PrivacyLockingBagPrivacyRuleSecureOrganizationTwo-FactorAuthenticationPhysicalSafeguardsUnauthorizedAccessNeedtoKnowComplianceBusinessAssociateViolationSecurityIncidentMedicalRecordsAuditTrailRecipientLaptopBreachNotificationPrivacyIncidentDe-IdentifiedInfoWorkforceTrainingSecurityRiskAnalysisCoveredEntitiesPrivacyOfficerMaliciousSubcontractorsSecureDisposalRiskAssessmentNotice ofPrivacyPracticesHITECHSafeguardBusinessAssociateAgreementHIPAAComplianceBreachNotificationRuleAuthorizationDataBreachPrivacyOfficerHIPAACleanDeskPolicySecureEmailComplianceOfficerBreachNotificationHIPAAGoldenRulesPhoneNumberVendorsBusinessAssociatesPoliciesSuspiciousAccessControlProtectedHealthInfoDisclosureElectronicPHIAdministrativeSafeguardsPrecautionsIdentityVerificationSecurityDesktopCoveredEntityPasswordProtectionSocialSecurityNumberPhishingSecurityRuleDataIntegrityUnauthorizedTechnicalSafeguardsDHHSPassphraseWorkstationSecurityPatientConsentEncryptionRole-BasedAccessEmailIncidentProceduresPharmaciesRetentionPolicyConsequencesPHIHIPAAViolationReportImmediatelyPersonalInformationFaxCoverSheetSecurityOfficerElectronicProtectedHealthInformationHealthcareProvidersPharmacyBenefitManagersTreatmentMinimumNecessaryPrivacyLockingBagPrivacyRuleSecureOrganizationTwo-FactorAuthenticationPhysicalSafeguardsUnauthorizedAccessNeedtoKnowComplianceBusinessAssociateViolationSecurityIncidentMedicalRecordsAuditTrailRecipientLaptopBreachNotificationPrivacyIncidentDe-IdentifiedInfoWorkforceTrainingSecurityRiskAnalysisCoveredEntitiesPrivacyOfficerMaliciousSubcontractorsSecureDisposalRiskAssessmentNotice ofPrivacyPracticesHITECHSafeguardBusinessAssociateAgreementHIPAAComplianceBreachNotificationRuleAuthorizationDataBreachPrivacyOfficerHIPAACleanDeskPolicySecureEmailComplianceOfficerBreachNotificationHIPAAGoldenRulesPhoneNumberVendorsBusinessAssociatesPoliciesSuspiciousAccessControlProtectedHealthInfoDisclosureElectronicPHIAdministrativeSafeguardsPrecautionsIdentityVerificationSecurityDesktopCoveredEntityPasswordProtectionSocialSecurityNumberPhishingSecurityRuleDataIntegrityUnauthorizedTechnicalSafeguardsDHHSPassphraseWorkstationSecurityPatientConsentEncryptionRole-BasedAccessEmailIncidentProceduresPharmaciesRetentionPolicyConsequencesPHIHIPAAViolationReportImmediatelyPersonalInformationFaxCoverSheetSecurityOfficerElectronicProtectedHealthInformationHealthcareProvidersPharmacyBenefitManagersTreatmentMinimumNecessary

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Privacy
  2. Locking Bag
  3. Privacy Rule
  4. Secure
  5. Organization
  6. Two-Factor Authentication
  7. Physical Safeguards
  8. Unauthorized Access
  9. Need to Know
  10. Compliance
  11. Business Associate
  12. Violation
  13. Security Incident
  14. Medical Records
  15. Audit Trail
  16. Recipient
  17. Laptop
  18. Breach Notification
  19. Privacy Incident
  20. De-Identified Info
  21. Workforce Training
  22. Security Risk Analysis
  23. Covered Entities
  24. Privacy Officer
  25. Malicious
  26. Subcontractors
  27. Secure Disposal
  28. Risk Assessment
  29. Notice of Privacy Practices
  30. HITECH
  31. Safeguard
  32. Business Associate Agreement
  33. HIPAA Compliance
  34. Breach Notification Rule
  35. Authorization
  36. Data Breach
  37. Privacy Officer
  38. HIPAA
  39. Clean Desk Policy
  40. Secure Email
  41. Compliance Officer
  42. Breach Notification
  43. HIPAA Golden Rules
  44. Phone Number
  45. Vendors
  46. Business Associates
  47. Policies
  48. Suspicious
  49. Access Control
  50. Protected Health Info
  51. Disclosure
  52. Electronic PHI
  53. Administrative Safeguards
  54. Precautions
  55. Identity Verification
  56. Security
  57. Desktop
  58. Covered Entity
  59. Password Protection
  60. Social Security Number
  61. Phishing
  62. Security Rule
  63. Data Integrity
  64. Unauthorized
  65. Technical Safeguards
  66. DHHS
  67. Passphrase
  68. Workstation Security
  69. Patient Consent
  70. Encryption
  71. Role-Based Access
  72. Email
  73. Incident
  74. Procedures
  75. Pharmacies
  76. Retention Policy
  77. Consequences
  78. PHI
  79. HIPAA Violation
  80. Report Immediately
  81. Personal Information
  82. Fax Cover Sheet
  83. Security Officer
  84. Electronic Protected Health Information
  85. Healthcare Providers
  86. Pharmacy Benefit Managers
  87. Treatment
  88. Minimum Necessary