Right toDamagesDPAAct of2012Right tofile acomplaintAccountabilityMonitoringLegitimatePurposePublicandPrivateProcessingRight toDataPortabilityRighttoAccessTransparencyDataPrivacyOfficerDataPrivacyComplianceUsage/ProcessingImplementPrivacy andProtectionMeasuresPhysicalSecurityCollectionTechnicalSecurityPersonalInformationProcessor(PIP)DataPrivacyPrinciplesCompatibleStorageDisposalPersonalDataBreachIndividualsandEntitiesPersonalInformationController(PIC)Right toErasureorBlockingDisclosure/TransferConsolidatingSensitivePrivacyManualDataSubjectOrganizingLawfulProcessingRight tobeinformedEncryptionProportionalityPersonalInformationPrivacyImpactAssessment(PIA)SecurityIncidentRight toDamagesDPAAct of2012Right tofile acomplaintAccountabilityMonitoringLegitimatePurposePublicandPrivateProcessingRight toDataPortabilityRighttoAccessTransparencyDataPrivacyOfficerDataPrivacyComplianceUsage/ProcessingImplementPrivacy andProtectionMeasuresPhysicalSecurityCollectionTechnicalSecurityPersonalInformationProcessor(PIP)DataPrivacyPrinciplesCompatibleStorageDisposalPersonalDataBreachIndividualsandEntitiesPersonalInformationController(PIC)Right toErasureorBlockingDisclosure/TransferConsolidatingSensitivePrivacyManualDataSubjectOrganizingLawfulProcessingRight tobeinformedEncryptionProportionalityPersonalInformationPrivacyImpactAssessment(PIA)SecurityIncident

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B B
3
I
4
G
5
O
6
G
7
N
8
G
9
I
10
O
11
B
12
B
13
B
14
N
15
N
16
G
17
O
18
B
19
G
20
O
21
O
22
N
23
N
24
G
25
I
26
I
27
I
28
O
29
N
30
N
31
B
32
N
33
G
34
I
35
O
36
B
37
I
38
B
39
I
  1. G-Right to Damages
  2. B-Right to file a complaint
    B-DPA Act of 2012
  3. I-Accountability
  4. G-Monitoring
  5. O-Legitimate Purpose
  6. G-Public and Private
  7. N-Processing
  8. G-Right to Data Portability
  9. I-Right to Access
  10. O-Transparency
  11. B-Data Privacy Officer
  12. B-Data Privacy
  13. B-Compliance
  14. N-Usage/Processing
  15. N-Implement Privacy and Protection Measures
  16. G-Physical Security
  17. O-Collection
  18. B-Technical Security
  19. G-Personal Information Processor (PIP)
  20. O-Data Privacy Principles
  21. O-Compatible
  22. N-Storage Disposal
  23. N-Personal Data Breach
  24. G-Individuals and Entities
  25. I-Personal Information Controller (PIC)
  26. I-Right to Erasure or Blocking
  27. I-Disclosure/Transfer
  28. O-Consolidating
  29. N-Sensitive
  30. N-Privacy Manual
  31. B-Data Subject
  32. N-Organizing
  33. G-Lawful Processing
  34. I-Right to be informed
  35. O-Encryption
  36. B-Proportionality
  37. I-Personal Information
  38. B-Privacy Impact Assessment (PIA)
  39. I-Security Incident