MonitoringPersonalInformationCollectionProcessingDataPrivacyPrinciplesComplianceRight tobeinformedPersonalDataBreachPersonalInformationController(PIC)PhysicalSecurityDataPrivacyPrivacyImpactAssessment(PIA)AccountabilityDisclosure/TransferConsolidatingStorageDisposalLegitimatePurposeRight toErasureorBlockingUsage/ProcessingLawfulProcessingDataPrivacyOfficerImplementPrivacy andProtectionMeasuresDPAAct of2012Right tofile acomplaintIndividualsandEntitiesSensitiveDataSubjectRighttoAccessPublicandPrivatePrivacyManualOrganizingProportionalityRight toDataPortabilityRight toDamagesEncryptionCompatibleTechnicalSecuritySecurityIncidentTransparencyPersonalInformationProcessor(PIP)MonitoringPersonalInformationCollectionProcessingDataPrivacyPrinciplesComplianceRight tobeinformedPersonalDataBreachPersonalInformationController(PIC)PhysicalSecurityDataPrivacyPrivacyImpactAssessment(PIA)AccountabilityDisclosure/TransferConsolidatingStorageDisposalLegitimatePurposeRight toErasureorBlockingUsage/ProcessingLawfulProcessingDataPrivacyOfficerImplementPrivacy andProtectionMeasuresDPAAct of2012Right tofile acomplaintIndividualsandEntitiesSensitiveDataSubjectRighttoAccessPublicandPrivatePrivacyManualOrganizingProportionalityRight toDataPortabilityRight toDamagesEncryptionCompatibleTechnicalSecuritySecurityIncidentTransparencyPersonalInformationProcessor(PIP)

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
O
4
N
5
O
6
B
7
I
8
N
9
I
10
G
11
B
12
B
13
I
14
I
15
O
16
N
17
O
18
I
19
N
20
G
21
B
22
N
23
B B
24
G
25
N
26
B
27
I
28
G
29
N
30
N
31
B
32
G
33
G
34
O
35
O
36
B
37
I
38
O
39
G
  1. G-Monitoring
  2. I-Personal Information
  3. O-Collection
  4. N-Processing
  5. O-Data Privacy Principles
  6. B-Compliance
  7. I-Right to be informed
  8. N-Personal Data Breach
  9. I-Personal Information Controller (PIC)
  10. G-Physical Security
  11. B-Data Privacy
  12. B-Privacy Impact Assessment (PIA)
  13. I-Accountability
  14. I-Disclosure/Transfer
  15. O-Consolidating
  16. N-Storage Disposal
  17. O-Legitimate Purpose
  18. I-Right to Erasure or Blocking
  19. N-Usage/Processing
  20. G-Lawful Processing
  21. B-Data Privacy Officer
  22. N-Implement Privacy and Protection Measures
  23. B-Right to file a complaint
    B-DPA Act of 2012
  24. G-Individuals and Entities
  25. N-Sensitive
  26. B-Data Subject
  27. I-Right to Access
  28. G-Public and Private
  29. N-Privacy Manual
  30. N-Organizing
  31. B-Proportionality
  32. G-Right to Data Portability
  33. G-Right to Damages
  34. O-Encryption
  35. O-Compatible
  36. B-Technical Security
  37. I-Security Incident
  38. O-Transparency
  39. G-Personal Information Processor (PIP)