|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Interpersonal techniquesmay include: | active listening being respectful and non-discriminatory to others control of tone of voice and body language demonstrating flexibility and willingness to negotiate interpreting non-verbal and verbal messages maintaining professionalism providing and receiving constructive feedback questioning to clarify and confirm understanding two-way communication use of communication appropriate to cultural differences use of positive, confident and cooperative language. |
Security servicesmay include: | control room monitoring controlling exit from and access to premises crowd control escorting people or property guarding monitoring of people, premises or property screening of people or items static or mobile patrol. |
Security systems may be: | alarms biometric computerised electronic mechanical personal. |
Legislative requirementsmay relate to: | applicable commonwealth, state and territory legislation which affects security work such as: workplace safety environmental issues equal employment opportunity industrial relations anti-discrimination and diversity Australian standards and quality assurance award and enterprise agreements evidence collection freedom of information licensing arrangements and certification requirements privacy requirements relevant industry codes of practice telecommunications trade practices use of force. |
Organisational requirementsmay relate to: | access and equity policies, principles and practices business and performance plans client service standards code of conduct, code of ethics communication and reporting procedures complaint and dispute resolution procedures emergency and evacuation procedures employer and employee rights and responsibilities Occupational Health and Safety (OHS) policies, procedures and programs own role, responsibility and authority personal and professional development privacy and confidentiality of information quality assurance and continuous improvement processes and standards resource parameters and procedures roles, functions and responsibilities of security personnel storage and disposal of information. |
Personal limitationsmay relate to: | being unsure of best method to complete task compliance with OHS requirements current competence level difficulties in meeting timelines inability to fulfil own role and responsibilities licensing requirements technical expertise understanding of assignment instructions understanding of legal requirements. |
Relevant personsmay include: | client colleagues emergency personnel legal representatives security consultant supervisor technical security experts. |
Client service may relate to: | dealing with conflict efficient use of resources handling and recording complaints meeting agreed timelines meeting allocated duties and responsibilities meeting budget and agreed costs professionalism and conduct regular communication and reporting. |
Assignment instructionsmay relate to: | assignment objectives and timeframes back-up client identification and information details communication equipment and procedures instructions from client, supervisor or colleagues legislative requirements relating to work tasks OHS including use of personal protective equipment resource and equipment needs site layout including access points use of force use of workplace documentation verbal and non-verbal reporting work schedules including budget work tasks and procedures. |
Special requirementsmay relate to: | control of exit from and access to premises crowd control emergency security services escort of people and property non-routine information or service provision screening of property and people urgent requests. |
Reportingmay include: | completing documentation such as logs, journals and activity reports completing police reports completing written and computer reports contacting designated personnel recording security risk and incident details requesting security assistance verbal reporting to client or supervisor. |
Verifiable evidencemay include: | auditable documentation and reports client satisfaction questionnaire feedback from lapsed clients quality assurance data records of complaints and actions taken for resolution. |