Lock mycomputerwhen I leavemy workspaceEnsure thePI I use isup-to-dateand accurateOnly use PIfor thepurpose itwascollectedIdentify andmitigateprivacy risksParticipatein privacytrainingKnow how torespond to aprivacybreachLimit accessto PI tothose thatneed toknowReport theftor loss ofequipment ordocumentscontaining PIKnow thedifferentforms ofPIDon't discussconfidentialinformationaround othersnot involvedKnow of theretentionperiod, afteradministrativeuse, of PIReport anysuspiciousindividualwithout asecurity passI payattention todetails andreview myworkseekconsent fornew orconsistentuse of PICollect PIonly if itrelates toLAC'sactivitiesFollow GCguidelinesfor handlingclassifiedinformationI report privacybreaches to mydirectreport/privacyteamAm informedof LAC'sprivacypolicies andproceduresI know whatadministrativeuse of PI isIf I havedoubts aboutprivacyissues andactions, I askI know whatnon-administrativeuse of PI isI am aware oftheconsequencesof a privacybreachI knowwhat aPIB isUnderstandmyobligationsunder thePrivacy ActNever leavedocumentswith PIunattendedon my deskLock mycomputerwhen I leavemy workspaceEnsure thePI I use isup-to-dateand accurateOnly use PIfor thepurpose itwascollectedIdentify andmitigateprivacy risksParticipatein privacytrainingKnow how torespond to aprivacybreachLimit accessto PI tothose thatneed toknowReport theftor loss ofequipment ordocumentscontaining PIKnow thedifferentforms ofPIDon't discussconfidentialinformationaround othersnot involvedKnow of theretentionperiod, afteradministrativeuse, of PIReport anysuspiciousindividualwithout asecurity passI payattention todetails andreview myworkseekconsent fornew orconsistentuse of PICollect PIonly if itrelates toLAC'sactivitiesFollow GCguidelinesfor handlingclassifiedinformationI report privacybreaches to mydirectreport/privacyteamAm informedof LAC'sprivacypolicies andproceduresI know whatadministrativeuse of PI isIf I havedoubts aboutprivacyissues andactions, I askI know whatnon-administrativeuse of PI isI am aware oftheconsequencesof a privacybreachI knowwhat aPIB isUnderstandmyobligationsunder thePrivacy ActNever leavedocumentswith PIunattendedon my desk

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Lock my computer when I leave my work space
  2. Ensure the PI I use is up-to-date and accurate
  3. Only use PI for the purpose it was collected
  4. Identify and mitigate privacy risks
  5. Participate in privacy training
  6. Know how to respond to a privacy breach
  7. Limit access to PI to those that need to know
  8. Report theft or loss of equipment or documents containing PI
  9. Know the different forms of PI
  10. Don't discuss confidential information around others not involved
  11. Know of the retention period, after administrative use, of PI
  12. Report any suspicious individual without a security pass
  13. I pay attention to details and review my work
  14. seek consent for new or consistent use of PI
  15. Collect PI only if it relates to LAC's activities
  16. Follow GC guidelines for handling classified information
  17. I report privacy breaches to my direct report/privacy team
  18. Am informed of LAC's privacy policies and procedures
  19. I know what administrative use of PI is
  20. If I have doubts about privacy issues and actions, I ask
  21. I know what non-administrative use of PI is
  22. I am aware of the consequences of a privacy breach
  23. I know what a PIB is
  24. Understand my obligations under the Privacy Act
  25. Never leave documents with PI unattended on my desk