PersonalDataBreachLawfulProcessingDataPrivacyPrinciplesSensitiveProportionalitySecurityIncidentEncryptionPhysicalSecurityDataSubjectPersonalInformationController(PIC)TechnicalSecurityProcessingPersonalInformationProcessor(PIP)CollectionIndividualsandEntitiesOrganizingLegitimatePurposeTransparencyRight tobeinformedAccountabilityRight toDataPortabilityDataPrivacyCompatibleDataPrivacyOfficerImplementPrivacy andProtectionMeasuresPrivacyImpactAssessment(PIA)RighttoAccessConsolidatingMonitoringRight toErasureorBlockingPublicandPrivateStorageDisposalPrivacyManualDisclosure/TransferUsage/ProcessingPersonalInformationComplianceRight toDamagesDPAAct of2012Right tofile acomplaintPersonalDataBreachLawfulProcessingDataPrivacyPrinciplesSensitiveProportionalitySecurityIncidentEncryptionPhysicalSecurityDataSubjectPersonalInformationController(PIC)TechnicalSecurityProcessingPersonalInformationProcessor(PIP)CollectionIndividualsandEntitiesOrganizingLegitimatePurposeTransparencyRight tobeinformedAccountabilityRight toDataPortabilityDataPrivacyCompatibleDataPrivacyOfficerImplementPrivacy andProtectionMeasuresPrivacyImpactAssessment(PIA)RighttoAccessConsolidatingMonitoringRight toErasureorBlockingPublicandPrivateStorageDisposalPrivacyManualDisclosure/TransferUsage/ProcessingPersonalInformationComplianceRight toDamagesDPAAct of2012Right tofile acomplaint

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
O
4
N
5
B
6
I
7
O
8
G
9
B
10
I
11
B
12
N
13
G
14
O
15
G
16
N
17
O
18
O
19
I
20
I
21
G
22
B
23
O
24
B
25
N
26
B
27
I
28
O
29
G
30
I
31
G
32
N
33
N
34
I
35
N
36
I
37
B
38
G
39
B B
  1. N-Personal Data Breach
  2. G-Lawful Processing
  3. O-Data Privacy Principles
  4. N-Sensitive
  5. B-Proportionality
  6. I-Security Incident
  7. O-Encryption
  8. G-Physical Security
  9. B-Data Subject
  10. I-Personal Information Controller (PIC)
  11. B-Technical Security
  12. N-Processing
  13. G-Personal Information Processor (PIP)
  14. O-Collection
  15. G-Individuals and Entities
  16. N-Organizing
  17. O-Legitimate Purpose
  18. O-Transparency
  19. I-Right to be informed
  20. I-Accountability
  21. G-Right to Data Portability
  22. B-Data Privacy
  23. O-Compatible
  24. B-Data Privacy Officer
  25. N-Implement Privacy and Protection Measures
  26. B-Privacy Impact Assessment (PIA)
  27. I-Right to Access
  28. O-Consolidating
  29. G-Monitoring
  30. I-Right to Erasure or Blocking
  31. G-Public and Private
  32. N-Storage Disposal
  33. N-Privacy Manual
  34. I-Disclosure/Transfer
  35. N-Usage/Processing
  36. I-Personal Information
  37. B-Compliance
  38. G-Right to Damages
  39. B-Right to file a complaint
    B-DPA Act of 2012