StorageDisposalPersonalDataBreachIndividualsandEntitiesEncryptionRight toDamagesTransparencySensitivePersonalInformationController(PIC)PersonalInformationProcessor(PIP)ComplianceRight tobeinformedPrivacyImpactAssessment(PIA)CompatibleDataSubjectLegitimatePurposeCollectionDataPrivacyOfficerDPAAct of2012Right tofile acomplaintProportionalityDataPrivacyPublicandPrivateProcessingDataPrivacyPrinciplesAccountabilityMonitoringPhysicalSecurityConsolidatingRighttoAccessRight toErasureorBlockingDisclosure/TransferTechnicalSecurityUsage/ProcessingPrivacyManualSecurityIncidentPersonalInformationImplementPrivacy andProtectionMeasuresOrganizingLawfulProcessingRight toDataPortabilityStorageDisposalPersonalDataBreachIndividualsandEntitiesEncryptionRight toDamagesTransparencySensitivePersonalInformationController(PIC)PersonalInformationProcessor(PIP)ComplianceRight tobeinformedPrivacyImpactAssessment(PIA)CompatibleDataSubjectLegitimatePurposeCollectionDataPrivacyOfficerDPAAct of2012Right tofile acomplaintProportionalityDataPrivacyPublicandPrivateProcessingDataPrivacyPrinciplesAccountabilityMonitoringPhysicalSecurityConsolidatingRighttoAccessRight toErasureorBlockingDisclosure/TransferTechnicalSecurityUsage/ProcessingPrivacyManualSecurityIncidentPersonalInformationImplementPrivacy andProtectionMeasuresOrganizingLawfulProcessingRight toDataPortability

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
N
3
G
4
O
5
G
6
O
7
N
8
I
9
G
10
B
11
I
12
B
13
O
14
B
15
O
16
O
17
B
18
B B
19
B
20
B
21
G
22
N
23
O
24
I
25
G
26
G
27
O
28
I
29
I
30
I
31
B
32
N
33
N
34
I
35
I
36
N
37
N
38
G
39
G
  1. N-Storage Disposal
  2. N-Personal Data Breach
  3. G-Individuals and Entities
  4. O-Encryption
  5. G-Right to Damages
  6. O-Transparency
  7. N-Sensitive
  8. I-Personal Information Controller (PIC)
  9. G-Personal Information Processor (PIP)
  10. B-Compliance
  11. I-Right to be informed
  12. B-Privacy Impact Assessment (PIA)
  13. O-Compatible
  14. B-Data Subject
  15. O-Legitimate Purpose
  16. O-Collection
  17. B-Data Privacy Officer
  18. B-Right to file a complaint
    B-DPA Act of 2012
  19. B-Proportionality
  20. B-Data Privacy
  21. G-Public and Private
  22. N-Processing
  23. O-Data Privacy Principles
  24. I-Accountability
  25. G-Monitoring
  26. G-Physical Security
  27. O-Consolidating
  28. I-Right to Access
  29. I-Right to Erasure or Blocking
  30. I-Disclosure/Transfer
  31. B-Technical Security
  32. N-Usage/Processing
  33. N-Privacy Manual
  34. I-Security Incident
  35. I-Personal Information
  36. N-Implement Privacy and Protection Measures
  37. N-Organizing
  38. G-Lawful Processing
  39. G-Right to Data Portability