PrivacyManualComplianceUsage/ProcessingTransparencyConsolidatingIndividualsandEntitiesPersonalInformationPrivacyImpactAssessment(PIA)CollectionPersonalDataBreachDPAAct of2012Right tofile acomplaintMonitoringDataPrivacyRighttoAccessOrganizingCompatibleRight toDataPortabilityDataPrivacyPrinciplesProcessingAccountabilityLegitimatePurposeImplementPrivacy andProtectionMeasuresDataPrivacyOfficerDisclosure/TransferLawfulProcessingRight toErasureorBlockingSensitiveDataSubjectSecurityIncidentPersonalInformationController(PIC)StorageDisposalProportionalityEncryptionTechnicalSecurityPublicandPrivateRight tobeinformedPhysicalSecurityPersonalInformationProcessor(PIP)Right toDamagesPrivacyManualComplianceUsage/ProcessingTransparencyConsolidatingIndividualsandEntitiesPersonalInformationPrivacyImpactAssessment(PIA)CollectionPersonalDataBreachDPAAct of2012Right tofile acomplaintMonitoringDataPrivacyRighttoAccessOrganizingCompatibleRight toDataPortabilityDataPrivacyPrinciplesProcessingAccountabilityLegitimatePurposeImplementPrivacy andProtectionMeasuresDataPrivacyOfficerDisclosure/TransferLawfulProcessingRight toErasureorBlockingSensitiveDataSubjectSecurityIncidentPersonalInformationController(PIC)StorageDisposalProportionalityEncryptionTechnicalSecurityPublicandPrivateRight tobeinformedPhysicalSecurityPersonalInformationProcessor(PIP)Right toDamages

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
B
3
N
4
O
5
O
6
G
7
I
8
B
9
O
10
N
11
B B
12
G
13
B
14
I
15
N
16
O
17
G
18
O
19
N
20
I
21
O
22
N
23
B
24
I
25
G
26
I
27
N
28
B
29
I
30
I
31
N
32
B
33
O
34
B
35
G
36
I
37
G
38
G
39
G
  1. N-Privacy Manual
  2. B-Compliance
  3. N-Usage/Processing
  4. O-Transparency
  5. O-Consolidating
  6. G-Individuals and Entities
  7. I-Personal Information
  8. B-Privacy Impact Assessment (PIA)
  9. O-Collection
  10. N-Personal Data Breach
  11. B-Right to file a complaint
    B-DPA Act of 2012
  12. G-Monitoring
  13. B-Data Privacy
  14. I-Right to Access
  15. N-Organizing
  16. O-Compatible
  17. G-Right to Data Portability
  18. O-Data Privacy Principles
  19. N-Processing
  20. I-Accountability
  21. O-Legitimate Purpose
  22. N-Implement Privacy and Protection Measures
  23. B-Data Privacy Officer
  24. I-Disclosure/Transfer
  25. G-Lawful Processing
  26. I-Right to Erasure or Blocking
  27. N-Sensitive
  28. B-Data Subject
  29. I-Security Incident
  30. I-Personal Information Controller (PIC)
  31. N-Storage Disposal
  32. B-Proportionality
  33. O-Encryption
  34. B-Technical Security
  35. G-Public and Private
  36. I-Right to be informed
  37. G-Physical Security
  38. G-Personal Information Processor (PIP)
  39. G-Right to Damages