TechnicalSecurityUsage/ProcessingOrganizingPersonalInformationProcessor(PIP)Right toDamagesPrivacyImpactAssessment(PIA)AccountabilityCompatibleEncryptionPersonalInformationPhysicalSecurityDisclosure/TransferImplementPrivacy andProtectionMeasuresDataSubjectPrivacyManualRight toDataPortabilityProportionalityProcessingRight tobeinformedCollectionComplianceDataPrivacyPrinciplesTransparencyDataPrivacyConsolidatingPersonalDataBreachMonitoringSensitiveIndividualsandEntitiesRight toErasureorBlockingRighttoAccessSecurityIncidentStorageDisposalLegitimatePurposePublicandPrivateLawfulProcessingPersonalInformationController(PIC)DataPrivacyOfficerDPAAct of2012Right tofile acomplaintTechnicalSecurityUsage/ProcessingOrganizingPersonalInformationProcessor(PIP)Right toDamagesPrivacyImpactAssessment(PIA)AccountabilityCompatibleEncryptionPersonalInformationPhysicalSecurityDisclosure/TransferImplementPrivacy andProtectionMeasuresDataSubjectPrivacyManualRight toDataPortabilityProportionalityProcessingRight tobeinformedCollectionComplianceDataPrivacyPrinciplesTransparencyDataPrivacyConsolidatingPersonalDataBreachMonitoringSensitiveIndividualsandEntitiesRight toErasureorBlockingRighttoAccessSecurityIncidentStorageDisposalLegitimatePurposePublicandPrivateLawfulProcessingPersonalInformationController(PIC)DataPrivacyOfficerDPAAct of2012Right tofile acomplaint

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
N
4
G
5
G
6
B
7
I
8
O
9
O
10
I
11
G
12
I
13
N
14
B
15
N
16
G
17
B
18
N
19
I
20
O
21
B
22
O
23
O
24
B
25
O
26
N
27
G
28
N
29
G
30
I
31
I
32
I
33
N
34
O
35
G
36
G
37
I
38
B
39
B B
  1. B-Technical Security
  2. N-Usage/Processing
  3. N-Organizing
  4. G-Personal Information Processor (PIP)
  5. G-Right to Damages
  6. B-Privacy Impact Assessment (PIA)
  7. I-Accountability
  8. O-Compatible
  9. O-Encryption
  10. I-Personal Information
  11. G-Physical Security
  12. I-Disclosure/Transfer
  13. N-Implement Privacy and Protection Measures
  14. B-Data Subject
  15. N-Privacy Manual
  16. G-Right to Data Portability
  17. B-Proportionality
  18. N-Processing
  19. I-Right to be informed
  20. O-Collection
  21. B-Compliance
  22. O-Data Privacy Principles
  23. O-Transparency
  24. B-Data Privacy
  25. O-Consolidating
  26. N-Personal Data Breach
  27. G-Monitoring
  28. N-Sensitive
  29. G-Individuals and Entities
  30. I-Right to Erasure or Blocking
  31. I-Right to Access
  32. I-Security Incident
  33. N-Storage Disposal
  34. O-Legitimate Purpose
  35. G-Public and Private
  36. G-Lawful Processing
  37. I-Personal Information Controller (PIC)
  38. B-Data Privacy Officer
  39. B-Right to file a complaint
    B-DPA Act of 2012