Risk Assessment Security Laptop Need to Know Breach Notification Privacy Incident Breach Notification Privacy Audit Trail Security Officer HIPAA Golden Rules Desktop Malicious Security Incident Locking Bag Business Associate Agreement Fax Cover Sheet Phishing Retention Policy Social Security Number Organization Security Rule Protected Health Info Privacy Officer Treatment Notice of Privacy Practices Compliance Officer HIPAA Violation HIPAA Vendors Incident Patient Consent Security Risk Analysis Covered Entities Minimum Necessary Password Protection Precautions Two-Factor Authentication Authorization Workstation Security PHI Privacy Rule Suspicious Personal Information Passphrase Secure Disposal Role- Based Access Physical Safeguards HIPAA Compliance Secure Encryption Access Control Covered Entity DHHS Business Associates Healthcare Providers Technical Safeguards Report Immediately Electronic PHI Safeguard Business Associate Data Integrity Policies Pharmacy Benefit Managers Disclosure Workforce Training Recipient HITECH Medical Records Unauthorized Access Unauthorized Procedures Breach Notification Rule Identity Verification Pharmacies Clean Desk Policy Email Consequences Violation Subcontractors Phone Number Compliance De- Identified Info Privacy Officer Data Breach Secure Email Administrative Safeguards Electronic Protected Health Information Risk Assessment Security Laptop Need to Know Breach Notification Privacy Incident Breach Notification Privacy Audit Trail Security Officer HIPAA Golden Rules Desktop Malicious Security Incident Locking Bag Business Associate Agreement Fax Cover Sheet Phishing Retention Policy Social Security Number Organization Security Rule Protected Health Info Privacy Officer Treatment Notice of Privacy Practices Compliance Officer HIPAA Violation HIPAA Vendors Incident Patient Consent Security Risk Analysis Covered Entities Minimum Necessary Password Protection Precautions Two-Factor Authentication Authorization Workstation Security PHI Privacy Rule Suspicious Personal Information Passphrase Secure Disposal Role- Based Access Physical Safeguards HIPAA Compliance Secure Encryption Access Control Covered Entity DHHS Business Associates Healthcare Providers Technical Safeguards Report Immediately Electronic PHI Safeguard Business Associate Data Integrity Policies Pharmacy Benefit Managers Disclosure Workforce Training Recipient HITECH Medical Records Unauthorized Access Unauthorized Procedures Breach Notification Rule Identity Verification Pharmacies Clean Desk Policy Email Consequences Violation Subcontractors Phone Number Compliance De- Identified Info Privacy Officer Data Breach Secure Email Administrative Safeguards Electronic Protected Health Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk Assessment
Security
Laptop
Need to Know
Breach Notification
Privacy Incident
Breach Notification
Privacy
Audit Trail
Security Officer
HIPAA Golden Rules
Desktop
Malicious
Security Incident
Locking Bag
Business Associate Agreement
Fax Cover Sheet
Phishing
Retention Policy
Social Security Number
Organization
Security Rule
Protected Health Info
Privacy Officer
Treatment
Notice of Privacy Practices
Compliance Officer
HIPAA Violation
HIPAA
Vendors
Incident
Patient Consent
Security Risk Analysis
Covered Entities
Minimum Necessary
Password Protection
Precautions
Two-Factor Authentication
Authorization
Workstation Security
PHI
Privacy Rule
Suspicious
Personal Information
Passphrase
Secure Disposal
Role-Based Access
Physical Safeguards
HIPAA Compliance
Secure
Encryption
Access Control
Covered Entity
DHHS
Business Associates
Healthcare Providers
Technical Safeguards
Report Immediately
Electronic PHI
Safeguard
Business Associate
Data Integrity
Policies
Pharmacy Benefit Managers
Disclosure
Workforce Training
Recipient
HITECH
Medical Records
Unauthorized Access
Unauthorized
Procedures
Breach Notification Rule
Identity Verification
Pharmacies
Clean Desk Policy
Email
Consequences
Violation
Subcontractors
Phone Number
Compliance
De-Identified Info
Privacy Officer
Data Breach
Secure Email
Administrative Safeguards
Electronic Protected Health Information