Unauthorized Access Privacy Officer Breach Notification Medical Records Pharmacies Physical Safeguards Social Security Number PHI Patient Consent Disclosure Policies Pharmacy Benefit Managers Report Immediately Phone Number Secure Audit Trail Protected Health Info Data Breach Security Incident Workforce Training HIPAA Compliance Security Retention Policy Violation Security Risk Analysis Breach Notification Recipient Passphrase Workstation Security Risk Assessment Business Associates Fax Cover Sheet Breach Notification Rule Electronic PHI Malicious Privacy Rule Administrative Safeguards Notice of Privacy Practices Compliance Officer Secure Disposal Email Treatment Security Officer Identity Verification Locking Bag HITECH Compliance Two-Factor Authentication Business Associate Agreement Precautions HIPAA Golden Rules Desktop Authorization De- Identified Info Technical Safeguards Privacy Officer Need to Know HIPAA Unauthorized Clean Desk Policy Personal Information DHHS HIPAA Violation Consequences Subcontractors Security Rule Covered Entity Electronic Protected Health Information Incident Role- Based Access Privacy Incident Vendors Safeguard Procedures Secure Email Access Control Password Protection Privacy Healthcare Providers Minimum Necessary Encryption Phishing Business Associate Suspicious Data Integrity Laptop Covered Entities Organization Unauthorized Access Privacy Officer Breach Notification Medical Records Pharmacies Physical Safeguards Social Security Number PHI Patient Consent Disclosure Policies Pharmacy Benefit Managers Report Immediately Phone Number Secure Audit Trail Protected Health Info Data Breach Security Incident Workforce Training HIPAA Compliance Security Retention Policy Violation Security Risk Analysis Breach Notification Recipient Passphrase Workstation Security Risk Assessment Business Associates Fax Cover Sheet Breach Notification Rule Electronic PHI Malicious Privacy Rule Administrative Safeguards Notice of Privacy Practices Compliance Officer Secure Disposal Email Treatment Security Officer Identity Verification Locking Bag HITECH Compliance Two-Factor Authentication Business Associate Agreement Precautions HIPAA Golden Rules Desktop Authorization De- Identified Info Technical Safeguards Privacy Officer Need to Know HIPAA Unauthorized Clean Desk Policy Personal Information DHHS HIPAA Violation Consequences Subcontractors Security Rule Covered Entity Electronic Protected Health Information Incident Role- Based Access Privacy Incident Vendors Safeguard Procedures Secure Email Access Control Password Protection Privacy Healthcare Providers Minimum Necessary Encryption Phishing Business Associate Suspicious Data Integrity Laptop Covered Entities Organization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Unauthorized Access
Privacy Officer
Breach Notification
Medical Records
Pharmacies
Physical Safeguards
Social Security Number
PHI
Patient Consent
Disclosure
Policies
Pharmacy Benefit Managers
Report Immediately
Phone Number
Secure
Audit Trail
Protected Health Info
Data Breach
Security Incident
Workforce Training
HIPAA Compliance
Security
Retention Policy
Violation
Security Risk Analysis
Breach Notification
Recipient
Passphrase
Workstation Security
Risk Assessment
Business Associates
Fax Cover Sheet
Breach Notification Rule
Electronic PHI
Malicious
Privacy Rule
Administrative Safeguards
Notice of Privacy Practices
Compliance Officer
Secure Disposal
Email
Treatment
Security Officer
Identity Verification
Locking Bag
HITECH
Compliance
Two-Factor Authentication
Business Associate Agreement
Precautions
HIPAA Golden Rules
Desktop
Authorization
De-Identified Info
Technical Safeguards
Privacy Officer
Need to Know
HIPAA
Unauthorized
Clean Desk Policy
Personal Information
DHHS
HIPAA Violation
Consequences
Subcontractors
Security Rule
Covered Entity
Electronic Protected Health Information
Incident
Role-Based Access
Privacy Incident
Vendors
Safeguard
Procedures
Secure Email
Access Control
Password Protection
Privacy
Healthcare Providers
Minimum Necessary
Encryption
Phishing
Business Associate
Suspicious
Data Integrity
Laptop
Covered Entities
Organization