RiskAssessmentSecurityLaptopNeedtoKnowBreachNotificationPrivacyIncidentBreachNotificationPrivacyAuditTrailSecurityOfficerHIPAAGoldenRulesDesktopMaliciousSecurityIncidentLockingBagBusinessAssociateAgreementFaxCoverSheetPhishingRetentionPolicySocialSecurityNumberOrganizationSecurityRuleProtectedHealthInfoPrivacyOfficerTreatmentNotice ofPrivacyPracticesComplianceOfficerHIPAAViolationHIPAAVendorsIncidentPatientConsentSecurityRiskAnalysisCoveredEntitiesMinimumNecessaryPasswordProtectionPrecautionsTwo-FactorAuthenticationAuthorizationWorkstationSecurityPHIPrivacyRuleSuspiciousPersonalInformationPassphraseSecureDisposalRole-BasedAccessPhysicalSafeguardsHIPAAComplianceSecureEncryptionAccessControlCoveredEntityDHHSBusinessAssociatesHealthcareProvidersTechnicalSafeguardsReportImmediatelyElectronicPHISafeguardBusinessAssociateDataIntegrityPoliciesPharmacyBenefitManagersDisclosureWorkforceTrainingRecipientHITECHMedicalRecordsUnauthorizedAccessUnauthorizedProceduresBreachNotificationRuleIdentityVerificationPharmaciesCleanDeskPolicyEmailConsequencesViolationSubcontractorsPhoneNumberComplianceDe-IdentifiedInfoPrivacyOfficerDataBreachSecureEmailAdministrativeSafeguardsElectronicProtectedHealthInformationRiskAssessmentSecurityLaptopNeedtoKnowBreachNotificationPrivacyIncidentBreachNotificationPrivacyAuditTrailSecurityOfficerHIPAAGoldenRulesDesktopMaliciousSecurityIncidentLockingBagBusinessAssociateAgreementFaxCoverSheetPhishingRetentionPolicySocialSecurityNumberOrganizationSecurityRuleProtectedHealthInfoPrivacyOfficerTreatmentNotice ofPrivacyPracticesComplianceOfficerHIPAAViolationHIPAAVendorsIncidentPatientConsentSecurityRiskAnalysisCoveredEntitiesMinimumNecessaryPasswordProtectionPrecautionsTwo-FactorAuthenticationAuthorizationWorkstationSecurityPHIPrivacyRuleSuspiciousPersonalInformationPassphraseSecureDisposalRole-BasedAccessPhysicalSafeguardsHIPAAComplianceSecureEncryptionAccessControlCoveredEntityDHHSBusinessAssociatesHealthcareProvidersTechnicalSafeguardsReportImmediatelyElectronicPHISafeguardBusinessAssociateDataIntegrityPoliciesPharmacyBenefitManagersDisclosureWorkforceTrainingRecipientHITECHMedicalRecordsUnauthorizedAccessUnauthorizedProceduresBreachNotificationRuleIdentityVerificationPharmaciesCleanDeskPolicyEmailConsequencesViolationSubcontractorsPhoneNumberComplianceDe-IdentifiedInfoPrivacyOfficerDataBreachSecureEmailAdministrativeSafeguardsElectronicProtectedHealthInformation

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Risk Assessment
  2. Security
  3. Laptop
  4. Need to Know
  5. Breach Notification
  6. Privacy Incident
  7. Breach Notification
  8. Privacy
  9. Audit Trail
  10. Security Officer
  11. HIPAA Golden Rules
  12. Desktop
  13. Malicious
  14. Security Incident
  15. Locking Bag
  16. Business Associate Agreement
  17. Fax Cover Sheet
  18. Phishing
  19. Retention Policy
  20. Social Security Number
  21. Organization
  22. Security Rule
  23. Protected Health Info
  24. Privacy Officer
  25. Treatment
  26. Notice of Privacy Practices
  27. Compliance Officer
  28. HIPAA Violation
  29. HIPAA
  30. Vendors
  31. Incident
  32. Patient Consent
  33. Security Risk Analysis
  34. Covered Entities
  35. Minimum Necessary
  36. Password Protection
  37. Precautions
  38. Two-Factor Authentication
  39. Authorization
  40. Workstation Security
  41. PHI
  42. Privacy Rule
  43. Suspicious
  44. Personal Information
  45. Passphrase
  46. Secure Disposal
  47. Role-Based Access
  48. Physical Safeguards
  49. HIPAA Compliance
  50. Secure
  51. Encryption
  52. Access Control
  53. Covered Entity
  54. DHHS
  55. Business Associates
  56. Healthcare Providers
  57. Technical Safeguards
  58. Report Immediately
  59. Electronic PHI
  60. Safeguard
  61. Business Associate
  62. Data Integrity
  63. Policies
  64. Pharmacy Benefit Managers
  65. Disclosure
  66. Workforce Training
  67. Recipient
  68. HITECH
  69. Medical Records
  70. Unauthorized Access
  71. Unauthorized
  72. Procedures
  73. Breach Notification Rule
  74. Identity Verification
  75. Pharmacies
  76. Clean Desk Policy
  77. Email
  78. Consequences
  79. Violation
  80. Subcontractors
  81. Phone Number
  82. Compliance
  83. De-Identified Info
  84. Privacy Officer
  85. Data Breach
  86. Secure Email
  87. Administrative Safeguards
  88. Electronic Protected Health Information