Disclosure/TransferTransparencyMonitoringCollectionPhysicalSecurityComplianceStorageDisposalPersonalDataBreachRight toErasureorBlockingOrganizingLawfulProcessingEncryptionPersonalInformationSecurityIncidentProportionalityDataPrivacyPrinciplesDataPrivacyOfficerPrivacyImpactAssessment(PIA)PersonalInformationController(PIC)Right tobeinformedPrivacyManualPublicandPrivateDPAAct of2012Usage/ProcessingRight toDamagesConsolidatingRight toDataPortabilityDataSubjectDataPrivacyLegitimatePurposeTechnicalSecurityPersonalInformationProcessor(PIP)ImplementPrivacy andProtectionMeasuresRighttoAccessSensitiveFree!IndividualsandEntitiesRight tofile acomplaintAccountabilityProcessingCompatibleDisclosure/TransferTransparencyMonitoringCollectionPhysicalSecurityComplianceStorageDisposalPersonalDataBreachRight toErasureorBlockingOrganizingLawfulProcessingEncryptionPersonalInformationSecurityIncidentProportionalityDataPrivacyPrinciplesDataPrivacyOfficerPrivacyImpactAssessment(PIA)PersonalInformationController(PIC)Right tobeinformedPrivacyManualPublicandPrivateDPAAct of2012Usage/ProcessingRight toDamagesConsolidatingRight toDataPortabilityDataSubjectDataPrivacyLegitimatePurposeTechnicalSecurityPersonalInformationProcessor(PIP)ImplementPrivacy andProtectionMeasuresRighttoAccessSensitiveFree!IndividualsandEntitiesRight tofile acomplaintAccountabilityProcessingCompatible

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
O
4
O
5
G
6
B
7
G
8
N
9
N
10
G
11
G
12
B
13
I
14
I
15
I
16
O
17
B
18
I
19
N
20
I
21
N
22
O
23
B
24
G
25
G
26
O
27
G
28
B
29
B
30
O
31
B
32
G
33
N
34
I
35
N
36
N
37
O
38
I
39
N
40
N
41
O
  1. I-Disclosure/Transfer
  2. B-Transparency
  3. O-Monitoring
  4. O-Collection
  5. G-Physical Security
  6. B-Compliance
  7. G-Storage Disposal
  8. N-Personal Data Breach
  9. N-Right to Erasure or Blocking
  10. G-Organizing
  11. G-Lawful Processing
  12. B-Encryption
  13. I-Personal Information
  14. I-Security Incident
  15. I-Proportionality
  16. O-Data Privacy Principles
  17. B-Data Privacy Officer
  18. I-Privacy Impact Assessment (PIA)
  19. N-Personal Information Controller (PIC)
  20. I-Right to be informed
  21. N-Privacy Manual
  22. O-Public and Private
  23. B-DPA Act of 2012
  24. G-Usage/Processing
  25. G-Right to Damages
  26. O-Consolidating
  27. G-Right to Data Portability
  28. B-Data Subject
  29. B-Data Privacy
  30. O-Legitimate Purpose
  31. B-Technical Security
  32. G-Personal Information Processor (PIP)
  33. N-Implement Privacy and Protection Measures
  34. I-Right to Access
  35. N-Sensitive
  36. N-Free!
  37. O-Individuals and Entities
  38. I-Right to file a complaint
  39. N-Accountability
  40. N-Processing
  41. O-Compatible