ComplianceOrganizingPersonalInformationController(PIC)PublicandPrivateSecurityIncidentLawfulProcessingLegitimatePurposeRight toErasureorBlockingDisclosure/TransferFree!DataPrivacyPrinciplesProportionalityStorageDisposalAccountabilityRight toDataPortabilityConsolidatingSensitiveTechnicalSecurityPersonalDataBreachRight toDamagesRight tobeinformedPersonalInformationProcessor(PIP)MonitoringDataPrivacyTransparencyRighttoAccessPrivacyManualPersonalInformationEncryptionPhysicalSecurityIndividualsandEntitiesUsage/ProcessingPrivacyImpactAssessment(PIA)CollectionDataSubjectProcessingDPAAct of2012CompatibleRight tofile acomplaintImplementPrivacy andProtectionMeasuresDataPrivacyOfficerComplianceOrganizingPersonalInformationController(PIC)PublicandPrivateSecurityIncidentLawfulProcessingLegitimatePurposeRight toErasureorBlockingDisclosure/TransferFree!DataPrivacyPrinciplesProportionalityStorageDisposalAccountabilityRight toDataPortabilityConsolidatingSensitiveTechnicalSecurityPersonalDataBreachRight toDamagesRight tobeinformedPersonalInformationProcessor(PIP)MonitoringDataPrivacyTransparencyRighttoAccessPrivacyManualPersonalInformationEncryptionPhysicalSecurityIndividualsandEntitiesUsage/ProcessingPrivacyImpactAssessment(PIA)CollectionDataSubjectProcessingDPAAct of2012CompatibleRight tofile acomplaintImplementPrivacy andProtectionMeasuresDataPrivacyOfficer

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
G
3
N
4
O
5
I
6
G
7
O
8
N
9
I
10
N
11
O
12
I
13
G
14
N
15
G
16
O
17
N
18
B
19
N
20
G
21
I
22
G
23
O
24
B
25
B
26
I
27
N
28
I
29
B
30
G
31
O
32
G
33
I
34
O
35
B
36
N
37
B
38
O
39
I
40
N
41
B
  1. B-Compliance
  2. G-Organizing
  3. N-Personal Information Controller (PIC)
  4. O-Public and Private
  5. I-Security Incident
  6. G-Lawful Processing
  7. O-Legitimate Purpose
  8. N-Right to Erasure or Blocking
  9. I-Disclosure/Transfer
  10. N-Free!
  11. O-Data Privacy Principles
  12. I-Proportionality
  13. G-Storage Disposal
  14. N-Accountability
  15. G-Right to Data Portability
  16. O-Consolidating
  17. N-Sensitive
  18. B-Technical Security
  19. N-Personal Data Breach
  20. G-Right to Damages
  21. I-Right to be informed
  22. G-Personal Information Processor (PIP)
  23. O-Monitoring
  24. B-Data Privacy
  25. B-Transparency
  26. I-Right to Access
  27. N-Privacy Manual
  28. I-Personal Information
  29. B-Encryption
  30. G-Physical Security
  31. O-Individuals and Entities
  32. G-Usage/Processing
  33. I-Privacy Impact Assessment (PIA)
  34. O-Collection
  35. B-Data Subject
  36. N-Processing
  37. B-DPA Act of 2012
  38. O-Compatible
  39. I-Right to file a complaint
  40. N-Implement Privacy and Protection Measures
  41. B-Data Privacy Officer