FCC Fine Example Account PIN Password Verification System Access Logs Social Engineering Role- Based Access CPNI = Call/Service Data Least Privilege No Sharing Without Consent No Customer Info in Email 24-Hour Breach Notice Verified Identity No Access for Techs Call Detail Records Caller ID Spoofing Reporting Violation CPNI Definition Training Required “CPNI!” Shouted in Role Play Opt-Out Required Annual Certification Breach Example Internal Breach CPNI Policy Review Marketing Restrictions FCC Fine Example Account PIN Password Verification System Access Logs Social Engineering Role- Based Access CPNI = Call/Service Data Least Privilege No Sharing Without Consent No Customer Info in Email 24-Hour Breach Notice Verified Identity No Access for Techs Call Detail Records Caller ID Spoofing Reporting Violation CPNI Definition Training Required “CPNI!” Shouted in Role Play Opt-Out Required Annual Certification Breach Example Internal Breach CPNI Policy Review Marketing Restrictions
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
FCC Fine Example
Account PIN
Password Verification
System Access Logs
Social Engineering
Role-Based Access
CPNI = Call/Service Data
Least Privilege
No Sharing Without Consent
No Customer Info in Email
24-Hour Breach Notice
Verified Identity
No Access for Techs
Call Detail Records
Caller ID Spoofing
Reporting Violation
CPNI Definition
Training Required
“CPNI!” Shouted in Role Play
Opt-Out Required
Annual Certification
Breach Example
Internal Breach
CPNI Policy Review
Marketing Restrictions