ContainmentPrivacyPolicyDataRecoveryDataStorageCloudSecurityCybersecurityAwarenessRiskManagementIncidentReportDataBreachNotificationDataProcessingRightsof DataSubjectsLawfulAccessBackupDataSecurityPersonalDataDataRetentionDataBreachComplianceNationalPrivacyCommissionIdentityTheftDataSubjectCybersecurityRansomwarePrivacyImpactAssessmentPrivacyNoticeVulnerabilityDataPrivacyNoticeFirewallsTransparencyAccessControlIntegrationRight toErasureRight toDamagesDataProcessorPenaltiesEncryptionDataMinimizationConsentConfidentialityDataConsentRightsof DataSubjectsIntegrationCyberAttacksDataControllerRighttorectifyDisclosureSensitivePersonalInformationMulti-FactorAuthenticationDataProtectionOfficerRighttoAccessStrongPasswordNetworkSecurityPhishingRight toFile aComplaintAnonymizationMalwareContainmentPrivacyPolicyDataRecoveryDataStorageCloudSecurityCybersecurityAwarenessRiskManagementIncidentReportDataBreachNotificationDataProcessingRightsof DataSubjectsLawfulAccessBackupDataSecurityPersonalDataDataRetentionDataBreachComplianceNationalPrivacyCommissionIdentityTheftDataSubjectCybersecurityRansomwarePrivacyImpactAssessmentPrivacyNoticeVulnerabilityDataPrivacyNoticeFirewallsTransparencyAccessControlIntegrationRight toErasureRight toDamagesDataProcessorPenaltiesEncryptionDataMinimizationConsentConfidentialityDataConsentRightsof DataSubjectsIntegrationCyberAttacksDataControllerRighttorectifyDisclosureSensitivePersonalInformationMulti-FactorAuthenticationDataProtectionOfficerRighttoAccessStrongPasswordNetworkSecurityPhishingRight toFile aComplaintAnonymizationMalware

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Containment
  2. Privacy Policy
  3. Data Recovery
  4. Data Storage
  5. Cloud Security
  6. Cybersecurity Awareness
  7. Risk Management
  8. Incident Report
  9. Data Breach Notification
  10. Data Processing
  11. Rights of Data Subjects
  12. Lawful Access
  13. Backup
  14. Data Security
  15. Personal Data
  16. Data Retention
  17. Data Breach
  18. Compliance
  19. National Privacy Commission
  20. Identity Theft
  21. Data Subject
  22. Cybersecurity
  23. Ransomware
  24. Privacy Impact Assessment
  25. Privacy Notice
  26. Vulnerability
  27. Data Privacy Notice
  28. Firewalls
  29. Transparency
  30. Access Control
  31. Integration
  32. Right to Erasure
  33. Right to Damages
  34. Data Processor
  35. Penalties
  36. Encryption
  37. Data Minimization
  38. Consent
  39. Confidentiality
  40. Data Consent
  41. Rights of Data Subjects
  42. Integration
  43. Cyber Attacks
  44. Data Controller
  45. Right to rectify
  46. Disclosure
  47. Sensitive Personal Information
  48. Multi-Factor Authentication
  49. Data Protection Officer
  50. Right to Access
  51. Strong Password
  52. Network Security
  53. Phishing
  54. Right to File a Complaint
  55. Anonymization
  56. Malware