Privacy Impact Assessment (PIA) Individuals and Entities Monitoring Personal Information Lawful Processing Organizing Privacy Manual Free! Right to be informed Right to Damages Technical Security Sensitive Right to Access Consolidating Security Incident Compatible Implement Privacy and Protection Measures Processing Legitimate Purpose Proportionality Usage/Processing Compliance Collection Personal Information Controller (PIC) Physical Security Data Privacy Storage Disposal Data Privacy Principles Personal Data Breach Right to file a complaint Disclosure/Transfer Right to Data Portability Encryption Accountability Data Subject Transparency Public and Private DPA Act of 2012 Personal Information Processor (PIP) Data Privacy Officer Right to Erasure or Blocking Privacy Impact Assessment (PIA) Individuals and Entities Monitoring Personal Information Lawful Processing Organizing Privacy Manual Free! Right to be informed Right to Damages Technical Security Sensitive Right to Access Consolidating Security Incident Compatible Implement Privacy and Protection Measures Processing Legitimate Purpose Proportionality Usage/Processing Compliance Collection Personal Information Controller (PIC) Physical Security Data Privacy Storage Disposal Data Privacy Principles Personal Data Breach Right to file a complaint Disclosure/Transfer Right to Data Portability Encryption Accountability Data Subject Transparency Public and Private DPA Act of 2012 Personal Information Processor (PIP) Data Privacy Officer Right to Erasure or Blocking
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Privacy Impact Assessment (PIA)
O-Individuals and Entities
O-Monitoring
I-Personal Information
G-Lawful Processing
G-Organizing
N-Privacy Manual
N-Free!
I-Right to be informed
G-Right to Damages
B-Technical Security
N-Sensitive
I-Right to Access
O-Consolidating
I-Security Incident
O-Compatible
N-Implement Privacy and Protection Measures
N-Processing
O-Legitimate Purpose
I-Proportionality
G-Usage/Processing
B-Compliance
O-Collection
N-Personal Information Controller (PIC)
G-Physical Security
B-Data Privacy
G-Storage Disposal
O-Data Privacy Principles
N-Personal Data Breach
I-Right to file a complaint
I-Disclosure/Transfer
G-Right to Data Portability
B-Encryption
N-Accountability
B-Data Subject
B-Transparency
O-Public and Private
B-DPA Act of 2012
G-Personal Information Processor (PIP)
B-Data Privacy Officer
N-Right to Erasure or Blocking