Follow GCguidelinesfor handlingclassifiedinformationReport anysuspiciousindividualwithout asecurity passI payattention todetails andreview myworkseekconsent fornew orconsistentuse of PIIdentify andmitigateprivacy risksDon't discussconfidentialinformationaround othersnot involvedUnderstandmyobligationsunder thePrivacy ActI know whatnon-administrativeuse of PI isAm informedof LAC'sprivacypolicies andproceduresOnly use PIfor thepurpose itwascollectedKnow of theretentionperiod, afteradministrativeuse, of PII know whatadministrativeuse of PI isParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachEnsure thePI I use isup-to-dateand accurateLimit accessto PI tothose thatneed toknowI knowwhat aPIB isCollect PIonly if itrelates toLAC'sactivitiesLock mycomputerwhen I leavemy workspaceKnow how torespond to aprivacybreachReport theftor loss ofequipment ordocumentscontaining PII report privacybreaches to mydirectreport/privacyteamIf I havedoubts aboutprivacyissues andactions, I askNever leavedocumentswith PIunattendedon my deskKnow thedifferentforms ofPIFollow GCguidelinesfor handlingclassifiedinformationReport anysuspiciousindividualwithout asecurity passI payattention todetails andreview myworkseekconsent fornew orconsistentuse of PIIdentify andmitigateprivacy risksDon't discussconfidentialinformationaround othersnot involvedUnderstandmyobligationsunder thePrivacy ActI know whatnon-administrativeuse of PI isAm informedof LAC'sprivacypolicies andproceduresOnly use PIfor thepurpose itwascollectedKnow of theretentionperiod, afteradministrativeuse, of PII know whatadministrativeuse of PI isParticipatein privacytrainingI am aware oftheconsequencesof a privacybreachEnsure thePI I use isup-to-dateand accurateLimit accessto PI tothose thatneed toknowI knowwhat aPIB isCollect PIonly if itrelates toLAC'sactivitiesLock mycomputerwhen I leavemy workspaceKnow how torespond to aprivacybreachReport theftor loss ofequipment ordocumentscontaining PII report privacybreaches to mydirectreport/privacyteamIf I havedoubts aboutprivacyissues andactions, I askNever leavedocumentswith PIunattendedon my deskKnow thedifferentforms ofPI

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Follow GC guidelines for handling classified information
  2. Report any suspicious individual without a security pass
  3. I pay attention to details and review my work
  4. seek consent for new or consistent use of PI
  5. Identify and mitigate privacy risks
  6. Don't discuss confidential information around others not involved
  7. Understand my obligations under the Privacy Act
  8. I know what non-administrative use of PI is
  9. Am informed of LAC's privacy policies and procedures
  10. Only use PI for the purpose it was collected
  11. Know of the retention period, after administrative use, of PI
  12. I know what administrative use of PI is
  13. Participate in privacy training
  14. I am aware of the consequences of a privacy breach
  15. Ensure the PI I use is up-to-date and accurate
  16. Limit access to PI to those that need to know
  17. I know what a PIB is
  18. Collect PI only if it relates to LAC's activities
  19. Lock my computer when I leave my work space
  20. Know how to respond to a privacy breach
  21. Report theft or loss of equipment or documents containing PI
  22. I report privacy breaches to my direct report/privacy team
  23. If I have doubts about privacy issues and actions, I ask
  24. Never leave documents with PI unattended on my desk
  25. Know the different forms of PI