Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

MEM20014A Mapping and Delivery Guide
Perform a site security survey

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency MEM20014A - Perform a site security survey
Description This unit covers examining and assessing security requirements across commercial, industrial and domestic applications. This unit has been modified from Unit PRSTS301 Identify technical security requirements in the (PRS03) Asset Security Training Package endorsed 19/03/2003.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application This unit requires the ability to source relevant information, establish security risk and use appropriate assessment methods to ensure an accurate determination of security equipment/system options to meet client needs.Where estimates and quotes are required, Unit PRSTS317 (Provide estimate and quote) should also be selected.Band: AUnit Weight: 2
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites
Competency Field Locksmithing
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Prepare to assess security requirements
  • Job requirements are reviewed and clarified with appropriate person(s) in accordance with organisational requirements.
  • Discussions with customer are conducted to establish actual and potential security risks and clarify scope of work.
  • Effective interpersonal techniques are applied when interacting.
  • Site access and specific site requirements are identified and appropriate arrangements are made as required in accordance with client and organisational requirements.
  • Personal limitations in assessing security requirements are identified and assistance is sought from appropriate person(s), in accordance with organisational procedures.
       
Element: Assess security requirements
  • Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements.
  • Information is gathered from identified sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements.
  • A site assessment is carried out where possible to facilitate an accurate determination of security requirements.
  • Client assets, activities and existing security arrangements are reviewed to assess the level and range of security risk to client operations.
  • Weak points, risk areas and environmental factors affecting the security risk of the site are identified and assessed in accordance with organisational procedures.
       
Element: Document security assessment
  • Information is recorded and stored in accordance with manufacturer specifications and organisational procedures.
  • A comprehensive assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s).
  • A security survey is prepared in accordance with industry and organisational standards of style, format and accuracy.
  • Recommendations for security equipment/systems and alternative options are made in accordance with organisational requirements.
  • Documentation is processed in accordance with legislative, assignment and organisational requirements.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

A person who demonstrates competency in this unit must be able to examine and assess technical security requirements.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Assessors must be satisfied that the candidate can competently and consistently perform all elements of the unit as specified by the criteria, including required knowledge, and be capable of applying the competency in new and different situations and contexts.

Context of and specific resources for assessment

This unit may be assessed on the job, off the job or a combination of both on and off the job. Where assessment occurs off the job, that is the candidate is not in productive work, then an appropriate simulation must be used where the range of conditions reflects realistic workplace situations. The competencies covered by this unit would be demonstrated by an individual working alone or as part of a team. The assessment environment should not disadvantage the candidate.

This unit could be assessed in conjunction with any other units addressing the safety, quality, communication, materials handling, recording and reporting associated with assessing technical security requirements, or other units requiring the exercise of the skills and knowledge covered by this unit.

Method of assessment

Assessors should gather a range of evidence that is valid, sufficient, current and authentic. Evidence can be gathered through a variety of ways including direct observation, supervisor's reports, project work, samples and questioning. Questioning techniques should not require language, literacy and numeracy skills beyond those required in this unit of competency. The candidate must have access to all tools, equipment, materials and documentation required. The candidate must be permitted to refer to any relevant workplace procedures, product and manufacturing specifications, codes, standards, manuals and reference materials.

Guidance information for assessment


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

Look for evidence that confirms skills in:

identifying security threats to people, property and premises

observing and assessing technical security requirements

reading and interpreting plans, designs and specifications

applying basic numeracy techniques

applying safe and efficient work practices

communicating in a clear and concise manner

relating to people from different social and cultural backgrounds

presenting a professional image

preparing documentation

planning and sequencing work tasks

entering data using basic keyboarding skills

Required knowledge

Look for evidence that confirms knowledge of:

risk assessment methods and procedures

available security equipment/system options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Job requirements

Instructions from supervisor/management, work schedules and completion dates, specific client requirements, site requirements, security clearance and access requirements, reporting and documentation requirements, budget allocations, associated legislation BCA, fire regulations

Appropriate person(s)

Clients, site managers, project managers, engineers and technicians, technical experts, line managers/supervisors, colleagues, regulatory personnel, security consultants

Organisational requirements

Legal and organisational operational policies and procedures, operations manuals, induction and training materials, insurance policy agreements, client and organisational confidentiality requirements, organisational goals/objectives/plans/systems/ processes, employer and employee rights and responsibilities, own role, responsibility and delegation, quality and continuous improvement processes and standards, client service standards, defined resource parameters, OHS policies/procedures/programs, emergency and evacuation procedures, duty of care, code of conduct, code of ethics, access and equity policy, principles and practice, records and information systems and processes, communication channels and reporting procedures

Customer

Owner, property/other agent, tenant, building supervisor, manager, project manager, government and legal instruments/agencies

Scope of work

Personal protection, access requirements, property or assets, conformance with insurance, legislative or other requirements

Interpersonal techniques

Verbal or non-verbal language, two-way interaction, constructive feedback, active listening, questioning to clarify and confirm understanding, interpreting non-verbal and verbal messages, observation techniques, use of positive, confident and co-operative language, control of tone of voice and body language, use of language and concepts appropriate to cultural differences, use of clear presentations of options and consequences, demonstrating flexibility and willingness to compromise

Site access and specific site requirements

May relate to access and egress points, time of access, access codes, keys, passes, security clearances, union requirements, OHS requirements, building codes and regulations, heritage listings, noise control

Assessment may involve

Discussions with client, visual inspections, review of client floor plans and supporting documentation, questioning police/insurance companies/other bodies

Applicable legislation, codes and national standards

Relevant Commonwealth/State/Territory legislation which affect organisational operation: occupational health and safety, environmental issues, equal employment opportunity, industrial relations, anti-discrimination and diversity, licensing arrangements, Australian standards, quality assurance and certification requirements, relevant industry codes of practice, trade practices, award and enterprise agreements, privacy related legislation

Information

Value or importance of assets, insurance policy agreements, special rooms or areas requiring higher level of protection, current/proposed operating environments, assets and systems, activities and functions, existing security systems/equipment, existing management strategies, business and operational plans, incident history

Site assessment

Type and condition of building structures, identification of risk areas/weak points, site restrictions, regulations and requirements, access and egress patterns, floor plan, existing security equipment/systems

Security risks

Vandalism, sabotage, trespass, break-in, burglary, assault or harm, unauthorised access, theft, pilferage, deliberate/accidental damage

Weak points and risk areas

Unsecured windows, entry points screened from public view, external doors without deadlocks or with hinges opening outward, flimsy building materials, client habits (e.g. doors left unlocked)

Environmental factors

Adequacy of street lighting, traffic flow, neighbourhood crime rating, proximity of other buildings

Security equipment and systems

Detection devices, audible/visual warning devices, cameras, monitors and control equipment, control panels, intercoms, wireless equipment, car alarms, electronic readers, electronic recognition controls, locks and locking systems, grills, lighting, boom gates, turnstiles, bank pop-up screens, smoke detection devices, electric/mechanical fire safety and fire locking systems, power supplies, batteries, security doors and door controls

Security systems

Electronic, mechanical, computerised, procedural

Documentation

Checklists, reports, floor plans, client briefs, specifications, schedules, site survey

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Job requirements are reviewed and clarified with appropriate person(s) in accordance with organisational requirements. 
Discussions with customer are conducted to establish actual and potential security risks and clarify scope of work. 
Effective interpersonal techniques are applied when interacting. 
Site access and specific site requirements are identified and appropriate arrangements are made as required in accordance with client and organisational requirements. 
Personal limitations in assessing security requirements are identified and assistance is sought from appropriate person(s), in accordance with organisational procedures. 
Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements. 
Information is gathered from identified sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements. 
A site assessment is carried out where possible to facilitate an accurate determination of security requirements. 
Client assets, activities and existing security arrangements are reviewed to assess the level and range of security risk to client operations. 
Weak points, risk areas and environmental factors affecting the security risk of the site are identified and assessed in accordance with organisational procedures. 
Information is recorded and stored in accordance with manufacturer specifications and organisational procedures. 
A comprehensive assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s). 
A security survey is prepared in accordance with industry and organisational standards of style, format and accuracy. 
Recommendations for security equipment/systems and alternative options are made in accordance with organisational requirements. 
Documentation is processed in accordance with legislative, assignment and organisational requirements. 

Forms

Assessment Cover Sheet

MEM20014A - Perform a site security survey
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

MEM20014A - Perform a site security survey

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: