SecurityIncidentPhysicalSecurityDataSubjectDataPrivacyIndividualsandEntitiesRight toDataPortabilitySensitiveLegitimatePurposeAccountabilityPersonalDataBreachImplementPrivacy andProtectionMeasuresRight toErasureorBlockingProcessingEncryptionUsage/ProcessingDisclosure/TransferRighttoAccessMonitoringTechnicalSecurityDataPrivacyPrinciplesPersonalInformationCollectionPrivacyManualPrivacyImpactAssessment(PIA)LawfulProcessingCompatiblePublicandPrivateComplianceTransparencyOrganizingConsolidatingRight toDamagesPersonalInformationProcessor(PIP)Right tobeinformedPersonalInformationController(PIC)ProportionalityDataPrivacyOfficerStorageDisposalDPAAct of2012Right tofile acomplaintSecurityIncidentPhysicalSecurityDataSubjectDataPrivacyIndividualsandEntitiesRight toDataPortabilitySensitiveLegitimatePurposeAccountabilityPersonalDataBreachImplementPrivacy andProtectionMeasuresRight toErasureorBlockingProcessingEncryptionUsage/ProcessingDisclosure/TransferRighttoAccessMonitoringTechnicalSecurityDataPrivacyPrinciplesPersonalInformationCollectionPrivacyManualPrivacyImpactAssessment(PIA)LawfulProcessingCompatiblePublicandPrivateComplianceTransparencyOrganizingConsolidatingRight toDamagesPersonalInformationProcessor(PIP)Right tobeinformedPersonalInformationController(PIC)ProportionalityDataPrivacyOfficerStorageDisposalDPAAct of2012Right tofile acomplaint

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
B
4
B
5
G
6
G
7
N
8
O
9
I
10
N
11
N
12
I
13
N
14
O
15
N
16
I
17
I
18
G
19
B
20
O
21
I
22
O
23
N
24
B
25
G
26
O
27
G
28
B
29
O
30
N
31
O
32
G
33
G
34
I
35
I
36
B
37
B
38
N
39
B B
  1. I-Security Incident
  2. G-Physical Security
  3. B-Data Subject
  4. B-Data Privacy
  5. G-Individuals and Entities
  6. G-Right to Data Portability
  7. N-Sensitive
  8. O-Legitimate Purpose
  9. I-Accountability
  10. N-Personal Data Breach
  11. N-Implement Privacy and Protection Measures
  12. I-Right to Erasure or Blocking
  13. N-Processing
  14. O-Encryption
  15. N-Usage/Processing
  16. I-Disclosure/Transfer
  17. I-Right to Access
  18. G-Monitoring
  19. B-Technical Security
  20. O-Data Privacy Principles
  21. I-Personal Information
  22. O-Collection
  23. N-Privacy Manual
  24. B-Privacy Impact Assessment (PIA)
  25. G-Lawful Processing
  26. O-Compatible
  27. G-Public and Private
  28. B-Compliance
  29. O-Transparency
  30. N-Organizing
  31. O-Consolidating
  32. G-Right to Damages
  33. G-Personal Information Processor (PIP)
  34. I-Right to be informed
  35. I-Personal Information Controller (PIC)
  36. B-Proportionality
  37. B-Data Privacy Officer
  38. N-Storage Disposal
  39. B-Right to file a complaint
    B-DPA Act of 2012