Electronic Protected Health Information Subcontractors HITECH Desktop Consequences Privacy Officer Secure HIPAA Compliance Precautions Email Privacy Rule Phone Number Medical Records Social Security Number Pharmacies Privacy Incident Need to Know Notice of Privacy Practices Fax Cover Sheet Patient Consent Personal Information Security Officer Covered Entity Workforce Training DHHS HIPAA Violation Policies Phishing Locking Bag Secure Disposal Authorization Compliance Password Protection Workstation Security Passphrase Recipient Business Associate Agreement Encryption Laptop Protected Health Info Audit Trail De- Identified Info Compliance Officer PHI Minimum Necessary Treatment Technical Safeguards Organization HIPAA Role- Based Access Violation Incident Safeguard Pharmacy Benefit Managers Data Breach Data Integrity Privacy Officer Physical Safeguards Business Associate Security Report Immediately Unauthorized HIPAA Golden Rules Identity Verification Administrative Safeguards Security Rule Access Control Breach Notification Rule Security Risk Analysis Breach Notification Covered Entities Disclosure Secure Email Retention Policy Two-Factor Authentication Clean Desk Policy Privacy Unauthorized Access Security Incident Breach Notification Suspicious Risk Assessment Malicious Vendors Electronic PHI Business Associates Procedures Healthcare Providers Electronic Protected Health Information Subcontractors HITECH Desktop Consequences Privacy Officer Secure HIPAA Compliance Precautions Email Privacy Rule Phone Number Medical Records Social Security Number Pharmacies Privacy Incident Need to Know Notice of Privacy Practices Fax Cover Sheet Patient Consent Personal Information Security Officer Covered Entity Workforce Training DHHS HIPAA Violation Policies Phishing Locking Bag Secure Disposal Authorization Compliance Password Protection Workstation Security Passphrase Recipient Business Associate Agreement Encryption Laptop Protected Health Info Audit Trail De- Identified Info Compliance Officer PHI Minimum Necessary Treatment Technical Safeguards Organization HIPAA Role- Based Access Violation Incident Safeguard Pharmacy Benefit Managers Data Breach Data Integrity Privacy Officer Physical Safeguards Business Associate Security Report Immediately Unauthorized HIPAA Golden Rules Identity Verification Administrative Safeguards Security Rule Access Control Breach Notification Rule Security Risk Analysis Breach Notification Covered Entities Disclosure Secure Email Retention Policy Two-Factor Authentication Clean Desk Policy Privacy Unauthorized Access Security Incident Breach Notification Suspicious Risk Assessment Malicious Vendors Electronic PHI Business Associates Procedures Healthcare Providers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Electronic Protected Health Information
Subcontractors
HITECH
Desktop
Consequences
Privacy Officer
Secure
HIPAA Compliance
Precautions
Email
Privacy Rule
Phone Number
Medical Records
Social Security Number
Pharmacies
Privacy Incident
Need to Know
Notice of Privacy Practices
Fax Cover Sheet
Patient Consent
Personal Information
Security Officer
Covered Entity
Workforce Training
DHHS
HIPAA Violation
Policies
Phishing
Locking Bag
Secure Disposal
Authorization
Compliance
Password Protection
Workstation Security
Passphrase
Recipient
Business Associate Agreement
Encryption
Laptop
Protected Health Info
Audit Trail
De-Identified Info
Compliance Officer
PHI
Minimum Necessary
Treatment
Technical Safeguards
Organization
HIPAA
Role-Based Access
Violation
Incident
Safeguard
Pharmacy Benefit Managers
Data Breach
Data Integrity
Privacy Officer
Physical Safeguards
Business Associate
Security
Report Immediately
Unauthorized
HIPAA Golden Rules
Identity Verification
Administrative Safeguards
Security Rule
Access Control
Breach Notification Rule
Security Risk Analysis
Breach Notification
Covered Entities
Disclosure
Secure Email
Retention Policy
Two-Factor Authentication
Clean Desk Policy
Privacy
Unauthorized Access
Security Incident
Breach Notification
Suspicious
Risk Assessment
Malicious
Vendors
Electronic PHI
Business Associates
Procedures
Healthcare Providers