|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Legislative requirements may relate to: | Australian standards and quality assurance requirementsforce continuum, use of force guidelinesgeneral 'duty of care' responsibilitieslicensing or certification requirementsprivacy and confidentialityrelevant commonwealth, state and territory legislation, codes and national standards for:anti-discriminationcultural and ethnic diversityenvironmental issuesequal employment opportunityindustrial relationsOccupational Health and Safety (OHS)relevant industry codes of practice trespass and the removal of persons. |
Organisational requirements may relate to: | access and equity policies, principles and practicesbusiness and performance plansclient service standardscode of conduct, code of ethicscommunication and reporting procedurescomplaint and dispute resolution proceduresemergency and evacuation proceduresemployer and employee rights and responsibilities OHS policies, procedures and programsown role, responsibility and authority personal and professional developmentprivacy and confidentiality of informationquality assurance and continuous improvement processes and standardsresource parameters and proceduresroles, functions and responsibilities of security personnelstorage and disposal of information. |
Relevant standards: | must include AS/NZS 4360: 2004 Risk managementmay relate to:AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises AS3911:1992 Guidelines for auditing quality systemsHB 167:2006 Security Risk ManagementHB 436 Risk Management Guidelines - Companion to AS/NZS 4360HB 231:2000 Information security risk management guidelines. |
Relevant persons may be: | accountantscontractorsinventory or administration personnelmanagersoperational personnelsecurity personneltechnicians. |
Assetsmay include: | assets owned, leased or in the custody of an organisation buildingsequipmentfacilitiesgoodwillinformation and documentationinformation systems and sourcesintellectual propertypeoplereputationsecurity systems. |
Source documentsmay include: | asset registerdepreciation registeremployee recordslease or hire purchase contractsorganisation chartprofit and loss analysis for an asset or division of the organisationthose obtained from accounting personnel. |
Interpersonal techniquesmay include: | active listeningbeing respectful and non-discriminatory to otherscontrol of tone of voice and body languagedemonstrating flexibility and willingness to negotiateinterpreting non-verbal and verbal messagesmaintaining professionalismproviding and receiving constructive feedbackquestioning to clarify and confirm understandingtwo-way communicationuse of communication appropriate to cultural differencesuse of positive, confident and cooperative language. |
Status of assetsmay relate to: | borrowingcurrent condition of asset (damaged, in repair, lost, stolen, on leave, undergoing routine maintenance)held in custodyhireimportanceleaseownershipsecurity. |
Market valueof assets may be based on: | assessment of purchase pricedepreciated valueformal valuationreplacement costs. |
Factorswhich may influence value of assets may include: | dollar costfunctionharm to short or long term operation of the organisationimportance to normal operation of the organisationreplacement availability, time and costthe value of production or output lost as a result of loss of the asset. |
Access to assetsor sources of information may involve: | entry to locations where assets are kept, used or storedentry to storage facilitiesobtaining authority to access restricted data, areas or personnelobtaining relevant security clearanceon-site visits. |
Security measuresmay relate to: | access control systemsClosed Circuit Television (CCTV) and monitoring systemsdeployment or increase of security personnelsafes, vaults and locking mechanismsstandard operating procedures for security of assets. |
Riskrelates to: | the chance of something happening that will have an impact on objectives. |
Security risks may relate to: | biological hazardschemical spillsclient contact electrical faultsexplosivesfinancial viabilityinjury to personnelnoise, light, heat, smokepersons carrying weaponspersons causing a public nuisancepersons demonstrating suspicious behaviourpersons suffering from emotional or physical distresspersons under the influence of intoxicating substancespersons with criminal intentpersons, vehicles and equipment in unsuitable locationsproperty or peoplesecurity systemssuspicious packages or substancessystems or process failuresterrorismviolence or physical threats. |
Treatmentsmay relate to: | additional personnelcontracted contingency servicesidentified countermeasuresinternal contingency plansrisk reduction strategiesuse of stored resourcesuse of superseded equipment. |
Anauditmay be completed by using: | inspection of records and documentsinternal auditing procedures as outlined in AS3911:1992 Guidelines for auditing quality systemsinterviewsmonitoring and inspecting procedures and processesprofessional internal or external auditorsquestionnairessite visits and inspections. |
Operating parametersmay include: | adherence to proceduresadverse conditions for system efficiency availability and condition of systems and equipmentavailability and use of back-up systemscall out of support and specialist personnelclarity of communication systemsfault-finding proceduresnormal function of dutiesOHS requirementsoptimal conditions for system efficiency reaction timesafe and timely deploymentsound and light intensitystandard operating procedures. |
Planned testingmay include: | computer modellingconceptual analysiscontrolled interruptions to normal operationsdebriefing sessionsinspectioninterceptioninterviewspenetration exercisesrehearsalssimulation and replicationtesting of alarms, CCTV and other warning devicestesting or access control systems. |
Organisational standards for written informationmay relate to: | ability to be used for legal purposesaccuracy of costingsappropriate level of literacyformat and presentationrelevance of written informationuse of clear, concise language and plain English. |
Reportshould include: | evidence and supporting materials to validate the findingsgraphical representations of datarecommendations where applicablesummary of assessment objectives and outcomestables and information from approved data collection tools. |
Feedbackmay be obtained through: | comments from client or colleaguescompletion and analysis of formal client satisfaction surveyeffectiveness of assessment outcomes in meeting assessment objectivesformal or informal performance discussion. |