Right to Data Portability Personal Information Controller (PIC) Public and Private Monitoring Security Incident Lawful Processing Individuals and Entities Privacy Impact Assessment (PIA) Usage/Processing Processing Disclosure/Transfer Data Privacy Transparency Encryption Sensitive Data Subject Right to file a complaint Technical Security Storage Disposal Personal Information Processor (PIP) Right to Erasure or Blocking DPA Act of 2012 Proportionality Free! Right to Access Compatible Data Privacy Officer Compliance Legitimate Purpose Personal Data Breach Accountability Physical Security Collection Personal Information Data Privacy Principles Consolidating Privacy Manual Implement Privacy and Protection Measures Right to be informed Right to Damages Organizing Right to Data Portability Personal Information Controller (PIC) Public and Private Monitoring Security Incident Lawful Processing Individuals and Entities Privacy Impact Assessment (PIA) Usage/Processing Processing Disclosure/Transfer Data Privacy Transparency Encryption Sensitive Data Subject Right to file a complaint Technical Security Storage Disposal Personal Information Processor (PIP) Right to Erasure or Blocking DPA Act of 2012 Proportionality Free! Right to Access Compatible Data Privacy Officer Compliance Legitimate Purpose Personal Data Breach Accountability Physical Security Collection Personal Information Data Privacy Principles Consolidating Privacy Manual Implement Privacy and Protection Measures Right to be informed Right to Damages Organizing
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Right to Data Portability
N-Personal Information Controller (PIC)
O-Public and Private
O-Monitoring
I-Security Incident
G-Lawful Processing
O-Individuals and Entities
I-Privacy Impact Assessment (PIA)
G-Usage/Processing
N-Processing
I-Disclosure/Transfer
B-Data Privacy
B-Transparency
B-Encryption
N-Sensitive
B-Data Subject
I-Right to file a complaint
B-Technical Security
G-Storage Disposal
G-Personal Information Processor (PIP)
N-Right to Erasure or Blocking
B-DPA Act of 2012
I-Proportionality
N-Free!
I-Right to Access
O-Compatible
B-Data Privacy Officer
B-Compliance
O-Legitimate Purpose
N-Personal Data Breach
N-Accountability
G-Physical Security
O-Collection
I-Personal Information
O-Data Privacy Principles
O-Consolidating
N-Privacy Manual
N-Implement Privacy and Protection Measures
I-Right to be informed
G-Right to Damages
G-Organizing