Right toDataPortabilityPersonalInformationController(PIC)PublicandPrivateMonitoringSecurityIncidentLawfulProcessingIndividualsandEntitiesPrivacyImpactAssessment(PIA)Usage/ProcessingProcessingDisclosure/TransferDataPrivacyTransparencyEncryptionSensitiveDataSubjectRight tofile acomplaintTechnicalSecurityStorageDisposalPersonalInformationProcessor(PIP)Right toErasureorBlockingDPAAct of2012ProportionalityFree!RighttoAccessCompatibleDataPrivacyOfficerComplianceLegitimatePurposePersonalDataBreachAccountabilityPhysicalSecurityCollectionPersonalInformationDataPrivacyPrinciplesConsolidatingPrivacyManualImplementPrivacy andProtectionMeasuresRight tobeinformedRight toDamagesOrganizingRight toDataPortabilityPersonalInformationController(PIC)PublicandPrivateMonitoringSecurityIncidentLawfulProcessingIndividualsandEntitiesPrivacyImpactAssessment(PIA)Usage/ProcessingProcessingDisclosure/TransferDataPrivacyTransparencyEncryptionSensitiveDataSubjectRight tofile acomplaintTechnicalSecurityStorageDisposalPersonalInformationProcessor(PIP)Right toErasureorBlockingDPAAct of2012ProportionalityFree!RighttoAccessCompatibleDataPrivacyOfficerComplianceLegitimatePurposePersonalDataBreachAccountabilityPhysicalSecurityCollectionPersonalInformationDataPrivacyPrinciplesConsolidatingPrivacyManualImplementPrivacy andProtectionMeasuresRight tobeinformedRight toDamagesOrganizing

FMH DP Seminar - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
O
4
O
5
I
6
G
7
O
8
I
9
G
10
N
11
I
12
B
13
B
14
B
15
N
16
B
17
I
18
B
19
G
20
G
21
N
22
B
23
I
24
N
25
I
26
O
27
B
28
B
29
O
30
N
31
N
32
G
33
O
34
I
35
O
36
O
37
N
38
N
39
I
40
G
41
G
  1. G-Right to Data Portability
  2. N-Personal Information Controller (PIC)
  3. O-Public and Private
  4. O-Monitoring
  5. I-Security Incident
  6. G-Lawful Processing
  7. O-Individuals and Entities
  8. I-Privacy Impact Assessment (PIA)
  9. G-Usage/Processing
  10. N-Processing
  11. I-Disclosure/Transfer
  12. B-Data Privacy
  13. B-Transparency
  14. B-Encryption
  15. N-Sensitive
  16. B-Data Subject
  17. I-Right to file a complaint
  18. B-Technical Security
  19. G-Storage Disposal
  20. G-Personal Information Processor (PIP)
  21. N-Right to Erasure or Blocking
  22. B-DPA Act of 2012
  23. I-Proportionality
  24. N-Free!
  25. I-Right to Access
  26. O-Compatible
  27. B-Data Privacy Officer
  28. B-Compliance
  29. O-Legitimate Purpose
  30. N-Personal Data Breach
  31. N-Accountability
  32. G-Physical Security
  33. O-Collection
  34. I-Personal Information
  35. O-Data Privacy Principles
  36. O-Consolidating
  37. N-Privacy Manual
  38. N-Implement Privacy and Protection Measures
  39. I-Right to be informed
  40. G-Right to Damages
  41. G-Organizing