DataSubjectRighttoObjectPrivacyPolicyThird-partyProcessingConfidentialityRighttoAccessRight toErasure /Right to beForgottenAnonymizationRetentionPeriodDataMinimizationAuditTrailCross-borderDataTransferSensitivePersonalInformationProcessingof DataSecurityMeasuresCompliancePrivacyNoticeDataSharingDataProtectionOfficer(DPO)DataControllerConfidentialityEncryptionIntegrityDataProcessorTransparencyRight toDataPortabilityDataBreachMonitoringandAuditingPersonalDataRight toRectificationAccountabilityAvailabilityAccessControlConsentDataSubjectRighttoObjectPrivacyPolicyThird-partyProcessingConfidentialityRighttoAccessRight toErasure /Right to beForgottenAnonymizationRetentionPeriodDataMinimizationAuditTrailCross-borderDataTransferSensitivePersonalInformationProcessingof DataSecurityMeasuresCompliancePrivacyNoticeDataSharingDataProtectionOfficer(DPO)DataControllerConfidentialityEncryptionIntegrityDataProcessorTransparencyRight toDataPortabilityDataBreachMonitoringandAuditingPersonalDataRight toRectificationAccountabilityAvailabilityAccessControlConsent

DATA PRIVACY IN THE WORKPLACE - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Data Subject
  2. Right to Object
  3. Privacy Policy
  4. Third-party Processing
  5. Confidentiality
  6. Right to Access
  7. Right to Erasure / Right to be Forgotten
  8. Anonymization
  9. Retention Period
  10. Data Minimization
  11. Audit Trail
  12. Cross-border Data Transfer
  13. Sensitive Personal Information
  14. Processing of Data
  15. Security Measures
  16. Compliance
  17. Privacy Notice
  18. Data Sharing
  19. Data Protection Officer (DPO)
  20. Data Controller
  21. Confidentiality
  22. Encryption
  23. Integrity
  24. Data Processor
  25. Transparency
  26. Right to Data Portability
  27. Data Breach
  28. Monitoring and Auditing
  29. Personal Data
  30. Right to Rectification
  31. Accountability
  32. Availability
  33. Access Control
  34. Consent