Ensure thePI I use isup-to-dateand accurateLock mycomputerwhen I leavemy workspaceI knowwhat aPIB isParticipatein privacytrainingKnow of theretentionperiod, afteradministrativeuse, of PII know whatadministrativeuse of PI isseekconsent fornew orconsistentuse of PII am aware oftheconsequencesof a privacybreachLimit accessto PI tothose thatneed toknowI know whatnon-administrativeuse of PI isDon't discussconfidentialinformationaround othersnot involvedReport anysuspiciousindividualwithout asecurity passAm informedof LAC'sprivacypolicies andproceduresKnow thedifferentforms ofPIReport theftor loss ofequipment ordocumentscontaining PIIdentify andmitigateprivacy risksIf I havedoubts aboutprivacyissues andactions, I askUnderstandmyobligationsunder thePrivacy ActCollect PIonly if itrelates toLAC'sactivitiesNever leavedocumentswith PIunattendedon my deskI report privacybreaches to mydirectreport/privacyteamOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkFollow GCguidelinesfor handlingclassifiedinformationKnow how torespond to aprivacybreachEnsure thePI I use isup-to-dateand accurateLock mycomputerwhen I leavemy workspaceI knowwhat aPIB isParticipatein privacytrainingKnow of theretentionperiod, afteradministrativeuse, of PII know whatadministrativeuse of PI isseekconsent fornew orconsistentuse of PII am aware oftheconsequencesof a privacybreachLimit accessto PI tothose thatneed toknowI know whatnon-administrativeuse of PI isDon't discussconfidentialinformationaround othersnot involvedReport anysuspiciousindividualwithout asecurity passAm informedof LAC'sprivacypolicies andproceduresKnow thedifferentforms ofPIReport theftor loss ofequipment ordocumentscontaining PIIdentify andmitigateprivacy risksIf I havedoubts aboutprivacyissues andactions, I askUnderstandmyobligationsunder thePrivacy ActCollect PIonly if itrelates toLAC'sactivitiesNever leavedocumentswith PIunattendedon my deskI report privacybreaches to mydirectreport/privacyteamOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkFollow GCguidelinesfor handlingclassifiedinformationKnow how torespond to aprivacybreach

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Ensure the PI I use is up-to-date and accurate
  2. Lock my computer when I leave my work space
  3. I know what a PIB is
  4. Participate in privacy training
  5. Know of the retention period, after administrative use, of PI
  6. I know what administrative use of PI is
  7. seek consent for new or consistent use of PI
  8. I am aware of the consequences of a privacy breach
  9. Limit access to PI to those that need to know
  10. I know what non-administrative use of PI is
  11. Don't discuss confidential information around others not involved
  12. Report any suspicious individual without a security pass
  13. Am informed of LAC's privacy policies and procedures
  14. Know the different forms of PI
  15. Report theft or loss of equipment or documents containing PI
  16. Identify and mitigate privacy risks
  17. If I have doubts about privacy issues and actions, I ask
  18. Understand my obligations under the Privacy Act
  19. Collect PI only if it relates to LAC's activities
  20. Never leave documents with PI unattended on my desk
  21. I report privacy breaches to my direct report/privacy team
  22. Only use PI for the purpose it was collected
  23. I pay attention to details and review my work
  24. Follow GC guidelines for handling classified information
  25. Know how to respond to a privacy breach