DataSubjectMulti-FactorAuthenticationDisclosureRighttorectifyIntegrationContainmentVulnerabilityPenaltiesAccessControlRansomwareComplianceBackupDataBreachNotificationStrongPasswordDataStorageDataControllerNationalPrivacyCommissionDataProcessingIncidentReportMalwareDataProtectionOfficerSensitivePersonalInformationDataProcessorPrivacyImpactAssessmentTransparencyDataConsentDataSecurityConsentRight toFile aComplaintIdentityTheftEncryptionRight toErasureFirewallsDataPrivacyNoticeDataBreachCybersecurityAwarenessRighttoAccessCyberAttacksNetworkSecurityPrivacyNoticeDataRecoveryDataMinimizationLawfulAccessIntegrationAnonymizationPersonalDataPhishingRight toDamagesRightsof DataSubjectsRightsof DataSubjectsRiskManagementDataRetentionCloudSecurityCybersecurityConfidentialityPrivacyPolicyDataSubjectMulti-FactorAuthenticationDisclosureRighttorectifyIntegrationContainmentVulnerabilityPenaltiesAccessControlRansomwareComplianceBackupDataBreachNotificationStrongPasswordDataStorageDataControllerNationalPrivacyCommissionDataProcessingIncidentReportMalwareDataProtectionOfficerSensitivePersonalInformationDataProcessorPrivacyImpactAssessmentTransparencyDataConsentDataSecurityConsentRight toFile aComplaintIdentityTheftEncryptionRight toErasureFirewallsDataPrivacyNoticeDataBreachCybersecurityAwarenessRighttoAccessCyberAttacksNetworkSecurityPrivacyNoticeDataRecoveryDataMinimizationLawfulAccessIntegrationAnonymizationPersonalDataPhishingRight toDamagesRightsof DataSubjectsRightsof DataSubjectsRiskManagementDataRetentionCloudSecurityCybersecurityConfidentialityPrivacyPolicy

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Data Subject
  2. Multi-Factor Authentication
  3. Disclosure
  4. Right to rectify
  5. Integration
  6. Containment
  7. Vulnerability
  8. Penalties
  9. Access Control
  10. Ransomware
  11. Compliance
  12. Backup
  13. Data Breach Notification
  14. Strong Password
  15. Data Storage
  16. Data Controller
  17. National Privacy Commission
  18. Data Processing
  19. Incident Report
  20. Malware
  21. Data Protection Officer
  22. Sensitive Personal Information
  23. Data Processor
  24. Privacy Impact Assessment
  25. Transparency
  26. Data Consent
  27. Data Security
  28. Consent
  29. Right to File a Complaint
  30. Identity Theft
  31. Encryption
  32. Right to Erasure
  33. Firewalls
  34. Data Privacy Notice
  35. Data Breach
  36. Cybersecurity Awareness
  37. Right to Access
  38. Cyber Attacks
  39. Network Security
  40. Privacy Notice
  41. Data Recovery
  42. Data Minimization
  43. Lawful Access
  44. Integration
  45. Anonymization
  46. Personal Data
  47. Phishing
  48. Right to Damages
  49. Rights of Data Subjects
  50. Rights of Data Subjects
  51. Risk Management
  52. Data Retention
  53. Cloud Security
  54. Cybersecurity
  55. Confidentiality
  56. Privacy Policy