CompliancePersonalInformationController(PIC)ProportionalityDataPrivacyPrinciplesRight toDamagesPersonalInformationProcessor(PIP)PrivacyImpactAssessment(PIA)Disclosure/TransferProcessingSecurityIncidentIndividualsandEntitiesDPAAct of2012PersonalInformationRight toDataPortabilityRight tofile acomplaintStorageDisposalPublicandPrivateSensitiveDataSubjectConsolidatingLawfulProcessingOrganizingImplementPrivacy andProtectionMeasuresPrivacyManualUsage/ProcessingFree!PersonalDataBreachDataPrivacyOfficerCollectionTransparencyPhysicalSecurityCompatibleRight toErasureorBlockingLegitimatePurposeTechnicalSecurityRight tobeinformedEncryptionMonitoringRighttoAccessDataPrivacyAccountabilityCompliancePersonalInformationController(PIC)ProportionalityDataPrivacyPrinciplesRight toDamagesPersonalInformationProcessor(PIP)PrivacyImpactAssessment(PIA)Disclosure/TransferProcessingSecurityIncidentIndividualsandEntitiesDPAAct of2012PersonalInformationRight toDataPortabilityRight tofile acomplaintStorageDisposalPublicandPrivateSensitiveDataSubjectConsolidatingLawfulProcessingOrganizingImplementPrivacy andProtectionMeasuresPrivacyManualUsage/ProcessingFree!PersonalDataBreachDataPrivacyOfficerCollectionTransparencyPhysicalSecurityCompatibleRight toErasureorBlockingLegitimatePurposeTechnicalSecurityRight tobeinformedEncryptionMonitoringRighttoAccessDataPrivacyAccountability

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
I
4
O
5
G
6
G
7
I
8
I
9
N
10
I
11
O
12
B
13
I
14
G
15
I
16
G
17
O
18
N
19
B
20
O
21
G
22
G
23
N
24
N
25
G
26
N
27
N
28
B
29
O
30
B
31
G
32
O
33
N
34
O
35
B
36
I
37
B
38
O
39
I
40
B
41
N
  1. B-Compliance
  2. N-Personal Information Controller (PIC)
  3. I-Proportionality
  4. O-Data Privacy Principles
  5. G-Right to Damages
  6. G-Personal Information Processor (PIP)
  7. I-Privacy Impact Assessment (PIA)
  8. I-Disclosure/Transfer
  9. N-Processing
  10. I-Security Incident
  11. O-Individuals and Entities
  12. B-DPA Act of 2012
  13. I-Personal Information
  14. G-Right to Data Portability
  15. I-Right to file a complaint
  16. G-Storage Disposal
  17. O-Public and Private
  18. N-Sensitive
  19. B-Data Subject
  20. O-Consolidating
  21. G-Lawful Processing
  22. G-Organizing
  23. N-Implement Privacy and Protection Measures
  24. N-Privacy Manual
  25. G-Usage/Processing
  26. N-Free!
  27. N-Personal Data Breach
  28. B-Data Privacy Officer
  29. O-Collection
  30. B-Transparency
  31. G-Physical Security
  32. O-Compatible
  33. N-Right to Erasure or Blocking
  34. O-Legitimate Purpose
  35. B-Technical Security
  36. I-Right to be informed
  37. B-Encryption
  38. O-Monitoring
  39. I-Right to Access
  40. B-Data Privacy
  41. N-Accountability