Data Privacy Principles Storage Disposal Right to Erasure or Blocking Compliance Implement Privacy and Protection Measures Personal Information Privacy Manual Data Privacy Right to Damages Public and Private Personal Data Breach Sensitive Data Subject Usage/Processing Personal Information Controller (PIC) Right to Access Security Incident Right to be informed Compatible Legitimate Purpose Consolidating Personal Information Processor (PIP) Individuals and Entities Disclosure/Transfer Collection Organizing Technical Security Physical Security Processing Transparency Encryption DPA Act of 2012 Right to file a complaint Accountability Proportionality Monitoring Lawful Processing Privacy Impact Assessment (PIA) Right to Data Portability Data Privacy Officer Data Privacy Principles Storage Disposal Right to Erasure or Blocking Compliance Implement Privacy and Protection Measures Personal Information Privacy Manual Data Privacy Right to Damages Public and Private Personal Data Breach Sensitive Data Subject Usage/Processing Personal Information Controller (PIC) Right to Access Security Incident Right to be informed Compatible Legitimate Purpose Consolidating Personal Information Processor (PIP) Individuals and Entities Disclosure/Transfer Collection Organizing Technical Security Physical Security Processing Transparency Encryption DPA Act of 2012 Right to file a complaint Accountability Proportionality Monitoring Lawful Processing Privacy Impact Assessment (PIA) Right to Data Portability Data Privacy Officer
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Data Privacy Principles
N-Storage Disposal
I-Right to Erasure or Blocking
B-Compliance
N-Implement Privacy and Protection Measures
I-Personal Information
N-Privacy Manual
B-Data Privacy
G-Right to Damages
G-Public and Private
N-Personal Data Breach
N-Sensitive
B-Data Subject
N-Usage/Processing
I-Personal Information Controller (PIC)
I-Right to Access
I-Security Incident
I-Right to be informed
O-Compatible
O-Legitimate Purpose
O-Consolidating
G-Personal Information Processor (PIP)
G-Individuals and Entities
I-Disclosure/Transfer
O-Collection
N-Organizing
B-Technical Security
G-Physical Security
N-Processing
O-Transparency
O-Encryption
B-Right to file a complaint
B-DPA Act of 2012
I-Accountability
B-Proportionality
G-Monitoring
G-Lawful Processing
B-Privacy Impact Assessment (PIA)
G-Right to Data Portability
B-Data Privacy Officer