EffectivenessCleanDeskPolicyPHIHIPAATrainingSafeHarborChapmanCode ofEthics andConductEducationProcedureInformationSecurityComplianceCommitteeAuditWorkPlan7ElementsFraudEmail8thElementQuiTamHealthPlanAccessControlNotice ofPrivacyPracticesMedicareOIGBAAAnti-KickbackAbuseRecordRetentionHealthStreamMonitoringSanctionCyberSecurityCommunicationCorrectiveActionPlanAHCCCSComplianceSecurityConflictofInterestGomezOCREPHIPasswordProtectionHIPAAReleaseHotlineWastePolicyPorterTextMessageWhistleBlowerOversightInternalAuditExclusionScreeningStarkBadgeAttestationFederalSentencingGuidelinesHiTechAuthorizationMedicaidAuditorPrivacyBreachFosterEMRAffordableCare ActeLearningExternalAuditPIIEncryptionreportitRiskAssessmentwww.reportit.netEffectivenessCleanDeskPolicyPHIHIPAATrainingSafeHarborChapmanCode ofEthics andConductEducationProcedureInformationSecurityComplianceCommitteeAuditWorkPlan7ElementsFraudEmail8thElementQuiTamHealthPlanAccessControlNotice ofPrivacyPracticesMedicareOIGBAAAnti-KickbackAbuseRecordRetentionHealthStreamMonitoringSanctionCyberSecurityCommunicationCorrectiveActionPlanAHCCCSComplianceSecurityConflictofInterestGomezOCREPHIPasswordProtectionHIPAAReleaseHotlineWastePolicyPorterTextMessageWhistleBlowerOversightInternalAuditExclusionScreeningStarkBadgeAttestationFederalSentencingGuidelinesHiTechAuthorizationMedicaidAuditorPrivacyBreachFosterEMRAffordableCare ActeLearningExternalAuditPIIEncryptionreportitRiskAssessmentwww.reportit.net

Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. Effectiveness
  2. Clean Desk Policy
  3. PHI
  4. HIPAA
  5. Training
  6. Safe Harbor
  7. Chapman
  8. Code of Ethics and Conduct
  9. Education
  10. Procedure
  11. Information Security
  12. Compliance Committee
  13. Audit Work Plan
  14. 7 Elements
  15. Fraud
  16. Email
  17. 8th Element
  18. Qui Tam
  19. Health Plan
  20. Access Control
  21. Notice of Privacy Practices
  22. Medicare
  23. OIG
  24. BAA
  25. Anti-Kickback
  26. Abuse
  27. Record Retention
  28. HealthStream
  29. Monitoring
  30. Sanction
  31. Cyber Security
  32. Communication
  33. Corrective Action Plan
  34. AHCCCS
  35. Compliance
  36. Security
  37. Conflict of Interest
  38. Gomez
  39. OCR
  40. EPHI
  41. Password Protection
  42. HIPAA Release
  43. Hotline
  44. Waste
  45. Policy
  46. Porter
  47. Text Message
  48. Whistle Blower
  49. Oversight
  50. Internal Audit
  51. Exclusion Screening
  52. Stark
  53. Badge
  54. Attestation
  55. Federal Sentencing Guidelines
  56. HiTech
  57. Authorization
  58. Medicaid
  59. Auditor
  60. Privacy
  61. Breach
  62. Foster
  63. EMR
  64. Affordable Care Act
  65. eLearning
  66. External Audit
  67. PII
  68. Encryption
  69. report it
  70. Risk Assessment
  71. www.reportit.net