|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Legislative requirements may relate to: | apprehension and powers of arrest Australian standards and quality assurance requirementscounter-terrorismcrowd control and control of persons under the influence of intoxicating substancesforce continuum, use of force guidelinesgeneral 'duty of care' responsibilitiesinspection of people and property, and search and seizure of goodslicensing or certification requirementsprivacy and confidentialityrelevant commonwealth, state and territory legislation, codes and national standards for:anti-discriminationcultural and ethnic diversityenvironmental issuesequal employment opportunityindustrial relationsOHSrelevant industry codes of practice trespass and the removal of personsuse of restraints and weapons:batonsfirearmshandcuffsspray. |
Organisational requirements may relate to: | access and equity policies, principles and practicesbusiness and performance plansclient service standardscode of conduct, code of ethicscommunication and reporting procedurescomplaint and dispute resolution proceduresemergency and evacuation proceduresemployer and employee rights and responsibilities OHS policies, procedures and programsown role, responsibility and authority personal and professional developmentprivacy and confidentiality of informationquality assurance and continuous improvement processes and standardsresource parameters and proceduresroles, functions and responsibilities of security personnelstorage and disposal of information. |
Relevant standards: | must include AS/NZS 4360: 2004 Risk managementmay relate to:AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises HB 167:2006 Security Risk ManagementHB 436 Risk Management Guidelines - Companion to AS/NZS 4360HB 231:2000 Information security risk management guidelines. |
Clientsmay include: | employer and employee groupsindividualspolitical partiespublic and private entitiestrade or professional associations. |
Relevant personsmay include: | manufacturersother professional, specialist or technical staffsecurity consultantssecurity personnelsupervisors. |
Relevant informationmay include: | client activities and functionsclient business and operational plansclient current and proposed operating environment, assets and systemsexisting client security management strategieshistory of incidentspotential risks and threats experienced by similar organisationsterms of reference. |
Sourcesof information may include: | annual reportscompetitorscurrent and past employees of the company, like organisation or like industryfield experts (for example qualified technicians)government agenciesinternetmedia (journals, TV, radio, magazines)newspaper articlesorganisational recordspoliceresearch paperssecurity contractors or consultantssecurity industry associationsservice providerssimilar organisations and industries (domestic and international). |
Assetsmay include: | business plansequipmentfacilitiesgoodwillinformation, information systems and sourcesintellectual propertyoutputpeoplereputationsystemswork processes and practices. |
Threats may: | affect the security of an assetbe an agent or event that could put an asset at risk (theft, vandalism, fire, flood, power loss, unauthorised access, viruses, corruption of data)be deliberate, natural, accidental, perceivedcause loss of goodwill, reputation or credibilitycause loss, disclosure, destruction or compromise of assetcause risk of litigation. |
Theoperating environmentof an organisation may relate to: | competitorscore business functionsenvironmental issuesfinancial marketskey stakeholders market sharenature of operationsneighboursscale of operationssituational issuessize of companystability of company, organisation, industry and markettype of industry workforce. |
Causes and sourcesof threats may include: | a group of peoplea nation, country or statean individualan organisationnatural events or the environment. |
Assessment criteriamay be based on: | organisational or client requirementsqualitative factors quantitative factorssemi-quantitative factorsthe Australian Standard AS/NZS 4360:1999 Risk Management (or its equivalent). |
Consequencesmay include: | consideration of effect on client's ability to continue core functionsdisruption to operations impact on neighbours and subsequent litigationloss of asset (eg property, lives, reputation, goodwill)loss of privacyloss of service or businessloss of trustloss or reduction of productivity. |
Factorsmay include: | changes to the operational environment such as neighbours, financial markets and market sharethose with regard to repair or replacement of assets and activities such as time, cost, training and availability. |
Threat impactevaluation may relate to: | factors related to the repair or replacement of assets and activitieslevel of seriousnessrisk of litigation. |
Contingencyarrangements may relate to: | cessation of operationscontinuity of operationspartial closuretransfer of operations. |
Reportsmay include: | graphical representations of datarecommendationssummary of assessment outcomestables and information from approved data collection tools. |