Procedures Physical Safeguards Email HIPAA Golden Rules Electronic PHI Business Associate DHHS Data Breach Workstation Security Risk Assessment Recipient Phone Number Audit Trail Policies Privacy Officer Social Security Number Personal Information Security Covered Entity Unauthorized Report Immediately Secure Suspicious Business Associate Agreement Incident Privacy Privacy Officer Fax Cover Sheet Subcontractors Secure Email Security Officer Privacy Rule Notice of Privacy Practices HIPAA Desktop Minimum Necessary Access Control Covered Entities Identity Verification Passphrase Disclosure Phishing Compliance Officer Safeguard Consequences Business Associates Healthcare Providers Patient Consent Secure Disposal Retention Policy Administrative Safeguards Two-Factor Authentication HIPAA Compliance HIPAA Violation Compliance Laptop Treatment Authorization Technical Safeguards Pharmacies Security Rule Breach Notification Password Protection Locking Bag Protected Health Info Security Risk Analysis Data Integrity HITECH Privacy Incident Breach Notification Pharmacy Benefit Managers Violation Electronic Protected Health Information Vendors Encryption Unauthorized Access Need to Know Security Incident PHI Role- Based Access Breach Notification Rule Malicious Precautions Medical Records Workforce Training De- Identified Info Clean Desk Policy Organization Procedures Physical Safeguards Email HIPAA Golden Rules Electronic PHI Business Associate DHHS Data Breach Workstation Security Risk Assessment Recipient Phone Number Audit Trail Policies Privacy Officer Social Security Number Personal Information Security Covered Entity Unauthorized Report Immediately Secure Suspicious Business Associate Agreement Incident Privacy Privacy Officer Fax Cover Sheet Subcontractors Secure Email Security Officer Privacy Rule Notice of Privacy Practices HIPAA Desktop Minimum Necessary Access Control Covered Entities Identity Verification Passphrase Disclosure Phishing Compliance Officer Safeguard Consequences Business Associates Healthcare Providers Patient Consent Secure Disposal Retention Policy Administrative Safeguards Two-Factor Authentication HIPAA Compliance HIPAA Violation Compliance Laptop Treatment Authorization Technical Safeguards Pharmacies Security Rule Breach Notification Password Protection Locking Bag Protected Health Info Security Risk Analysis Data Integrity HITECH Privacy Incident Breach Notification Pharmacy Benefit Managers Violation Electronic Protected Health Information Vendors Encryption Unauthorized Access Need to Know Security Incident PHI Role- Based Access Breach Notification Rule Malicious Precautions Medical Records Workforce Training De- Identified Info Clean Desk Policy Organization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Procedures
Physical Safeguards
Email
HIPAA Golden Rules
Electronic PHI
Business Associate
DHHS
Data Breach
Workstation Security
Risk Assessment
Recipient
Phone Number
Audit Trail
Policies
Privacy Officer
Social Security Number
Personal Information
Security
Covered Entity
Unauthorized
Report Immediately
Secure
Suspicious
Business Associate Agreement
Incident
Privacy
Privacy Officer
Fax Cover Sheet
Subcontractors
Secure Email
Security Officer
Privacy Rule
Notice of Privacy Practices
HIPAA
Desktop
Minimum Necessary
Access Control
Covered Entities
Identity Verification
Passphrase
Disclosure
Phishing
Compliance Officer
Safeguard
Consequences
Business Associates
Healthcare Providers
Patient Consent
Secure Disposal
Retention Policy
Administrative Safeguards
Two-Factor Authentication
HIPAA Compliance
HIPAA Violation
Compliance
Laptop
Treatment
Authorization
Technical Safeguards
Pharmacies
Security Rule
Breach Notification
Password Protection
Locking Bag
Protected Health Info
Security Risk Analysis
Data Integrity
HITECH
Privacy Incident
Breach Notification
Pharmacy Benefit Managers
Violation
Electronic Protected Health Information
Vendors
Encryption
Unauthorized Access
Need to Know
Security Incident
PHI
Role-Based Access
Breach Notification Rule
Malicious
Precautions
Medical Records
Workforce Training
De-Identified Info
Clean Desk Policy
Organization