Right to Damages DPA Act of 2012 Right to file a complaint Accountability Monitoring Legitimate Purpose Public and Private Processing Right to Data Portability Right to Access Transparency Data Privacy Officer Data Privacy Compliance Usage/Processing Implement Privacy and Protection Measures Physical Security Collection Technical Security Personal Information Processor (PIP) Data Privacy Principles Compatible Storage Disposal Personal Data Breach Individuals and Entities Personal Information Controller (PIC) Right to Erasure or Blocking Disclosure/Transfer Consolidating Sensitive Privacy Manual Data Subject Organizing Lawful Processing Right to be informed Encryption Proportionality Personal Information Privacy Impact Assessment (PIA) Security Incident Right to Damages DPA Act of 2012 Right to file a complaint Accountability Monitoring Legitimate Purpose Public and Private Processing Right to Data Portability Right to Access Transparency Data Privacy Officer Data Privacy Compliance Usage/Processing Implement Privacy and Protection Measures Physical Security Collection Technical Security Personal Information Processor (PIP) Data Privacy Principles Compatible Storage Disposal Personal Data Breach Individuals and Entities Personal Information Controller (PIC) Right to Erasure or Blocking Disclosure/Transfer Consolidating Sensitive Privacy Manual Data Subject Organizing Lawful Processing Right to be informed Encryption Proportionality Personal Information Privacy Impact Assessment (PIA) Security Incident
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Right to Damages
B-Right to file a complaint
B-DPA Act of 2012
I-Accountability
G-Monitoring
O-Legitimate Purpose
G-Public and Private
N-Processing
G-Right to Data Portability
I-Right to Access
O-Transparency
B-Data Privacy Officer
B-Data Privacy
B-Compliance
N-Usage/Processing
N-Implement Privacy and Protection Measures
G-Physical Security
O-Collection
B-Technical Security
G-Personal Information Processor (PIP)
O-Data Privacy Principles
O-Compatible
N-Storage Disposal
N-Personal Data Breach
G-Individuals and Entities
I-Personal Information Controller (PIC)
I-Right to Erasure or Blocking
I-Disclosure/Transfer
O-Consolidating
N-Sensitive
N-Privacy Manual
B-Data Subject
N-Organizing
G-Lawful Processing
I-Right to be informed
O-Encryption
B-Proportionality
I-Personal Information
B-Privacy Impact Assessment (PIA)
I-Security Incident