Data Subject Data Privacy Organizing Sensitive Public and Private Compliance Personal Information Processor (PIP) Compatible Right to be informed Lawful Processing Individuals and Entities Technical Security Data Privacy Principles Physical Security Storage Disposal Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Disclosure/Transfer Proportionality Encryption Processing Right to Data Portability Personal Data Breach DPA Act of 2012 Right to file a complaint Privacy Manual Transparency Security Incident Personal Information Controller (PIC) Data Privacy Officer Collection Right to Erasure or Blocking Personal Information Right to Damages Consolidating Legitimate Purpose Usage/Processing Right to Access Monitoring Accountability Data Subject Data Privacy Organizing Sensitive Public and Private Compliance Personal Information Processor (PIP) Compatible Right to be informed Lawful Processing Individuals and Entities Technical Security Data Privacy Principles Physical Security Storage Disposal Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Disclosure/Transfer Proportionality Encryption Processing Right to Data Portability Personal Data Breach DPA Act of 2012 Right to file a complaint Privacy Manual Transparency Security Incident Personal Information Controller (PIC) Data Privacy Officer Collection Right to Erasure or Blocking Personal Information Right to Damages Consolidating Legitimate Purpose Usage/Processing Right to Access Monitoring Accountability
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Data Subject
B-Data Privacy
N-Organizing
N-Sensitive
G-Public and Private
B-Compliance
G-Personal Information Processor (PIP)
O-Compatible
I-Right to be informed
G-Lawful Processing
G-Individuals and Entities
B-Technical Security
O-Data Privacy Principles
G-Physical Security
N-Storage Disposal
B-Privacy Impact Assessment (PIA)
N-Implement Privacy and Protection Measures
I-Disclosure/Transfer
B-Proportionality
O-Encryption
N-Processing
G-Right to Data Portability
N-Personal Data Breach
B-Right to file a complaint
B-DPA Act of 2012
N-Privacy Manual
O-Transparency
I-Security Incident
I-Personal Information Controller (PIC)
B-Data Privacy Officer
O-Collection
I-Right to Erasure or Blocking
I-Personal Information
G-Right to Damages
O-Consolidating
O-Legitimate Purpose
N-Usage/Processing
I-Right to Access
G-Monitoring
I-Accountability