MalwareNetworkSecurityDataControllerDataSecurityDataRecoveryBackupFirewallsDataProcessorEncryptionCompliancePhishingAccessControlCyberAttacksIncidentReportDataSubjectPrivacyImpactAssessmentRighttoAccessRight toDamagesRansomwareDataStorageContainmentRightsof DataSubjectsDataConsentAnonymizationNationalPrivacyCommissionRight toErasureRight toFile aComplaintCybersecurityDataBreachDataProcessingConsentCybersecurityAwarenessStrongPasswordSensitivePersonalInformationPrivacyPolicyCloudSecurityDataProtectionOfficerIntegrationDataPrivacyNoticeVulnerabilityTransparencyDataRetentionDataBreachNotificationPersonalDataMulti-FactorAuthenticationRightsof DataSubjectsRiskManagementIntegrationLawfulAccessRighttorectifyConfidentialityIdentityTheftPenaltiesDataMinimizationDisclosurePrivacyNoticeMalwareNetworkSecurityDataControllerDataSecurityDataRecoveryBackupFirewallsDataProcessorEncryptionCompliancePhishingAccessControlCyberAttacksIncidentReportDataSubjectPrivacyImpactAssessmentRighttoAccessRight toDamagesRansomwareDataStorageContainmentRightsof DataSubjectsDataConsentAnonymizationNationalPrivacyCommissionRight toErasureRight toFile aComplaintCybersecurityDataBreachDataProcessingConsentCybersecurityAwarenessStrongPasswordSensitivePersonalInformationPrivacyPolicyCloudSecurityDataProtectionOfficerIntegrationDataPrivacyNoticeVulnerabilityTransparencyDataRetentionDataBreachNotificationPersonalDataMulti-FactorAuthenticationRightsof DataSubjectsRiskManagementIntegrationLawfulAccessRighttorectifyConfidentialityIdentityTheftPenaltiesDataMinimizationDisclosurePrivacyNotice

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Malware
  2. Network Security
  3. Data Controller
  4. Data Security
  5. Data Recovery
  6. Backup
  7. Firewalls
  8. Data Processor
  9. Encryption
  10. Compliance
  11. Phishing
  12. Access Control
  13. Cyber Attacks
  14. Incident Report
  15. Data Subject
  16. Privacy Impact Assessment
  17. Right to Access
  18. Right to Damages
  19. Ransomware
  20. Data Storage
  21. Containment
  22. Rights of Data Subjects
  23. Data Consent
  24. Anonymization
  25. National Privacy Commission
  26. Right to Erasure
  27. Right to File a Complaint
  28. Cybersecurity
  29. Data Breach
  30. Data Processing
  31. Consent
  32. Cybersecurity Awareness
  33. Strong Password
  34. Sensitive Personal Information
  35. Privacy Policy
  36. Cloud Security
  37. Data Protection Officer
  38. Integration
  39. Data Privacy Notice
  40. Vulnerability
  41. Transparency
  42. Data Retention
  43. Data Breach Notification
  44. Personal Data
  45. Multi-Factor Authentication
  46. Rights of Data Subjects
  47. Risk Management
  48. Integration
  49. Lawful Access
  50. Right to rectify
  51. Confidentiality
  52. Identity Theft
  53. Penalties
  54. Data Minimization
  55. Disclosure
  56. Privacy Notice