I know whatnon-administrativeuse of PI isLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PINever leavedocumentswith PIunattendedon my deskIf I havedoubts aboutprivacyissues andactions, I askseekconsent fornew orconsistentuse of PIDon't discussconfidentialinformationaround othersnot involvedIdentify andmitigateprivacy risksKnow thedifferentforms ofPIAm informedof LAC'sprivacypolicies andproceduresI know whatadministrativeuse of PI isLimit accessto PI tothose thatneed toknowOnly use PIfor thepurpose itwascollectedReport anysuspiciousindividualwithout asecurity passI report privacybreaches to mydirectreport/privacyteamReport theftor loss ofequipment ordocumentscontaining PICollect PIonly if itrelates toLAC'sactivitiesI payattention todetails andreview myworkParticipatein privacytrainingKnow how torespond to aprivacybreachI am aware oftheconsequencesof a privacybreachUnderstandmyobligationsunder thePrivacy ActEnsure thePI I use isup-to-dateand accurateI knowwhat aPIB isFollow GCguidelinesfor handlingclassifiedinformationI know whatnon-administrativeuse of PI isLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PINever leavedocumentswith PIunattendedon my deskIf I havedoubts aboutprivacyissues andactions, I askseekconsent fornew orconsistentuse of PIDon't discussconfidentialinformationaround othersnot involvedIdentify andmitigateprivacy risksKnow thedifferentforms ofPIAm informedof LAC'sprivacypolicies andproceduresI know whatadministrativeuse of PI isLimit accessto PI tothose thatneed toknowOnly use PIfor thepurpose itwascollectedReport anysuspiciousindividualwithout asecurity passI report privacybreaches to mydirectreport/privacyteamReport theftor loss ofequipment ordocumentscontaining PICollect PIonly if itrelates toLAC'sactivitiesI payattention todetails andreview myworkParticipatein privacytrainingKnow how torespond to aprivacybreachI am aware oftheconsequencesof a privacybreachUnderstandmyobligationsunder thePrivacy ActEnsure thePI I use isup-to-dateand accurateI knowwhat aPIB isFollow GCguidelinesfor handlingclassifiedinformation

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. I know what non-administrative use of PI is
  2. Lock my computer when I leave my work space
  3. Know of the retention period, after administrative use, of PI
  4. Never leave documents with PI unattended on my desk
  5. If I have doubts about privacy issues and actions, I ask
  6. seek consent for new or consistent use of PI
  7. Don't discuss confidential information around others not involved
  8. Identify and mitigate privacy risks
  9. Know the different forms of PI
  10. Am informed of LAC's privacy policies and procedures
  11. I know what administrative use of PI is
  12. Limit access to PI to those that need to know
  13. Only use PI for the purpose it was collected
  14. Report any suspicious individual without a security pass
  15. I report privacy breaches to my direct report/privacy team
  16. Report theft or loss of equipment or documents containing PI
  17. Collect PI only if it relates to LAC's activities
  18. I pay attention to details and review my work
  19. Participate in privacy training
  20. Know how to respond to a privacy breach
  21. I am aware of the consequences of a privacy breach
  22. Understand my obligations under the Privacy Act
  23. Ensure the PI I use is up-to-date and accurate
  24. I know what a PIB is
  25. Follow GC guidelines for handling classified information