Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

CPPSEC4004A Mapping and Delivery Guide
Monitor and review security operations

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency CPPSEC4004A - Monitor and review security operations
Description This unit of competency specifies the outcomes required to supervise field staff during the conduct of security operations. It requires the ability to source and apply security information, organise equipment and resources, address operational problems, and evaluate operational effectiveness. This unit may form part of the licensing requirements for persons responsible for supervising security operations in those states and territories where these are regulated activities.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application This unit of competency has application in those work roles involving the supervision of security options in a security environment other than a control room. Competency requires legal and operational knowledge applicable to relevant sectors of the security industry. The knowledge and skills described in this unit are to be applied within relevant legislative and organisational guidelines.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites Not Applicable
Competency Field Security and risk management
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Prepare for security operations.
  • Applicable provisions of legislative and organisational requirements, and relevant standards for the implementation of security operations are identified and complied with.
  • Assignment instructions and relevant information are obtained and reviewed.
  • Security systems and technology required to monitor security operations are confirmed and checked for operational effectiveness.
  • Equipment and resource requirements are determined and organised in accordance with organisational procedures.
  • Communication channels and processes are confirmed with relevant persons.
  • Occupational Health and Safety (OHS) issues are identified and appropriate risk control measures implemented in accordance with organisational requirements.
       
Element: Monitor security operations.
  • Security operations are systematically monitored in accordance with organisational procedures.
  • Security systems and technology are used in accordance with manufacturer's instructions.
  • Factors affecting the achievement of security operations are identified and recommendations for variation to operational plan are confirmed with relevant persons.
  • Requests for assistance are received, confirmed and organised in accordance with organisational procedures.
  • Specialist advice is sought as required in accordance with organisational procedures.
  • Operational information is recorded and reported in accordance with organisational procedures.
       
Element: Review security operations.
  • A process of continual assessment is applied to review and evaluate effectiveness of security operations.
  • Briefings and debriefings are planned, scheduled and conducted in accordance with organisational procedures.
  • Incident observations are provided accurately and constructively and opportunities for improvement are identified to inform future practice.
  • Review findings and recommendations are prepared and presented to relevant persons in accordance with organisational procedures.
  • Presented information uses clear and concise language and meets organisational standards of style, format and accuracy.
  • Relevant documentation is completed and securely maintained in accordance with organisational procedures.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately completing, preparing and presenting documentation related to security operations in a suitable style and format to relevant personnel for review

accurately interpreting, communicating and implementing assignment instructions

identifying problems or issues with operational efficiency and implementing suitable contingency measures

maintaining communication with field staff using established communication channels and equipment

monitoring work of security personnel to ensure the efficiency and effectiveness of security operations is maintained

reviewing and evaluating effectiveness of security operations through a process of continual assessment, feedback and review.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

This section describes the skills and knowledge and their level required for this unit.

Required skills

coaching and mentoring to provide support to colleagues

display team leadership

estimate and calculate resource and equipment requirements

facilitate review and debrief processes

interpret and comply with relevant legislative, regulatory and licensing requirements

interpret security codes and alarm signals and implement responses maintain communication with field staff

maintain effective client and colleague relationships

monitor and manage OHS in the workplace environment

prioritise work tasks and maintain schedules

supervise field staff and security operations.

Required knowledge

applicable provisions of legislation relevant to security operations including OHS and licensing and certification

briefing and debriefing techniques

communication protocols and terminology

emergency and evacuation procedures

operational principles and functions of security technology and equipment

principles of AS/NZS 4360: 2004 Risk management and related guidelines

principles of effective communication and interpersonal techniques

problem-solving strategies

reporting, documentation requirements and processes

security issues and incident management techniques

security risk assessment methods

teamwork principles and strategies

time management principles.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

OHS

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Relevant legislation may include:

Crimes Act 1900

Firearms Act 1996 and Firearms (General) Regulations 1997

general principles of Common Law

Inclosed Lands Protection Act 1901

Law Enforcement (Powers and Responsibilities) Act 2002

Liquor Act 1982

Listening Devices Act 1984

Registered Clubs Act 1976

Security Industry Act 1997 and Regulations 1998

Telecommunications Act

Trade Practices Act

Workplace Surveillance Act 2005.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Relevant standards:

must include AS/NZS 4360: 2004 Risk management

may relate to:

AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises

HB 167:2006 Security Risk Management

HB 436 Risk Management Guidelines - Companion to AS/NZS 4360

HB 231:2000 Information security risk management guidelines.

Assignment instructions may include:

assignment purpose and objective

assignment tasks and procedures

assignment timeframe

client information

incident and security risk response procedures

personal presentation

reporting and documentation requirements

resource and equipment requirements.

Relevant informationmay include:

client competition

core business functions

key stakeholders

nature of client business and type of industry

scale of operations

size of company and number of employees.

Security systems may include:

access control systems

acoustic sensors

automatic entrance and exit devices

biometric devices

electronic field detection systems

infra-red sensors

intelligent building systems

intruder alarm systems

motion sensors

movement detectors.

Equipment and resources may include:

communication equipment:

pager

portable and mounted two-way radio

telephone and mobile phone

defensive equipment:

batons, firearm, and the relevant licenses and permits

maps

pen and security notebook

personal protection equipment

security equipment:

alarms and signals

electronic screening equipment

motion sensors

personal duress alarms

static alarms

video cameras and monitors

security personnel and specialist services

transport.

Communication channels and processesmay include:

direct line supervision paths

established communication protocols

formal communication pathways

lateral supervision paths

organisational communication networks

verbal and non-verbal communication procedures eg pro-words, phonetic alphabet, call signs, coded messages, use of abbreviations, hand signals.

Relevant personsmay include:

clients

colleagues

emergency services personnel and agencies

human resource personnel

management

legal representatives.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Security risks may relate to:

biological hazards

chemical spills

client contact

electrical faults

explosives

financial viability

injury to personnel

noise, light, heat, smoke

persons carrying weapons

persons causing a public nuisance

persons demonstrating suspicious behaviour

persons suffering from emotional or physical distress

persons under the influence of intoxicating substances

persons with criminal intent

persons, vehicles and equipment in unsuitable locations

property or people

security systems

suspicious packages or substances

systems or process failures

terrorism

violence or physical threats.

Monitoringmay be conducted:

using an audio recording device

by camera (eg optical recording device)

electronically and digitally

visually (eg observation).

Factorsmay include:

access to resources and materials

budget constraints

competing work demands

environmental factors (eg time, weather)

technology or equipment breakdowns

unforeseen incidents

workplace environment hazards and risks.

Assistancemay include:

back-up support

explaining and clarifying

problem-solving

providing encouragement

providing feedback

undertaking extra tasks.

Opportunities for improvementmay relate to:

gaps in operational coverage as determined in internal auditing or assessment processes

on-the-job instruction

operational effectiveness assessment

organisational assessment and evaluations provision of learning opportunities

relevant organisational changes such as need to alter policies or procedures

structured feedback.

Documentationmay include:

activity reports

field notes

incident reports

radio and telephone communication records

request for assistance forms

security logs

shift reference files

vehicle and personnel movements.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Applicable provisions of legislative and organisational requirements, and relevant standards for the implementation of security operations are identified and complied with. 
Assignment instructions and relevant information are obtained and reviewed. 
Security systems and technology required to monitor security operations are confirmed and checked for operational effectiveness. 
Equipment and resource requirements are determined and organised in accordance with organisational procedures. 
Communication channels and processes are confirmed with relevant persons. 
Occupational Health and Safety (OHS) issues are identified and appropriate risk control measures implemented in accordance with organisational requirements. 
Security operations are systematically monitored in accordance with organisational procedures. 
Security systems and technology are used in accordance with manufacturer's instructions. 
Factors affecting the achievement of security operations are identified and recommendations for variation to operational plan are confirmed with relevant persons. 
Requests for assistance are received, confirmed and organised in accordance with organisational procedures. 
Specialist advice is sought as required in accordance with organisational procedures. 
Operational information is recorded and reported in accordance with organisational procedures. 
A process of continual assessment is applied to review and evaluate effectiveness of security operations. 
Briefings and debriefings are planned, scheduled and conducted in accordance with organisational procedures. 
Incident observations are provided accurately and constructively and opportunities for improvement are identified to inform future practice. 
Review findings and recommendations are prepared and presented to relevant persons in accordance with organisational procedures. 
Presented information uses clear and concise language and meets organisational standards of style, format and accuracy. 
Relevant documentation is completed and securely maintained in accordance with organisational procedures. 

Forms

Assessment Cover Sheet

CPPSEC4004A - Monitor and review security operations
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

CPPSEC4004A - Monitor and review security operations

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: