|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
OHS requirements may relate to: | controlling and minimising risks correct manual handling including shifting, lifting and carrying elimination of hazardous materials and substances identifying hazards safe use and operation of equipment including: business technology first aid equipment fire safety equipment personal protective clothing and equipment safety equipment safety procedures for the protection of self and others. |
Legislative requirements may relate to: | Australian standards and quality assurance requirements award and enterprise agreements Compliance Policy Guidelines (CPGs) counter-terrorism general 'duty of care' responsibilities licensing or certification requirements privacy and confidentiality relevant commonwealth, state and territory legislation, codes and national standards for: anti-discrimination cultural and ethnic diversity environmental issues equal employment opportunity industrial relations OHS relevant industry codes of practice telecommunications. |
Organisational requirements may relate to: | access and equity policies, principles and practices business and performance plans client service standards code of conduct, code of ethics communication and reporting procedures complaint and dispute resolution procedures emergency and evacuation procedures employer and employee rights and responsibilities environmental management including waste disposal, recycling and re-use guidelines OHS policies, procedures and programs own role, responsibility and authority personal and professional development privacy and confidentiality of information quality assurance and continuous improvement processes and standards resource parameters and procedures roles, functions and responsibilities of security personnel standard operating procedures storage and disposal of information use and maintenance of equipment and systems. |
Biometric refers to: | a measurable physical characteristic or personal behavioural trait used to recognise the identity or verify the identity of an individual. |
Types of biometrics may include: | DNA matching eyes: iris recognition retina recognition face recognition finger geometry recognition fingerprint recognition gait hand geometry recognition odour signature recognition typing recognition and keystroke dynamics vein recognition voice: speaker recognition speaker verification. |
Privacy legislation may include: | Commonwealth, State and Territory Privacy Acts national information privacy principles national privacy principles. |
Sources may include: | Internet literature professional associations and networks workshops. |
Biometric applications may be: | commercial: access control banking and finance (ATM and credit card access, e-commerce) cybersecurity (computer network login and electronic data security, internet access) encryption and watermarking travel and transportation forensic: corpse identification criminal investigation parenthood determination terrorist identification government: airport security border control correctional facility healthcare homeland security identity management law enforcement national ID card, driver's licence passport control physical access control social security. |
Relevant personsmay include: | biometric technology specialists clients colleagues external consultants information technology specialists manager. |
Communication may be: | face-to-face group interaction in Indigenous languages in languages other than English oral reporting participation in routine meetings reading independently recording of discussions speaking clearly and directly through the use of assistive technology via an interpreter visual or written writing to audience needs. |
Interpersonal techniques may involve: | active listening being non-judgemental being respectful and non-discriminatory constructive feedback control of tone of voice and body language culturally aware and sensitive use of language and concepts demonstrating flexibility and willingness to negotiate effective verbal and non-verbal communication maintaining professionalism providing sufficient time for questions and responses reflection and summarising two-way interaction use of plain English use of positive, confident and cooperative language. |
Social and cultural differencesmay relate to: | dress and personal presentation food language religion social conventions traditional practices values and beliefs. |
Riskrelates to: | the chance of something happening that will have an impact on objectives. |
Security risks may relate to: | biological hazards chemical spills client contact electrical faults explosives financial viability injury to personnel noise, light, heat, smoke persons carrying weapons persons causing a public nuisance persons demonstrating suspicious behaviour persons suffering from emotional or physical distress persons under the influence of intoxicating substances persons with criminal intent persons, vehicles and equipment in unsuitable locations property or people security systems suspicious packages or substances systems or process failures terrorism violence or physical threats. |
Biometric systems are: | automated systems able to capture a biometric sample from an individual person, extract biometric data from the sample, compare the data with one or more reference templates, determine the quality of a match, and indicate whether or not an identification or verification of identity has been achieved. |
Biometric equipment and systems may include: | acquisition devices: cameras (video, infrared-enabled video, single-image) chip or reader embedded in peripheral device microphones optical scanners biometric servers hardware interconnecting infrastructure software: server-based authentication software for biometric authentication and logging software associated with acquisition devices. |
Business equipment may include: | computers and computer applications data management applications and servers e-mail facsimile machines internet, extranet, and intranet modems personal schedulers photocopiers printers. |
Appropriate format may include: | formats that cater for those with special needs for example, producing documents in large print. |
Feedbackmay include: | comments from managers, supervisors, colleagues or clients formal or informal performance appraisals personal reflective behaviour strategies workplace assessment. |
Records and reports: | may be: computer-based manual other appropriate organisational communication system may detail: activity reports client meetings client requirements oral briefings security and risk assessments technical data and specifications telephone conversations. |