|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Occupational Health and Safety (OHS) requirements may relate to: | controlling and minimising risks correct manual handling including shifting, lifting and carrying elimination of hazardous materials and substances identifying hazards safe use and operation of equipment including business technology first aid equipment fire safety equipment personal protective clothing and equipment safety equipment safety procedures for the protection of self and others. |
Legislative requirements may relate to: | Australian standards and quality assurance requirements award and enterprise agreements Compliance Policy Guidelines (CPGs) counter-terrorism general 'duty of care' responsibilities licensing or certification requirements privacy and confidentiality relevant commonwealth, state and territory legislation, codes and national standards for: anti-discrimination cultural and ethnic diversity environmental issues equal employment opportunity industrial relations OHS relevant industry codes of practice telecommunications. |
Organisational requirements may relate to: | access and equity policies, principles and practices business and performance plans client service standards code of conduct, code of ethics communication and reporting procedures complaint and dispute resolution procedures emergency and evacuation procedures employer and employee rights and responsibilities environmental management including waste disposal, recycling and re-use guidelines OHS policies, procedures and programs own role, responsibility and authority personal and professional development privacy and confidentiality of information quality assurance and continuous improvement processes and standards resource parameters and procedures roles, functions and responsibilities of security personnel standard operating procedures storage and disposal of information use and maintenance of equipment and systems. |
Biometric refers to: | a measurable physical characteristic or personal behavioural trait used to recognise the identity or verify the identity of an individual. |
Biometric technologies include: | facial recognition fingerprint recognition hand geometry iris recognition retina recognition signature recognition vein recognition voice recognition. |
Privacy legislation may include: | Commonwealth, State and Territory Privacy Acts national information privacy principles national privacy principles. |
Security safeguards may be: | administrative and include: contingency plans (data back-up, disaster recovery, and emergency mode operation plans) information access management (access authorisation, establishment and modification) security awareness and training (awareness, virus protection, log-in success or failure, password management) security incident procedures (report and response procedures) security management (risk analysis and management) physical and include measures to protect information systems, buildings and equipment from natural and environmental hazards and unauthorised intrusions technical and include: access control (user identification, emergency access procedures, automatic log-off, encryption and decryption) audit control (logging, capturing data versions, times, sessions, workstations, events and user information) transmission security (integrity controls, encryption). |
Threats: | are intentional or unintentional potential events that could compromise the security integrity of physical and technical organisational systems. |
Riskrelates to: | the chance of something happening that will have an impact on objectives. |
Risksmay relate to: | data and information personnel property. |
Communication may be: | face-to-face group interaction in Indigenous languages in languages other than English oral reporting participation in routine meetings reading independently recording of discussions speaking clearly and directly through the use of assistive technology via an interpreter visual or written writing to audience needs. |
Interpersonal techniques may involve: | active listening being non-judgemental being respectful and non-discriminatory constructive feedback control of tone of voice and body language culturally aware and sensitive use of language and concepts demonstrating flexibility and willingness to negotiate effective verbal and non-verbal communication maintaining professionalism providing sufficient time for questions and responses reflection and summarising two-way interaction use of plain English use of positive, confident and cooperative language. |
Social and cultural differencesmay relate to: | dress and personal presentation food language religion social conventions traditional practices values and beliefs. |
Optionsmay relate to: | enrolment advice motivation to verify tolerance for rejected attempts. |
Multiplebiometrics refers to: | a biometric system that integrates two ore more biometric technologies (facial and iris recognition, and multiple instances of a single biometric eg one, two or ten fingerprints). |
Biometric equipment and systems are: | automated systems able to capture a biometric sample from an individual person, extract biometric data from the sample, compare the data with one or more reference templates, determine the quality of a match, and indicate whether or not an identification or verification of identity has been achieved. |
Biometric equipment and systems may include: | acquisition devices: cameras (video, infrared-enabled video, single-image) chip or reader embedded in peripheral device microphones optical scanners biometric servers hardware interconnecting infrastructure software: server-based authentication software for biometric authentication and logging software associated with acquisition devices. |
Resource requirements may include: | computer systems (hardware, software and infrastructure) equipment funding personnel time tools. |
Existing architecturemay include: | desktop PCs local area networks (LANs) mainframe systems servers websites wide area networks (WANs). |
Additional requirementsmay relate to: | integration service requirements and interoperability upgrading or replacing the system or components of the system. |
Feasibilitymay relate to: | economic and schedule feasibility operational feasibility technical feasibility. |
Relevant informationmay include: | assets (resources, data and information) contingency plans implementation issues resource requirements including allocation and location risk and threat assessment outcomes treatment options. |
Appropriate format may include: | formats that cater for those with special needs for example, producing documents in large print. |
Implementation strategy may include: | analysis and comparison of biometrics system options assessment of security risks enrolment processes integration requirement and system interoperability resources necessary for implementation staged rollouts. |
Contingencies may detail: | roles, responsibilities, teams and procedures associated with restoring a security system following a disruption side manual door entry. |
Relevant personsmay include: | biometric technology specialists clients colleagues external consultants information technology specialists manager. |
Records and reports: | may be: computer-based manual other appropriate organisational communication system may detail: biometric technologies and systems organisational security requirements resources requirements risk assessment outcomes technical data and specifications timeframe and financial considerations. |