PasswordVerificationTrainingRequiredFCCFineExampleLeastPrivilegeAccountPINVerifiedIdentitySocialEngineeringOpt-OutRequiredCPNIPolicyReviewCPNIDefinitionRole-BasedAccessReportingViolationCaller IDSpoofing“CPNI!”Shoutedin RolePlay24-HourBreachNoticeBreachExampleInternalBreachSystemAccessLogsNoAccessfor TechsCPNI =Call/ServiceDataNoCustomerInfo inEmailNoSharingWithoutConsentAnnualCertificationCallDetailRecordsMarketingRestrictionsPasswordVerificationTrainingRequiredFCCFineExampleLeastPrivilegeAccountPINVerifiedIdentitySocialEngineeringOpt-OutRequiredCPNIPolicyReviewCPNIDefinitionRole-BasedAccessReportingViolationCaller IDSpoofing“CPNI!”Shoutedin RolePlay24-HourBreachNoticeBreachExampleInternalBreachSystemAccessLogsNoAccessfor TechsCPNI =Call/ServiceDataNoCustomerInfo inEmailNoSharingWithoutConsentAnnualCertificationCallDetailRecordsMarketingRestrictions

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Password Verification
  2. Training Required
  3. FCC Fine Example
  4. Least Privilege
  5. Account PIN
  6. Verified Identity
  7. Social Engineering
  8. Opt-Out Required
  9. CPNI Policy Review
  10. CPNI Definition
  11. Role-Based Access
  12. Reporting Violation
  13. Caller ID Spoofing
  14. “CPNI!” Shouted in Role Play
  15. 24-Hour Breach Notice
  16. Breach Example
  17. Internal Breach
  18. System Access Logs
  19. No Access for Techs
  20. CPNI = Call/Service Data
  21. No Customer Info in Email
  22. No Sharing Without Consent
  23. Annual Certification
  24. Call Detail Records
  25. Marketing Restrictions