalPrivacyCommissionAccessControlSensitivePersonalInformationDataSubjectPrivacyImpactAssessmentEncryptionPersonalDataDataStorageRighttoAccessDataSecurityDataPrivacyNoticeDataBreachNotificationRightsof DataSubjectsDataRecoveryCybersecurityPenaltiesCybersecurityAwarenessNetworkSecurityIntegrationMulti-FactorAuthenticationConsentDataProtectionOfficerAnonymization

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Firewalls
  2. Right to rectify
  3. Incident Report
  4. Right to File a Complaint
  5. Vulnerability
  6. Privacy Policy
  7. Transparency
  8. Backup
  9. Right to Erasure
  10. Lawful Access
  11. Rights of Data Subjects
  12. Cyber Attacks
  13. Integration
  14. Privacy Notice
  15. Data Processor
  16. Cloud Security
  17. Phishing
  18. Data Controller
  19. Identity Theft
  20. Data Breach
  21. Malware
  22. Strong Password
  23. Ransomware
  24. Risk Management
  25. Containment
  26. Data Consent
  27. Data Retention
  28. Right to Damages
  29. Data Processing
  30. Data Minimization
  31. Disclosure
  32. Confidentiality
  33. Compliance
  34. National Privacy Commission
  35. Access Control
  36. Sensitive Personal Information
  37. Data Subject
  38. Privacy Impact Assessment
  39. Encryption
  40. Personal Data
  41. Data Storage
  42. Right to Access
  43. Data Security
  44. Data Privacy Notice
  45. Data Breach Notification
  46. Rights of Data Subjects
  47. Data Recovery
  48. Cybersecurity
  49. Penalties
  50. Cybersecurity Awareness
  51. Network Security
  52. Integration
  53. Multi-Factor Authentication
  54. Consent
  55. Data Protection Officer
  56. Anonymization