Privacy Manual Compliance Usage/Processing Transparency Consolidating Individuals and Entities Personal Information Privacy Impact Assessment (PIA) Collection Personal Data Breach DPA Act of 2012 Right to file a complaint Monitoring Data Privacy Right to Access Organizing Compatible Right to Data Portability Data Privacy Principles Processing Accountability Legitimate Purpose Implement Privacy and Protection Measures Data Privacy Officer Disclosure/Transfer Lawful Processing Right to Erasure or Blocking Sensitive Data Subject Security Incident Personal Information Controller (PIC) Storage Disposal Proportionality Encryption Technical Security Public and Private Right to be informed Physical Security Personal Information Processor (PIP) Right to Damages Privacy Manual Compliance Usage/Processing Transparency Consolidating Individuals and Entities Personal Information Privacy Impact Assessment (PIA) Collection Personal Data Breach DPA Act of 2012 Right to file a complaint Monitoring Data Privacy Right to Access Organizing Compatible Right to Data Portability Data Privacy Principles Processing Accountability Legitimate Purpose Implement Privacy and Protection Measures Data Privacy Officer Disclosure/Transfer Lawful Processing Right to Erasure or Blocking Sensitive Data Subject Security Incident Personal Information Controller (PIC) Storage Disposal Proportionality Encryption Technical Security Public and Private Right to be informed Physical Security Personal Information Processor (PIP) Right to Damages
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Privacy Manual
B-Compliance
N-Usage/Processing
O-Transparency
O-Consolidating
G-Individuals and Entities
I-Personal Information
B-Privacy Impact Assessment (PIA)
O-Collection
N-Personal Data Breach
B-Right to file a complaint
B-DPA Act of 2012
G-Monitoring
B-Data Privacy
I-Right to Access
N-Organizing
O-Compatible
G-Right to Data Portability
O-Data Privacy Principles
N-Processing
I-Accountability
O-Legitimate Purpose
N-Implement Privacy and Protection Measures
B-Data Privacy Officer
I-Disclosure/Transfer
G-Lawful Processing
I-Right to Erasure or Blocking
N-Sensitive
B-Data Subject
I-Security Incident
I-Personal Information Controller (PIC)
N-Storage Disposal
B-Proportionality
O-Encryption
B-Technical Security
G-Public and Private
I-Right to be informed
G-Physical Security
G-Personal Information Processor (PIP)
G-Right to Damages