SecurityIncidentMonitoringDataPrivacyLawfulProcessingPersonalInformationFree!Right toDamagesRight tofile acomplaintOrganizingTransparencyDPAAct of2012DataPrivacyOfficerEncryptionPublicandPrivatePrivacyManualImplementPrivacy andProtectionMeasuresPersonalInformationController(PIC)PhysicalSecurityPersonalDataBreachRight tobeinformedRighttoAccessUsage/ProcessingPersonalInformationProcessor(PIP)DataSubjectRight toDataPortabilityAccountabilityTechnicalSecurityDisclosure/TransferStorageDisposalCollectionComplianceDataPrivacyPrinciplesLegitimatePurposeRight toErasureorBlockingIndividualsandEntitiesCompatibleSensitiveProcessingConsolidatingProportionalityPrivacyImpactAssessment(PIA)SecurityIncidentMonitoringDataPrivacyLawfulProcessingPersonalInformationFree!Right toDamagesRight tofile acomplaintOrganizingTransparencyDPAAct of2012DataPrivacyOfficerEncryptionPublicandPrivatePrivacyManualImplementPrivacy andProtectionMeasuresPersonalInformationController(PIC)PhysicalSecurityPersonalDataBreachRight tobeinformedRighttoAccessUsage/ProcessingPersonalInformationProcessor(PIP)DataSubjectRight toDataPortabilityAccountabilityTechnicalSecurityDisclosure/TransferStorageDisposalCollectionComplianceDataPrivacyPrinciplesLegitimatePurposeRight toErasureorBlockingIndividualsandEntitiesCompatibleSensitiveProcessingConsolidatingProportionalityPrivacyImpactAssessment(PIA)

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
B
4
G
5
I
6
N
7
G
8
I
9
G
10
B
11
B
12
B
13
B
14
O
15
N
16
N
17
N
18
G
19
N
20
I
21
I
22
G
23
G
24
B
25
G
26
N
27
B
28
I
29
G
30
O
31
B
32
O
33
O
34
N
35
O
36
O
37
N
38
N
39
O
40
I
41
I
  1. I-Security Incident
  2. O-Monitoring
  3. B-Data Privacy
  4. G-Lawful Processing
  5. I-Personal Information
  6. N-Free!
  7. G-Right to Damages
  8. I-Right to file a complaint
  9. G-Organizing
  10. B-Transparency
  11. B-DPA Act of 2012
  12. B-Data Privacy Officer
  13. B-Encryption
  14. O-Public and Private
  15. N-Privacy Manual
  16. N-Implement Privacy and Protection Measures
  17. N-Personal Information Controller (PIC)
  18. G-Physical Security
  19. N-Personal Data Breach
  20. I-Right to be informed
  21. I-Right to Access
  22. G-Usage/Processing
  23. G-Personal Information Processor (PIP)
  24. B-Data Subject
  25. G-Right to Data Portability
  26. N-Accountability
  27. B-Technical Security
  28. I-Disclosure/Transfer
  29. G-Storage Disposal
  30. O-Collection
  31. B-Compliance
  32. O-Data Privacy Principles
  33. O-Legitimate Purpose
  34. N-Right to Erasure or Blocking
  35. O-Individuals and Entities
  36. O-Compatible
  37. N-Sensitive
  38. N-Processing
  39. O-Consolidating
  40. I-Proportionality
  41. I-Privacy Impact Assessment (PIA)