Fax Cover Sheet Notice of Privacy Practices Incident Medical Records De- Identified Info Administrative Safeguards Security Incident Security Rule Policies Malicious DHHS Need to Know Access Control Vendors Unauthorized Access Clean Desk Policy Business Associate Risk Assessment HIPAA Security Officer Pharmacies Safeguard Email Personal Information Privacy Officer Healthcare Providers Pharmacy Benefit Managers Retention Policy Encryption Unauthorized Role- Based Access Minimum Necessary Covered Entities HITECH Security Social Security Number Disclosure Laptop Compliance Officer Privacy Rule Covered Entity Identity Verification Audit Trail Patient Consent HIPAA Compliance Treatment HIPAA Violation Privacy Privacy Incident Password Protection Phishing Two-Factor Authentication Business Associates Privacy Officer Breach Notification Suspicious Workstation Security PHI Technical Safeguards Organization Data Breach Security Risk Analysis Passphrase Authorization Breach Notification Subcontractors Business Associate Agreement Secure Data Integrity Violation Consequences Report Immediately Workforce Training Electronic PHI Desktop Protected Health Info Physical Safeguards Secure Disposal Compliance Secure Email Electronic Protected Health Information Precautions Phone Number HIPAA Golden Rules Breach Notification Rule Locking Bag Procedures Recipient Fax Cover Sheet Notice of Privacy Practices Incident Medical Records De- Identified Info Administrative Safeguards Security Incident Security Rule Policies Malicious DHHS Need to Know Access Control Vendors Unauthorized Access Clean Desk Policy Business Associate Risk Assessment HIPAA Security Officer Pharmacies Safeguard Email Personal Information Privacy Officer Healthcare Providers Pharmacy Benefit Managers Retention Policy Encryption Unauthorized Role- Based Access Minimum Necessary Covered Entities HITECH Security Social Security Number Disclosure Laptop Compliance Officer Privacy Rule Covered Entity Identity Verification Audit Trail Patient Consent HIPAA Compliance Treatment HIPAA Violation Privacy Privacy Incident Password Protection Phishing Two-Factor Authentication Business Associates Privacy Officer Breach Notification Suspicious Workstation Security PHI Technical Safeguards Organization Data Breach Security Risk Analysis Passphrase Authorization Breach Notification Subcontractors Business Associate Agreement Secure Data Integrity Violation Consequences Report Immediately Workforce Training Electronic PHI Desktop Protected Health Info Physical Safeguards Secure Disposal Compliance Secure Email Electronic Protected Health Information Precautions Phone Number HIPAA Golden Rules Breach Notification Rule Locking Bag Procedures Recipient
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Fax Cover Sheet
Notice of Privacy Practices
Incident
Medical Records
De-Identified Info
Administrative Safeguards
Security Incident
Security Rule
Policies
Malicious
DHHS
Need to Know
Access Control
Vendors
Unauthorized Access
Clean Desk Policy
Business Associate
Risk Assessment
HIPAA
Security Officer
Pharmacies
Safeguard
Email
Personal Information
Privacy Officer
Healthcare Providers
Pharmacy Benefit Managers
Retention Policy
Encryption
Unauthorized
Role-Based Access
Minimum Necessary
Covered Entities
HITECH
Security
Social Security Number
Disclosure
Laptop
Compliance Officer
Privacy Rule
Covered Entity
Identity Verification
Audit Trail
Patient Consent
HIPAA Compliance
Treatment
HIPAA Violation
Privacy
Privacy Incident
Password Protection
Phishing
Two-Factor Authentication
Business Associates
Privacy Officer
Breach Notification
Suspicious
Workstation Security
PHI
Technical Safeguards
Organization
Data Breach
Security Risk Analysis
Passphrase
Authorization
Breach Notification
Subcontractors
Business Associate Agreement
Secure
Data Integrity
Violation
Consequences
Report Immediately
Workforce Training
Electronic PHI
Desktop
Protected Health Info
Physical Safeguards
Secure Disposal
Compliance
Secure Email
Electronic Protected Health Information
Precautions
Phone Number
HIPAA Golden Rules
Breach Notification Rule
Locking Bag
Procedures
Recipient