Usage/ProcessingPersonalInformationProcessor(PIP)DataPrivacyPersonalInformationTechnicalSecurityMonitoringEncryptionPublicandPrivatePhysicalSecurityLegitimatePurposePersonalInformationController(PIC)DPAAct of2012Right tofile acomplaintRight tobeinformedProcessingProportionalityConsolidatingCompliancePrivacyImpactAssessment(PIA)Right toDataPortabilityAccountabilitySecurityIncidentIndividualsandEntitiesTransparencyPrivacyManualDataPrivacyOfficerPersonalDataBreachCompatibleLawfulProcessingCollectionImplementPrivacy andProtectionMeasuresRight toDamagesSensitiveDataPrivacyPrinciplesDataSubjectRighttoAccessOrganizingStorageDisposalRight toErasureorBlockingDisclosure/TransferUsage/ProcessingPersonalInformationProcessor(PIP)DataPrivacyPersonalInformationTechnicalSecurityMonitoringEncryptionPublicandPrivatePhysicalSecurityLegitimatePurposePersonalInformationController(PIC)DPAAct of2012Right tofile acomplaintRight tobeinformedProcessingProportionalityConsolidatingCompliancePrivacyImpactAssessment(PIA)Right toDataPortabilityAccountabilitySecurityIncidentIndividualsandEntitiesTransparencyPrivacyManualDataPrivacyOfficerPersonalDataBreachCompatibleLawfulProcessingCollectionImplementPrivacy andProtectionMeasuresRight toDamagesSensitiveDataPrivacyPrinciplesDataSubjectRighttoAccessOrganizingStorageDisposalRight toErasureorBlockingDisclosure/Transfer

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
B
4
I
5
B
6
G
7
O
8
G
9
G
10
O
11
I
12
B B
13
I
14
N
15
B
16
O
17
B
18
B
19
G
20
I
21
I
22
G
23
O
24
N
25
B
26
N
27
O
28
G
29
O
30
N
31
G
32
N
33
O
34
B
35
I
36
N
37
N
38
I
39
I
  1. N-Usage/Processing
  2. G-Personal Information Processor (PIP)
  3. B-Data Privacy
  4. I-Personal Information
  5. B-Technical Security
  6. G-Monitoring
  7. O-Encryption
  8. G-Public and Private
  9. G-Physical Security
  10. O-Legitimate Purpose
  11. I-Personal Information Controller (PIC)
  12. B-Right to file a complaint
    B-DPA Act of 2012
  13. I-Right to be informed
  14. N-Processing
  15. B-Proportionality
  16. O-Consolidating
  17. B-Compliance
  18. B-Privacy Impact Assessment (PIA)
  19. G-Right to Data Portability
  20. I-Accountability
  21. I-Security Incident
  22. G-Individuals and Entities
  23. O-Transparency
  24. N-Privacy Manual
  25. B-Data Privacy Officer
  26. N-Personal Data Breach
  27. O-Compatible
  28. G-Lawful Processing
  29. O-Collection
  30. N-Implement Privacy and Protection Measures
  31. G-Right to Damages
  32. N-Sensitive
  33. O-Data Privacy Principles
  34. B-Data Subject
  35. I-Right to Access
  36. N-Organizing
  37. N-Storage Disposal
  38. I-Right to Erasure or Blocking
  39. I-Disclosure/Transfer