CloudSecurityAccessControlComplianceFirewallsRight toErasureNetworkSecurityPhishingEncryptionDataBreachDataRecoveryNationalPrivacyCommissionDataSecurityIncidentReportSensitivePersonalInformationRightsof DataSubjectsRight toFile aComplaintDataProcessorDataMinimizationPrivacyNoticeRightsof DataSubjectsAnonymizationStrongPasswordDisclosurePrivacyPolicyPenaltiesConfidentialityIntegrationCybersecurityAwarenessRansomwareDataSubjectPrivacyImpactAssessmentRight toDamagesDataProtectionOfficerDataPrivacyNoticeRighttoAccessRiskManagementContainmentCybersecurityLawfulAccessBackupTransparencyRighttorectifyDataProcessingConsentVulnerabilityDataRetentionPersonalDataMulti-FactorAuthenticationMalwareIdentityTheftDataControllerDataBreachNotificationCyberAttacksDataConsentIntegrationDataStorageCloudSecurityAccessControlComplianceFirewallsRight toErasureNetworkSecurityPhishingEncryptionDataBreachDataRecoveryNationalPrivacyCommissionDataSecurityIncidentReportSensitivePersonalInformationRightsof DataSubjectsRight toFile aComplaintDataProcessorDataMinimizationPrivacyNoticeRightsof DataSubjectsAnonymizationStrongPasswordDisclosurePrivacyPolicyPenaltiesConfidentialityIntegrationCybersecurityAwarenessRansomwareDataSubjectPrivacyImpactAssessmentRight toDamagesDataProtectionOfficerDataPrivacyNoticeRighttoAccessRiskManagementContainmentCybersecurityLawfulAccessBackupTransparencyRighttorectifyDataProcessingConsentVulnerabilityDataRetentionPersonalDataMulti-FactorAuthenticationMalwareIdentityTheftDataControllerDataBreachNotificationCyberAttacksDataConsentIntegrationDataStorage

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cloud Security
  2. Access Control
  3. Compliance
  4. Firewalls
  5. Right to Erasure
  6. Network Security
  7. Phishing
  8. Encryption
  9. Data Breach
  10. Data Recovery
  11. National Privacy Commission
  12. Data Security
  13. Incident Report
  14. Sensitive Personal Information
  15. Rights of Data Subjects
  16. Right to File a Complaint
  17. Data Processor
  18. Data Minimization
  19. Privacy Notice
  20. Rights of Data Subjects
  21. Anonymization
  22. Strong Password
  23. Disclosure
  24. Privacy Policy
  25. Penalties
  26. Confidentiality
  27. Integration
  28. Cybersecurity Awareness
  29. Ransomware
  30. Data Subject
  31. Privacy Impact Assessment
  32. Right to Damages
  33. Data Protection Officer
  34. Data Privacy Notice
  35. Right to Access
  36. Risk Management
  37. Containment
  38. Cybersecurity
  39. Lawful Access
  40. Backup
  41. Transparency
  42. Right to rectify
  43. Data Processing
  44. Consent
  45. Vulnerability
  46. Data Retention
  47. Personal Data
  48. Multi-Factor Authentication
  49. Malware
  50. Identity Theft
  51. Data Controller
  52. Data Breach Notification
  53. Cyber Attacks
  54. Data Consent
  55. Integration
  56. Data Storage