inauthentic identity representation bullying and harassment adult nudity and sexual activity misinformation child sexual exploitation privacy violations dangerous organizations or criminals violent and graphic content suicide, self-injury, eating disorders adult sexual exploition property infringement restricted goods and services hateful conduct adult nudity and sexual activity adult sexual solicitation violence and incitement locally illegal content fraud, scams, deceptive practices co-ordinating harm and promoting crime sexually explicit language spam human exploitation account integrity cybersecurity inauthentic identity representation bullying and harassment adult nudity and sexual activity misinformation child sexual exploitation privacy violations dangerous organizations or criminals violent and graphic content suicide, self-injury, eating disorders adult sexual exploition property infringement restricted goods and services hateful conduct adult nudity and sexual activity adult sexual solicitation violence and incitement locally illegal content fraud, scams, deceptive practices co-ordinating harm and promoting crime sexually explicit language spam human exploitation account integrity cybersecurity
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
inauthentic identity representation
bullying and harassment
adult nudity and sexual activity
misinformation
child sexual exploitation
privacy violations
dangerous organizations or criminals
violent and graphic content
suicide, self-injury, eating disorders
adult sexual exploition
property infringement
restricted goods and services
hateful conduct
adult nudity and sexual activity
adult sexual solicitation
violence and incitement
locally illegal content
fraud, scams, deceptive practices
co-ordinating harm and promoting crime
sexually explicit language
spam
human exploitation
account integrity
cybersecurity