I report privacybreaches to mydirectreport/privacyteamNever leavedocumentswith PIunattendedon my deskIdentify andmitigateprivacy risksKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askI am aware oftheconsequencesof a privacybreachseekconsent fornew orconsistentuse of PIOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkKnow how torespond to aprivacybreachReport anysuspiciousindividualwithout asecurity passKnow thedifferentforms ofPII know whatadministrativeuse of PI isAm informedof LAC'sprivacypolicies andproceduresEnsure thePI I use isup-to-dateand accurateReport theftor loss ofequipment ordocumentscontaining PIDon't discussconfidentialinformationaround othersnot involvedCollect PIonly if itrelates toLAC'sactivitiesI knowwhat aPIB isLimit accessto PI tothose thatneed toknowFollow GCguidelinesfor handlingclassifiedinformationLock mycomputerwhen I leavemy workspaceUnderstandmyobligationsunder thePrivacy ActI know whatnon-administrativeuse of PI isParticipatein privacytrainingI report privacybreaches to mydirectreport/privacyteamNever leavedocumentswith PIunattendedon my deskIdentify andmitigateprivacy risksKnow of theretentionperiod, afteradministrativeuse, of PIIf I havedoubts aboutprivacyissues andactions, I askI am aware oftheconsequencesof a privacybreachseekconsent fornew orconsistentuse of PIOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkKnow how torespond to aprivacybreachReport anysuspiciousindividualwithout asecurity passKnow thedifferentforms ofPII know whatadministrativeuse of PI isAm informedof LAC'sprivacypolicies andproceduresEnsure thePI I use isup-to-dateand accurateReport theftor loss ofequipment ordocumentscontaining PIDon't discussconfidentialinformationaround othersnot involvedCollect PIonly if itrelates toLAC'sactivitiesI knowwhat aPIB isLimit accessto PI tothose thatneed toknowFollow GCguidelinesfor handlingclassifiedinformationLock mycomputerwhen I leavemy workspaceUnderstandmyobligationsunder thePrivacy ActI know whatnon-administrativeuse of PI isParticipatein privacytraining

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. I report privacy breaches to my direct report/privacy team
  2. Never leave documents with PI unattended on my desk
  3. Identify and mitigate privacy risks
  4. Know of the retention period, after administrative use, of PI
  5. If I have doubts about privacy issues and actions, I ask
  6. I am aware of the consequences of a privacy breach
  7. seek consent for new or consistent use of PI
  8. Only use PI for the purpose it was collected
  9. I pay attention to details and review my work
  10. Know how to respond to a privacy breach
  11. Report any suspicious individual without a security pass
  12. Know the different forms of PI
  13. I know what administrative use of PI is
  14. Am informed of LAC's privacy policies and procedures
  15. Ensure the PI I use is up-to-date and accurate
  16. Report theft or loss of equipment or documents containing PI
  17. Don't discuss confidential information around others not involved
  18. Collect PI only if it relates to LAC's activities
  19. I know what a PIB is
  20. Limit access to PI to those that need to know
  21. Follow GC guidelines for handling classified information
  22. Lock my computer when I leave my work space
  23. Understand my obligations under the Privacy Act
  24. I know what non-administrative use of PI is
  25. Participate in privacy training