Right toDataPortabilityStorageDisposalProcessingDisclosure/TransferPersonalInformationController(PIC)MonitoringDPAAct of2012Right tofile acomplaintAccountabilityEncryptionIndividualsandEntitiesCollectionPrivacyImpactAssessment(PIA)DataPrivacyPrinciplesRight toDamagesPrivacyManualTechnicalSecurityDataPrivacySensitiveSecurityIncidentPersonalInformationRighttoAccessUsage/ProcessingOrganizingTransparencyPhysicalSecurityPersonalDataBreachPublicandPrivateDataSubjectDataPrivacyOfficerLegitimatePurposeRight toErasureorBlockingComplianceRight tobeinformedCompatibleLawfulProcessingImplementPrivacy andProtectionMeasuresPersonalInformationProcessor(PIP)ConsolidatingProportionalityRight toDataPortabilityStorageDisposalProcessingDisclosure/TransferPersonalInformationController(PIC)MonitoringDPAAct of2012Right tofile acomplaintAccountabilityEncryptionIndividualsandEntitiesCollectionPrivacyImpactAssessment(PIA)DataPrivacyPrinciplesRight toDamagesPrivacyManualTechnicalSecurityDataPrivacySensitiveSecurityIncidentPersonalInformationRighttoAccessUsage/ProcessingOrganizingTransparencyPhysicalSecurityPersonalDataBreachPublicandPrivateDataSubjectDataPrivacyOfficerLegitimatePurposeRight toErasureorBlockingComplianceRight tobeinformedCompatibleLawfulProcessingImplementPrivacy andProtectionMeasuresPersonalInformationProcessor(PIP)ConsolidatingProportionality

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
N
4
I
5
I
6
G
7
B B
8
I
9
O
10
G
11
O
12
B
13
O
14
G
15
N
16
B
17
B
18
N
19
I
20
I
21
I
22
N
23
N
24
O
25
G
26
N
27
G
28
B
29
B
30
O
31
I
32
B
33
I
34
O
35
G
36
N
37
G
38
O
39
B
  1. G-Right to Data Portability
  2. N-Storage Disposal
  3. N-Processing
  4. I-Disclosure/Transfer
  5. I-Personal Information Controller (PIC)
  6. G-Monitoring
  7. B-Right to file a complaint
    B-DPA Act of 2012
  8. I-Accountability
  9. O-Encryption
  10. G-Individuals and Entities
  11. O-Collection
  12. B-Privacy Impact Assessment (PIA)
  13. O-Data Privacy Principles
  14. G-Right to Damages
  15. N-Privacy Manual
  16. B-Technical Security
  17. B-Data Privacy
  18. N-Sensitive
  19. I-Security Incident
  20. I-Personal Information
  21. I-Right to Access
  22. N-Usage/Processing
  23. N-Organizing
  24. O-Transparency
  25. G-Physical Security
  26. N-Personal Data Breach
  27. G-Public and Private
  28. B-Data Subject
  29. B-Data Privacy Officer
  30. O-Legitimate Purpose
  31. I-Right to Erasure or Blocking
  32. B-Compliance
  33. I-Right to be informed
  34. O-Compatible
  35. G-Lawful Processing
  36. N-Implement Privacy and Protection Measures
  37. G-Personal Information Processor (PIP)
  38. O-Consolidating
  39. B-Proportionality