(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
An employee feels they are being bullied by a co worker. Which department should the employee report to?
The HR Department
Name the three types of PHI
Verbal, Electronic and Paper PHI
If you would like to learn more about reporting you can take this course
Open Lines of Communication
The name of the patient privacy law that was passed in 1996
HIPAA
Using PMG equipment to advance in a second job is a violation under this policy
Conflict of Interest
Click on this button in outlook to report a phishing scam
Report Phish
Who is our Chief Compliance Officer?
Meg Grimaldi
improper billing and coding may result in fines under this Act
The False Claims Act
An employee was advised to upcode the level of service by a colleague. Which department should he report this to?
The Compliance Department
This type of phishing refers to fraudulent emails that appear to be from someone you know
Spear Phishing
Reporting misconduct creates a safer workplace.
Culture of Compliance
This policy protects those who have reported non compliance in good faith
Non Retaliation Policy
This is a set of guidelines that outlines general expectations for employees and supports our commitment to ethical behavior
Code of Conduct
This rules states that only the necessary information should be disclosed to fulfill your goal
Minimum Necessary Rule
This term is used to describe higher level service code than what was performed
Upcoding
These are various forms in which a phishing attack may occur
Text, phone, social media, and even Venmo
An improper disclosure of PHI may result in this reportable event
Breach
This is the name of our monthly Newsletter
Compliance Counts!
Where can you find our Compliance policies and procedures?
Compliance SharePoint Site
When scammers use social skills to try to access your personal or workplace computer system
Phishing
The acronym PHI stands for this
Protected Health Information
This policy encourages self reporting and provides a safe space for employees to discuss concerns
Open Door Policy
How many elements of an effective Compliance Program are there?
Seven
This is one of three ways to submit a report
Web report