Elements and Performance Criteria
- Prepare to use security database.
- Applicable provisions of legislative and organisational requirements relevant to operating a security database are identified and complied with.
- Ergonomic and conservation issues are identified and appropriate risk control measures implemented in accordance with Occupational Health and Safety (OHS) guidelines.
- Appropriate software and hardware is identified to meet task requirements and installed in accordance with manufacturer's instructions.
- Virus protection is monitored, maintained regularly updated to ensure the continuous integrity and protection of data.
- Database storage, security and access requirements are identified and complied with to ensure the confidentiality and security of data.
- Established housekeeping, maintenance and back-up procedures are identified and conducted on a routine basis.
- Stand-by database and alternative strategies are identified and implemented as required to address operational faults and deficiencies in database systems.
- Use security database.
- Data entry, output and presentation requirements are identified and complied with in accordance with assignment instructions.
- Data is obtained from verifiable sources, checked and monitored for variations in data quality.
- Data is entered, checked for accuracy and updated as required.
- Errors and lags in data processing or discrepancies are identified, diagnosed and reported.
- Complex faults or repair requirements outside area of responsibility or competence are reported for specialist assistance.
- Measures to improve database content, interfaces or effectiveness are identified and confirmed with relevant persons.
- Compile reports.
- Reports are prepared in a timely manner using appropriate formats and presentation methods.
- Reports are produced using relevant data and are reviewed and checked for accuracy.
- Constructive feedback to improve and maintain security database systems is received and used to inform future practice.
- Procedures for the safe storage and protection of data are identified and complied with in accordance with organisational procedures.
- Relevant documentation is completed and securely maintained with due regard to confidentiality in accordance with organisational procedures.