What is thecontactinformation ofthe PrivacyOfficer?What is a"strong"password?What is theprocedure forlost/stolenlaptop orUSB?RetentionofOwnershipNondisclosureAgreementConfidentialityAgreementsWhere canyou find thelist ofapprovedsoftware?When yousee apicture onthe slideWhen wediscusstelecommutingWhen youcomplete theGeneralConfidentialityNoticeIf thespeakersmiles orlaughsDataBackupWhen doyou reportsecurityincidents?UHFileDropEncryptionVeraCryptWhat are thethree differentlevels ofHIPAAviolations?Who is/arethe COSCOmember(s) foryour specificproject?If youunderstand thepop culturereference onAndrew's slideWhen youhear the word"Costco"(regardless ofspelling)WhatdoesHIPAAstand for?When isincidentalpersonal use ofPHACresourcespermissible?If thespeaker hasa virtualbackgroundMcAfeeAntivirusIn the eventof a conflictof policies,the ____applyWhat arethe PHACprohibitedactivities?What is PHIand whatidentifiersdoes itinclude?PrivacyOfficerWhat istransportablemedia?Should youattempt toremove asuspected viruson a PHACcomputer?KeePassXCWho mustadhere tothesepolicies?When Dr.Fan startshersectionWhat is theprocedure fordiscovery of anunknown laptopor USB?If any of thespeakersturn off theircameraWhat is thecontactinformation ofthe PrivacyOfficer?What is a"strong"password?What is theprocedure forlost/stolenlaptop orUSB?RetentionofOwnershipNondisclosureAgreementConfidentialityAgreementsWhere canyou find thelist ofapprovedsoftware?When yousee apicture onthe slideWhen wediscusstelecommutingWhen youcomplete theGeneralConfidentialityNoticeIf thespeakersmiles orlaughsDataBackupWhen doyou reportsecurityincidents?UHFileDropEncryptionVeraCryptWhat are thethree differentlevels ofHIPAAviolations?Who is/arethe COSCOmember(s) foryour specificproject?If youunderstand thepop culturereference onAndrew's slideWhen youhear the word"Costco"(regardless ofspelling)WhatdoesHIPAAstand for?When isincidentalpersonal use ofPHACresourcespermissible?If thespeaker hasa virtualbackgroundMcAfeeAntivirusIn the eventof a conflictof policies,the ____applyWhat arethe PHACprohibitedactivities?What is PHIand whatidentifiersdoes itinclude?PrivacyOfficerWhat istransportablemedia?Should youattempt toremove asuspected viruson a PHACcomputer?KeePassXCWho mustadhere tothesepolicies?When Dr.Fan startshersectionWhat is theprocedure fordiscovery of anunknown laptopor USB?If any of thespeakersturn off theircamera

Quest to HIPAA Master Status - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
  1. What is the contact information of the Privacy Officer?
  2. What is a "strong" password?
  3. What is the procedure for lost/stolen laptop or USB?
  4. Retention of Ownership
  5. Nondisclosure Agreement
  6. Confidentiality Agreements
  7. Where can you find the list of approved software?
  8. When you see a picture on the slide
  9. When we discuss telecommuting
  10. When you complete the General Confidentiality Notice
  11. If the speaker smiles or laughs
  12. Data Backup
  13. When do you report security incidents?
  14. UH FileDrop
  15. Encryption
  16. VeraCrypt
  17. What are the three different levels of HIPAA violations?
  18. Who is/are the COSCO member(s) for your specific project?
  19. If you understand the pop culture reference on Andrew's slide
  20. When you hear the word "Costco" (regardless of spelling)
  21. What does HIPAA stand for?
  22. When is incidental personal use of PHAC resources permissible?
  23. If the speaker has a virtual background
  24. McAfee Antivirus
  25. In the event of a conflict of policies, the ____ apply
  26. What are the PHAC prohibited activities?
  27. What is PHI and what identifiers does it include?
  28. Privacy Officer
  29. What is transportable media?
  30. Should you attempt to remove a suspected virus on a PHAC computer?
  31. KeePassXC
  32. Who must adhere to these policies?
  33. When Dr. Fan starts her section
  34. What is the procedure for discovery of an unknown laptop or USB?
  35. If any of the speakers turn off their camera