Don't discussconfidentialinformationaround othersnot involvedEnsure thePI I use isup-to-dateand accurateKnow thedifferentforms ofPIIf I havedoubts aboutprivacyissues andactions, I askI knowwhat aPIB isUnderstandmyobligationsunder thePrivacy ActLock mycomputerwhen I leavemy workspaceI know whatadministrativeuse of PI isCollect PIonly if itrelates toLAC'sactivitiesReport anysuspiciousindividualwithout asecurity passKnow how torespond to aprivacybreachLimit accessto PI tothose thatneed toknowFollow GCguidelinesfor handlingclassifiedinformationParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachOnly use PIfor thepurpose itwascollectedI know whatnon-administrativeuse of PI isReport theftor loss ofequipment ordocumentscontaining PIKnow of theretentionperiod, afteradministrativeuse, of PINever leavedocumentswith PIunattendedon my deskseekconsent fornew orconsistentuse of PIAm informedof LAC'sprivacypolicies andproceduresI report privacybreaches to mydirectreport/privacyteamIdentify andmitigateprivacy risksI payattention todetails andreview myworkDon't discussconfidentialinformationaround othersnot involvedEnsure thePI I use isup-to-dateand accurateKnow thedifferentforms ofPIIf I havedoubts aboutprivacyissues andactions, I askI knowwhat aPIB isUnderstandmyobligationsunder thePrivacy ActLock mycomputerwhen I leavemy workspaceI know whatadministrativeuse of PI isCollect PIonly if itrelates toLAC'sactivitiesReport anysuspiciousindividualwithout asecurity passKnow how torespond to aprivacybreachLimit accessto PI tothose thatneed toknowFollow GCguidelinesfor handlingclassifiedinformationParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachOnly use PIfor thepurpose itwascollectedI know whatnon-administrativeuse of PI isReport theftor loss ofequipment ordocumentscontaining PIKnow of theretentionperiod, afteradministrativeuse, of PINever leavedocumentswith PIunattendedon my deskseekconsent fornew orconsistentuse of PIAm informedof LAC'sprivacypolicies andproceduresI report privacybreaches to mydirectreport/privacyteamIdentify andmitigateprivacy risksI payattention todetails andreview mywork

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Don't discuss confidential information around others not involved
  2. Ensure the PI I use is up-to-date and accurate
  3. Know the different forms of PI
  4. If I have doubts about privacy issues and actions, I ask
  5. I know what a PIB is
  6. Understand my obligations under the Privacy Act
  7. Lock my computer when I leave my work space
  8. I know what administrative use of PI is
  9. Collect PI only if it relates to LAC's activities
  10. Report any suspicious individual without a security pass
  11. Know how to respond to a privacy breach
  12. Limit access to PI to those that need to know
  13. Follow GC guidelines for handling classified information
  14. Participate in privacy training
  15. I am aware of the consequences of a privacy breach
  16. Only use PI for the purpose it was collected
  17. I know what non-administrative use of PI is
  18. Report theft or loss of equipment or documents containing PI
  19. Know of the retention period, after administrative use, of PI
  20. Never leave documents with PI unattended on my desk
  21. seek consent for new or consistent use of PI
  22. Am informed of LAC's privacy policies and procedures
  23. I report privacy breaches to my direct report/privacy team
  24. Identify and mitigate privacy risks
  25. I pay attention to details and review my work