Know of theretentionperiod, afteradministrativeuse, of PIReport anysuspiciousindividualwithout asecurity passNever leavedocumentswith PIunattendedon my deskDon't discussconfidentialinformationaround othersnot involvedI knowwhat aPIB isI payattention todetails andreview myworkKnow thedifferentforms ofPILock mycomputerwhen I leavemy workspaceOnly use PIfor thepurpose itwascollectedIdentify andmitigateprivacy risksReport theftor loss ofequipment ordocumentscontaining PIEnsure thePI I use isup-to-dateand accurateParticipatein privacytrainingIf I havedoubts aboutprivacyissues andactions, I askI am aware oftheconsequencesof a privacybreachAm informedof LAC'sprivacypolicies andproceduresseekconsent fornew orconsistentuse of PII know whatnon-administrativeuse of PI isI report privacybreaches to mydirectreport/privacyteamKnow how torespond to aprivacybreachCollect PIonly if itrelates toLAC'sactivitiesFollow GCguidelinesfor handlingclassifiedinformationLimit accessto PI tothose thatneed toknowI know whatadministrativeuse of PI isUnderstandmyobligationsunder thePrivacy ActKnow of theretentionperiod, afteradministrativeuse, of PIReport anysuspiciousindividualwithout asecurity passNever leavedocumentswith PIunattendedon my deskDon't discussconfidentialinformationaround othersnot involvedI knowwhat aPIB isI payattention todetails andreview myworkKnow thedifferentforms ofPILock mycomputerwhen I leavemy workspaceOnly use PIfor thepurpose itwascollectedIdentify andmitigateprivacy risksReport theftor loss ofequipment ordocumentscontaining PIEnsure thePI I use isup-to-dateand accurateParticipatein privacytrainingIf I havedoubts aboutprivacyissues andactions, I askI am aware oftheconsequencesof a privacybreachAm informedof LAC'sprivacypolicies andproceduresseekconsent fornew orconsistentuse of PII know whatnon-administrativeuse of PI isI report privacybreaches to mydirectreport/privacyteamKnow how torespond to aprivacybreachCollect PIonly if itrelates toLAC'sactivitiesFollow GCguidelinesfor handlingclassifiedinformationLimit accessto PI tothose thatneed toknowI know whatadministrativeuse of PI isUnderstandmyobligationsunder thePrivacy Act

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Know of the retention period, after administrative use, of PI
  2. Report any suspicious individual without a security pass
  3. Never leave documents with PI unattended on my desk
  4. Don't discuss confidential information around others not involved
  5. I know what a PIB is
  6. I pay attention to details and review my work
  7. Know the different forms of PI
  8. Lock my computer when I leave my work space
  9. Only use PI for the purpose it was collected
  10. Identify and mitigate privacy risks
  11. Report theft or loss of equipment or documents containing PI
  12. Ensure the PI I use is up-to-date and accurate
  13. Participate in privacy training
  14. If I have doubts about privacy issues and actions, I ask
  15. I am aware of the consequences of a privacy breach
  16. Am informed of LAC's privacy policies and procedures
  17. seek consent for new or consistent use of PI
  18. I know what non-administrative use of PI is
  19. I report privacy breaches to my direct report/privacy team
  20. Know how to respond to a privacy breach
  21. Collect PI only if it relates to LAC's activities
  22. Follow GC guidelines for handling classified information
  23. Limit access to PI to those that need to know
  24. I know what administrative use of PI is
  25. Understand my obligations under the Privacy Act