PersonalDataBreachLegitimatePurposeComplianceProportionalityPersonalInformationProcessor(PIP)Right toDamagesTransparencyDataPrivacyPrinciplesRighttoAccessMonitoringDataPrivacyOfficerTechnicalSecuritySensitivePersonalInformationController(PIC)PersonalInformationCompatiblePublicandPrivateUsage/ProcessingSecurityIncidentStorageDisposalPhysicalSecurityConsolidatingProcessingDPAAct of2012Right tofile acomplaintDisclosure/TransferImplementPrivacy andProtectionMeasuresOrganizingEncryptionPrivacyManualRight toDataPortabilityRight toErasureorBlockingDataPrivacyRight tobeinformedAccountabilityDataSubjectPrivacyImpactAssessment(PIA)CollectionLawfulProcessingIndividualsandEntitiesPersonalDataBreachLegitimatePurposeComplianceProportionalityPersonalInformationProcessor(PIP)Right toDamagesTransparencyDataPrivacyPrinciplesRighttoAccessMonitoringDataPrivacyOfficerTechnicalSecuritySensitivePersonalInformationController(PIC)PersonalInformationCompatiblePublicandPrivateUsage/ProcessingSecurityIncidentStorageDisposalPhysicalSecurityConsolidatingProcessingDPAAct of2012Right tofile acomplaintDisclosure/TransferImplementPrivacy andProtectionMeasuresOrganizingEncryptionPrivacyManualRight toDataPortabilityRight toErasureorBlockingDataPrivacyRight tobeinformedAccountabilityDataSubjectPrivacyImpactAssessment(PIA)CollectionLawfulProcessingIndividualsandEntities

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
O
3
B
4
B
5
G
6
G
7
O
8
O
9
I
10
G
11
B
12
B
13
N
14
I
15
I
16
O
17
G
18
N
19
I
20
N
21
G
22
O
23
N
24
B B
25
I
26
N
27
N
28
O
29
N
30
G
31
I
32
B
33
I
34
I
35
B
36
B
37
O
38
G
39
G
  1. N-Personal Data Breach
  2. O-Legitimate Purpose
  3. B-Compliance
  4. B-Proportionality
  5. G-Personal Information Processor (PIP)
  6. G-Right to Damages
  7. O-Transparency
  8. O-Data Privacy Principles
  9. I-Right to Access
  10. G-Monitoring
  11. B-Data Privacy Officer
  12. B-Technical Security
  13. N-Sensitive
  14. I-Personal Information Controller (PIC)
  15. I-Personal Information
  16. O-Compatible
  17. G-Public and Private
  18. N-Usage/Processing
  19. I-Security Incident
  20. N-Storage Disposal
  21. G-Physical Security
  22. O-Consolidating
  23. N-Processing
  24. B-Right to file a complaint
    B-DPA Act of 2012
  25. I-Disclosure/Transfer
  26. N-Implement Privacy and Protection Measures
  27. N-Organizing
  28. O-Encryption
  29. N-Privacy Manual
  30. G-Right to Data Portability
  31. I-Right to Erasure or Blocking
  32. B-Data Privacy
  33. I-Right to be informed
  34. I-Accountability
  35. B-Data Subject
  36. B-Privacy Impact Assessment (PIA)
  37. O-Collection
  38. G-Lawful Processing
  39. G-Individuals and Entities