Security Incident Monitoring Data Privacy Lawful Processing Personal Information Free! Right to Damages Right to file a complaint Organizing Transparency DPA Act of 2012 Data Privacy Officer Encryption Public and Private Privacy Manual Implement Privacy and Protection Measures Personal Information Controller (PIC) Physical Security Personal Data Breach Right to be informed Right to Access Usage/Processing Personal Information Processor (PIP) Data Subject Right to Data Portability Accountability Technical Security Disclosure/Transfer Storage Disposal Collection Compliance Data Privacy Principles Legitimate Purpose Right to Erasure or Blocking Individuals and Entities Compatible Sensitive Processing Consolidating Proportionality Privacy Impact Assessment (PIA) Security Incident Monitoring Data Privacy Lawful Processing Personal Information Free! Right to Damages Right to file a complaint Organizing Transparency DPA Act of 2012 Data Privacy Officer Encryption Public and Private Privacy Manual Implement Privacy and Protection Measures Personal Information Controller (PIC) Physical Security Personal Data Breach Right to be informed Right to Access Usage/Processing Personal Information Processor (PIP) Data Subject Right to Data Portability Accountability Technical Security Disclosure/Transfer Storage Disposal Collection Compliance Data Privacy Principles Legitimate Purpose Right to Erasure or Blocking Individuals and Entities Compatible Sensitive Processing Consolidating Proportionality Privacy Impact Assessment (PIA)
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Security Incident
O-Monitoring
B-Data Privacy
G-Lawful Processing
I-Personal Information
N-Free!
G-Right to Damages
I-Right to file a complaint
G-Organizing
B-Transparency
B-DPA Act of 2012
B-Data Privacy Officer
B-Encryption
O-Public and Private
N-Privacy Manual
N-Implement Privacy and Protection Measures
N-Personal Information Controller (PIC)
G-Physical Security
N-Personal Data Breach
I-Right to be informed
I-Right to Access
G-Usage/Processing
G-Personal Information Processor (PIP)
B-Data Subject
G-Right to Data Portability
N-Accountability
B-Technical Security
I-Disclosure/Transfer
G-Storage Disposal
O-Collection
B-Compliance
O-Data Privacy Principles
O-Legitimate Purpose
N-Right to Erasure or Blocking
O-Individuals and Entities
O-Compatible
N-Sensitive
N-Processing
O-Consolidating
I-Proportionality
I-Privacy Impact Assessment (PIA)