Discover a world of educational opportunities to support your lifelong learning
Practice Experience Program is a self-directed education program designed to support non vocationally registered doctors on their pathway to RACGP Fellowship
RACGP offer courses and events to further develop the knowledge you need to develop your GP career
2022 RACGP curriculum and syllabus
for Australian general practice
The Abuse and violence: working with our patients in general practice provides the best-available current evidence for GPs
Stay up-to-date with the latest information and resources on the COVID-19 vaccine rollout.
Download the Standards for general practice (5th edition) - a benchmark for quality care and risk management in Australian general practices
Coronavirus (COVID-19) resources for general practitioners
Advice and guidelines for GPs and practice teams to help protect general practice information systems
Video consultations can provide convenient and accessible healthcare delivery
Read all of the RACGP reports and submissions on various healthcare topics
Read all of the RACGP position statements on various healthcare topics
Join our RACGP Facebook groups
Information security in general practice
Securing your network and equipment
Software is a program (or group of programs) that performs specific functions that are stored and run by hardware. Software is important to a general practice as these programs are used to store information and run the business side of practices.
Examples of common practice software include:
All software should support your business requirements. It is recommended to seek guidance from an IT professional on your specific requirements and how to mitigate any security risks associated with these requirements.
Your practice policy and procedures should include system and software maintenance.
Your policy should confirm the requirement for:
Application control is one of the most effective mitigation strategies in ensuring the security of your practices IT systems, and is a part of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents. It prevents the execution and spread of malicious code (also known as malware) and the installation or use of unapproved applications.
Implementing application control involves: