Know thedifferentforms ofPIReport anysuspiciousindividualwithout asecurity passReport theftor loss ofequipment ordocumentscontaining PIseekconsent fornew orconsistentuse of PILimit accessto PI tothose thatneed toknowIdentify andmitigateprivacy risksKnow how torespond to aprivacybreachI knowwhat aPIB isIf I havedoubts aboutprivacyissues andactions, I askOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkKnow of theretentionperiod, afteradministrativeuse, of PII am aware oftheconsequencesof a privacybreachAm informedof LAC'sprivacypolicies andproceduresNever leavedocumentswith PIunattendedon my deskI report privacybreaches to mydirectreport/privacyteamLock mycomputerwhen I leavemy workspaceDon't discussconfidentialinformationaround othersnot involvedParticipatein privacytrainingFollow GCguidelinesfor handlingclassifiedinformationCollect PIonly if itrelates toLAC'sactivitiesUnderstandmyobligationsunder thePrivacy ActEnsure thePI I use isup-to-dateand accurateI know whatadministrativeuse of PI isI know whatnon-administrativeuse of PI isKnow thedifferentforms ofPIReport anysuspiciousindividualwithout asecurity passReport theftor loss ofequipment ordocumentscontaining PIseekconsent fornew orconsistentuse of PILimit accessto PI tothose thatneed toknowIdentify andmitigateprivacy risksKnow how torespond to aprivacybreachI knowwhat aPIB isIf I havedoubts aboutprivacyissues andactions, I askOnly use PIfor thepurpose itwascollectedI payattention todetails andreview myworkKnow of theretentionperiod, afteradministrativeuse, of PII am aware oftheconsequencesof a privacybreachAm informedof LAC'sprivacypolicies andproceduresNever leavedocumentswith PIunattendedon my deskI report privacybreaches to mydirectreport/privacyteamLock mycomputerwhen I leavemy workspaceDon't discussconfidentialinformationaround othersnot involvedParticipatein privacytrainingFollow GCguidelinesfor handlingclassifiedinformationCollect PIonly if itrelates toLAC'sactivitiesUnderstandmyobligationsunder thePrivacy ActEnsure thePI I use isup-to-dateand accurateI know whatadministrativeuse of PI isI know whatnon-administrativeuse of PI is

Privacy Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Know the different forms of PI
  2. Report any suspicious individual without a security pass
  3. Report theft or loss of equipment or documents containing PI
  4. seek consent for new or consistent use of PI
  5. Limit access to PI to those that need to know
  6. Identify and mitigate privacy risks
  7. Know how to respond to a privacy breach
  8. I know what a PIB is
  9. If I have doubts about privacy issues and actions, I ask
  10. Only use PI for the purpose it was collected
  11. I pay attention to details and review my work
  12. Know of the retention period, after administrative use, of PI
  13. I am aware of the consequences of a privacy breach
  14. Am informed of LAC's privacy policies and procedures
  15. Never leave documents with PI unattended on my desk
  16. I report privacy breaches to my direct report/privacy team
  17. Lock my computer when I leave my work space
  18. Don't discuss confidential information around others not involved
  19. Participate in privacy training
  20. Follow GC guidelines for handling classified information
  21. Collect PI only if it relates to LAC's activities
  22. Understand my obligations under the Privacy Act
  23. Ensure the PI I use is up-to-date and accurate
  24. I know what administrative use of PI is
  25. I know what non-administrative use of PI is