Personal Data Breach Personal Information Right to Damages DPA Act of 2012 Personal Information Processor (PIP) Storage Disposal Transparency Data Privacy Principles Physical Security Proportionality Legitimate Purpose Organizing Right to Data Portability Personal Information Controller (PIC) Technical Security Lawful Processing Sensitive Compatible Usage/Processing Disclosure/Transfer Data Subject Compliance Individuals and Entities Public and Private Encryption Right to Erasure or Blocking Free! Processing Right to file a complaint Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Security Incident Monitoring Privacy Manual Data Privacy Officer Collection Data Privacy Right to Access Accountability Right to be informed Consolidating Personal Data Breach Personal Information Right to Damages DPA Act of 2012 Personal Information Processor (PIP) Storage Disposal Transparency Data Privacy Principles Physical Security Proportionality Legitimate Purpose Organizing Right to Data Portability Personal Information Controller (PIC) Technical Security Lawful Processing Sensitive Compatible Usage/Processing Disclosure/Transfer Data Subject Compliance Individuals and Entities Public and Private Encryption Right to Erasure or Blocking Free! Processing Right to file a complaint Privacy Impact Assessment (PIA) Implement Privacy and Protection Measures Security Incident Monitoring Privacy Manual Data Privacy Officer Collection Data Privacy Right to Access Accountability Right to be informed Consolidating
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Personal Data Breach
I-Personal Information
G-Right to Damages
B-DPA Act of 2012
G-Personal Information Processor (PIP)
G-Storage Disposal
B-Transparency
O-Data Privacy Principles
G-Physical Security
I-Proportionality
O-Legitimate Purpose
G-Organizing
G-Right to Data Portability
N-Personal Information Controller (PIC)
B-Technical Security
G-Lawful Processing
N-Sensitive
O-Compatible
G-Usage/Processing
I-Disclosure/Transfer
B-Data Subject
B-Compliance
O-Individuals and Entities
O-Public and Private
B-Encryption
N-Right to Erasure or Blocking
N-Free!
N-Processing
I-Right to file a complaint
I-Privacy Impact Assessment (PIA)
N-Implement Privacy and Protection Measures
I-Security Incident
O-Monitoring
N-Privacy Manual
B-Data Privacy Officer
O-Collection
B-Data Privacy
I-Right to Access
N-Accountability
I-Right to be informed
O-Consolidating