Electronic PHI Business Associate Agreement Administrative Safeguards Privacy Vendors Identity Verification Report Immediately Secure Patient Consent Policies Violation Authorization Audit Trail Medical Records Breach Notification HIPAA Violation Clean Desk Policy Risk Assessment Organization Business Associate Treatment Protected Health Info HITECH Laptop Unauthorized Access Workforce Training Data Integrity Phishing Personal Information Technical Safeguards Pharmacies Security Rule Subcontractors Phone Number Email Security Officer Security Risk Analysis Unauthorized Privacy Incident Incident Safeguard Secure Disposal Data Breach Desktop Physical Safeguards Privacy Officer Social Security Number Password Protection Recipient Security Access Control Workstation Security Minimum Necessary Secure Email Privacy Officer Compliance Need to Know HIPAA Compliance Healthcare Providers Fax Cover Sheet Breach Notification PHI Breach Notification Rule Security Incident Passphrase Consequences Procedures HIPAA Compliance Officer De- Identified Info HIPAA Golden Rules Pharmacy Benefit Managers DHHS Retention Policy Locking Bag Role- Based Access Precautions Business Associates Malicious Covered Entity Electronic Protected Health Information Suspicious Privacy Rule Encryption Two-Factor Authentication Covered Entities Disclosure Notice of Privacy Practices Electronic PHI Business Associate Agreement Administrative Safeguards Privacy Vendors Identity Verification Report Immediately Secure Patient Consent Policies Violation Authorization Audit Trail Medical Records Breach Notification HIPAA Violation Clean Desk Policy Risk Assessment Organization Business Associate Treatment Protected Health Info HITECH Laptop Unauthorized Access Workforce Training Data Integrity Phishing Personal Information Technical Safeguards Pharmacies Security Rule Subcontractors Phone Number Email Security Officer Security Risk Analysis Unauthorized Privacy Incident Incident Safeguard Secure Disposal Data Breach Desktop Physical Safeguards Privacy Officer Social Security Number Password Protection Recipient Security Access Control Workstation Security Minimum Necessary Secure Email Privacy Officer Compliance Need to Know HIPAA Compliance Healthcare Providers Fax Cover Sheet Breach Notification PHI Breach Notification Rule Security Incident Passphrase Consequences Procedures HIPAA Compliance Officer De- Identified Info HIPAA Golden Rules Pharmacy Benefit Managers DHHS Retention Policy Locking Bag Role- Based Access Precautions Business Associates Malicious Covered Entity Electronic Protected Health Information Suspicious Privacy Rule Encryption Two-Factor Authentication Covered Entities Disclosure Notice of Privacy Practices
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Electronic PHI
Business Associate Agreement
Administrative Safeguards
Privacy
Vendors
Identity Verification
Report Immediately
Secure
Patient Consent
Policies
Violation
Authorization
Audit Trail
Medical Records
Breach Notification
HIPAA Violation
Clean Desk Policy
Risk Assessment
Organization
Business Associate
Treatment
Protected Health Info
HITECH
Laptop
Unauthorized Access
Workforce Training
Data Integrity
Phishing
Personal Information
Technical Safeguards
Pharmacies
Security Rule
Subcontractors
Phone Number
Email
Security Officer
Security Risk Analysis
Unauthorized
Privacy Incident
Incident
Safeguard
Secure Disposal
Data Breach
Desktop
Physical Safeguards
Privacy Officer
Social Security Number
Password Protection
Recipient
Security
Access Control
Workstation Security
Minimum Necessary
Secure Email
Privacy Officer
Compliance
Need to Know
HIPAA Compliance
Healthcare Providers
Fax Cover Sheet
Breach Notification
PHI
Breach Notification Rule
Security Incident
Passphrase
Consequences
Procedures
HIPAA
Compliance Officer
De-Identified Info
HIPAA Golden Rules
Pharmacy Benefit Managers
DHHS
Retention Policy
Locking Bag
Role-Based Access
Precautions
Business Associates
Malicious
Covered Entity
Electronic Protected Health Information
Suspicious
Privacy Rule
Encryption
Two-Factor Authentication
Covered Entities
Disclosure
Notice of Privacy Practices