information thatneither identifiesnor provides areasonable basisto identify anindividualoffers providersa convenientview ofimportantinformation at aglancerecords that showwho has accesseda computer ornetwork and whatoperations wereperformedelectronicversion of aperson'slifelongcomprehensivehealth recordindividually identifiablehealth information thatis transmitted ormaintained byelectronic media or istransmitted ormaintained in any otherformhealth plans withhigh deductibles,low premiums,and tax-freesavings accountsprocedure codes thatare used to representthe processes aphysician performed indetermining the bestcourse of treatmentthe mechanismsrequired to protectelectronic systems,equipment, and datafrom threats,environmental hazardsand unauthorizedintrusionprovidesdifferentsearch optionsto locate apatient's recordpermission touse anddiscloseinformation foruses other thanTPOpolicies andproceduresdesigned toprotect e-healthinformationallows patientsto view certaininformationfrom their chartvia the Internetpart of the AdministrativeSimplification provisionsof HIPAA that providesprotection for individuallyidentifiable healthinformation and grantscertain rights toindividuals in regard totheir medical recorda widely usedformat fordocumentingpatientencountersnotes about apatient's medicalcondition that aremade during orafter a physician-patient encounterproviders andorganizations thatprovide health care inthe normal course ofbusiness andelectronically transmitany information that isprotected under HIPAApart of theAdministrativeSimplification provisionsof HIPAA that protectsthe confidentiality,integrity, and availabilityof e-health informationinformationsystem notconnected toanotherinformationsystemlimits access topatientinformationbased on theuser's role in anorganizationthe process ofconverting datainto anunreadableformat before itis distributedthe releaseof PHI to anoutsideprovider ororganizationsecurity featurethat limits accessto informationbased on type ofinformation eachuser will need toview or modifyautomatedprocesses usedto protect dataand controlaccess to datasafeguards to protectPHI from beingaccidentally released tothose who do not needaccess to theinformation during anappropriate use ordisclosurename of the HIPAATitle II, whichaddresses theuniform transfer of e-healthcare data aswell as patientprivacy protectionsinformation thatneither identifiesnor provides areasonable basisto identify anindividualoffers providersa convenientview ofimportantinformation at aglancerecords that showwho has accesseda computer ornetwork and whatoperations wereperformedelectronicversion of aperson'slifelongcomprehensivehealth recordindividually identifiablehealth information thatis transmitted ormaintained byelectronic media or istransmitted ormaintained in any otherformhealth plans withhigh deductibles,low premiums,and tax-freesavings accountsprocedure codes thatare used to representthe processes aphysician performed indetermining the bestcourse of treatmentthe mechanismsrequired to protectelectronic systems,equipment, and datafrom threats,environmental hazardsand unauthorizedintrusionprovidesdifferentsearch optionsto locate apatient's recordpermission touse anddiscloseinformation foruses other thanTPOpolicies andproceduresdesigned toprotect e-healthinformationallows patientsto view certaininformationfrom their chartvia the Internetpart of the AdministrativeSimplification provisionsof HIPAA that providesprotection for individuallyidentifiable healthinformation and grantscertain rights toindividuals in regard totheir medical recorda widely usedformat fordocumentingpatientencountersnotes about apatient's medicalcondition that aremade during orafter a physician-patient encounterproviders andorganizations thatprovide health care inthe normal course ofbusiness andelectronically transmitany information that isprotected under HIPAApart of theAdministrativeSimplification provisionsof HIPAA that protectsthe confidentiality,integrity, and availabilityof e-health informationinformationsystem notconnected toanotherinformationsystemlimits access topatientinformationbased on theuser's role in anorganizationthe process ofconverting datainto anunreadableformat before itis distributedthe releaseof PHI to anoutsideprovider ororganizationsecurity featurethat limits accessto informationbased on type ofinformation eachuser will need toview or modifyautomatedprocesses usedto protect dataand controlaccess to datasafeguards to protectPHI from beingaccidentally released tothose who do not needaccess to theinformation during anappropriate use ordisclosurename of the HIPAATitle II, whichaddresses theuniform transfer of e-healthcare data aswell as patientprivacy protections

FINAL REVIEW - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. information that neither identifies nor provides a reasonable basis to identify an individual
  2. offers providers a convenient view of important information at a glance
  3. records that show who has accessed a computer or network and what operations were performed
  4. electronic version of a person's lifelong comprehensive health record
  5. individually identifiable health information that is transmitted or maintained by electronic media or is transmitted or maintained in any other form
  6. health plans with high deductibles, low premiums, and tax-free savings accounts
  7. procedure codes that are used to represent the processes a physician performed in determining the best course of treatment
  8. the mechanisms required to protect electronic systems, equipment, and data from threats, environmental hazards and unauthorized intrusion
  9. provides different search options to locate a patient's record
  10. permission to use and disclose information for uses other than TPO
  11. policies and procedures designed to protect e-health information
  12. allows patients to view certain information from their chart via the Internet
  13. part of the Administrative Simplification provisions of HIPAA that provides protection for individually identifiable health information and grants certain rights to individuals in regard to their medical record
  14. a widely used format for documenting patient encounters
  15. notes about a patient's medical condition that are made during or after a physician-patient encounter
  16. providers and organizations that provide health care in the normal course of business and electronically transmit any information that is protected under HIPAA
  17. part of the Administrative Simplification provisions of HIPAA that protects the confidentiality, integrity, and availability of e-health information
  18. information system not connected to another information system
  19. limits access to patient information based on the user's role in an organization
  20. the process of converting data into an unreadable format before it is distributed
  21. the release of PHI to an outside provider or organization
  22. security feature that limits access to information based on type of information each user will need to view or modify
  23. automated processes used to protect data and control access to data
  24. safeguards to protect PHI from being accidentally released to those who do not need access to the information during an appropriate use or disclosure
  25. name of the HIPAA Title II, which addresses the uniform transfer of e-healthcare data as well as patient privacy protections