Right toDataPortabilityTransparencyDataPrivacyOfficerPersonalDataBreachRight toDamagesCompatibleDataSubjectCollectionUsage/ProcessingLawfulProcessingOrganizingPersonalInformationProportionalityStorageDisposalIndividualsandEntitiesSecurityIncidentTechnicalSecurityDPAAct of2012Right tofile acomplaintMonitoringDataPrivacyAccountabilityLegitimatePurposeRighttoAccessRight tobeinformedRight toErasureorBlockingSensitiveDataPrivacyPrinciplesPublicandPrivateEncryptionPersonalInformationProcessor(PIP)PhysicalSecurityPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresPersonalInformationController(PIC)CompliancePrivacyManualDisclosure/TransferProcessingConsolidatingRight toDataPortabilityTransparencyDataPrivacyOfficerPersonalDataBreachRight toDamagesCompatibleDataSubjectCollectionUsage/ProcessingLawfulProcessingOrganizingPersonalInformationProportionalityStorageDisposalIndividualsandEntitiesSecurityIncidentTechnicalSecurityDPAAct of2012Right tofile acomplaintMonitoringDataPrivacyAccountabilityLegitimatePurposeRighttoAccessRight tobeinformedRight toErasureorBlockingSensitiveDataPrivacyPrinciplesPublicandPrivateEncryptionPersonalInformationProcessor(PIP)PhysicalSecurityPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresPersonalInformationController(PIC)CompliancePrivacyManualDisclosure/TransferProcessingConsolidating

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
O
3
B
4
N
5
G
6
O
7
B
8
O
9
N
10
G
11
N
12
I
13
B
14
N
15
G
16
I
17
B
18
B B
19
G
20
B
21
I
22
O
23
I
24
I
25
I
26
N
27
O
28
G
29
O
30
G
31
G
32
B
33
N
34
I
35
B
36
N
37
I
38
N
39
O
  1. G-Right to Data Portability
  2. O-Transparency
  3. B-Data Privacy Officer
  4. N-Personal Data Breach
  5. G-Right to Damages
  6. O-Compatible
  7. B-Data Subject
  8. O-Collection
  9. N-Usage/Processing
  10. G-Lawful Processing
  11. N-Organizing
  12. I-Personal Information
  13. B-Proportionality
  14. N-Storage Disposal
  15. G-Individuals and Entities
  16. I-Security Incident
  17. B-Technical Security
  18. B-Right to file a complaint
    B-DPA Act of 2012
  19. G-Monitoring
  20. B-Data Privacy
  21. I-Accountability
  22. O-Legitimate Purpose
  23. I-Right to Access
  24. I-Right to be informed
  25. I-Right to Erasure or Blocking
  26. N-Sensitive
  27. O-Data Privacy Principles
  28. G-Public and Private
  29. O-Encryption
  30. G-Personal Information Processor (PIP)
  31. G-Physical Security
  32. B-Privacy Impact Assessment (PIA)
  33. N-Implement Privacy and Protection Measures
  34. I-Personal Information Controller (PIC)
  35. B-Compliance
  36. N-Privacy Manual
  37. I-Disclosure/Transfer
  38. N-Processing
  39. O-Consolidating