ComplianceSharePointSiteWhere canyou find ourCompliancepolicies andprocedures?HIPAAThe name ofthe patientprivacy law thatwas passed in1996MegGrimaldiWho is ourChiefComplianceOfficer?OpenDoorPolicyThis policyencourages selfreporting andprovides a safespace foremployees todiscuss concernsTheComplianceDepartmentAn employee wasadvised to upcodethe level of serviceby a colleague.Which departmentshould he reportthis to?WebreportThis is oneof threeways tosubmit areportSpearPhishingThis type ofphishing refers tofraudulent emailsthat appear to befrom someoneyou knowPhishingWhen scammersuse social skillsto try to accessyour personal orworkplacecomputer systemNonRetaliationPolicyThis policyprotects thosewho havereported noncompliance ingood faithSevenHow manyelements of aneffectiveComplianceProgram arethere?ProtectedHealthInformationTheacronymPHI standsfor thisThe HRDepartmentAn employee feelsthey are beingbullied by a coworker. Whichdepartment shouldthe employeereport to?The FalseClaimsActimproperbilling andcoding mayresult in finesunder this ActMinimumNecessaryRuleThis rules statesthat only thenecessaryinformation shouldbe disclosed tofulfill your goalComplianceCounts!This is thename of ourmonthlyNewsletterBreachAn improperdisclosure ofPHI may resultin thisreportableeventVerbal,Electronicand PaperPHIName thethreetypes ofPHIConflictofInterestUsing PMGequipment toadvance in asecond job is aviolation underthis policyUpcodingThis term isused todescribe higherlevel servicecode than whatwas performedOpen Lines ofCommunicationIf you wouldlike to learnmore aboutreporting youcan take thiscourseText, phone,socialmedia, andeven VenmoThese arevarious formsin which aphishing attackmay occurCulture ofComplianceReportingmisconductcreates asaferworkplace.Code ofConductThis is a set ofguidelines thatoutlines generalexpectations foremployees andsupports ourcommitment toethical behaviorReportPhishClick on thisbutton inoutlook toreport aphishing scamComplianceSharePointSiteWhere canyou find ourCompliancepolicies andprocedures?HIPAAThe name ofthe patientprivacy law thatwas passed in1996MegGrimaldiWho is ourChiefComplianceOfficer?OpenDoorPolicyThis policyencourages selfreporting andprovides a safespace foremployees todiscuss concernsTheComplianceDepartmentAn employee wasadvised to upcodethe level of serviceby a colleague.Which departmentshould he reportthis to?WebreportThis is oneof threeways tosubmit areportSpearPhishingThis type ofphishing refers tofraudulent emailsthat appear to befrom someoneyou knowPhishingWhen scammersuse social skillsto try to accessyour personal orworkplacecomputer systemNonRetaliationPolicyThis policyprotects thosewho havereported noncompliance ingood faithSevenHow manyelements of aneffectiveComplianceProgram arethere?ProtectedHealthInformationTheacronymPHI standsfor thisThe HRDepartmentAn employee feelsthey are beingbullied by a coworker. Whichdepartment shouldthe employeereport to?The FalseClaimsActimproperbilling andcoding mayresult in finesunder this ActMinimumNecessaryRuleThis rules statesthat only thenecessaryinformation shouldbe disclosed tofulfill your goalComplianceCounts!This is thename of ourmonthlyNewsletterBreachAn improperdisclosure ofPHI may resultin thisreportableeventVerbal,Electronicand PaperPHIName thethreetypes ofPHIConflictofInterestUsing PMGequipment toadvance in asecond job is aviolation underthis policyUpcodingThis term isused todescribe higherlevel servicecode than whatwas performedOpen Lines ofCommunicationIf you wouldlike to learnmore aboutreporting youcan take thiscourseText, phone,socialmedia, andeven VenmoThese arevarious formsin which aphishing attackmay occurCulture ofComplianceReportingmisconductcreates asaferworkplace.Code ofConductThis is a set ofguidelines thatoutlines generalexpectations foremployees andsupports ourcommitment toethical behaviorReportPhishClick on thisbutton inoutlook toreport aphishing scam

Welcome to Compliance Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Where can you find our Compliance policies and procedures?
    Compliance SharePoint Site
  2. The name of the patient privacy law that was passed in 1996
    HIPAA
  3. Who is our Chief Compliance Officer?
    Meg Grimaldi
  4. This policy encourages self reporting and provides a safe space for employees to discuss concerns
    Open Door Policy
  5. An employee was advised to upcode the level of service by a colleague. Which department should he report this to?
    The Compliance Department
  6. This is one of three ways to submit a report
    Web report
  7. This type of phishing refers to fraudulent emails that appear to be from someone you know
    Spear Phishing
  8. When scammers use social skills to try to access your personal or workplace computer system
    Phishing
  9. This policy protects those who have reported non compliance in good faith
    Non Retaliation Policy
  10. How many elements of an effective Compliance Program are there?
    Seven
  11. The acronym PHI stands for this
    Protected Health Information
  12. An employee feels they are being bullied by a co worker. Which department should the employee report to?
    The HR Department
  13. improper billing and coding may result in fines under this Act
    The False Claims Act
  14. This rules states that only the necessary information should be disclosed to fulfill your goal
    Minimum Necessary Rule
  15. This is the name of our monthly Newsletter
    Compliance Counts!
  16. An improper disclosure of PHI may result in this reportable event
    Breach
  17. Name the three types of PHI
    Verbal, Electronic and Paper PHI
  18. Using PMG equipment to advance in a second job is a violation under this policy
    Conflict of Interest
  19. This term is used to describe higher level service code than what was performed
    Upcoding
  20. If you would like to learn more about reporting you can take this course
    Open Lines of Communication
  21. These are various forms in which a phishing attack may occur
    Text, phone, social media, and even Venmo
  22. Reporting misconduct creates a safer workplace.
    Culture of Compliance
  23. This is a set of guidelines that outlines general expectations for employees and supports our commitment to ethical behavior
    Code of Conduct
  24. Click on this button in outlook to report a phishing scam
    Report Phish