Technical Security Usage/Processing Organizing Personal Information Processor (PIP) Right to Damages Privacy Impact Assessment (PIA) Accountability Compatible Encryption Personal Information Physical Security Disclosure/Transfer Implement Privacy and Protection Measures Data Subject Privacy Manual Right to Data Portability Proportionality Processing Right to be informed Collection Compliance Data Privacy Principles Transparency Data Privacy Consolidating Personal Data Breach Monitoring Sensitive Individuals and Entities Right to Erasure or Blocking Right to Access Security Incident Storage Disposal Legitimate Purpose Public and Private Lawful Processing Personal Information Controller (PIC) Data Privacy Officer DPA Act of 2012 Right to file a complaint Technical Security Usage/Processing Organizing Personal Information Processor (PIP) Right to Damages Privacy Impact Assessment (PIA) Accountability Compatible Encryption Personal Information Physical Security Disclosure/Transfer Implement Privacy and Protection Measures Data Subject Privacy Manual Right to Data Portability Proportionality Processing Right to be informed Collection Compliance Data Privacy Principles Transparency Data Privacy Consolidating Personal Data Breach Monitoring Sensitive Individuals and Entities Right to Erasure or Blocking Right to Access Security Incident Storage Disposal Legitimate Purpose Public and Private Lawful Processing Personal Information Controller (PIC) Data Privacy Officer DPA Act of 2012 Right to file a complaint
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Technical Security
N-Usage/Processing
N-Organizing
G-Personal Information Processor (PIP)
G-Right to Damages
B-Privacy Impact Assessment (PIA)
I-Accountability
O-Compatible
O-Encryption
I-Personal Information
G-Physical Security
I-Disclosure/Transfer
N-Implement Privacy and Protection Measures
B-Data Subject
N-Privacy Manual
G-Right to Data Portability
B-Proportionality
N-Processing
I-Right to be informed
O-Collection
B-Compliance
O-Data Privacy Principles
O-Transparency
B-Data Privacy
O-Consolidating
N-Personal Data Breach
G-Monitoring
N-Sensitive
G-Individuals and Entities
I-Right to Erasure or Blocking
I-Right to Access
I-Security Incident
N-Storage Disposal
O-Legitimate Purpose
G-Public and Private
G-Lawful Processing
I-Personal Information Controller (PIC)
B-Data Privacy Officer
B-Right to file a complaint
B-DPA Act of 2012