Security Incident Physical Security Data Subject Data Privacy Individuals and Entities Right to Data Portability Sensitive Legitimate Purpose Accountability Personal Data Breach Implement Privacy and Protection Measures Right to Erasure or Blocking Processing Encryption Usage/Processing Disclosure/Transfer Right to Access Monitoring Technical Security Data Privacy Principles Personal Information Collection Privacy Manual Privacy Impact Assessment (PIA) Lawful Processing Compatible Public and Private Compliance Transparency Organizing Consolidating Right to Damages Personal Information Processor (PIP) Right to be informed Personal Information Controller (PIC) Proportionality Data Privacy Officer Storage Disposal DPA Act of 2012 Right to file a complaint Security Incident Physical Security Data Subject Data Privacy Individuals and Entities Right to Data Portability Sensitive Legitimate Purpose Accountability Personal Data Breach Implement Privacy and Protection Measures Right to Erasure or Blocking Processing Encryption Usage/Processing Disclosure/Transfer Right to Access Monitoring Technical Security Data Privacy Principles Personal Information Collection Privacy Manual Privacy Impact Assessment (PIA) Lawful Processing Compatible Public and Private Compliance Transparency Organizing Consolidating Right to Damages Personal Information Processor (PIP) Right to be informed Personal Information Controller (PIC) Proportionality Data Privacy Officer Storage Disposal DPA Act of 2012 Right to file a complaint
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Security Incident
G-Physical Security
B-Data Subject
B-Data Privacy
G-Individuals and Entities
G-Right to Data Portability
N-Sensitive
O-Legitimate Purpose
I-Accountability
N-Personal Data Breach
N-Implement Privacy and Protection Measures
I-Right to Erasure or Blocking
N-Processing
O-Encryption
N-Usage/Processing
I-Disclosure/Transfer
I-Right to Access
G-Monitoring
B-Technical Security
O-Data Privacy Principles
I-Personal Information
O-Collection
N-Privacy Manual
B-Privacy Impact Assessment (PIA)
G-Lawful Processing
O-Compatible
G-Public and Private
B-Compliance
O-Transparency
N-Organizing
O-Consolidating
G-Right to Damages
G-Personal Information Processor (PIP)
I-Right to be informed
I-Personal Information Controller (PIC)
B-Proportionality
B-Data Privacy Officer
N-Storage Disposal
B-Right to file a complaint
B-DPA Act of 2012