ImplementPrivacy andProtectionMeasuresOrganizingMonitoringPrivacyImpactAssessment(PIA)RighttoAccessDataPrivacyProportionalityDataSubjectTechnicalSecurityDataPrivacyOfficerRight toDataPortabilityRight toDamagesDPAAct of2012Right tofile acomplaintPrivacyManualDisclosure/TransferSensitiveComplianceConsolidatingPersonalInformationTransparencyStorageDisposalLawfulProcessingPhysicalSecurityDataPrivacyPrinciplesAccountabilityCollectionPersonalInformationController(PIC)Right tobeinformedProcessingIndividualsandEntitiesPersonalInformationProcessor(PIP)Right toErasureorBlockingCompatibleUsage/ProcessingEncryptionPublicandPrivateSecurityIncidentPersonalDataBreachLegitimatePurposeImplementPrivacy andProtectionMeasuresOrganizingMonitoringPrivacyImpactAssessment(PIA)RighttoAccessDataPrivacyProportionalityDataSubjectTechnicalSecurityDataPrivacyOfficerRight toDataPortabilityRight toDamagesDPAAct of2012Right tofile acomplaintPrivacyManualDisclosure/TransferSensitiveComplianceConsolidatingPersonalInformationTransparencyStorageDisposalLawfulProcessingPhysicalSecurityDataPrivacyPrinciplesAccountabilityCollectionPersonalInformationController(PIC)Right tobeinformedProcessingIndividualsandEntitiesPersonalInformationProcessor(PIP)Right toErasureorBlockingCompatibleUsage/ProcessingEncryptionPublicandPrivateSecurityIncidentPersonalDataBreachLegitimatePurpose

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
N
3
G
4
B
5
I
6
B
7
B
8
B
9
B
10
B
11
G
12
G
13
B B
14
N
15
I
16
N
17
B
18
O
19
I
20
O
21
N
22
G
23
G
24
O
25
I
26
O
27
I
28
I
29
N
30
G
31
G
32
I
33
O
34
N
35
O
36
G
37
I
38
N
39
O
  1. N-Implement Privacy and Protection Measures
  2. N-Organizing
  3. G-Monitoring
  4. B-Privacy Impact Assessment (PIA)
  5. I-Right to Access
  6. B-Data Privacy
  7. B-Proportionality
  8. B-Data Subject
  9. B-Technical Security
  10. B-Data Privacy Officer
  11. G-Right to Data Portability
  12. G-Right to Damages
  13. B-Right to file a complaint
    B-DPA Act of 2012
  14. N-Privacy Manual
  15. I-Disclosure/Transfer
  16. N-Sensitive
  17. B-Compliance
  18. O-Consolidating
  19. I-Personal Information
  20. O-Transparency
  21. N-Storage Disposal
  22. G-Lawful Processing
  23. G-Physical Security
  24. O-Data Privacy Principles
  25. I-Accountability
  26. O-Collection
  27. I-Personal Information Controller (PIC)
  28. I-Right to be informed
  29. N-Processing
  30. G-Individuals and Entities
  31. G-Personal Information Processor (PIP)
  32. I-Right to Erasure or Blocking
  33. O-Compatible
  34. N-Usage/Processing
  35. O-Encryption
  36. G-Public and Private
  37. I-Security Incident
  38. N-Personal Data Breach
  39. O-Legitimate Purpose