Right toDamagesPersonalDataBreachDisclosure/TransferLawfulProcessingPrivacyManualProportionalityPublicandPrivateEncryptionMonitoringOrganizingDPAAct of2012Right tofile acomplaintSecurityIncidentTechnicalSecurityIndividualsandEntitiesDataSubjectRight toErasureorBlockingRighttoAccessCollectionRight toDataPortabilityDataPrivacyOfficerCompatibleTransparencyPersonalInformationController(PIC)ComplianceDataPrivacySensitivePhysicalSecurityRight tobeinformedUsage/ProcessingPersonalInformationProcessor(PIP)ImplementPrivacy andProtectionMeasuresPersonalInformationStorageDisposalLegitimatePurposeProcessingPrivacyImpactAssessment(PIA)ConsolidatingDataPrivacyPrinciplesAccountabilityRight toDamagesPersonalDataBreachDisclosure/TransferLawfulProcessingPrivacyManualProportionalityPublicandPrivateEncryptionMonitoringOrganizingDPAAct of2012Right tofile acomplaintSecurityIncidentTechnicalSecurityIndividualsandEntitiesDataSubjectRight toErasureorBlockingRighttoAccessCollectionRight toDataPortabilityDataPrivacyOfficerCompatibleTransparencyPersonalInformationController(PIC)ComplianceDataPrivacySensitivePhysicalSecurityRight tobeinformedUsage/ProcessingPersonalInformationProcessor(PIP)ImplementPrivacy andProtectionMeasuresPersonalInformationStorageDisposalLegitimatePurposeProcessingPrivacyImpactAssessment(PIA)ConsolidatingDataPrivacyPrinciplesAccountability

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
I
4
G
5
N
6
B
7
G
8
O
9
G
10
N
11
B B
12
I
13
B
14
G
15
B
16
I
17
I
18
O
19
G
20
B
21
O
22
O
23
I
24
B
25
B
26
N
27
G
28
I
29
N
30
G
31
N
32
I
33
N
34
O
35
N
36
B
37
O
38
O
39
I
  1. G-Right to Damages
  2. N-Personal Data Breach
  3. I-Disclosure/Transfer
  4. G-Lawful Processing
  5. N-Privacy Manual
  6. B-Proportionality
  7. G-Public and Private
  8. O-Encryption
  9. G-Monitoring
  10. N-Organizing
  11. B-Right to file a complaint
    B-DPA Act of 2012
  12. I-Security Incident
  13. B-Technical Security
  14. G-Individuals and Entities
  15. B-Data Subject
  16. I-Right to Erasure or Blocking
  17. I-Right to Access
  18. O-Collection
  19. G-Right to Data Portability
  20. B-Data Privacy Officer
  21. O-Compatible
  22. O-Transparency
  23. I-Personal Information Controller (PIC)
  24. B-Compliance
  25. B-Data Privacy
  26. N-Sensitive
  27. G-Physical Security
  28. I-Right to be informed
  29. N-Usage/Processing
  30. G-Personal Information Processor (PIP)
  31. N-Implement Privacy and Protection Measures
  32. I-Personal Information
  33. N-Storage Disposal
  34. O-Legitimate Purpose
  35. N-Processing
  36. B-Privacy Impact Assessment (PIA)
  37. O-Consolidating
  38. O-Data Privacy Principles
  39. I-Accountability