Personal Data Breach Legitimate Purpose Compliance Proportionality Personal Information Processor (PIP) Right to Damages Transparency Data Privacy Principles Right to Access Monitoring Data Privacy Officer Technical Security Sensitive Personal Information Controller (PIC) Personal Information Compatible Public and Private Usage/Processing Security Incident Storage Disposal Physical Security Consolidating Processing DPA Act of 2012 Right to file a complaint Disclosure/Transfer Implement Privacy and Protection Measures Organizing Encryption Privacy Manual Right to Data Portability Right to Erasure or Blocking Data Privacy Right to be informed Accountability Data Subject Privacy Impact Assessment (PIA) Collection Lawful Processing Individuals and Entities Personal Data Breach Legitimate Purpose Compliance Proportionality Personal Information Processor (PIP) Right to Damages Transparency Data Privacy Principles Right to Access Monitoring Data Privacy Officer Technical Security Sensitive Personal Information Controller (PIC) Personal Information Compatible Public and Private Usage/Processing Security Incident Storage Disposal Physical Security Consolidating Processing DPA Act of 2012 Right to file a complaint Disclosure/Transfer Implement Privacy and Protection Measures Organizing Encryption Privacy Manual Right to Data Portability Right to Erasure or Blocking Data Privacy Right to be informed Accountability Data Subject Privacy Impact Assessment (PIA) Collection Lawful Processing Individuals and Entities
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Personal Data Breach
O-Legitimate Purpose
B-Compliance
B-Proportionality
G-Personal Information Processor (PIP)
G-Right to Damages
O-Transparency
O-Data Privacy Principles
I-Right to Access
G-Monitoring
B-Data Privacy Officer
B-Technical Security
N-Sensitive
I-Personal Information Controller (PIC)
I-Personal Information
O-Compatible
G-Public and Private
N-Usage/Processing
I-Security Incident
N-Storage Disposal
G-Physical Security
O-Consolidating
N-Processing
B-Right to file a complaint
B-DPA Act of 2012
I-Disclosure/Transfer
N-Implement Privacy and Protection Measures
N-Organizing
O-Encryption
N-Privacy Manual
G-Right to Data Portability
I-Right to Erasure or Blocking
B-Data Privacy
I-Right to be informed
I-Accountability
B-Data Subject
B-Privacy Impact Assessment (PIA)
O-Collection
G-Lawful Processing
G-Individuals and Entities