• CPPSEC3003A - Determine response to security risk situation

Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

CPPSEC3003A Mapping and Delivery Guide
Determine response to security risk situation

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency CPPSEC3003A - Determine response to security risk situation
Description This unit of competency specifies the outcomes required to determine an appropriate response to a security risk situation. It requires the ability to analyse the nature and degree of risk and determine response options according to changing circumstances. This unit may form part of the licensing requirements for persons engaged in guarding operations in those states and territories where these are regulated activities.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application This unit of competency has application in those work roles involving guarding in a security environment. Competency requires legal and operational knowledge applicable to relevant sectors of the security industry. The knowledge and skills described in this unit are to be applied within relevant legislative and organisational guidelines.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites Not Applicable
Competency Field Operations
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Identify security risk situation.
  • Applicable provisions of legislative and organisational requirements relevant to security risk operations identified and complied with.
  • Information on security risk situation is received and verified for reliability and authenticity.
  • Environmental factors relevant to security risk situation are identified and monitored for changes in characteristics that may impact on security response.
  • Additional information required to assess degree of risk is sourced as required.
  • Communication channels and processes are used to maintain an accurate and up to date exchange of information with relevant persons.
       
Element: Assess security risk situation.
  • Assessment of security risk situation is conducted in accordance with organisational procedures.
  • Security risk situation is assessed for degree of risk to persons, property and premises.
  • Appropriate risk control measures to ensure the safety and security of persons, property and premises are determined.
  • Suitable equipment and resource requirements appropriate to security risk situation are determined.
  • Specialist advice is sought as required in accordance with organisational procedures.
       
Element: Determine response options.
  • Options for response to security risk situation are evaluated and determined.
  • Response is within the scope of own responsibility, competence and authority.
  • Response maximises the safety and security of persons, property and premises.
  • Response involves the appropriate selection and efficient use of equipment and resources.
  • Relevant documentation is completed and securely maintained with due regard to confidentiality in accordance with organisational procedures.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

determining response options which are most effective for the security risk

determining response options within specified legal and strategic limits

identifying current and potential risk factors and their impact on the security risk situation

interpreting and complying with legal and procedural requirements including licensing requirements

reviewing and adjusting response strategies to meet changing circumstances

using appropriate communication modes and terminology to receive and convey information.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to a registered provider of assessment services

access to a suitable venue and equipment

access to plain English version of relevant statutes and procedures

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

This section describes the skills and knowledge and their level required for this unit.

Required skills

assess information and determine response appropriate to security risk situation

communicate effectively with people from different social, cultural and ethnic backgrounds and of varying physical and mental abilities

communicate using appropriate channels and clear and concise language

conduct risk assessment of security risk situation

determine suitable security and personal protection equipment

facilitate commonsense solutions within operating parameters

identify and comply with applicable legal and procedural requirements including licensing requirements

identify and comply with security incident response procedures

identify support and assistance requirements

operate security and communications equipment.

Required knowledge

approved communication terminology and codes and signals

emergency and evacuation procedures and instructions

instructions and procedures for responding to security risk situations

observation and monitoring techniques

operational functions and procedures for the use of communications, security and personal protection equipment

phonetic alphabet

principles of effective communication including interpersonal techniques

procedures and requirements for documenting security incidents

range of available resources and equipment

range of potential security incidents and appropriate responses

reporting processes

risk assessment processes

structure and responsibilities of the emergency services agencies.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

Occupational Health and Safety (OHS)

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Relevantlegislation may include:

Crimes Act 1900

Firearms Act 1996 and Firearms (General) Regulations 1997

general principles of Common Law

Inclosed Lands Protection Act 1901

Law Enforcement (Powers and Responsibilities) Act 2002

Liquor Act 1982

Listening Devices Act 1984

Registered Clubs Act 1976

Security Industry Act 1997 and Regulations 1998

Trade Practices Act

Workplace Surveillance Act 2005.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Security risk situation may relate to:

biological hazards

chemical spills

electrical faults

explosives

injury to personnel

noise, light, heat, smoke

persons carrying weapons

persons causing a public nuisance

persons demonstrating suspicious behaviour

persons suffering from emotional or physical distress

persons under the influence of intoxicating substances

persons with criminal intent

persons, vehicles and equipment in unsuitable locations

suspicious packages or substances

terrorism

violence or physical threats.

Environmental factors may relate to:

access to assistance and resources

availability of exits and opportunities for escape

crowds

different degrees of light including low light and darkness

presence of several sources of threat

time of day

weather.

Communication channels and processes may relate to:

direct line supervision paths

established communication protocols

formal communication pathways

lateral supervision paths

organisational communication networks

verbal and non-verbal communication procedures eg pro-words, phonetic alphabet, call signs, coded messages, use of abbreviations, hand signals.

Relevant persons may include:

clients

colleagues

emergency services personnel

supervisor.

Factors for assessment may include:

available resources including emergency support, team back-up or security equipment

known information about persons involved in the security risk

known information about the circumstances of the security risk

observation of the environment and physical conditions

options for controlling and defusing security risk

potential triggers for escalation of security risk

the nature of the security risk.

Resources and equipment may include:

communications equipment

pager

portable and mounted two-way radio

telephone and mobile phone

maps

pen and security notebook

personal protection equipment

security equipment

restraints

weapons

security personnel and specialist services

transport.

Responsemay involve:

defusing the situation

evacuating the premises

isolating area of potential risk

isolating risk

notifying relevant emergency services agencies

providing access for emergency services

provision of first aid

request for support and assistance

restraint of person

tactical withdrawal

use of batons, handcuffs or spray

use of empty hand techniques

use of negotiation techniques

use of restraints.

Documentation may include:

activity logs

incident reports

request for assistance forms

vehicle and personnel movements

written and electronic reports.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Applicable provisions of legislative and organisational requirements relevant to security risk operations identified and complied with. 
Information on security risk situation is received and verified for reliability and authenticity. 
Environmental factors relevant to security risk situation are identified and monitored for changes in characteristics that may impact on security response. 
Additional information required to assess degree of risk is sourced as required. 
Communication channels and processes are used to maintain an accurate and up to date exchange of information with relevant persons. 
Assessment of security risk situation is conducted in accordance with organisational procedures. 
Security risk situation is assessed for degree of risk to persons, property and premises. 
Appropriate risk control measures to ensure the safety and security of persons, property and premises are determined. 
Suitable equipment and resource requirements appropriate to security risk situation are determined. 
Specialist advice is sought as required in accordance with organisational procedures. 
Options for response to security risk situation are evaluated and determined. 
Response is within the scope of own responsibility, competence and authority. 
Response maximises the safety and security of persons, property and premises. 
Response involves the appropriate selection and efficient use of equipment and resources. 
Relevant documentation is completed and securely maintained with due regard to confidentiality in accordance with organisational procedures. 

Forms

Assessment Cover Sheet

CPPSEC3003A - Determine response to security risk situation
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

CPPSEC3003A - Determine response to security risk situation

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: