SocialSecurityNumberEmailMaliciousHITECHRetentionPolicySafeguardPhysicalSafeguardsDe-IdentifiedInfoPoliciesCleanDeskPolicyAuthorizationBusinessAssociateAgreementHIPAAComplianceBreachNotificationAuditTrailSecurePrivacyIncidentPasswordProtectionCoveredEntityWorkstationSecurityProtectedHealthInfoComplianceOfficerSecureEmailDataIntegrityMedicalRecordsPharmaciesSecurityRulePrivacyElectronicProtectedHealthInformationPassphraseDesktopNotice ofPrivacyPracticesUnauthorizedAccessHealthcareProvidersSecureDisposalProceduresPhoneNumberBusinessAssociateBusinessAssociatesDataBreachRole-BasedAccessUnauthorizedHIPAAGoldenRulesViolationDHHSComplianceSecurityRiskAnalysisTechnicalSafeguardsConsequencesDisclosureIncidentHIPAAViolationPrivacyRuleBreachNotificationRuleRecipientHIPAAPHISecurityOfficerEncryptionSubcontractorsFaxCoverSheetWorkforceTrainingRiskAssessmentAdministrativeSafeguardsVendorsPharmacyBenefitManagersReportImmediatelyCoveredEntitiesPrivacyOfficerBreachNotificationSecuritySecurityIncidentPrivacyOfficerPatientConsentPersonalInformationIdentityVerificationElectronicPHIPrecautionsLaptopLockingBagAccessControlOrganizationPhishingMinimumNecessaryNeedtoKnowTwo-FactorAuthenticationTreatmentSuspiciousSocialSecurityNumberEmailMaliciousHITECHRetentionPolicySafeguardPhysicalSafeguardsDe-IdentifiedInfoPoliciesCleanDeskPolicyAuthorizationBusinessAssociateAgreementHIPAAComplianceBreachNotificationAuditTrailSecurePrivacyIncidentPasswordProtectionCoveredEntityWorkstationSecurityProtectedHealthInfoComplianceOfficerSecureEmailDataIntegrityMedicalRecordsPharmaciesSecurityRulePrivacyElectronicProtectedHealthInformationPassphraseDesktopNotice ofPrivacyPracticesUnauthorizedAccessHealthcareProvidersSecureDisposalProceduresPhoneNumberBusinessAssociateBusinessAssociatesDataBreachRole-BasedAccessUnauthorizedHIPAAGoldenRulesViolationDHHSComplianceSecurityRiskAnalysisTechnicalSafeguardsConsequencesDisclosureIncidentHIPAAViolationPrivacyRuleBreachNotificationRuleRecipientHIPAAPHISecurityOfficerEncryptionSubcontractorsFaxCoverSheetWorkforceTrainingRiskAssessmentAdministrativeSafeguardsVendorsPharmacyBenefitManagersReportImmediatelyCoveredEntitiesPrivacyOfficerBreachNotificationSecuritySecurityIncidentPrivacyOfficerPatientConsentPersonalInformationIdentityVerificationElectronicPHIPrecautionsLaptopLockingBagAccessControlOrganizationPhishingMinimumNecessaryNeedtoKnowTwo-FactorAuthenticationTreatmentSuspicious

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Social Security Number
  2. Email
  3. Malicious
  4. HITECH
  5. Retention Policy
  6. Safeguard
  7. Physical Safeguards
  8. De-Identified Info
  9. Policies
  10. Clean Desk Policy
  11. Authorization
  12. Business Associate Agreement
  13. HIPAA Compliance
  14. Breach Notification
  15. Audit Trail
  16. Secure
  17. Privacy Incident
  18. Password Protection
  19. Covered Entity
  20. Workstation Security
  21. Protected Health Info
  22. Compliance Officer
  23. Secure Email
  24. Data Integrity
  25. Medical Records
  26. Pharmacies
  27. Security Rule
  28. Privacy
  29. Electronic Protected Health Information
  30. Passphrase
  31. Desktop
  32. Notice of Privacy Practices
  33. Unauthorized Access
  34. Healthcare Providers
  35. Secure Disposal
  36. Procedures
  37. Phone Number
  38. Business Associate
  39. Business Associates
  40. Data Breach
  41. Role-Based Access
  42. Unauthorized
  43. HIPAA Golden Rules
  44. Violation
  45. DHHS
  46. Compliance
  47. Security Risk Analysis
  48. Technical Safeguards
  49. Consequences
  50. Disclosure
  51. Incident
  52. HIPAA Violation
  53. Privacy Rule
  54. Breach Notification Rule
  55. Recipient
  56. HIPAA
  57. PHI
  58. Security Officer
  59. Encryption
  60. Subcontractors
  61. Fax Cover Sheet
  62. Workforce Training
  63. Risk Assessment
  64. Administrative Safeguards
  65. Vendors
  66. Pharmacy Benefit Managers
  67. Report Immediately
  68. Covered Entities
  69. Privacy Officer
  70. Breach Notification
  71. Security
  72. Security Incident
  73. Privacy Officer
  74. Patient Consent
  75. Personal Information
  76. Identity Verification
  77. Electronic PHI
  78. Precautions
  79. Laptop
  80. Locking Bag
  81. Access Control
  82. Organization
  83. Phishing
  84. Minimum Necessary
  85. Need to Know
  86. Two-Factor Authentication
  87. Treatment
  88. Suspicious