Medical Records Precautions Unauthorized Access HIPAA Compliance Security Officer Workforce Training Privacy Incident Two-Factor Authentication Laptop Procedures Administrative Safeguards Notice of Privacy Practices Privacy Personal Information Organization Security Rule Business Associates HIPAA Golden Rules Breach Notification Passphrase Pharmacies Pharmacy Benefit Managers Electronic Protected Health Information Password Protection Workstation Security Fax Cover Sheet Secure Email HIPAA Secure Disposal Vendors Security Malicious Suspicious Access Control Social Security Number Privacy Officer Phishing Safeguard HIPAA Violation Audit Trail Desktop Business Associate Technical Safeguards Email HITECH Incident Breach Notification Rule Recipient Subcontractors Data Integrity Healthcare Providers DHHS Phone Number Violation Privacy Rule Security Risk Analysis Identity Verification Security Incident Covered Entity Privacy Officer Patient Consent Electronic PHI Disclosure Risk Assessment Authorization Encryption Report Immediately De- Identified Info Data Breach Compliance Officer Role- Based Access Clean Desk Policy Retention Policy Covered Entities Breach Notification Policies Secure Minimum Necessary Need to Know Unauthorized Protected Health Info PHI Locking Bag Physical Safeguards Treatment Business Associate Agreement Consequences Compliance Medical Records Precautions Unauthorized Access HIPAA Compliance Security Officer Workforce Training Privacy Incident Two-Factor Authentication Laptop Procedures Administrative Safeguards Notice of Privacy Practices Privacy Personal Information Organization Security Rule Business Associates HIPAA Golden Rules Breach Notification Passphrase Pharmacies Pharmacy Benefit Managers Electronic Protected Health Information Password Protection Workstation Security Fax Cover Sheet Secure Email HIPAA Secure Disposal Vendors Security Malicious Suspicious Access Control Social Security Number Privacy Officer Phishing Safeguard HIPAA Violation Audit Trail Desktop Business Associate Technical Safeguards Email HITECH Incident Breach Notification Rule Recipient Subcontractors Data Integrity Healthcare Providers DHHS Phone Number Violation Privacy Rule Security Risk Analysis Identity Verification Security Incident Covered Entity Privacy Officer Patient Consent Electronic PHI Disclosure Risk Assessment Authorization Encryption Report Immediately De- Identified Info Data Breach Compliance Officer Role- Based Access Clean Desk Policy Retention Policy Covered Entities Breach Notification Policies Secure Minimum Necessary Need to Know Unauthorized Protected Health Info PHI Locking Bag Physical Safeguards Treatment Business Associate Agreement Consequences Compliance
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Medical Records
Precautions
Unauthorized Access
HIPAA Compliance
Security Officer
Workforce Training
Privacy Incident
Two-Factor Authentication
Laptop
Procedures
Administrative Safeguards
Notice of Privacy Practices
Privacy
Personal Information
Organization
Security Rule
Business Associates
HIPAA Golden Rules
Breach Notification
Passphrase
Pharmacies
Pharmacy Benefit Managers
Electronic Protected Health Information
Password Protection
Workstation Security
Fax Cover Sheet
Secure Email
HIPAA
Secure Disposal
Vendors
Security
Malicious
Suspicious
Access Control
Social Security Number
Privacy Officer
Phishing
Safeguard
HIPAA Violation
Audit Trail
Desktop
Business Associate
Technical Safeguards
Email
HITECH
Incident
Breach Notification Rule
Recipient
Subcontractors
Data Integrity
Healthcare Providers
DHHS
Phone Number
Violation
Privacy Rule
Security Risk Analysis
Identity Verification
Security Incident
Covered Entity
Privacy Officer
Patient Consent
Electronic PHI
Disclosure
Risk Assessment
Authorization
Encryption
Report Immediately
De-Identified Info
Data Breach
Compliance Officer
Role-Based Access
Clean Desk Policy
Retention Policy
Covered Entities
Breach Notification
Policies
Secure
Minimum Necessary
Need to Know
Unauthorized
Protected Health Info
PHI
Locking Bag
Physical Safeguards
Treatment
Business Associate Agreement
Consequences
Compliance