Implement Privacy and Protection Measures Organizing Monitoring Privacy Impact Assessment (PIA) Right to Access Data Privacy Proportionality Data Subject Technical Security Data Privacy Officer Right to Data Portability Right to Damages DPA Act of 2012 Right to file a complaint Privacy Manual Disclosure/Transfer Sensitive Compliance Consolidating Personal Information Transparency Storage Disposal Lawful Processing Physical Security Data Privacy Principles Accountability Collection Personal Information Controller (PIC) Right to be informed Processing Individuals and Entities Personal Information Processor (PIP) Right to Erasure or Blocking Compatible Usage/Processing Encryption Public and Private Security Incident Personal Data Breach Legitimate Purpose Implement Privacy and Protection Measures Organizing Monitoring Privacy Impact Assessment (PIA) Right to Access Data Privacy Proportionality Data Subject Technical Security Data Privacy Officer Right to Data Portability Right to Damages DPA Act of 2012 Right to file a complaint Privacy Manual Disclosure/Transfer Sensitive Compliance Consolidating Personal Information Transparency Storage Disposal Lawful Processing Physical Security Data Privacy Principles Accountability Collection Personal Information Controller (PIC) Right to be informed Processing Individuals and Entities Personal Information Processor (PIP) Right to Erasure or Blocking Compatible Usage/Processing Encryption Public and Private Security Incident Personal Data Breach Legitimate Purpose
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Implement Privacy and Protection Measures
N-Organizing
G-Monitoring
B-Privacy Impact Assessment (PIA)
I-Right to Access
B-Data Privacy
B-Proportionality
B-Data Subject
B-Technical Security
B-Data Privacy Officer
G-Right to Data Portability
G-Right to Damages
B-Right to file a complaint
B-DPA Act of 2012
N-Privacy Manual
I-Disclosure/Transfer
N-Sensitive
B-Compliance
O-Consolidating
I-Personal Information
O-Transparency
N-Storage Disposal
G-Lawful Processing
G-Physical Security
O-Data Privacy Principles
I-Accountability
O-Collection
I-Personal Information Controller (PIC)
I-Right to be informed
N-Processing
G-Individuals and Entities
G-Personal Information Processor (PIP)
I-Right to Erasure or Blocking
O-Compatible
N-Usage/Processing
O-Encryption
G-Public and Private
I-Security Incident
N-Personal Data Breach
O-Legitimate Purpose