PersonalDataBreachPersonalInformationRight toDamagesDPAAct of2012PersonalInformationProcessor(PIP)StorageDisposalTransparencyDataPrivacyPrinciplesPhysicalSecurityProportionalityLegitimatePurposeOrganizingRight toDataPortabilityPersonalInformationController(PIC)TechnicalSecurityLawfulProcessingSensitiveCompatibleUsage/ProcessingDisclosure/TransferDataSubjectComplianceIndividualsandEntitiesPublicandPrivateEncryptionRight toErasureorBlockingFree!ProcessingRight tofile acomplaintPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresSecurityIncidentMonitoringPrivacyManualDataPrivacyOfficerCollectionDataPrivacyRighttoAccessAccountabilityRight tobeinformedConsolidatingPersonalDataBreachPersonalInformationRight toDamagesDPAAct of2012PersonalInformationProcessor(PIP)StorageDisposalTransparencyDataPrivacyPrinciplesPhysicalSecurityProportionalityLegitimatePurposeOrganizingRight toDataPortabilityPersonalInformationController(PIC)TechnicalSecurityLawfulProcessingSensitiveCompatibleUsage/ProcessingDisclosure/TransferDataSubjectComplianceIndividualsandEntitiesPublicandPrivateEncryptionRight toErasureorBlockingFree!ProcessingRight tofile acomplaintPrivacyImpactAssessment(PIA)ImplementPrivacy andProtectionMeasuresSecurityIncidentMonitoringPrivacyManualDataPrivacyOfficerCollectionDataPrivacyRighttoAccessAccountabilityRight tobeinformedConsolidating

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
I
3
G
4
B
5
G
6
G
7
B
8
O
9
G
10
I
11
O
12
G
13
G
14
N
15
B
16
G
17
N
18
O
19
G
20
I
21
B
22
B
23
O
24
O
25
B
26
N
27
N
28
N
29
I
30
I
31
N
32
I
33
O
34
N
35
B
36
O
37
B
38
I
39
N
40
I
41
O
  1. N-Personal Data Breach
  2. I-Personal Information
  3. G-Right to Damages
  4. B-DPA Act of 2012
  5. G-Personal Information Processor (PIP)
  6. G-Storage Disposal
  7. B-Transparency
  8. O-Data Privacy Principles
  9. G-Physical Security
  10. I-Proportionality
  11. O-Legitimate Purpose
  12. G-Organizing
  13. G-Right to Data Portability
  14. N-Personal Information Controller (PIC)
  15. B-Technical Security
  16. G-Lawful Processing
  17. N-Sensitive
  18. O-Compatible
  19. G-Usage/Processing
  20. I-Disclosure/Transfer
  21. B-Data Subject
  22. B-Compliance
  23. O-Individuals and Entities
  24. O-Public and Private
  25. B-Encryption
  26. N-Right to Erasure or Blocking
  27. N-Free!
  28. N-Processing
  29. I-Right to file a complaint
  30. I-Privacy Impact Assessment (PIA)
  31. N-Implement Privacy and Protection Measures
  32. I-Security Incident
  33. O-Monitoring
  34. N-Privacy Manual
  35. B-Data Privacy Officer
  36. O-Collection
  37. B-Data Privacy
  38. I-Right to Access
  39. N-Accountability
  40. I-Right to be informed
  41. O-Consolidating