IncidentReportAnonymizationStrongPasswordDataMinimizationRight toErasureConsentCybersecurityAwarenessDataStorageEncryptionNationalPrivacyCommissionConfidentialityContainmentNetworkSecurityDisclosureDataPrivacyNoticeRightsof DataSubjectsPrivacyNoticePersonalDataRansomwareIdentityTheftIntegrationBackupDataProcessorIntegrationDataConsentRight toFile aComplaintCloudSecurityCyberAttacksDataBreachNotificationDataProtectionOfficerPrivacyPolicyMalwareDataSecurityRighttoAccessPenaltiesPhishingTransparencyRight toDamagesFirewallsRighttorectifyRightsof DataSubjectsDataRecoveryLawfulAccessComplianceAccessControlRiskManagementPrivacyImpactAssessmentVulnerabilityDataSubjectMulti-FactorAuthenticationDataControllerDataBreachSensitivePersonalInformationDataProcessingCybersecurityDataRetentionIncidentReportAnonymizationStrongPasswordDataMinimizationRight toErasureConsentCybersecurityAwarenessDataStorageEncryptionNationalPrivacyCommissionConfidentialityContainmentNetworkSecurityDisclosureDataPrivacyNoticeRightsof DataSubjectsPrivacyNoticePersonalDataRansomwareIdentityTheftIntegrationBackupDataProcessorIntegrationDataConsentRight toFile aComplaintCloudSecurityCyberAttacksDataBreachNotificationDataProtectionOfficerPrivacyPolicyMalwareDataSecurityRighttoAccessPenaltiesPhishingTransparencyRight toDamagesFirewallsRighttorectifyRightsof DataSubjectsDataRecoveryLawfulAccessComplianceAccessControlRiskManagementPrivacyImpactAssessmentVulnerabilityDataSubjectMulti-FactorAuthenticationDataControllerDataBreachSensitivePersonalInformationDataProcessingCybersecurityDataRetention

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Incident Report
  2. Anonymization
  3. Strong Password
  4. Data Minimization
  5. Right to Erasure
  6. Consent
  7. Cybersecurity Awareness
  8. Data Storage
  9. Encryption
  10. National Privacy Commission
  11. Confidentiality
  12. Containment
  13. Network Security
  14. Disclosure
  15. Data Privacy Notice
  16. Rights of Data Subjects
  17. Privacy Notice
  18. Personal Data
  19. Ransomware
  20. Identity Theft
  21. Integration
  22. Backup
  23. Data Processor
  24. Integration
  25. Data Consent
  26. Right to File a Complaint
  27. Cloud Security
  28. Cyber Attacks
  29. Data Breach Notification
  30. Data Protection Officer
  31. Privacy Policy
  32. Malware
  33. Data Security
  34. Right to Access
  35. Penalties
  36. Phishing
  37. Transparency
  38. Right to Damages
  39. Firewalls
  40. Right to rectify
  41. Rights of Data Subjects
  42. Data Recovery
  43. Lawful Access
  44. Compliance
  45. Access Control
  46. Risk Management
  47. Privacy Impact Assessment
  48. Vulnerability
  49. Data Subject
  50. Multi-Factor Authentication
  51. Data Controller
  52. Data Breach
  53. Sensitive Personal Information
  54. Data Processing
  55. Cybersecurity
  56. Data Retention