ProceduresPhysicalSafeguardsEmailHIPAAGoldenRulesElectronicPHIBusinessAssociateDHHSDataBreachWorkstationSecurityRiskAssessmentRecipientPhoneNumberAuditTrailPoliciesPrivacyOfficerSocialSecurityNumberPersonalInformationSecurityCoveredEntityUnauthorizedReportImmediatelySecureSuspiciousBusinessAssociateAgreementIncidentPrivacyPrivacyOfficerFaxCoverSheetSubcontractorsSecureEmailSecurityOfficerPrivacyRuleNotice ofPrivacyPracticesHIPAADesktopMinimumNecessaryAccessControlCoveredEntitiesIdentityVerificationPassphraseDisclosurePhishingComplianceOfficerSafeguardConsequencesBusinessAssociatesHealthcareProvidersPatientConsentSecureDisposalRetentionPolicyAdministrativeSafeguardsTwo-FactorAuthenticationHIPAAComplianceHIPAAViolationComplianceLaptopTreatmentAuthorizationTechnicalSafeguardsPharmaciesSecurityRuleBreachNotificationPasswordProtectionLockingBagProtectedHealthInfoSecurityRiskAnalysisDataIntegrityHITECHPrivacyIncidentBreachNotificationPharmacyBenefitManagersViolationElectronicProtectedHealthInformationVendorsEncryptionUnauthorizedAccessNeedtoKnowSecurityIncidentPHIRole-BasedAccessBreachNotificationRuleMaliciousPrecautionsMedicalRecordsWorkforceTrainingDe-IdentifiedInfoCleanDeskPolicyOrganizationProceduresPhysicalSafeguardsEmailHIPAAGoldenRulesElectronicPHIBusinessAssociateDHHSDataBreachWorkstationSecurityRiskAssessmentRecipientPhoneNumberAuditTrailPoliciesPrivacyOfficerSocialSecurityNumberPersonalInformationSecurityCoveredEntityUnauthorizedReportImmediatelySecureSuspiciousBusinessAssociateAgreementIncidentPrivacyPrivacyOfficerFaxCoverSheetSubcontractorsSecureEmailSecurityOfficerPrivacyRuleNotice ofPrivacyPracticesHIPAADesktopMinimumNecessaryAccessControlCoveredEntitiesIdentityVerificationPassphraseDisclosurePhishingComplianceOfficerSafeguardConsequencesBusinessAssociatesHealthcareProvidersPatientConsentSecureDisposalRetentionPolicyAdministrativeSafeguardsTwo-FactorAuthenticationHIPAAComplianceHIPAAViolationComplianceLaptopTreatmentAuthorizationTechnicalSafeguardsPharmaciesSecurityRuleBreachNotificationPasswordProtectionLockingBagProtectedHealthInfoSecurityRiskAnalysisDataIntegrityHITECHPrivacyIncidentBreachNotificationPharmacyBenefitManagersViolationElectronicProtectedHealthInformationVendorsEncryptionUnauthorizedAccessNeedtoKnowSecurityIncidentPHIRole-BasedAccessBreachNotificationRuleMaliciousPrecautionsMedicalRecordsWorkforceTrainingDe-IdentifiedInfoCleanDeskPolicyOrganization

HIPAA Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
  1. Procedures
  2. Physical Safeguards
  3. Email
  4. HIPAA Golden Rules
  5. Electronic PHI
  6. Business Associate
  7. DHHS
  8. Data Breach
  9. Workstation Security
  10. Risk Assessment
  11. Recipient
  12. Phone Number
  13. Audit Trail
  14. Policies
  15. Privacy Officer
  16. Social Security Number
  17. Personal Information
  18. Security
  19. Covered Entity
  20. Unauthorized
  21. Report Immediately
  22. Secure
  23. Suspicious
  24. Business Associate Agreement
  25. Incident
  26. Privacy
  27. Privacy Officer
  28. Fax Cover Sheet
  29. Subcontractors
  30. Secure Email
  31. Security Officer
  32. Privacy Rule
  33. Notice of Privacy Practices
  34. HIPAA
  35. Desktop
  36. Minimum Necessary
  37. Access Control
  38. Covered Entities
  39. Identity Verification
  40. Passphrase
  41. Disclosure
  42. Phishing
  43. Compliance Officer
  44. Safeguard
  45. Consequences
  46. Business Associates
  47. Healthcare Providers
  48. Patient Consent
  49. Secure Disposal
  50. Retention Policy
  51. Administrative Safeguards
  52. Two-Factor Authentication
  53. HIPAA Compliance
  54. HIPAA Violation
  55. Compliance
  56. Laptop
  57. Treatment
  58. Authorization
  59. Technical Safeguards
  60. Pharmacies
  61. Security Rule
  62. Breach Notification
  63. Password Protection
  64. Locking Bag
  65. Protected Health Info
  66. Security Risk Analysis
  67. Data Integrity
  68. HITECH
  69. Privacy Incident
  70. Breach Notification
  71. Pharmacy Benefit Managers
  72. Violation
  73. Electronic Protected Health Information
  74. Vendors
  75. Encryption
  76. Unauthorized Access
  77. Need to Know
  78. Security Incident
  79. PHI
  80. Role-Based Access
  81. Breach Notification Rule
  82. Malicious
  83. Precautions
  84. Medical Records
  85. Workforce Training
  86. De-Identified Info
  87. Clean Desk Policy
  88. Organization