CyberSecurityreportitComplianceCommitteeAccessControlChapmanAuditWorkPlanEMRAttestationPasswordProtectionSanctioneLearningFraudHealthStreamExternalAuditConflictofInterestInformationSecurityFosterHealthPlanCleanDeskPolicyFederalSentencingGuidelinesEducation8thElementPolicyExclusionScreeningGomezEPHIAuthorizationMedicareProcedureOIGHIPAANotice ofPrivacyPracticesPorterPrivacyAHCCCSSecurityBreachHIPAAReleaseHiTechMedicaidPHIEmailPIITextMessage7ElementsHotlineCorrectiveActionPlanRiskAssessmentRecordRetentionInternalAuditMonitoringOCRTrainingAffordableCare ActSafeHarborBAABadgeEncryptionCode ofEthics andConductAuditorwww.reportit.netOversightWhistleBlowerAbuseQuiTamStarkWasteAnti-KickbackCommunicationComplianceEffectivenessCyberSecurityreportitComplianceCommitteeAccessControlChapmanAuditWorkPlanEMRAttestationPasswordProtectionSanctioneLearningFraudHealthStreamExternalAuditConflictofInterestInformationSecurityFosterHealthPlanCleanDeskPolicyFederalSentencingGuidelinesEducation8thElementPolicyExclusionScreeningGomezEPHIAuthorizationMedicareProcedureOIGHIPAANotice ofPrivacyPracticesPorterPrivacyAHCCCSSecurityBreachHIPAAReleaseHiTechMedicaidPHIEmailPIITextMessage7ElementsHotlineCorrectiveActionPlanRiskAssessmentRecordRetentionInternalAuditMonitoringOCRTrainingAffordableCare ActSafeHarborBAABadgeEncryptionCode ofEthics andConductAuditorwww.reportit.netOversightWhistleBlowerAbuseQuiTamStarkWasteAnti-KickbackCommunicationComplianceEffectiveness

Compliance Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  1. Cyber Security
  2. report it
  3. Compliance Committee
  4. Access Control
  5. Chapman
  6. Audit Work Plan
  7. EMR
  8. Attestation
  9. Password Protection
  10. Sanction
  11. eLearning
  12. Fraud
  13. HealthStream
  14. External Audit
  15. Conflict of Interest
  16. Information Security
  17. Foster
  18. Health Plan
  19. Clean Desk Policy
  20. Federal Sentencing Guidelines
  21. Education
  22. 8th Element
  23. Policy
  24. Exclusion Screening
  25. Gomez
  26. EPHI
  27. Authorization
  28. Medicare
  29. Procedure
  30. OIG
  31. HIPAA
  32. Notice of Privacy Practices
  33. Porter
  34. Privacy
  35. AHCCCS
  36. Security
  37. Breach
  38. HIPAA Release
  39. HiTech
  40. Medicaid
  41. PHI
  42. Email
  43. PII
  44. Text Message
  45. 7 Elements
  46. Hotline
  47. Corrective Action Plan
  48. Risk Assessment
  49. Record Retention
  50. Internal Audit
  51. Monitoring
  52. OCR
  53. Training
  54. Affordable Care Act
  55. Safe Harbor
  56. BAA
  57. Badge
  58. Encryption
  59. Code of Ethics and Conduct
  60. Auditor
  61. www.reportit.net
  62. Oversight
  63. Whistle Blower
  64. Abuse
  65. Qui Tam
  66. Stark
  67. Waste
  68. Anti-Kickback
  69. Communication
  70. Compliance
  71. Effectiveness