|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Occupational Health and Safety (OHS) requirements may relate to: | controlling and minimising riskscorrect manual handling including shifting, lifting and carryingelimination of hazardous materials and substancesidentifying hazardssafe use and operation of equipment includingbusiness technologyfirst aid equipmentfire safety equipmentpersonal protective clothing and equipmentsafety equipmentsafety procedures for the protection of self and others. |
Legislative requirements may relate to: | Australian standards and quality assurance requirementsaward and enterprise agreementsCompliance Policy Guidelines (CPGs)counter-terrorismgeneral 'duty of care' responsibilitieslicensing or certification requirementsprivacy and confidentialityrelevant commonwealth, state and territory legislation, codes and national standards for:anti-discriminationcultural and ethnic diversityenvironmental issuesequal employment opportunityindustrial relationsOHSrelevant industry codes of practice telecommunications. |
Organisational requirements may relate to: | access and equity policies, principles and practicesbusiness and performance plansclient service standardscode of conduct, code of ethicscommunication and reporting procedurescomplaint and dispute resolution proceduresemergency and evacuation proceduresemployer and employee rights and responsibilities environmental management including waste disposal, recycling and re-use guidelinesOHS policies, procedures and programsown role, responsibility and authority personal and professional developmentprivacy and confidentiality of informationquality assurance and continuous improvement processes and standardsresource parameters and proceduresroles, functions and responsibilities of security personnelstandard operating proceduresstorage and disposal of informationuse and maintenance of equipment and systems. |
Biometric refers to: | a measurable physical characteristic or personal behavioural trait used to recognise the identity or verify the identity of an individual. |
Biometric technologies include: | facial recognitionfingerprint recognitionhand geometryiris recognitionretina recognitionsignature recognitionvein recognitionvoice recognition. |
Privacy legislation may include: | Commonwealth, State and Territory Privacy Actsnational information privacy principlesnational privacy principles. |
Security safeguards may be: | administrative and include:contingency plans (data back-up, disaster recovery, and emergency mode operation plans)information access management (access authorisation, establishment and modification)security awareness and training (awareness, virus protection, log-in success or failure, password management)security incident procedures (report and response procedures)security management (risk analysis and management)physical and include measures to protect information systems, buildings and equipment from natural and environmental hazards and unauthorised intrusions technical and include:access control (user identification, emergency access procedures, automatic log-off, encryption and decryption)audit control (logging, capturing data versions, times, sessions, workstations, events and user information)transmission security (integrity controls, encryption). |
Threats: | are intentional or unintentional potential events that could compromise the security integrity of physical and technical organisational systems. |
Riskrelates to: | the chance of something happening that will have an impact on objectives. |
Risksmay relate to: | data and informationpersonnelproperty. |
Communication may be: | face-to-facegroup interactionin Indigenous languagesin languages other than Englishoral reportingparticipation in routine meetingsreading independentlyrecording of discussionsspeaking clearly and directlythrough the use of assistive technologyvia an interpretervisual or writtenwriting to audience needs. |
Interpersonal techniques may involve: | active listening being non-judgementalbeing respectful and non-discriminatoryconstructive feedbackcontrol of tone of voice and body languageculturally aware and sensitive use of language and concepts demonstrating flexibility and willingness to negotiateeffective verbal and non-verbal communicationmaintaining professionalismproviding sufficient time for questions and responses reflection and summarisingtwo-way interactionuse of plain Englishuse of positive, confident and cooperative language. |
Social and cultural differencesmay relate to: | dress and personal presentationfoodlanguagereligionsocial conventionstraditional practicesvalues and beliefs. |
Optionsmay relate to: | enrolment advicemotivation to verifytolerance for rejected attempts. |
Multiplebiometrics refers to: | a biometric system that integrates two ore more biometric technologies (facial and iris recognition, and multiple instances of a single biometric eg one, two or ten fingerprints). |
Biometric equipment and systems are: | automated systems able to capture a biometric sample from an individual person, extract biometric data from the sample, compare the data with one or more reference templates, determine the quality of a match, and indicate whether or not an identification or verification of identity has been achieved. |
Biometric equipment and systems may include: | acquisition devices:cameras (video, infrared-enabled video, single-image)chip or reader embedded in peripheral devicemicrophonesoptical scannersbiometric servershardwareinterconnecting infrastructuresoftware:server-based authentication software for biometric authentication and loggingsoftware associated with acquisition devices. |
Resource requirements may include: | computer systems (hardware, software and infrastructure)equipmentfundingpersonneltimetools. |
Existing architecturemay include: | desktop PCslocal area networks (LANs)mainframe systemsserverswebsiteswide area networks (WANs). |
Additional requirementsmay relate to: | integration service requirements and interoperabilityupgrading or replacing the system or components of the system. |
Feasibilitymay relate to: | economic and schedule feasibilityoperational feasibilitytechnical feasibility. |
Relevant informationmay include: | assets (resources, data and information)contingency plansimplementation issuesresource requirements including allocation and locationrisk and threat assessment outcomestreatment options. |
Appropriate format may include: | formats that cater for those with special needs for example, producing documents in large print. |
Implementation strategy may include: | analysis and comparison of biometrics system optionsassessment of security risksenrolment processesintegration requirement and system interoperabilityresources necessary for implementationstaged rollouts. |
Contingencies may detail: | roles, responsibilities, teams and procedures associated with restoring a security system following a disruptionside manual door entry. |
Relevant personsmay include: | biometric technology specialistsclientscolleaguesexternal consultantsinformation technology specialistsmanager. |
Records and reports: | may be:computer-basedmanualother appropriate organisational communication system may detail:biometric technologies and systemsorganisational security requirementsresources requirementsrisk assessment outcomestechnical data and specificationstimeframe and financial considerations. |