HCTM 150 Healthcare Technology Environment and Security • 5 Cr.
This course gives an overview of the healthcare technology environment, various health IT applications, and associated privacy and security policies and compliance. It focuses on health information management systems as well as applications that connect into system, and on the flow and transfer of data throughout the healthcare system. Recommended: Background in either an IT-related or Healthcare-related field.
HCTM 150 is part of the Certified Associate in Healthcare Information & Management Systems (CAHIMS) certificate program. Through federal grant funds students receive support from a Student Navigator and Academic Coach who will provide career and instructional support services. Students will complete an initial survey on their goals.
After completing this class, students should be able to:
- Describe the role and characteristics of various IT applications, such as clinical, administrative, financial applications commonly used in healthcare
- Explain the roles and characteristics of the information and communication technologies, such as infrastructure, servers, web services, data exchange and storage that supports the healthcare environment
- Discuss significant technology trends affecting the health IT field
- Describe organizational policies and procedures to ensure confidentiality, integrity, and availability of data
- Identify organizational roles (e.g., information security, physical security, compliance) responsible for managing vulnerabilities
- Compare procedures and tools to identify and mitigate potential privacy/security risks and breaches, and to conduct audits
- Define the different levels of and strategies to maintain data management controls (e.g., data ownership, criticality, security levels, protection controls, retention and destruction requirements, access controls)
- Describe the key elements of disaster recovery and business continuity plans
- Describe the key elements of privacy and security audits