Password Verification Training Required FCC Fine Example Least Privilege Account PIN Verified Identity Social Engineering Opt-Out Required CPNI Policy Review CPNI Definition Role- Based Access Reporting Violation Caller ID Spoofing “CPNI!” Shouted in Role Play 24-Hour Breach Notice Breach Example Internal Breach System Access Logs No Access for Techs CPNI = Call/Service Data No Customer Info in Email No Sharing Without Consent Annual Certification Call Detail Records Marketing Restrictions Password Verification Training Required FCC Fine Example Least Privilege Account PIN Verified Identity Social Engineering Opt-Out Required CPNI Policy Review CPNI Definition Role- Based Access Reporting Violation Caller ID Spoofing “CPNI!” Shouted in Role Play 24-Hour Breach Notice Breach Example Internal Breach System Access Logs No Access for Techs CPNI = Call/Service Data No Customer Info in Email No Sharing Without Consent Annual Certification Call Detail Records Marketing Restrictions
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Password Verification
Training Required
FCC Fine Example
Least Privilege
Account PIN
Verified Identity
Social Engineering
Opt-Out Required
CPNI Policy Review
CPNI Definition
Role-Based Access
Reporting Violation
Caller ID Spoofing
“CPNI!” Shouted in Role Play
24-Hour Breach Notice
Breach Example
Internal Breach
System Access Logs
No Access for Techs
CPNI = Call/Service Data
No Customer Info in Email
No Sharing Without Consent
Annual Certification
Call Detail Records
Marketing Restrictions