MedicalRecordsPrecautionsUnauthorizedAccessHIPAAComplianceSecurityOfficerWorkforceTrainingPrivacyIncidentTwo-FactorAuthenticationLaptopProceduresAdministrativeSafeguardsNotice ofPrivacyPracticesPrivacyPersonalInformationOrganizationSecurityRuleBusinessAssociatesHIPAAGoldenRulesBreachNotificationPassphrasePharmaciesPharmacyBenefitManagersElectronicProtectedHealthInformationPasswordProtectionWorkstationSecurityFaxCoverSheetSecureEmailHIPAASecureDisposalVendorsSecurityMaliciousSuspiciousAccessControlSocialSecurityNumberPrivacyOfficerPhishingSafeguardHIPAAViolationAuditTrailDesktopBusinessAssociateTechnicalSafeguardsEmailHITECHIncidentBreachNotificationRuleRecipientSubcontractorsDataIntegrityHealthcareProvidersDHHSPhoneNumberViolationPrivacyRuleSecurityRiskAnalysisIdentityVerificationSecurityIncidentCoveredEntityPrivacyOfficerPatientConsentElectronicPHIDisclosureRiskAssessmentAuthorizationEncryptionReportImmediatelyDe-IdentifiedInfoDataBreachComplianceOfficerRole-BasedAccessCleanDeskPolicyRetentionPolicyCoveredEntitiesBreachNotificationPoliciesSecureMinimumNecessaryNeedtoKnowUnauthorizedProtectedHealthInfoPHILockingBagPhysicalSafeguardsTreatmentBusinessAssociateAgreementConsequencesComplianceMedicalRecordsPrecautionsUnauthorizedAccessHIPAAComplianceSecurityOfficerWorkforceTrainingPrivacyIncidentTwo-FactorAuthenticationLaptopProceduresAdministrativeSafeguardsNotice ofPrivacyPracticesPrivacyPersonalInformationOrganizationSecurityRuleBusinessAssociatesHIPAAGoldenRulesBreachNotificationPassphrasePharmaciesPharmacyBenefitManagersElectronicProtectedHealthInformationPasswordProtectionWorkstationSecurityFaxCoverSheetSecureEmailHIPAASecureDisposalVendorsSecurityMaliciousSuspiciousAccessControlSocialSecurityNumberPrivacyOfficerPhishingSafeguardHIPAAViolationAuditTrailDesktopBusinessAssociateTechnicalSafeguardsEmailHITECHIncidentBreachNotificationRuleRecipientSubcontractorsDataIntegrityHealthcareProvidersDHHSPhoneNumberViolationPrivacyRuleSecurityRiskAnalysisIdentityVerificationSecurityIncidentCoveredEntityPrivacyOfficerPatientConsentElectronicPHIDisclosureRiskAssessmentAuthorizationEncryptionReportImmediatelyDe-IdentifiedInfoDataBreachComplianceOfficerRole-BasedAccessCleanDeskPolicyRetentionPolicyCoveredEntitiesBreachNotificationPoliciesSecureMinimumNecessaryNeedtoKnowUnauthorizedProtectedHealthInfoPHILockingBagPhysicalSafeguardsTreatmentBusinessAssociateAgreementConsequencesCompliance

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Medical Records
  2. Precautions
  3. Unauthorized Access
  4. HIPAA Compliance
  5. Security Officer
  6. Workforce Training
  7. Privacy Incident
  8. Two-Factor Authentication
  9. Laptop
  10. Procedures
  11. Administrative Safeguards
  12. Notice of Privacy Practices
  13. Privacy
  14. Personal Information
  15. Organization
  16. Security Rule
  17. Business Associates
  18. HIPAA Golden Rules
  19. Breach Notification
  20. Passphrase
  21. Pharmacies
  22. Pharmacy Benefit Managers
  23. Electronic Protected Health Information
  24. Password Protection
  25. Workstation Security
  26. Fax Cover Sheet
  27. Secure Email
  28. HIPAA
  29. Secure Disposal
  30. Vendors
  31. Security
  32. Malicious
  33. Suspicious
  34. Access Control
  35. Social Security Number
  36. Privacy Officer
  37. Phishing
  38. Safeguard
  39. HIPAA Violation
  40. Audit Trail
  41. Desktop
  42. Business Associate
  43. Technical Safeguards
  44. Email
  45. HITECH
  46. Incident
  47. Breach Notification Rule
  48. Recipient
  49. Subcontractors
  50. Data Integrity
  51. Healthcare Providers
  52. DHHS
  53. Phone Number
  54. Violation
  55. Privacy Rule
  56. Security Risk Analysis
  57. Identity Verification
  58. Security Incident
  59. Covered Entity
  60. Privacy Officer
  61. Patient Consent
  62. Electronic PHI
  63. Disclosure
  64. Risk Assessment
  65. Authorization
  66. Encryption
  67. Report Immediately
  68. De-Identified Info
  69. Data Breach
  70. Compliance Officer
  71. Role-Based Access
  72. Clean Desk Policy
  73. Retention Policy
  74. Covered Entities
  75. Breach Notification
  76. Policies
  77. Secure
  78. Minimum Necessary
  79. Need to Know
  80. Unauthorized
  81. Protected Health Info
  82. PHI
  83. Locking Bag
  84. Physical Safeguards
  85. Treatment
  86. Business Associate Agreement
  87. Consequences
  88. Compliance