(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
What is the contact information of the Privacy Officer?
What is a "strong" password?
What is the procedure for lost/stolen laptop or USB?
Retention of Ownership
Nondisclosure Agreement
Confidentiality Agreements
Where can you find the list of approved software?
When you see a picture on the slide
When we discuss telecommuting
When you complete the General Confidentiality Notice
If the speaker smiles or laughs
Data Backup
When do you report security incidents?
UH FileDrop
Encryption
VeraCrypt
What are the three different levels of HIPAA violations?
Who is/are the COSCO member(s) for your specific project?
If you understand the pop culture reference on Andrew's slide
When you hear the word "Costco" (regardless of spelling)
What does HIPAA stand for?
When is incidental personal use of PHAC resources permissible?
If the speaker has a virtual background
McAfee Antivirus
In the event of a conflict of policies, the ____ apply
What are the PHAC prohibited activities?
What is PHI and what identifiers does it include?
Privacy Officer
What is transportable media?
Should you attempt to remove a suspected virus on a PHAC computer?
KeePassXC
Who must adhere to these policies?
When Dr. Fan starts her section
What is the procedure for discovery of an unknown laptop or USB?