Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Prepare for security assignment.
  2. Monitor and maintain safety of VIPs.
  3. Review and evaluate security operations.

Required Skills

This section describes the skills and knowledge and their level required for this unit

Required skills

assess client security requirements

communicate effectively with people from different social cultural and ethnic backgrounds and of varying physical and mental abilities

communicate using appropriate channels and clear and concise language

determine response appropriate to security risk situation

escort persons

estimate and calculate resource and equipment requirements

identify and comply with applicable legal and procedural requirements including licensing requirements

identify and comply with security incident response procedures

identify potential security threats and the likely source of risks

identify support and assistance requirements

operate security and communications equipment

present a professional image to members of the public and colleagues

record report and document information

select and use appropriate personal protection equipment

use negotiation techniques to defuse and resolve conflict

Required knowledge

client confidentiality requirements

communication channels codes and signals

emergency and evacuation procedures

escort procedures

first aid procedures and their application

instructions and procedures for responding to security risk situations

legal provisions relating to use of force guidelines

limits of own responsibility and authority

observation and monitoring techniques

operational functions and procedures for the use of communications security and personal protection equipment

principles of effective communication including interpersonal techniques

procedures and requirements for documenting security incidents

reporting structure and processes

security incidents and appropriate responses

security risk assessment methods

Evidence Required

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria required skills and knowledge range statement and the Assessment Guidelines for the Training Package

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of

accurately assessing assignment needs and instructions and determining approaches and resources to be applied

accurately identifying and assessing factors which might impact on the safety and security of VIPs and formulating and implementing appropriate responses

reviewing and evaluating security operations through a process of continual assessment feedback and exchange of information with relevant personnel

systematically monitoring security activities and varying operational plans as required to meet changing circumstances

Context of and specific resources for assessment

Context of assessment includes

a setting in the workplace or environment that simulates the conditions of performance described in the elements performance criteria and range statement

Resource implications for assessment include

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules organisational policies and duty statements

Reasonable adjustments must be made to assessment processes where required for people with disabilities This could include access to modified equipment and other physical resources and the provision of appropriate assessment support

Method of assessment

This unit of competency could be assessed using the following methods of assessment

observation of processes and procedures

questioning of underpinning knowledge and skills

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language literacy and numeracy capacity of the candidate and the competency being assessed In all cases where practical assessment is used it should be combined with targeted questioning to assess the underpinning knowledge

Oral questioning or written assessment may be used to assess underpinning knowledge In assessment situations where the candidate is offered a choice between oral questioning and written assessment questions are to be identical

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors team leaders or specialist training staff


Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

Occupational Health and Safety (OHS)

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructions may include:

assignment purpose and objective

assignment tasks and procedures

assignment timeframe

client identification information

incident and security risk response procedures

personal presentation requirements

personal protection equipment

premises location and layout

reporting and documentation requirements

resource and equipment requirements

travel routes and schedules.

Relevant personsmay include:

clients

colleagues

emergency services personnel and agencies

security personnel

supervisor.

Resources and equipment may include:

communications equipment:

earpiece

pager

portable and mounted two-way radio

telephone and mobile phone

maps

pen and security notebook

personal protection equipment

security equipment:

electronic screening equipment

video cameras and monitors

security personnel and specialist services

transport.

Communication channels and processes may relate to:

direct line supervision paths

established communication protocols

formal communication pathways

lateral supervision paths

organisational communication networks

verbal and non-verbal communication procedures eg pro-words, phonetic alphabet, call signs, coded messages, use of abbreviations, hand signals.

Security proceduresmay include:

appropriate positioning of relevant persons

communication of 'need to know' information to relevant persons

escort procedures

establishment and guarding of 'no go zones'

establishment of communication strategies

installation and operation of surveillance and communication equipment

issuance of ID cards for relevant persons

keying off lifts

negotiation and communication with VIPs own security staff

search of premises

security checks of relevant persons

setting up a central 'command post'.

Interpersonal techniques may involve:

active listening

being non-judgemental

being respectful and non-discriminatory

constructive feedback

control of tone of voice and body language

culturally aware and sensitive use of language and concepts

demonstrating flexibility and willingness to negotiate

effective verbal and non-verbal communication

maintaining professionalism

providing sufficient time for questions and responses

reflection and summarising

two-way interaction

use of plain English

use of positive, confident and cooperative language.

Social and cultural differencesmay relate to:

dress and personal presentation

food

language

religion

social conventions

traditional practices

values and beliefs.

Security risksmay relate to:

breaches of law eg criminal damage, offences against people, public order, misuse of drugs and alcohol

emergencies eg fire, scenes of crime, accidents

hazards eg physical, chemical, electrical, psychological, biological

threats eg bombs, sabotage, kidnap, assassination.

Responsemay involve:

defusing the situation

evacuating the premises

isolating area of potential risk

isolating risk

notifying relevant emergency services agencies

provision of first aid

request for support and assistance

restraint of person

tactical withdrawal

use of basic defensive techniques

use of negotiation techniques.

Assessmentmay include:

review to specifications and other documentation within organisational and industry policy guidelines

competency assessment for recording purposes.

Documentationmay include:

activity logs

incident reports

request for assistance forms

security risk and incident details

vehicle and personnel movements

written and electronic reports.