Assessor Resource

PSPSEC008
Conduct personnel security assessments

Assessment tool

Version 1.0
Issue Date: April 2024


This unit describes the skills required to collect, analyse and evaluate personal information, make recommendations on security assessment outcomes and record and report on personnel security assessments.

This unit applies to those working in the security sector required to make assessments.

The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to.

Those undertaking this unit would generally work independently and as part of a team using support resources as required. They would perform complex tasks in a range of familiar and unfamiliar contexts.

No licensing, legislative or certification requirements apply to unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Collect, analyse and evaluate personal information

1.1 Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

1.2 Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

1.3 Corroborate information and assess validity and reliability.

1.4 Conduct analysis in accordance with general suitability indicators and security standards.

1.5 Extract and interpret data and record outcomes.

1.6 Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

2. Make recommendations on security assessment outcomes

2.1 Formulate recommendations that are consistent with the information obtained.

2.2 Convey recommendations.

2.3 Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

2.4 Recommend improvements to procedures.

3. Record and report on personnel security assessments

3.1 Maintain complete and up to date records.

3.2 Prepare reports that are clear, fair and objective and use language suited to the purpose.

3.3 Address urgency and levels of risk in reports.

3.4 Adhere to procedures for storing and managing confidential and sensitive information.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to personnel security assessments

undertaking critical analysis, evaluation and deductive reasoning

applying problem solving and decision making

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Protective Security Policy Framework

general suitability indicators

international treaties and protocols

formats for different types of reports

risk assessment

management of secure information

WHS and environment in the context of personnel security assessments

Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when conducting personnel security assessments.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Collect, analyse and evaluate personal information

1.1 Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

1.2 Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

1.3 Corroborate information and assess validity and reliability.

1.4 Conduct analysis in accordance with general suitability indicators and security standards.

1.5 Extract and interpret data and record outcomes.

1.6 Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

2. Make recommendations on security assessment outcomes

2.1 Formulate recommendations that are consistent with the information obtained.

2.2 Convey recommendations.

2.3 Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

2.4 Recommend improvements to procedures.

3. Record and report on personnel security assessments

3.1 Maintain complete and up to date records.

3.2 Prepare reports that are clear, fair and objective and use language suited to the purpose.

3.3 Address urgency and levels of risk in reports.

3.4 Adhere to procedures for storing and managing confidential and sensitive information.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to personnel security assessments

undertaking critical analysis, evaluation and deductive reasoning

applying problem solving and decision making

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Protective Security Policy Framework

general suitability indicators

international treaties and protocols

formats for different types of reports

risk assessment

management of secure information

WHS and environment in the context of personnel security assessments

Assessment of this unit requires a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when conducting personnel security assessments.

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Collect information from the subject to be assessed in accordance with the purpose of the security assessment. 
Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided. 
Corroborate information and assess validity and reliability. 
Conduct analysis in accordance with general suitability indicators and security standards. 
Extract and interpret data and record outcomes. 
Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature. 
Formulate recommendations that are consistent with the information obtained. 
Convey recommendations. 
Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative. 
Recommend improvements to procedures. 
Maintain complete and up to date records. 
Prepare reports that are clear, fair and objective and use language suited to the purpose. 
Address urgency and levels of risk in reports. 
Adhere to procedures for storing and managing confidential and sensitive information. 
Collect information from the subject to be assessed in accordance with the purpose of the security assessment. 
Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided. 
Corroborate information and assess validity and reliability. 
Conduct analysis in accordance with general suitability indicators and security standards. 
Extract and interpret data and record outcomes. 
Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature. 
Formulate recommendations that are consistent with the information obtained. 
Convey recommendations. 
Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative. 
Recommend improvements to procedures. 
Maintain complete and up to date records. 
Prepare reports that are clear, fair and objective and use language suited to the purpose. 
Address urgency and levels of risk in reports. 
Adhere to procedures for storing and managing confidential and sensitive information. 

Forms

Assessment Cover Sheet

PSPSEC008 - Conduct personnel security assessments
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PSPSEC008 - Conduct personnel security assessments

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: