TransparencyRight toDamagesLegitimatePurposeImplementPrivacy andProtectionMeasuresPhysicalSecurityPersonalInformationProcessor(PIP)SensitivePersonalInformationEncryptionIndividualsandEntitiesProportionalityLawfulProcessingPublicandPrivateDisclosure/TransferCompatibleProcessingRight toDataPortabilityDataPrivacyPrinciplesCollectionSecurityIncidentPersonalDataBreachTechnicalSecurityRighttoAccessUsage/ProcessingPrivacyManualConsolidatingCompliancePrivacyImpactAssessment(PIA)Right toErasureorBlockingOrganizingDataSubjectDataPrivacyStorageDisposalAccountabilityDPAAct of2012Right tofile acomplaintRight tobeinformedMonitoringDataPrivacyOfficerPersonalInformationController(PIC)TransparencyRight toDamagesLegitimatePurposeImplementPrivacy andProtectionMeasuresPhysicalSecurityPersonalInformationProcessor(PIP)SensitivePersonalInformationEncryptionIndividualsandEntitiesProportionalityLawfulProcessingPublicandPrivateDisclosure/TransferCompatibleProcessingRight toDataPortabilityDataPrivacyPrinciplesCollectionSecurityIncidentPersonalDataBreachTechnicalSecurityRighttoAccessUsage/ProcessingPrivacyManualConsolidatingCompliancePrivacyImpactAssessment(PIA)Right toErasureorBlockingOrganizingDataSubjectDataPrivacyStorageDisposalAccountabilityDPAAct of2012Right tofile acomplaintRight tobeinformedMonitoringDataPrivacyOfficerPersonalInformationController(PIC)

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
G
3
O
4
N
5
G
6
G
7
N
8
I
9
O
10
G
11
B
12
G
13
G
14
I
15
O
16
N
17
G
18
O
19
O
20
I
21
N
22
B
23
I
24
N
25
N
26
O
27
B
28
B
29
I
30
N
31
B
32
B
33
N
34
I
35
B B
36
I
37
G
38
B
39
I
  1. O-Transparency
  2. G-Right to Damages
  3. O-Legitimate Purpose
  4. N-Implement Privacy and Protection Measures
  5. G-Physical Security
  6. G-Personal Information Processor (PIP)
  7. N-Sensitive
  8. I-Personal Information
  9. O-Encryption
  10. G-Individuals and Entities
  11. B-Proportionality
  12. G-Lawful Processing
  13. G-Public and Private
  14. I-Disclosure/Transfer
  15. O-Compatible
  16. N-Processing
  17. G-Right to Data Portability
  18. O-Data Privacy Principles
  19. O-Collection
  20. I-Security Incident
  21. N-Personal Data Breach
  22. B-Technical Security
  23. I-Right to Access
  24. N-Usage/Processing
  25. N-Privacy Manual
  26. O-Consolidating
  27. B-Compliance
  28. B-Privacy Impact Assessment (PIA)
  29. I-Right to Erasure or Blocking
  30. N-Organizing
  31. B-Data Subject
  32. B-Data Privacy
  33. N-Storage Disposal
  34. I-Accountability
  35. B-Right to file a complaint
    B-DPA Act of 2012
  36. I-Right to be informed
  37. G-Monitoring
  38. B-Data Privacy Officer
  39. I-Personal Information Controller (PIC)