Right toErasureorBlockingCompatibleDataSubjectRight toDataPortabilityOrganizingDataPrivacyOfficerProportionalityDataPrivacyMonitoringImplementPrivacy andProtectionMeasuresRight tobeinformedPersonalDataBreachTechnicalSecurityCollectionRight tofile acomplaintPersonalInformationProcessor(PIP)SensitiveConsolidatingRighttoAccessPrivacyManualEncryptionComplianceLegitimatePurposeIndividualsandEntitiesPhysicalSecurityDPAAct of2012PersonalInformationController(PIC)DataPrivacyPrinciplesTransparencyPersonalInformationStorageDisposalSecurityIncidentAccountabilityPublicandPrivateRight toDamagesDisclosure/TransferLawfulProcessingProcessingUsage/ProcessingFree!PrivacyImpactAssessment(PIA)Right toErasureorBlockingCompatibleDataSubjectRight toDataPortabilityOrganizingDataPrivacyOfficerProportionalityDataPrivacyMonitoringImplementPrivacy andProtectionMeasuresRight tobeinformedPersonalDataBreachTechnicalSecurityCollectionRight tofile acomplaintPersonalInformationProcessor(PIP)SensitiveConsolidatingRighttoAccessPrivacyManualEncryptionComplianceLegitimatePurposeIndividualsandEntitiesPhysicalSecurityDPAAct of2012PersonalInformationController(PIC)DataPrivacyPrinciplesTransparencyPersonalInformationStorageDisposalSecurityIncidentAccountabilityPublicandPrivateRight toDamagesDisclosure/TransferLawfulProcessingProcessingUsage/ProcessingFree!PrivacyImpactAssessment(PIA)

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
O
3
B
4
G
5
G
6
B
7
I
8
B
9
O
10
N
11
I
12
N
13
B
14
O
15
I
16
G
17
N
18
O
19
I
20
N
21
B
22
B
23
O
24
O
25
G
26
B
27
N
28
O
29
B
30
I
31
G
32
I
33
N
34
O
35
G
36
I
37
G
38
N
39
G
40
N
41
I
  1. N-Right to Erasure or Blocking
  2. O-Compatible
  3. B-Data Subject
  4. G-Right to Data Portability
  5. G-Organizing
  6. B-Data Privacy Officer
  7. I-Proportionality
  8. B-Data Privacy
  9. O-Monitoring
  10. N-Implement Privacy and Protection Measures
  11. I-Right to be informed
  12. N-Personal Data Breach
  13. B-Technical Security
  14. O-Collection
  15. I-Right to file a complaint
  16. G-Personal Information Processor (PIP)
  17. N-Sensitive
  18. O-Consolidating
  19. I-Right to Access
  20. N-Privacy Manual
  21. B-Encryption
  22. B-Compliance
  23. O-Legitimate Purpose
  24. O-Individuals and Entities
  25. G-Physical Security
  26. B-DPA Act of 2012
  27. N-Personal Information Controller (PIC)
  28. O-Data Privacy Principles
  29. B-Transparency
  30. I-Personal Information
  31. G-Storage Disposal
  32. I-Security Incident
  33. N-Accountability
  34. O-Public and Private
  35. G-Right to Damages
  36. I-Disclosure/Transfer
  37. G-Lawful Processing
  38. N-Processing
  39. G-Usage/Processing
  40. N-Free!
  41. I-Privacy Impact Assessment (PIA)