Transparency Right to Damages Legitimate Purpose Implement Privacy and Protection Measures Physical Security Personal Information Processor (PIP) Sensitive Personal Information Encryption Individuals and Entities Proportionality Lawful Processing Public and Private Disclosure/Transfer Compatible Processing Right to Data Portability Data Privacy Principles Collection Security Incident Personal Data Breach Technical Security Right to Access Usage/Processing Privacy Manual Consolidating Compliance Privacy Impact Assessment (PIA) Right to Erasure or Blocking Organizing Data Subject Data Privacy Storage Disposal Accountability DPA Act of 2012 Right to file a complaint Right to be informed Monitoring Data Privacy Officer Personal Information Controller (PIC) Transparency Right to Damages Legitimate Purpose Implement Privacy and Protection Measures Physical Security Personal Information Processor (PIP) Sensitive Personal Information Encryption Individuals and Entities Proportionality Lawful Processing Public and Private Disclosure/Transfer Compatible Processing Right to Data Portability Data Privacy Principles Collection Security Incident Personal Data Breach Technical Security Right to Access Usage/Processing Privacy Manual Consolidating Compliance Privacy Impact Assessment (PIA) Right to Erasure or Blocking Organizing Data Subject Data Privacy Storage Disposal Accountability DPA Act of 2012 Right to file a complaint Right to be informed Monitoring Data Privacy Officer Personal Information Controller (PIC)
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Transparency
G-Right to Damages
O-Legitimate Purpose
N-Implement Privacy and Protection Measures
G-Physical Security
G-Personal Information Processor (PIP)
N-Sensitive
I-Personal Information
O-Encryption
G-Individuals and Entities
B-Proportionality
G-Lawful Processing
G-Public and Private
I-Disclosure/Transfer
O-Compatible
N-Processing
G-Right to Data Portability
O-Data Privacy Principles
O-Collection
I-Security Incident
N-Personal Data Breach
B-Technical Security
I-Right to Access
N-Usage/Processing
N-Privacy Manual
O-Consolidating
B-Compliance
B-Privacy Impact Assessment (PIA)
I-Right to Erasure or Blocking
N-Organizing
B-Data Subject
B-Data Privacy
N-Storage Disposal
I-Accountability
B-Right to file a complaint
B-DPA Act of 2012
I-Right to be informed
G-Monitoring
B-Data Privacy Officer
I-Personal Information Controller (PIC)