CloudSecurityPenaltiesRighttoAccessRightsof DataSubjectsPrivacyNoticeRight toDamagesRightsof DataSubjectsMalwareAccessControlBackupDataSubjectRiskManagementLawfulAccessDataProcessorIntegrationDataSecurityCybersecurityAwarenessIdentityTheftEncryptionDataRetentionNationalPrivacyCommissionPhishingDataBreachNotificationRighttorectifyIntegrationPrivacyPolicyConsentRight toErasureDataBreachSensitivePersonalInformationCybersecurityRight toFile aComplaintDataStorageCyberAttacksDataConsentComplianceDataProcessingVulnerabilityDataPrivacyNoticeFirewallsDataControllerDisclosureDataRecoveryStrongPasswordDataProtectionOfficerTransparencyConfidentialityAnonymizationIncidentReportMulti-FactorAuthenticationContainmentPersonalDataNetworkSecurityPrivacyImpactAssessmentRansomwareDataMinimizationCloudSecurityPenaltiesRighttoAccessRightsof DataSubjectsPrivacyNoticeRight toDamagesRightsof DataSubjectsMalwareAccessControlBackupDataSubjectRiskManagementLawfulAccessDataProcessorIntegrationDataSecurityCybersecurityAwarenessIdentityTheftEncryptionDataRetentionNationalPrivacyCommissionPhishingDataBreachNotificationRighttorectifyIntegrationPrivacyPolicyConsentRight toErasureDataBreachSensitivePersonalInformationCybersecurityRight toFile aComplaintDataStorageCyberAttacksDataConsentComplianceDataProcessingVulnerabilityDataPrivacyNoticeFirewallsDataControllerDisclosureDataRecoveryStrongPasswordDataProtectionOfficerTransparencyConfidentialityAnonymizationIncidentReportMulti-FactorAuthenticationContainmentPersonalDataNetworkSecurityPrivacyImpactAssessmentRansomwareDataMinimization

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Cloud Security
  2. Penalties
  3. Right to Access
  4. Rights of Data Subjects
  5. Privacy Notice
  6. Right to Damages
  7. Rights of Data Subjects
  8. Malware
  9. Access Control
  10. Backup
  11. Data Subject
  12. Risk Management
  13. Lawful Access
  14. Data Processor
  15. Integration
  16. Data Security
  17. Cybersecurity Awareness
  18. Identity Theft
  19. Encryption
  20. Data Retention
  21. National Privacy Commission
  22. Phishing
  23. Data Breach Notification
  24. Right to rectify
  25. Integration
  26. Privacy Policy
  27. Consent
  28. Right to Erasure
  29. Data Breach
  30. Sensitive Personal Information
  31. Cybersecurity
  32. Right to File a Complaint
  33. Data Storage
  34. Cyber Attacks
  35. Data Consent
  36. Compliance
  37. Data Processing
  38. Vulnerability
  39. Data Privacy Notice
  40. Firewalls
  41. Data Controller
  42. Disclosure
  43. Data Recovery
  44. Strong Password
  45. Data Protection Officer
  46. Transparency
  47. Confidentiality
  48. Anonymization
  49. Incident Report
  50. Multi-Factor Authentication
  51. Containment
  52. Personal Data
  53. Network Security
  54. Privacy Impact Assessment
  55. Ransomware
  56. Data Minimization