Privacy Locking Bag Privacy Rule Secure Organization Two-Factor Authentication Physical Safeguards Unauthorized Access Need to Know Compliance Business Associate Violation Security Incident Medical Records Audit Trail Recipient Laptop Breach Notification Privacy Incident De- Identified Info Workforce Training Security Risk Analysis Covered Entities Privacy Officer Malicious Subcontractors Secure Disposal Risk Assessment Notice of Privacy Practices HITECH Safeguard Business Associate Agreement HIPAA Compliance Breach Notification Rule Authorization Data Breach Privacy Officer HIPAA Clean Desk Policy Secure Email Compliance Officer Breach Notification HIPAA Golden Rules Phone Number Vendors Business Associates Policies Suspicious Access Control Protected Health Info Disclosure Electronic PHI Administrative Safeguards Precautions Identity Verification Security Desktop Covered Entity Password Protection Social Security Number Phishing Security Rule Data Integrity Unauthorized Technical Safeguards DHHS Passphrase Workstation Security Patient Consent Encryption Role- Based Access Email Incident Procedures Pharmacies Retention Policy Consequences PHI HIPAA Violation Report Immediately Personal Information Fax Cover Sheet Security Officer Electronic Protected Health Information Healthcare Providers Pharmacy Benefit Managers Treatment Minimum Necessary Privacy Locking Bag Privacy Rule Secure Organization Two-Factor Authentication Physical Safeguards Unauthorized Access Need to Know Compliance Business Associate Violation Security Incident Medical Records Audit Trail Recipient Laptop Breach Notification Privacy Incident De- Identified Info Workforce Training Security Risk Analysis Covered Entities Privacy Officer Malicious Subcontractors Secure Disposal Risk Assessment Notice of Privacy Practices HITECH Safeguard Business Associate Agreement HIPAA Compliance Breach Notification Rule Authorization Data Breach Privacy Officer HIPAA Clean Desk Policy Secure Email Compliance Officer Breach Notification HIPAA Golden Rules Phone Number Vendors Business Associates Policies Suspicious Access Control Protected Health Info Disclosure Electronic PHI Administrative Safeguards Precautions Identity Verification Security Desktop Covered Entity Password Protection Social Security Number Phishing Security Rule Data Integrity Unauthorized Technical Safeguards DHHS Passphrase Workstation Security Patient Consent Encryption Role- Based Access Email Incident Procedures Pharmacies Retention Policy Consequences PHI HIPAA Violation Report Immediately Personal Information Fax Cover Sheet Security Officer Electronic Protected Health Information Healthcare Providers Pharmacy Benefit Managers Treatment Minimum Necessary
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Privacy
Locking Bag
Privacy Rule
Secure
Organization
Two-Factor Authentication
Physical Safeguards
Unauthorized Access
Need to Know
Compliance
Business Associate
Violation
Security Incident
Medical Records
Audit Trail
Recipient
Laptop
Breach Notification
Privacy Incident
De-Identified Info
Workforce Training
Security Risk Analysis
Covered Entities
Privacy Officer
Malicious
Subcontractors
Secure Disposal
Risk Assessment
Notice of Privacy Practices
HITECH
Safeguard
Business Associate Agreement
HIPAA Compliance
Breach Notification Rule
Authorization
Data Breach
Privacy Officer
HIPAA
Clean Desk Policy
Secure Email
Compliance Officer
Breach Notification
HIPAA Golden Rules
Phone Number
Vendors
Business Associates
Policies
Suspicious
Access Control
Protected Health Info
Disclosure
Electronic PHI
Administrative Safeguards
Precautions
Identity Verification
Security
Desktop
Covered Entity
Password Protection
Social Security Number
Phishing
Security Rule
Data Integrity
Unauthorized
Technical Safeguards
DHHS
Passphrase
Workstation Security
Patient Consent
Encryption
Role-Based Access
Email
Incident
Procedures
Pharmacies
Retention Policy
Consequences
PHI
HIPAA Violation
Report Immediately
Personal Information
Fax Cover Sheet
Security Officer
Electronic Protected Health Information
Healthcare Providers
Pharmacy Benefit Managers
Treatment
Minimum Necessary