Only use PIfor thepurpose itwascollectedI knowwhat aPIB isLimit accessto PI tothose thatneed toknowAm informedof LAC'sprivacypolicies andproceduresNever leavedocumentswith PIunattendedon my deskI payattention todetails andreview myworkI report privacybreaches to mydirectreport/privacyteamLock mycomputerwhen I leavemy workspaceReport theftor loss ofequipment ordocumentscontaining PII know whatadministrativeuse of PI isKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askKnow how torespond to aprivacybreachIdentify andmitigateprivacy risksParticipatein privacytrainingReport anysuspiciousindividualwithout asecurity passUnderstandmyobligationsunder thePrivacy Actseekconsent fornew orconsistentuse of PIKnow thedifferentforms ofPIDon't discussconfidentialinformationaround othersnot involvedI am aware oftheconsequencesof a privacybreachEnsure thePI I use isup-to-dateand accurateCollect PIonly if itrelates toLAC'sactivitiesI know whatnon-administrativeuse of PI isFollow GCguidelinesfor handlingclassifiedinformationOnly use PIfor thepurpose itwascollectedI knowwhat aPIB isLimit accessto PI tothose thatneed toknowAm informedof LAC'sprivacypolicies andproceduresNever leavedocumentswith PIunattendedon my deskI payattention todetails andreview myworkI report privacybreaches to mydirectreport/privacyteamLock mycomputerwhen I leavemy workspaceReport theftor loss ofequipment ordocumentscontaining PII know whatadministrativeuse of PI isKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askKnow how torespond to aprivacybreachIdentify andmitigateprivacy risksParticipatein privacytrainingReport anysuspiciousindividualwithout asecurity passUnderstandmyobligationsunder thePrivacy Actseekconsent fornew orconsistentuse of PIKnow thedifferentforms ofPIDon't discussconfidentialinformationaround othersnot involvedI am aware oftheconsequencesof a privacybreachEnsure thePI I use isup-to-dateand accurateCollect PIonly if itrelates toLAC'sactivitiesI know whatnon-administrativeuse of PI isFollow GCguidelinesfor handlingclassifiedinformation

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Only use PI for the purpose it was collected
  2. I know what a PIB is
  3. Limit access to PI to those that need to know
  4. Am informed of LAC's privacy policies and procedures
  5. Never leave documents with PI unattended on my desk
  6. I pay attention to details and review my work
  7. I report privacy breaches to my direct report/privacy team
  8. Lock my computer when I leave my work space
  9. Report theft or loss of equipment or documents containing PI
  10. I know what administrative use of PI is
  11. Know of the retention period, after administrative use, of PI
  12. If I have doubts about privacy issues and actions, I ask
  13. Know how to respond to a privacy breach
  14. Identify and mitigate privacy risks
  15. Participate in privacy training
  16. Report any suspicious individual without a security pass
  17. Understand my obligations under the Privacy Act
  18. seek consent for new or consistent use of PI
  19. Know the different forms of PI
  20. Don't discuss confidential information around others not involved
  21. I am aware of the consequences of a privacy breach
  22. Ensure the PI I use is up-to-date and accurate
  23. Collect PI only if it relates to LAC's activities
  24. I know what non-administrative use of PI is
  25. Follow GC guidelines for handling classified information