UnauthorizedAccessPrivacyOfficerBreachNotificationMedicalRecordsPharmaciesPhysicalSafeguardsSocialSecurityNumberPHIPatientConsentDisclosurePoliciesPharmacyBenefitManagersReportImmediatelyPhoneNumberSecureAuditTrailProtectedHealthInfoDataBreachSecurityIncidentWorkforceTrainingHIPAAComplianceSecurityRetentionPolicyViolationSecurityRiskAnalysisBreachNotificationRecipientPassphraseWorkstationSecurityRiskAssessmentBusinessAssociatesFaxCoverSheetBreachNotificationRuleElectronicPHIMaliciousPrivacyRuleAdministrativeSafeguardsNotice ofPrivacyPracticesComplianceOfficerSecureDisposalEmailTreatmentSecurityOfficerIdentityVerificationLockingBagHITECHComplianceTwo-FactorAuthenticationBusinessAssociateAgreementPrecautionsHIPAAGoldenRulesDesktopAuthorizationDe-IdentifiedInfoTechnicalSafeguardsPrivacyOfficerNeedtoKnowHIPAAUnauthorizedCleanDeskPolicyPersonalInformationDHHSHIPAAViolationConsequencesSubcontractorsSecurityRuleCoveredEntityElectronicProtectedHealthInformationIncidentRole-BasedAccessPrivacyIncidentVendorsSafeguardProceduresSecureEmailAccessControlPasswordProtectionPrivacyHealthcareProvidersMinimumNecessaryEncryptionPhishingBusinessAssociateSuspiciousDataIntegrityLaptopCoveredEntitiesOrganizationUnauthorizedAccessPrivacyOfficerBreachNotificationMedicalRecordsPharmaciesPhysicalSafeguardsSocialSecurityNumberPHIPatientConsentDisclosurePoliciesPharmacyBenefitManagersReportImmediatelyPhoneNumberSecureAuditTrailProtectedHealthInfoDataBreachSecurityIncidentWorkforceTrainingHIPAAComplianceSecurityRetentionPolicyViolationSecurityRiskAnalysisBreachNotificationRecipientPassphraseWorkstationSecurityRiskAssessmentBusinessAssociatesFaxCoverSheetBreachNotificationRuleElectronicPHIMaliciousPrivacyRuleAdministrativeSafeguardsNotice ofPrivacyPracticesComplianceOfficerSecureDisposalEmailTreatmentSecurityOfficerIdentityVerificationLockingBagHITECHComplianceTwo-FactorAuthenticationBusinessAssociateAgreementPrecautionsHIPAAGoldenRulesDesktopAuthorizationDe-IdentifiedInfoTechnicalSafeguardsPrivacyOfficerNeedtoKnowHIPAAUnauthorizedCleanDeskPolicyPersonalInformationDHHSHIPAAViolationConsequencesSubcontractorsSecurityRuleCoveredEntityElectronicProtectedHealthInformationIncidentRole-BasedAccessPrivacyIncidentVendorsSafeguardProceduresSecureEmailAccessControlPasswordProtectionPrivacyHealthcareProvidersMinimumNecessaryEncryptionPhishingBusinessAssociateSuspiciousDataIntegrityLaptopCoveredEntitiesOrganization

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Unauthorized Access
  2. Privacy Officer
  3. Breach Notification
  4. Medical Records
  5. Pharmacies
  6. Physical Safeguards
  7. Social Security Number
  8. PHI
  9. Patient Consent
  10. Disclosure
  11. Policies
  12. Pharmacy Benefit Managers
  13. Report Immediately
  14. Phone Number
  15. Secure
  16. Audit Trail
  17. Protected Health Info
  18. Data Breach
  19. Security Incident
  20. Workforce Training
  21. HIPAA Compliance
  22. Security
  23. Retention Policy
  24. Violation
  25. Security Risk Analysis
  26. Breach Notification
  27. Recipient
  28. Passphrase
  29. Workstation Security
  30. Risk Assessment
  31. Business Associates
  32. Fax Cover Sheet
  33. Breach Notification Rule
  34. Electronic PHI
  35. Malicious
  36. Privacy Rule
  37. Administrative Safeguards
  38. Notice of Privacy Practices
  39. Compliance Officer
  40. Secure Disposal
  41. Email
  42. Treatment
  43. Security Officer
  44. Identity Verification
  45. Locking Bag
  46. HITECH
  47. Compliance
  48. Two-Factor Authentication
  49. Business Associate Agreement
  50. Precautions
  51. HIPAA Golden Rules
  52. Desktop
  53. Authorization
  54. De-Identified Info
  55. Technical Safeguards
  56. Privacy Officer
  57. Need to Know
  58. HIPAA
  59. Unauthorized
  60. Clean Desk Policy
  61. Personal Information
  62. DHHS
  63. HIPAA Violation
  64. Consequences
  65. Subcontractors
  66. Security Rule
  67. Covered Entity
  68. Electronic Protected Health Information
  69. Incident
  70. Role-Based Access
  71. Privacy Incident
  72. Vendors
  73. Safeguard
  74. Procedures
  75. Secure Email
  76. Access Control
  77. Password Protection
  78. Privacy
  79. Healthcare Providers
  80. Minimum Necessary
  81. Encryption
  82. Phishing
  83. Business Associate
  84. Suspicious
  85. Data Integrity
  86. Laptop
  87. Covered Entities
  88. Organization