TechnicalSecurityLegitimatePurposeCompatiblePersonalInformationProcessor(PIP)LawfulProcessingDisclosure/TransferProcessingRight toErasureorBlockingRight toDamagesCollectionIndividualsandEntitiesRighttoAccessEncryptionPrivacyImpactAssessment(PIA)AccountabilitySensitivePrivacyManualPublicandPrivatePersonalInformationUsage/ProcessingImplementPrivacy andProtectionMeasuresDataSubjectComplianceSecurityIncidentTransparencyMonitoringDataPrivacyOfficerPersonalDataBreachDPAAct of2012Right tofile acomplaintProportionalityPersonalInformationController(PIC)ConsolidatingRight tobeinformedRight toDataPortabilityDataPrivacyPrinciplesStorageDisposalPhysicalSecurityOrganizingDataPrivacyTechnicalSecurityLegitimatePurposeCompatiblePersonalInformationProcessor(PIP)LawfulProcessingDisclosure/TransferProcessingRight toErasureorBlockingRight toDamagesCollectionIndividualsandEntitiesRighttoAccessEncryptionPrivacyImpactAssessment(PIA)AccountabilitySensitivePrivacyManualPublicandPrivatePersonalInformationUsage/ProcessingImplementPrivacy andProtectionMeasuresDataSubjectComplianceSecurityIncidentTransparencyMonitoringDataPrivacyOfficerPersonalDataBreachDPAAct of2012Right tofile acomplaintProportionalityPersonalInformationController(PIC)ConsolidatingRight tobeinformedRight toDataPortabilityDataPrivacyPrinciplesStorageDisposalPhysicalSecurityOrganizingDataPrivacy

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
O
3
O
4
G
5
G
6
I
7
N
8
I
9
G
10
O
11
G
12
I
13
O
14
B
15
I
16
N
17
N
18
G
19
I
20
N
21
N
22
B
23
B
24
I
25
O
26
G
27
B
28
N
29
B B
30
B
31
I
32
O
33
I
34
G
35
O
36
N
37
G
38
N
39
B
  1. B-Technical Security
  2. O-Legitimate Purpose
  3. O-Compatible
  4. G-Personal Information Processor (PIP)
  5. G-Lawful Processing
  6. I-Disclosure/Transfer
  7. N-Processing
  8. I-Right to Erasure or Blocking
  9. G-Right to Damages
  10. O-Collection
  11. G-Individuals and Entities
  12. I-Right to Access
  13. O-Encryption
  14. B-Privacy Impact Assessment (PIA)
  15. I-Accountability
  16. N-Sensitive
  17. N-Privacy Manual
  18. G-Public and Private
  19. I-Personal Information
  20. N-Usage/Processing
  21. N-Implement Privacy and Protection Measures
  22. B-Data Subject
  23. B-Compliance
  24. I-Security Incident
  25. O-Transparency
  26. G-Monitoring
  27. B-Data Privacy Officer
  28. N-Personal Data Breach
  29. B-Right to file a complaint
    B-DPA Act of 2012
  30. B-Proportionality
  31. I-Personal Information Controller (PIC)
  32. O-Consolidating
  33. I-Right to be informed
  34. G-Right to Data Portability
  35. O-Data Privacy Principles
  36. N-Storage Disposal
  37. G-Physical Security
  38. N-Organizing
  39. B-Data Privacy