Personal Information DPA Act of 2012 Right to file a complaint Transparency Sensitive Compatible Data Subject Privacy Manual Privacy Impact Assessment (PIA) Data Privacy Disclosure/Transfer Consolidating Usage/Processing Storage Disposal Lawful Processing Security Incident Individuals and Entities Right to be informed Physical Security Processing Personal Information Controller (PIC) Public and Private Implement Privacy and Protection Measures Monitoring Legitimate Purpose Data Privacy Officer Collection Compliance Accountability Organizing Data Privacy Principles Right to Data Portability Right to Access Personal Data Breach Encryption Proportionality Personal Information Processor (PIP) Technical Security Right to Erasure or Blocking Right to Damages Personal Information DPA Act of 2012 Right to file a complaint Transparency Sensitive Compatible Data Subject Privacy Manual Privacy Impact Assessment (PIA) Data Privacy Disclosure/Transfer Consolidating Usage/Processing Storage Disposal Lawful Processing Security Incident Individuals and Entities Right to be informed Physical Security Processing Personal Information Controller (PIC) Public and Private Implement Privacy and Protection Measures Monitoring Legitimate Purpose Data Privacy Officer Collection Compliance Accountability Organizing Data Privacy Principles Right to Data Portability Right to Access Personal Data Breach Encryption Proportionality Personal Information Processor (PIP) Technical Security Right to Erasure or Blocking Right to Damages
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Personal Information
B-Right to file a complaint
B-DPA Act of 2012
O-Transparency
N-Sensitive
O-Compatible
B-Data Subject
N-Privacy Manual
B-Privacy Impact Assessment (PIA)
B-Data Privacy
I-Disclosure/Transfer
O-Consolidating
N-Usage/Processing
N-Storage Disposal
G-Lawful Processing
I-Security Incident
G-Individuals and Entities
I-Right to be informed
G-Physical Security
N-Processing
I-Personal Information Controller (PIC)
G-Public and Private
N-Implement Privacy and Protection Measures
G-Monitoring
O-Legitimate Purpose
B-Data Privacy Officer
O-Collection
B-Compliance
I-Accountability
N-Organizing
O-Data Privacy Principles
G-Right to Data Portability
I-Right to Access
N-Personal Data Breach
O-Encryption
B-Proportionality
G-Personal Information Processor (PIP)
B-Technical Security
I-Right to Erasure or Blocking
G-Right to Damages