Right to Data Portability Transparency Data Privacy Officer Personal Data Breach Right to Damages Compatible Data Subject Collection Usage/Processing Lawful Processing Organizing Personal Information Proportionality Storage Disposal Individuals and Entities Security Incident Technical Security DPA Act of 2012 Right to file a complaint Monitoring Data Privacy Accountability Legitimate Purpose Right to Access Right to be informed Right to Erasure or Blocking Sensitive Data Privacy Principles Public and Private Encryption Personal Information Processor (PIP) Physical Security Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Personal Information Controller (PIC) Compliance Privacy Manual Disclosure/Transfer Processing Consolidating Right to Data Portability Transparency Data Privacy Officer Personal Data Breach Right to Damages Compatible Data Subject Collection Usage/Processing Lawful Processing Organizing Personal Information Proportionality Storage Disposal Individuals and Entities Security Incident Technical Security DPA Act of 2012 Right to file a complaint Monitoring Data Privacy Accountability Legitimate Purpose Right to Access Right to be informed Right to Erasure or Blocking Sensitive Data Privacy Principles Public and Private Encryption Personal Information Processor (PIP) Physical Security Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Personal Information Controller (PIC) Compliance Privacy Manual Disclosure/Transfer Processing Consolidating
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Right to Data Portability
O-Transparency
B-Data Privacy Officer
N-Personal Data Breach
G-Right to Damages
O-Compatible
B-Data Subject
O-Collection
N-Usage/Processing
G-Lawful Processing
N-Organizing
I-Personal Information
B-Proportionality
N-Storage Disposal
G-Individuals and Entities
I-Security Incident
B-Technical Security
B-Right to file a complaint
B-DPA Act of 2012
G-Monitoring
B-Data Privacy
I-Accountability
O-Legitimate Purpose
I-Right to Access
I-Right to be informed
I-Right to Erasure or Blocking
N-Sensitive
O-Data Privacy Principles
G-Public and Private
O-Encryption
G-Personal Information Processor (PIP)
G-Physical Security
B-Privacy Impact Assessment (PIA)
N-Implement Privacy and Protection Measures
I-Personal Information Controller (PIC)
B-Compliance
N-Privacy Manual
I-Disclosure/Transfer
N-Processing
O-Consolidating