US Regulatory Requirements ( Identify standard agencies, laws, and regulations; Explain and classify HIPAA (Health Insurance Portability and Accountability Act of 1996) controls and compliance issues; Summarise regulatory rules of record retention, disposal, and archiving; Explain and interpret legal best practices, requirements, and documentation).
Organisational Behaviour (Use best practices for handling PHI (Protected health information) in the workplace; Identify EHR/EMR (Electronic Health Records/Electronic Medical Records) access roles and responsibilities; Apply proper communication methods in the workplace; Identify organisational structures and different methods of operation; Given a scenario, execute daily activities while following a code of conduct).
IT Operations ( Identify commonly used IT terms and technologies; Demonstrate the ability to setup a basic PC workstation within an EHR/EMR (Electronic Health Records/Electronic Medical Records) environment; Given a scenario, troubleshoot and solve common PC problems; Install and configure hardware drivers and devices; Compare and contrast basic client networks and tools; Setup basic network devices and apply basic configuration settings; Given a scenario, troubleshoot and solve common network problems; Explain the features of different backup configurations and the associated maintenance practices; Classify different server types, environments, features, and limitations; Compare and contrast EHR/EMR (Electronic Health Records/Electronic Medical Records) technologies and how each is implemented).
Medical business operations (Identify commonly used medical terms and devices; Explain aspects of a typical clinical environment; Identify and label different components of medical interfaces; Determine common interface problems and escalate when necessary; Explain the basics of document imaging; Given a scenario, determine common clinical software problems; Describe change control best practices and its system-wide effects).
Security ( Explain physical security controls; Summarise the different encryption types and when each is used; Apply best practices when creating and communicating passwords; Classify permission levels based on roles; Identify different remote access methods and security controls; Recognise wireless security protocols and best practices; Implement best practices in secure disposal of electronic or physical PHI (Protected health information); Implement backup procedures based on disaster recovery policies; Identify common security risks and their prevention methods).