Technical Security Legitimate Purpose Compatible Personal Information Processor (PIP) Lawful Processing Disclosure/Transfer Processing Right to Erasure or Blocking Right to Damages Collection Individuals and Entities Right to Access Encryption Privacy Impact Assessment (PIA) Accountability Sensitive Privacy Manual Public and Private Personal Information Usage/Processing Implement Privacy and Protection Measures Data Subject Compliance Security Incident Transparency Monitoring Data Privacy Officer Personal Data Breach DPA Act of 2012 Right to file a complaint Proportionality Personal Information Controller (PIC) Consolidating Right to be informed Right to Data Portability Data Privacy Principles Storage Disposal Physical Security Organizing Data Privacy Technical Security Legitimate Purpose Compatible Personal Information Processor (PIP) Lawful Processing Disclosure/Transfer Processing Right to Erasure or Blocking Right to Damages Collection Individuals and Entities Right to Access Encryption Privacy Impact Assessment (PIA) Accountability Sensitive Privacy Manual Public and Private Personal Information Usage/Processing Implement Privacy and Protection Measures Data Subject Compliance Security Incident Transparency Monitoring Data Privacy Officer Personal Data Breach DPA Act of 2012 Right to file a complaint Proportionality Personal Information Controller (PIC) Consolidating Right to be informed Right to Data Portability Data Privacy Principles Storage Disposal Physical Security Organizing Data Privacy
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Technical Security
O-Legitimate Purpose
O-Compatible
G-Personal Information Processor (PIP)
G-Lawful Processing
I-Disclosure/Transfer
N-Processing
I-Right to Erasure or Blocking
G-Right to Damages
O-Collection
G-Individuals and Entities
I-Right to Access
O-Encryption
B-Privacy Impact Assessment (PIA)
I-Accountability
N-Sensitive
N-Privacy Manual
G-Public and Private
I-Personal Information
N-Usage/Processing
N-Implement Privacy and Protection Measures
B-Data Subject
B-Compliance
I-Security Incident
O-Transparency
G-Monitoring
B-Data Privacy Officer
N-Personal Data Breach
B-Right to file a complaint
B-DPA Act of 2012
B-Proportionality
I-Personal Information Controller (PIC)
O-Consolidating
I-Right to be informed
G-Right to Data Portability
O-Data Privacy Principles
N-Storage Disposal
G-Physical Security
N-Organizing
B-Data Privacy