seekconsent fornew orconsistentuse of PII know whatnon-administrativeuse of PI isI know whatadministrativeuse of PI isLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askIdentify andmitigateprivacy risksI payattention todetails andreview myworkKnow thedifferentforms ofPIReport theftor loss ofequipment ordocumentscontaining PII knowwhat aPIB isKnow how torespond to aprivacybreachFollow GCguidelinesfor handlingclassifiedinformationI am aware oftheconsequencesof a privacybreachParticipatein privacytrainingCollect PIonly if itrelates toLAC'sactivitiesI report privacybreaches to mydirectreport/privacyteamLimit accessto PI tothose thatneed toknowReport anysuspiciousindividualwithout asecurity passOnly use PIfor thepurpose itwascollectedAm informedof LAC'sprivacypolicies andproceduresUnderstandmyobligationsunder thePrivacy ActNever leavedocumentswith PIunattendedon my deskDon't discussconfidentialinformationaround othersnot involvedEnsure thePI I use isup-to-dateand accurateseekconsent fornew orconsistentuse of PII know whatnon-administrativeuse of PI isI know whatadministrativeuse of PI isLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askIdentify andmitigateprivacy risksI payattention todetails andreview myworkKnow thedifferentforms ofPIReport theftor loss ofequipment ordocumentscontaining PII knowwhat aPIB isKnow how torespond to aprivacybreachFollow GCguidelinesfor handlingclassifiedinformationI am aware oftheconsequencesof a privacybreachParticipatein privacytrainingCollect PIonly if itrelates toLAC'sactivitiesI report privacybreaches to mydirectreport/privacyteamLimit accessto PI tothose thatneed toknowReport anysuspiciousindividualwithout asecurity passOnly use PIfor thepurpose itwascollectedAm informedof LAC'sprivacypolicies andproceduresUnderstandmyobligationsunder thePrivacy ActNever leavedocumentswith PIunattendedon my deskDon't discussconfidentialinformationaround othersnot involvedEnsure thePI I use isup-to-dateand accurate

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. seek consent for new or consistent use of PI
  2. I know what non-administrative use of PI is
  3. I know what administrative use of PI is
  4. Lock my computer when I leave my work space
  5. Know of the retention period, after administrative use, of PI
  6. If I have doubts about privacy issues and actions, I ask
  7. Identify and mitigate privacy risks
  8. I pay attention to details and review my work
  9. Know the different forms of PI
  10. Report theft or loss of equipment or documents containing PI
  11. I know what a PIB is
  12. Know how to respond to a privacy breach
  13. Follow GC guidelines for handling classified information
  14. I am aware of the consequences of a privacy breach
  15. Participate in privacy training
  16. Collect PI only if it relates to LAC's activities
  17. I report privacy breaches to my direct report/privacy team
  18. Limit access to PI to those that need to know
  19. Report any suspicious individual without a security pass
  20. Only use PI for the purpose it was collected
  21. Am informed of LAC's privacy policies and procedures
  22. Understand my obligations under the Privacy Act
  23. Never leave documents with PI unattended on my desk
  24. Don't discuss confidential information around others not involved
  25. Ensure the PI I use is up-to-date and accurate