I am aware oftheconsequencesof a privacybreachDon't discussconfidentialinformationaround othersnot involvedOnly use PIfor thepurpose itwascollectedEnsure thePI I use isup-to-dateand accurateIdentify andmitigateprivacy risksKnow thedifferentforms ofPIseekconsent fornew orconsistentuse of PIAm informedof LAC'sprivacypolicies andproceduresParticipatein privacytrainingI report privacybreaches to mydirectreport/privacyteamUnderstandmyobligationsunder thePrivacy ActCollect PIonly if itrelates toLAC'sactivitiesReport theftor loss ofequipment ordocumentscontaining PILimit accessto PI tothose thatneed toknowIf I havedoubts aboutprivacyissues andactions, I askReport anysuspiciousindividualwithout asecurity passLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PIKnow how torespond to aprivacybreachI know whatadministrativeuse of PI isNever leavedocumentswith PIunattendedon my deskI know whatnon-administrativeuse of PI isFollow GCguidelinesfor handlingclassifiedinformationI knowwhat aPIB isI payattention todetails andreview myworkI am aware oftheconsequencesof a privacybreachDon't discussconfidentialinformationaround othersnot involvedOnly use PIfor thepurpose itwascollectedEnsure thePI I use isup-to-dateand accurateIdentify andmitigateprivacy risksKnow thedifferentforms ofPIseekconsent fornew orconsistentuse of PIAm informedof LAC'sprivacypolicies andproceduresParticipatein privacytrainingI report privacybreaches to mydirectreport/privacyteamUnderstandmyobligationsunder thePrivacy ActCollect PIonly if itrelates toLAC'sactivitiesReport theftor loss ofequipment ordocumentscontaining PILimit accessto PI tothose thatneed toknowIf I havedoubts aboutprivacyissues andactions, I askReport anysuspiciousindividualwithout asecurity passLock mycomputerwhen I leavemy workspaceKnow of theretentionperiod, afteradministrativeuse, of PIKnow how torespond to aprivacybreachI know whatadministrativeuse of PI isNever leavedocumentswith PIunattendedon my deskI know whatnon-administrativeuse of PI isFollow GCguidelinesfor handlingclassifiedinformationI knowwhat aPIB isI payattention todetails andreview mywork

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. I am aware of the consequences of a privacy breach
  2. Don't discuss confidential information around others not involved
  3. Only use PI for the purpose it was collected
  4. Ensure the PI I use is up-to-date and accurate
  5. Identify and mitigate privacy risks
  6. Know the different forms of PI
  7. seek consent for new or consistent use of PI
  8. Am informed of LAC's privacy policies and procedures
  9. Participate in privacy training
  10. I report privacy breaches to my direct report/privacy team
  11. Understand my obligations under the Privacy Act
  12. Collect PI only if it relates to LAC's activities
  13. Report theft or loss of equipment or documents containing PI
  14. Limit access to PI to those that need to know
  15. If I have doubts about privacy issues and actions, I ask
  16. Report any suspicious individual without a security pass
  17. Lock my computer when I leave my work space
  18. Know of the retention period, after administrative use, of PI
  19. Know how to respond to a privacy breach
  20. I know what administrative use of PI is
  21. Never leave documents with PI unattended on my desk
  22. I know what non-administrative use of PI is
  23. Follow GC guidelines for handling classified information
  24. I know what a PIB is
  25. I pay attention to details and review my work