ElectronicProtectedHealthInformationSubcontractorsHITECHDesktopConsequencesPrivacyOfficerSecureHIPAACompliancePrecautionsEmailPrivacyRulePhoneNumberMedicalRecordsSocialSecurityNumberPharmaciesPrivacyIncidentNeedtoKnowNotice ofPrivacyPracticesFaxCoverSheetPatientConsentPersonalInformationSecurityOfficerCoveredEntityWorkforceTrainingDHHSHIPAAViolationPoliciesPhishingLockingBagSecureDisposalAuthorizationCompliancePasswordProtectionWorkstationSecurityPassphraseRecipientBusinessAssociateAgreementEncryptionLaptopProtectedHealthInfoAuditTrailDe-IdentifiedInfoComplianceOfficerPHIMinimumNecessaryTreatmentTechnicalSafeguardsOrganizationHIPAARole-BasedAccessViolationIncidentSafeguardPharmacyBenefitManagersDataBreachDataIntegrityPrivacyOfficerPhysicalSafeguardsBusinessAssociateSecurityReportImmediatelyUnauthorizedHIPAAGoldenRulesIdentityVerificationAdministrativeSafeguardsSecurityRuleAccessControlBreachNotificationRuleSecurityRiskAnalysisBreachNotificationCoveredEntitiesDisclosureSecureEmailRetentionPolicyTwo-FactorAuthenticationCleanDeskPolicyPrivacyUnauthorizedAccessSecurityIncidentBreachNotificationSuspiciousRiskAssessmentMaliciousVendorsElectronicPHIBusinessAssociatesProceduresHealthcareProvidersElectronicProtectedHealthInformationSubcontractorsHITECHDesktopConsequencesPrivacyOfficerSecureHIPAACompliancePrecautionsEmailPrivacyRulePhoneNumberMedicalRecordsSocialSecurityNumberPharmaciesPrivacyIncidentNeedtoKnowNotice ofPrivacyPracticesFaxCoverSheetPatientConsentPersonalInformationSecurityOfficerCoveredEntityWorkforceTrainingDHHSHIPAAViolationPoliciesPhishingLockingBagSecureDisposalAuthorizationCompliancePasswordProtectionWorkstationSecurityPassphraseRecipientBusinessAssociateAgreementEncryptionLaptopProtectedHealthInfoAuditTrailDe-IdentifiedInfoComplianceOfficerPHIMinimumNecessaryTreatmentTechnicalSafeguardsOrganizationHIPAARole-BasedAccessViolationIncidentSafeguardPharmacyBenefitManagersDataBreachDataIntegrityPrivacyOfficerPhysicalSafeguardsBusinessAssociateSecurityReportImmediatelyUnauthorizedHIPAAGoldenRulesIdentityVerificationAdministrativeSafeguardsSecurityRuleAccessControlBreachNotificationRuleSecurityRiskAnalysisBreachNotificationCoveredEntitiesDisclosureSecureEmailRetentionPolicyTwo-FactorAuthenticationCleanDeskPolicyPrivacyUnauthorizedAccessSecurityIncidentBreachNotificationSuspiciousRiskAssessmentMaliciousVendorsElectronicPHIBusinessAssociatesProceduresHealthcareProviders

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Electronic Protected Health Information
  2. Subcontractors
  3. HITECH
  4. Desktop
  5. Consequences
  6. Privacy Officer
  7. Secure
  8. HIPAA Compliance
  9. Precautions
  10. Email
  11. Privacy Rule
  12. Phone Number
  13. Medical Records
  14. Social Security Number
  15. Pharmacies
  16. Privacy Incident
  17. Need to Know
  18. Notice of Privacy Practices
  19. Fax Cover Sheet
  20. Patient Consent
  21. Personal Information
  22. Security Officer
  23. Covered Entity
  24. Workforce Training
  25. DHHS
  26. HIPAA Violation
  27. Policies
  28. Phishing
  29. Locking Bag
  30. Secure Disposal
  31. Authorization
  32. Compliance
  33. Password Protection
  34. Workstation Security
  35. Passphrase
  36. Recipient
  37. Business Associate Agreement
  38. Encryption
  39. Laptop
  40. Protected Health Info
  41. Audit Trail
  42. De-Identified Info
  43. Compliance Officer
  44. PHI
  45. Minimum Necessary
  46. Treatment
  47. Technical Safeguards
  48. Organization
  49. HIPAA
  50. Role-Based Access
  51. Violation
  52. Incident
  53. Safeguard
  54. Pharmacy Benefit Managers
  55. Data Breach
  56. Data Integrity
  57. Privacy Officer
  58. Physical Safeguards
  59. Business Associate
  60. Security
  61. Report Immediately
  62. Unauthorized
  63. HIPAA Golden Rules
  64. Identity Verification
  65. Administrative Safeguards
  66. Security Rule
  67. Access Control
  68. Breach Notification Rule
  69. Security Risk Analysis
  70. Breach Notification
  71. Covered Entities
  72. Disclosure
  73. Secure Email
  74. Retention Policy
  75. Two-Factor Authentication
  76. Clean Desk Policy
  77. Privacy
  78. Unauthorized Access
  79. Security Incident
  80. Breach Notification
  81. Suspicious
  82. Risk Assessment
  83. Malicious
  84. Vendors
  85. Electronic PHI
  86. Business Associates
  87. Procedures
  88. Healthcare Providers