DataPrivacyPrinciplesStorageDisposalRight toErasureorBlockingComplianceImplementPrivacy andProtectionMeasuresPersonalInformationPrivacyManualDataPrivacyRight toDamagesPublicandPrivatePersonalDataBreachSensitiveDataSubjectUsage/ProcessingPersonalInformationController(PIC)RighttoAccessSecurityIncidentRight tobeinformedCompatibleLegitimatePurposeConsolidatingPersonalInformationProcessor(PIP)IndividualsandEntitiesDisclosure/TransferCollectionOrganizingTechnicalSecurityPhysicalSecurityProcessingTransparencyEncryptionDPAAct of2012Right tofile acomplaintAccountabilityProportionalityMonitoringLawfulProcessingPrivacyImpactAssessment(PIA)Right toDataPortabilityDataPrivacyOfficerDataPrivacyPrinciplesStorageDisposalRight toErasureorBlockingComplianceImplementPrivacy andProtectionMeasuresPersonalInformationPrivacyManualDataPrivacyRight toDamagesPublicandPrivatePersonalDataBreachSensitiveDataSubjectUsage/ProcessingPersonalInformationController(PIC)RighttoAccessSecurityIncidentRight tobeinformedCompatibleLegitimatePurposeConsolidatingPersonalInformationProcessor(PIP)IndividualsandEntitiesDisclosure/TransferCollectionOrganizingTechnicalSecurityPhysicalSecurityProcessingTransparencyEncryptionDPAAct of2012Right tofile acomplaintAccountabilityProportionalityMonitoringLawfulProcessingPrivacyImpactAssessment(PIA)Right toDataPortabilityDataPrivacyOfficer

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
N
3
I
4
B
5
N
6
I
7
N
8
B
9
G
10
G
11
N
12
N
13
B
14
N
15
I
16
I
17
I
18
I
19
O
20
O
21
O
22
G
23
G
24
I
25
O
26
N
27
B
28
G
29
N
30
O
31
O
32
B B
33
I
34
B
35
G
36
G
37
B
38
G
39
B
  1. O-Data Privacy Principles
  2. N-Storage Disposal
  3. I-Right to Erasure or Blocking
  4. B-Compliance
  5. N-Implement Privacy and Protection Measures
  6. I-Personal Information
  7. N-Privacy Manual
  8. B-Data Privacy
  9. G-Right to Damages
  10. G-Public and Private
  11. N-Personal Data Breach
  12. N-Sensitive
  13. B-Data Subject
  14. N-Usage/Processing
  15. I-Personal Information Controller (PIC)
  16. I-Right to Access
  17. I-Security Incident
  18. I-Right to be informed
  19. O-Compatible
  20. O-Legitimate Purpose
  21. O-Consolidating
  22. G-Personal Information Processor (PIP)
  23. G-Individuals and Entities
  24. I-Disclosure/Transfer
  25. O-Collection
  26. N-Organizing
  27. B-Technical Security
  28. G-Physical Security
  29. N-Processing
  30. O-Transparency
  31. O-Encryption
  32. B-Right to file a complaint
    B-DPA Act of 2012
  33. I-Accountability
  34. B-Proportionality
  35. G-Monitoring
  36. G-Lawful Processing
  37. B-Privacy Impact Assessment (PIA)
  38. G-Right to Data Portability
  39. B-Data Privacy Officer