Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to:
gain consensus on concepts when disaster recovery plan is submitted to higher authorities for review and sign-off
negotiate with client business area and project team when business critical functions are identified from project documentation
literacy skills to interpret statutory requirements
planning and organisational skills to:
manage logistics for resources and procedures required for disaster recovery
scope project, and plan time, cost, and quality
scope communications, risk analysis and management
research skills to:
follow best practice in system development
specify, analyse and evaluate broad features of a particular business domain.
Required knowledge
backup methodologies
business planning process relevant to the development of IT business solutions
client business domain
disaster recovery plan strategies and components, including:
physical security
system failure, accident or sabotage (hackers)
denial of service
virus attack
cyber attack
telecommunications failure
OHS
legislative and organisational requirements
system's current functionality
systems engineering.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Business critical functions may include: | customer service functions financial systems payroll. |
Documentation may relate to: | audit trails client training International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards maintaining equipment inventory naming standards project management templates and report writing satisfaction reports version control. |
Project team may include: | different businesses working in partnership individual business analysts solution developers and business clients working together third-party solution developers working together. |
Software may include: | commercial in-house packaged or customised software. |
Threats may include: | accident cyber attack denial of service espionage information technology failure sabotage security telecommunications network failure virus attack weather, such as storms and earthquake. |
Systems may include: | application service provider applications databases gateways internet service provider (ISP) operating systems servers. |
Statutory requirements may include: | industry imposed controls and standards legislation, such as Privacy Act laws regarding confidentiality and reporting of data in organisations, such as health and banking. |
Commercial requirements may include: | access to internal network availability backup confidentiality encryption firewalls hacking integrity passwords and logons storage and data recovery. |
Constraints may include: | budget hardware legal constraints policy resource software time. |
Specifications may include: | current system functionality technical requirements user-problem statement. |
Contingency plans will typically: | identify weaknesses and provide for the implementation of a disaster prevention program minimise disruption to business operations provide a coordinated approach to the disaster recovery process vary in format and content detail. |
Appropriate person may include: | authorised business representative client supervisor. |
Standards may include: | ISO, IEC and AS standards organisational standards project standards. |
Cut-over criteria may include: | actual system down time authorisations to cut-over estimate of business impact, including time before system is operational cut-over plan refresher. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist