PersonalDataCloudSecurityTransparencyPrivacyNoticeStrongPasswordComplianceMulti-FactorAuthenticationNationalPrivacyCommissionDataBreachAccessControlSensitivePersonalInformationCybersecurityRight toErasureLawfulAccessAnonymizationBackupDataPrivacyNoticeNetworkSecurityRansomwareDataControllerFirewallsPenaltiesRighttorectifyDataRecoveryPhishingDataRetentionConsentMalwareCyberAttacksVulnerabilityRiskManagementIdentityTheftDataSecurityPrivacyImpactAssessmentRightsof DataSubjectsDataProcessingDisclosureRight toDamagesRighttoAccessDataProtectionOfficerIntegrationRightsof DataSubjectsDataConsentContainmentRight toFile aComplaintDataMinimizationDataStorageIntegrationDataSubjectConfidentialityDataBreachNotificationPrivacyPolicyDataProcessorCybersecurityAwarenessIncidentReportEncryptionPersonalDataCloudSecurityTransparencyPrivacyNoticeStrongPasswordComplianceMulti-FactorAuthenticationNationalPrivacyCommissionDataBreachAccessControlSensitivePersonalInformationCybersecurityRight toErasureLawfulAccessAnonymizationBackupDataPrivacyNoticeNetworkSecurityRansomwareDataControllerFirewallsPenaltiesRighttorectifyDataRecoveryPhishingDataRetentionConsentMalwareCyberAttacksVulnerabilityRiskManagementIdentityTheftDataSecurityPrivacyImpactAssessmentRightsof DataSubjectsDataProcessingDisclosureRight toDamagesRighttoAccessDataProtectionOfficerIntegrationRightsof DataSubjectsDataConsentContainmentRight toFile aComplaintDataMinimizationDataStorageIntegrationDataSubjectConfidentialityDataBreachNotificationPrivacyPolicyDataProcessorCybersecurityAwarenessIncidentReportEncryption

Data Security Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  1. Personal Data
  2. Cloud Security
  3. Transparency
  4. Privacy Notice
  5. Strong Password
  6. Compliance
  7. Multi-Factor Authentication
  8. National Privacy Commission
  9. Data Breach
  10. Access Control
  11. Sensitive Personal Information
  12. Cybersecurity
  13. Right to Erasure
  14. Lawful Access
  15. Anonymization
  16. Backup
  17. Data Privacy Notice
  18. Network Security
  19. Ransomware
  20. Data Controller
  21. Firewalls
  22. Penalties
  23. Right to rectify
  24. Data Recovery
  25. Phishing
  26. Data Retention
  27. Consent
  28. Malware
  29. Cyber Attacks
  30. Vulnerability
  31. Risk Management
  32. Identity Theft
  33. Data Security
  34. Privacy Impact Assessment
  35. Rights of Data Subjects
  36. Data Processing
  37. Disclosure
  38. Right to Damages
  39. Right to Access
  40. Data Protection Officer
  41. Integration
  42. Rights of Data Subjects
  43. Data Consent
  44. Containment
  45. Right to File a Complaint
  46. Data Minimization
  47. Data Storage
  48. Integration
  49. Data Subject
  50. Confidentiality
  51. Data Breach Notification
  52. Privacy Policy
  53. Data Processor
  54. Cybersecurity Awareness
  55. Incident Report
  56. Encryption