Right to Damages Personal Data Breach Disclosure/Transfer Lawful Processing Privacy Manual Proportionality Public and Private Encryption Monitoring Organizing DPA Act of 2012 Right to file a complaint Security Incident Technical Security Individuals and Entities Data Subject Right to Erasure or Blocking Right to Access Collection Right to Data Portability Data Privacy Officer Compatible Transparency Personal Information Controller (PIC) Compliance Data Privacy Sensitive Physical Security Right to be informed Usage/Processing Personal Information Processor (PIP) Implement Privacy and Protection Measures Personal Information Storage Disposal Legitimate Purpose Processing Privacy Impact Assessment (PIA) Consolidating Data Privacy Principles Accountability Right to Damages Personal Data Breach Disclosure/Transfer Lawful Processing Privacy Manual Proportionality Public and Private Encryption Monitoring Organizing DPA Act of 2012 Right to file a complaint Security Incident Technical Security Individuals and Entities Data Subject Right to Erasure or Blocking Right to Access Collection Right to Data Portability Data Privacy Officer Compatible Transparency Personal Information Controller (PIC) Compliance Data Privacy Sensitive Physical Security Right to be informed Usage/Processing Personal Information Processor (PIP) Implement Privacy and Protection Measures Personal Information Storage Disposal Legitimate Purpose Processing Privacy Impact Assessment (PIA) Consolidating Data Privacy Principles Accountability
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Right to Damages
N-Personal Data Breach
I-Disclosure/Transfer
G-Lawful Processing
N-Privacy Manual
B-Proportionality
G-Public and Private
O-Encryption
G-Monitoring
N-Organizing
B-Right to file a complaint
B-DPA Act of 2012
I-Security Incident
B-Technical Security
G-Individuals and Entities
B-Data Subject
I-Right to Erasure or Blocking
I-Right to Access
O-Collection
G-Right to Data Portability
B-Data Privacy Officer
O-Compatible
O-Transparency
I-Personal Information Controller (PIC)
B-Compliance
B-Data Privacy
N-Sensitive
G-Physical Security
I-Right to be informed
N-Usage/Processing
G-Personal Information Processor (PIP)
N-Implement Privacy and Protection Measures
I-Personal Information
N-Storage Disposal
O-Legitimate Purpose
N-Processing
B-Privacy Impact Assessment (PIA)
O-Consolidating
O-Data Privacy Principles
I-Accountability