Right to Erasure or Blocking Compatible Data Subject Right to Data Portability Organizing Data Privacy Officer Proportionality Data Privacy Monitoring Implement Privacy and Protection Measures Right to be informed Personal Data Breach Technical Security Collection Right to file a complaint Personal Information Processor (PIP) Sensitive Consolidating Right to Access Privacy Manual Encryption Compliance Legitimate Purpose Individuals and Entities Physical Security DPA Act of 2012 Personal Information Controller (PIC) Data Privacy Principles Transparency Personal Information Storage Disposal Security Incident Accountability Public and Private Right to Damages Disclosure/Transfer Lawful Processing Processing Usage/Processing Free! Privacy Impact Assessment (PIA) Right to Erasure or Blocking Compatible Data Subject Right to Data Portability Organizing Data Privacy Officer Proportionality Data Privacy Monitoring Implement Privacy and Protection Measures Right to be informed Personal Data Breach Technical Security Collection Right to file a complaint Personal Information Processor (PIP) Sensitive Consolidating Right to Access Privacy Manual Encryption Compliance Legitimate Purpose Individuals and Entities Physical Security DPA Act of 2012 Personal Information Controller (PIC) Data Privacy Principles Transparency Personal Information Storage Disposal Security Incident Accountability Public and Private Right to Damages Disclosure/Transfer Lawful Processing Processing Usage/Processing Free! Privacy Impact Assessment (PIA)
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Right to Erasure or Blocking
O-Compatible
B-Data Subject
G-Right to Data Portability
G-Organizing
B-Data Privacy Officer
I-Proportionality
B-Data Privacy
O-Monitoring
N-Implement Privacy and Protection Measures
I-Right to be informed
N-Personal Data Breach
B-Technical Security
O-Collection
I-Right to file a complaint
G-Personal Information Processor (PIP)
N-Sensitive
O-Consolidating
I-Right to Access
N-Privacy Manual
B-Encryption
B-Compliance
O-Legitimate Purpose
O-Individuals and Entities
G-Physical Security
B-DPA Act of 2012
N-Personal Information Controller (PIC)
O-Data Privacy Principles
B-Transparency
I-Personal Information
G-Storage Disposal
I-Security Incident
N-Accountability
O-Public and Private
G-Right to Damages
I-Disclosure/Transfer
G-Lawful Processing
N-Processing
G-Usage/Processing
N-Free!
I-Privacy Impact Assessment (PIA)