Right to Data Portability Storage Disposal Processing Disclosure/Transfer Personal Information Controller (PIC) Monitoring DPA Act of 2012 Right to file a complaint Accountability Encryption Individuals and Entities Collection Privacy Impact Assessment (PIA) Data Privacy Principles Right to Damages Privacy Manual Technical Security Data Privacy Sensitive Security Incident Personal Information Right to Access Usage/Processing Organizing Transparency Physical Security Personal Data Breach Public and Private Data Subject Data Privacy Officer Legitimate Purpose Right to Erasure or Blocking Compliance Right to be informed Compatible Lawful Processing Implement Privacy and Protection Measures Personal Information Processor (PIP) Consolidating Proportionality Right to Data Portability Storage Disposal Processing Disclosure/Transfer Personal Information Controller (PIC) Monitoring DPA Act of 2012 Right to file a complaint Accountability Encryption Individuals and Entities Collection Privacy Impact Assessment (PIA) Data Privacy Principles Right to Damages Privacy Manual Technical Security Data Privacy Sensitive Security Incident Personal Information Right to Access Usage/Processing Organizing Transparency Physical Security Personal Data Breach Public and Private Data Subject Data Privacy Officer Legitimate Purpose Right to Erasure or Blocking Compliance Right to be informed Compatible Lawful Processing Implement Privacy and Protection Measures Personal Information Processor (PIP) Consolidating Proportionality
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Right to Data Portability
N-Storage Disposal
N-Processing
I-Disclosure/Transfer
I-Personal Information Controller (PIC)
G-Monitoring
B-Right to file a complaint
B-DPA Act of 2012
I-Accountability
O-Encryption
G-Individuals and Entities
O-Collection
B-Privacy Impact Assessment (PIA)
O-Data Privacy Principles
G-Right to Damages
N-Privacy Manual
B-Technical Security
B-Data Privacy
N-Sensitive
I-Security Incident
I-Personal Information
I-Right to Access
N-Usage/Processing
N-Organizing
O-Transparency
G-Physical Security
N-Personal Data Breach
G-Public and Private
B-Data Subject
B-Data Privacy Officer
O-Legitimate Purpose
I-Right to Erasure or Blocking
B-Compliance
I-Right to be informed
O-Compatible
G-Lawful Processing
N-Implement Privacy and Protection Measures
G-Personal Information Processor (PIP)
O-Consolidating
B-Proportionality