FaxCoverSheetNotice ofPrivacyPracticesIncidentMedicalRecordsDe-IdentifiedInfoAdministrativeSafeguardsSecurityIncidentSecurityRulePoliciesMaliciousDHHSNeedtoKnowAccessControlVendorsUnauthorizedAccessCleanDeskPolicyBusinessAssociateRiskAssessmentHIPAASecurityOfficerPharmaciesSafeguardEmailPersonalInformationPrivacyOfficerHealthcareProvidersPharmacyBenefitManagersRetentionPolicyEncryptionUnauthorizedRole-BasedAccessMinimumNecessaryCoveredEntitiesHITECHSecuritySocialSecurityNumberDisclosureLaptopComplianceOfficerPrivacyRuleCoveredEntityIdentityVerificationAuditTrailPatientConsentHIPAAComplianceTreatmentHIPAAViolationPrivacyPrivacyIncidentPasswordProtectionPhishingTwo-FactorAuthenticationBusinessAssociatesPrivacyOfficerBreachNotificationSuspiciousWorkstationSecurityPHITechnicalSafeguardsOrganizationDataBreachSecurityRiskAnalysisPassphraseAuthorizationBreachNotificationSubcontractorsBusinessAssociateAgreementSecureDataIntegrityViolationConsequencesReportImmediatelyWorkforceTrainingElectronicPHIDesktopProtectedHealthInfoPhysicalSafeguardsSecureDisposalComplianceSecureEmailElectronicProtectedHealthInformationPrecautionsPhoneNumberHIPAAGoldenRulesBreachNotificationRuleLockingBagProceduresRecipientFaxCoverSheetNotice ofPrivacyPracticesIncidentMedicalRecordsDe-IdentifiedInfoAdministrativeSafeguardsSecurityIncidentSecurityRulePoliciesMaliciousDHHSNeedtoKnowAccessControlVendorsUnauthorizedAccessCleanDeskPolicyBusinessAssociateRiskAssessmentHIPAASecurityOfficerPharmaciesSafeguardEmailPersonalInformationPrivacyOfficerHealthcareProvidersPharmacyBenefitManagersRetentionPolicyEncryptionUnauthorizedRole-BasedAccessMinimumNecessaryCoveredEntitiesHITECHSecuritySocialSecurityNumberDisclosureLaptopComplianceOfficerPrivacyRuleCoveredEntityIdentityVerificationAuditTrailPatientConsentHIPAAComplianceTreatmentHIPAAViolationPrivacyPrivacyIncidentPasswordProtectionPhishingTwo-FactorAuthenticationBusinessAssociatesPrivacyOfficerBreachNotificationSuspiciousWorkstationSecurityPHITechnicalSafeguardsOrganizationDataBreachSecurityRiskAnalysisPassphraseAuthorizationBreachNotificationSubcontractorsBusinessAssociateAgreementSecureDataIntegrityViolationConsequencesReportImmediatelyWorkforceTrainingElectronicPHIDesktopProtectedHealthInfoPhysicalSafeguardsSecureDisposalComplianceSecureEmailElectronicProtectedHealthInformationPrecautionsPhoneNumberHIPAAGoldenRulesBreachNotificationRuleLockingBagProceduresRecipient

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Fax Cover Sheet
  2. Notice of Privacy Practices
  3. Incident
  4. Medical Records
  5. De-Identified Info
  6. Administrative Safeguards
  7. Security Incident
  8. Security Rule
  9. Policies
  10. Malicious
  11. DHHS
  12. Need to Know
  13. Access Control
  14. Vendors
  15. Unauthorized Access
  16. Clean Desk Policy
  17. Business Associate
  18. Risk Assessment
  19. HIPAA
  20. Security Officer
  21. Pharmacies
  22. Safeguard
  23. Email
  24. Personal Information
  25. Privacy Officer
  26. Healthcare Providers
  27. Pharmacy Benefit Managers
  28. Retention Policy
  29. Encryption
  30. Unauthorized
  31. Role-Based Access
  32. Minimum Necessary
  33. Covered Entities
  34. HITECH
  35. Security
  36. Social Security Number
  37. Disclosure
  38. Laptop
  39. Compliance Officer
  40. Privacy Rule
  41. Covered Entity
  42. Identity Verification
  43. Audit Trail
  44. Patient Consent
  45. HIPAA Compliance
  46. Treatment
  47. HIPAA Violation
  48. Privacy
  49. Privacy Incident
  50. Password Protection
  51. Phishing
  52. Two-Factor Authentication
  53. Business Associates
  54. Privacy Officer
  55. Breach Notification
  56. Suspicious
  57. Workstation Security
  58. PHI
  59. Technical Safeguards
  60. Organization
  61. Data Breach
  62. Security Risk Analysis
  63. Passphrase
  64. Authorization
  65. Breach Notification
  66. Subcontractors
  67. Business Associate Agreement
  68. Secure
  69. Data Integrity
  70. Violation
  71. Consequences
  72. Report Immediately
  73. Workforce Training
  74. Electronic PHI
  75. Desktop
  76. Protected Health Info
  77. Physical Safeguards
  78. Secure Disposal
  79. Compliance
  80. Secure Email
  81. Electronic Protected Health Information
  82. Precautions
  83. Phone Number
  84. HIPAA Golden Rules
  85. Breach Notification Rule
  86. Locking Bag
  87. Procedures
  88. Recipient