PrivacyImpactAssessment(PIA)IndividualsandEntitiesMonitoringPersonalInformationLawfulProcessingOrganizingPrivacyManualFree!Right tobeinformedRight toDamagesTechnicalSecuritySensitiveRighttoAccessConsolidatingSecurityIncidentCompatibleImplementPrivacy andProtectionMeasuresProcessingLegitimatePurposeProportionalityUsage/ProcessingComplianceCollectionPersonalInformationController(PIC)PhysicalSecurityDataPrivacyStorageDisposalDataPrivacyPrinciplesPersonalDataBreachRight tofile acomplaintDisclosure/TransferRight toDataPortabilityEncryptionAccountabilityDataSubjectTransparencyPublicandPrivateDPAAct of2012PersonalInformationProcessor(PIP)DataPrivacyOfficerRight toErasureorBlockingPrivacyImpactAssessment(PIA)IndividualsandEntitiesMonitoringPersonalInformationLawfulProcessingOrganizingPrivacyManualFree!Right tobeinformedRight toDamagesTechnicalSecuritySensitiveRighttoAccessConsolidatingSecurityIncidentCompatibleImplementPrivacy andProtectionMeasuresProcessingLegitimatePurposeProportionalityUsage/ProcessingComplianceCollectionPersonalInformationController(PIC)PhysicalSecurityDataPrivacyStorageDisposalDataPrivacyPrinciplesPersonalDataBreachRight tofile acomplaintDisclosure/TransferRight toDataPortabilityEncryptionAccountabilityDataSubjectTransparencyPublicandPrivateDPAAct of2012PersonalInformationProcessor(PIP)DataPrivacyOfficerRight toErasureorBlocking

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
O
4
I
5
G
6
G
7
N
8
N
9
I
10
G
11
B
12
N
13
I
14
O
15
I
16
O
17
N
18
N
19
O
20
I
21
G
22
B
23
O
24
N
25
G
26
B
27
G
28
O
29
N
30
I
31
I
32
G
33
B
34
N
35
B
36
B
37
O
38
B
39
G
40
B
41
N
  1. I-Privacy Impact Assessment (PIA)
  2. O-Individuals and Entities
  3. O-Monitoring
  4. I-Personal Information
  5. G-Lawful Processing
  6. G-Organizing
  7. N-Privacy Manual
  8. N-Free!
  9. I-Right to be informed
  10. G-Right to Damages
  11. B-Technical Security
  12. N-Sensitive
  13. I-Right to Access
  14. O-Consolidating
  15. I-Security Incident
  16. O-Compatible
  17. N-Implement Privacy and Protection Measures
  18. N-Processing
  19. O-Legitimate Purpose
  20. I-Proportionality
  21. G-Usage/Processing
  22. B-Compliance
  23. O-Collection
  24. N-Personal Information Controller (PIC)
  25. G-Physical Security
  26. B-Data Privacy
  27. G-Storage Disposal
  28. O-Data Privacy Principles
  29. N-Personal Data Breach
  30. I-Right to file a complaint
  31. I-Disclosure/Transfer
  32. G-Right to Data Portability
  33. B-Encryption
  34. N-Accountability
  35. B-Data Subject
  36. B-Transparency
  37. O-Public and Private
  38. B-DPA Act of 2012
  39. G-Personal Information Processor (PIP)
  40. B-Data Privacy Officer
  41. N-Right to Erasure or Blocking