Social Security Number Email Malicious HITECH Retention Policy Safeguard Physical Safeguards De- Identified Info Policies Clean Desk Policy Authorization Business Associate Agreement HIPAA Compliance Breach Notification Audit Trail Secure Privacy Incident Password Protection Covered Entity Workstation Security Protected Health Info Compliance Officer Secure Email Data Integrity Medical Records Pharmacies Security Rule Privacy Electronic Protected Health Information Passphrase Desktop Notice of Privacy Practices Unauthorized Access Healthcare Providers Secure Disposal Procedures Phone Number Business Associate Business Associates Data Breach Role- Based Access Unauthorized HIPAA Golden Rules Violation DHHS Compliance Security Risk Analysis Technical Safeguards Consequences Disclosure Incident HIPAA Violation Privacy Rule Breach Notification Rule Recipient HIPAA PHI Security Officer Encryption Subcontractors Fax Cover Sheet Workforce Training Risk Assessment Administrative Safeguards Vendors Pharmacy Benefit Managers Report Immediately Covered Entities Privacy Officer Breach Notification Security Security Incident Privacy Officer Patient Consent Personal Information Identity Verification Electronic PHI Precautions Laptop Locking Bag Access Control Organization Phishing Minimum Necessary Need to Know Two-Factor Authentication Treatment Suspicious Social Security Number Email Malicious HITECH Retention Policy Safeguard Physical Safeguards De- Identified Info Policies Clean Desk Policy Authorization Business Associate Agreement HIPAA Compliance Breach Notification Audit Trail Secure Privacy Incident Password Protection Covered Entity Workstation Security Protected Health Info Compliance Officer Secure Email Data Integrity Medical Records Pharmacies Security Rule Privacy Electronic Protected Health Information Passphrase Desktop Notice of Privacy Practices Unauthorized Access Healthcare Providers Secure Disposal Procedures Phone Number Business Associate Business Associates Data Breach Role- Based Access Unauthorized HIPAA Golden Rules Violation DHHS Compliance Security Risk Analysis Technical Safeguards Consequences Disclosure Incident HIPAA Violation Privacy Rule Breach Notification Rule Recipient HIPAA PHI Security Officer Encryption Subcontractors Fax Cover Sheet Workforce Training Risk Assessment Administrative Safeguards Vendors Pharmacy Benefit Managers Report Immediately Covered Entities Privacy Officer Breach Notification Security Security Incident Privacy Officer Patient Consent Personal Information Identity Verification Electronic PHI Precautions Laptop Locking Bag Access Control Organization Phishing Minimum Necessary Need to Know Two-Factor Authentication Treatment Suspicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Security Number
Email
Malicious
HITECH
Retention Policy
Safeguard
Physical Safeguards
De-Identified Info
Policies
Clean Desk Policy
Authorization
Business Associate Agreement
HIPAA Compliance
Breach Notification
Audit Trail
Secure
Privacy Incident
Password Protection
Covered Entity
Workstation Security
Protected Health Info
Compliance Officer
Secure Email
Data Integrity
Medical Records
Pharmacies
Security Rule
Privacy
Electronic Protected Health Information
Passphrase
Desktop
Notice of Privacy Practices
Unauthorized Access
Healthcare Providers
Secure Disposal
Procedures
Phone Number
Business Associate
Business Associates
Data Breach
Role-Based Access
Unauthorized
HIPAA Golden Rules
Violation
DHHS
Compliance
Security Risk Analysis
Technical Safeguards
Consequences
Disclosure
Incident
HIPAA Violation
Privacy Rule
Breach Notification Rule
Recipient
HIPAA
PHI
Security Officer
Encryption
Subcontractors
Fax Cover Sheet
Workforce Training
Risk Assessment
Administrative Safeguards
Vendors
Pharmacy Benefit Managers
Report Immediately
Covered Entities
Privacy Officer
Breach Notification
Security
Security Incident
Privacy Officer
Patient Consent
Personal Information
Identity Verification
Electronic PHI
Precautions
Laptop
Locking Bag
Access Control
Organization
Phishing
Minimum Necessary
Need to Know
Two-Factor Authentication
Treatment
Suspicious