ElectronicPHIBusinessAssociateAgreementAdministrativeSafeguardsPrivacyVendorsIdentityVerificationReportImmediatelySecurePatientConsentPoliciesViolationAuthorizationAuditTrailMedicalRecordsBreachNotificationHIPAAViolationCleanDeskPolicyRiskAssessmentOrganizationBusinessAssociateTreatmentProtectedHealthInfoHITECHLaptopUnauthorizedAccessWorkforceTrainingDataIntegrityPhishingPersonalInformationTechnicalSafeguardsPharmaciesSecurityRuleSubcontractorsPhoneNumberEmailSecurityOfficerSecurityRiskAnalysisUnauthorizedPrivacyIncidentIncidentSafeguardSecureDisposalDataBreachDesktopPhysicalSafeguardsPrivacyOfficerSocialSecurityNumberPasswordProtectionRecipientSecurityAccessControlWorkstationSecurityMinimumNecessarySecureEmailPrivacyOfficerComplianceNeedtoKnowHIPAAComplianceHealthcareProvidersFaxCoverSheetBreachNotificationPHIBreachNotificationRuleSecurityIncidentPassphraseConsequencesProceduresHIPAAComplianceOfficerDe-IdentifiedInfoHIPAAGoldenRulesPharmacyBenefitManagersDHHSRetentionPolicyLockingBagRole-BasedAccessPrecautionsBusinessAssociatesMaliciousCoveredEntityElectronicProtectedHealthInformationSuspiciousPrivacyRuleEncryptionTwo-FactorAuthenticationCoveredEntitiesDisclosureNotice ofPrivacyPracticesElectronicPHIBusinessAssociateAgreementAdministrativeSafeguardsPrivacyVendorsIdentityVerificationReportImmediatelySecurePatientConsentPoliciesViolationAuthorizationAuditTrailMedicalRecordsBreachNotificationHIPAAViolationCleanDeskPolicyRiskAssessmentOrganizationBusinessAssociateTreatmentProtectedHealthInfoHITECHLaptopUnauthorizedAccessWorkforceTrainingDataIntegrityPhishingPersonalInformationTechnicalSafeguardsPharmaciesSecurityRuleSubcontractorsPhoneNumberEmailSecurityOfficerSecurityRiskAnalysisUnauthorizedPrivacyIncidentIncidentSafeguardSecureDisposalDataBreachDesktopPhysicalSafeguardsPrivacyOfficerSocialSecurityNumberPasswordProtectionRecipientSecurityAccessControlWorkstationSecurityMinimumNecessarySecureEmailPrivacyOfficerComplianceNeedtoKnowHIPAAComplianceHealthcareProvidersFaxCoverSheetBreachNotificationPHIBreachNotificationRuleSecurityIncidentPassphraseConsequencesProceduresHIPAAComplianceOfficerDe-IdentifiedInfoHIPAAGoldenRulesPharmacyBenefitManagersDHHSRetentionPolicyLockingBagRole-BasedAccessPrecautionsBusinessAssociatesMaliciousCoveredEntityElectronicProtectedHealthInformationSuspiciousPrivacyRuleEncryptionTwo-FactorAuthenticationCoveredEntitiesDisclosureNotice ofPrivacyPractices

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Electronic PHI
  2. Business Associate Agreement
  3. Administrative Safeguards
  4. Privacy
  5. Vendors
  6. Identity Verification
  7. Report Immediately
  8. Secure
  9. Patient Consent
  10. Policies
  11. Violation
  12. Authorization
  13. Audit Trail
  14. Medical Records
  15. Breach Notification
  16. HIPAA Violation
  17. Clean Desk Policy
  18. Risk Assessment
  19. Organization
  20. Business Associate
  21. Treatment
  22. Protected Health Info
  23. HITECH
  24. Laptop
  25. Unauthorized Access
  26. Workforce Training
  27. Data Integrity
  28. Phishing
  29. Personal Information
  30. Technical Safeguards
  31. Pharmacies
  32. Security Rule
  33. Subcontractors
  34. Phone Number
  35. Email
  36. Security Officer
  37. Security Risk Analysis
  38. Unauthorized
  39. Privacy Incident
  40. Incident
  41. Safeguard
  42. Secure Disposal
  43. Data Breach
  44. Desktop
  45. Physical Safeguards
  46. Privacy Officer
  47. Social Security Number
  48. Password Protection
  49. Recipient
  50. Security
  51. Access Control
  52. Workstation Security
  53. Minimum Necessary
  54. Secure Email
  55. Privacy Officer
  56. Compliance
  57. Need to Know
  58. HIPAA Compliance
  59. Healthcare Providers
  60. Fax Cover Sheet
  61. Breach Notification
  62. PHI
  63. Breach Notification Rule
  64. Security Incident
  65. Passphrase
  66. Consequences
  67. Procedures
  68. HIPAA
  69. Compliance Officer
  70. De-Identified Info
  71. HIPAA Golden Rules
  72. Pharmacy Benefit Managers
  73. DHHS
  74. Retention Policy
  75. Locking Bag
  76. Role-Based Access
  77. Precautions
  78. Business Associates
  79. Malicious
  80. Covered Entity
  81. Electronic Protected Health Information
  82. Suspicious
  83. Privacy Rule
  84. Encryption
  85. Two-Factor Authentication
  86. Covered Entities
  87. Disclosure
  88. Notice of Privacy Practices