DataSubjectDataPrivacyOrganizingSensitivePublicandPrivateCompliancePersonalInformationProcessor(PIP)CompatibleRight tobeinformedLawfulProcessingIndividualsandEntitiesTechnicalSecurityDataPrivacyPrinciplesPhysicalSecurityStorageDisposalPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresDisclosure/TransferProportionalityEncryptionProcessingRight toDataPortabilityPersonalDataBreachDPAAct of2012Right tofile acomplaintPrivacyManualTransparencySecurityIncidentPersonalInformationController(PIC)DataPrivacyOfficerCollectionRight toErasureorBlockingPersonalInformationRight toDamagesConsolidatingLegitimatePurposeUsage/ProcessingRighttoAccessMonitoringAccountabilityDataSubjectDataPrivacyOrganizingSensitivePublicandPrivateCompliancePersonalInformationProcessor(PIP)CompatibleRight tobeinformedLawfulProcessingIndividualsandEntitiesTechnicalSecurityDataPrivacyPrinciplesPhysicalSecurityStorageDisposalPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresDisclosure/TransferProportionalityEncryptionProcessingRight toDataPortabilityPersonalDataBreachDPAAct of2012Right tofile acomplaintPrivacyManualTransparencySecurityIncidentPersonalInformationController(PIC)DataPrivacyOfficerCollectionRight toErasureorBlockingPersonalInformationRight toDamagesConsolidatingLegitimatePurposeUsage/ProcessingRighttoAccessMonitoringAccountability

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
N
4
N
5
G
6
B
7
G
8
O
9
I
10
G
11
G
12
B
13
O
14
G
15
N
16
B
17
N
18
I
19
B
20
O
21
N
22
G
23
N
24
B B
25
N
26
O
27
I
28
I
29
B
30
O
31
I
32
I
33
G
34
O
35
O
36
N
37
I
38
G
39
I
  1. B-Data Subject
  2. B-Data Privacy
  3. N-Organizing
  4. N-Sensitive
  5. G-Public and Private
  6. B-Compliance
  7. G-Personal Information Processor (PIP)
  8. O-Compatible
  9. I-Right to be informed
  10. G-Lawful Processing
  11. G-Individuals and Entities
  12. B-Technical Security
  13. O-Data Privacy Principles
  14. G-Physical Security
  15. N-Storage Disposal
  16. B-Privacy Impact Assessment (PIA)
  17. N-Implement Privacy and Protection Measures
  18. I-Disclosure/Transfer
  19. B-Proportionality
  20. O-Encryption
  21. N-Processing
  22. G-Right to Data Portability
  23. N-Personal Data Breach
  24. B-Right to file a complaint
    B-DPA Act of 2012
  25. N-Privacy Manual
  26. O-Transparency
  27. I-Security Incident
  28. I-Personal Information Controller (PIC)
  29. B-Data Privacy Officer
  30. O-Collection
  31. I-Right to Erasure or Blocking
  32. I-Personal Information
  33. G-Right to Damages
  34. O-Consolidating
  35. O-Legitimate Purpose
  36. N-Usage/Processing
  37. I-Right to Access
  38. G-Monitoring
  39. I-Accountability