PersonalInformationDPAAct of2012Right tofile acomplaintTransparencySensitiveCompatibleDataSubjectPrivacyManualPrivacyImpactAssessment(PIA)DataPrivacyDisclosure/TransferConsolidatingUsage/ProcessingStorageDisposalLawfulProcessingSecurityIncidentIndividualsandEntitiesRight tobeinformedPhysicalSecurityProcessingPersonalInformationController(PIC)PublicandPrivateImplementPrivacy andProtectionMeasuresMonitoringLegitimatePurposeDataPrivacyOfficerCollectionComplianceAccountabilityOrganizingDataPrivacyPrinciplesRight toDataPortabilityRighttoAccessPersonalDataBreachEncryptionProportionalityPersonalInformationProcessor(PIP)TechnicalSecurityRight toErasureorBlockingRight toDamagesPersonalInformationDPAAct of2012Right tofile acomplaintTransparencySensitiveCompatibleDataSubjectPrivacyManualPrivacyImpactAssessment(PIA)DataPrivacyDisclosure/TransferConsolidatingUsage/ProcessingStorageDisposalLawfulProcessingSecurityIncidentIndividualsandEntitiesRight tobeinformedPhysicalSecurityProcessingPersonalInformationController(PIC)PublicandPrivateImplementPrivacy andProtectionMeasuresMonitoringLegitimatePurposeDataPrivacyOfficerCollectionComplianceAccountabilityOrganizingDataPrivacyPrinciplesRight toDataPortabilityRighttoAccessPersonalDataBreachEncryptionProportionalityPersonalInformationProcessor(PIP)TechnicalSecurityRight toErasureorBlockingRight toDamages

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B B
3
O
4
N
5
O
6
B
7
N
8
B
9
B
10
I
11
O
12
N
13
N
14
G
15
I
16
G
17
I
18
G
19
N
20
I
21
G
22
N
23
G
24
O
25
B
26
O
27
B
28
I
29
N
30
O
31
G
32
I
33
N
34
O
35
B
36
G
37
B
38
I
39
G
  1. I-Personal Information
  2. B-Right to file a complaint
    B-DPA Act of 2012
  3. O-Transparency
  4. N-Sensitive
  5. O-Compatible
  6. B-Data Subject
  7. N-Privacy Manual
  8. B-Privacy Impact Assessment (PIA)
  9. B-Data Privacy
  10. I-Disclosure/Transfer
  11. O-Consolidating
  12. N-Usage/Processing
  13. N-Storage Disposal
  14. G-Lawful Processing
  15. I-Security Incident
  16. G-Individuals and Entities
  17. I-Right to be informed
  18. G-Physical Security
  19. N-Processing
  20. I-Personal Information Controller (PIC)
  21. G-Public and Private
  22. N-Implement Privacy and Protection Measures
  23. G-Monitoring
  24. O-Legitimate Purpose
  25. B-Data Privacy Officer
  26. O-Collection
  27. B-Compliance
  28. I-Accountability
  29. N-Organizing
  30. O-Data Privacy Principles
  31. G-Right to Data Portability
  32. I-Right to Access
  33. N-Personal Data Breach
  34. O-Encryption
  35. B-Proportionality
  36. G-Personal Information Processor (PIP)
  37. B-Technical Security
  38. I-Right to Erasure or Blocking
  39. G-Right to Damages