NTISthis.com

Evidence Guide: CPPSEC2018A - Monitor electronic reporting facility

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC2018A - Monitor electronic reporting facility

What evidence can you provide to prove your understanding of each of the following citeria?

Monitor and maintain electronic security systems.

  1. Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.
  2. Security systems are systematically monitored and tested to ensure performance is maintained within defined operating guidelines.
  3. Actual or suspected faults or deficiencies in security systems are reported in accordance with organisational procedures.
  4. Preventative and breakdown maintenance arrangements for security systems are confirmed with relevant persons.
  5. Back-up procedures to maintain security and integrity of security systems are implemented in accordance with organisational procedures.
  6. Safe workplace practices are identified and complied with in accordance with Occupational Health and Safety (OHS) requirements.
Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security systems are systematically monitored and tested to ensure performance is maintained within defined operating guidelines.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Actual or suspected faults or deficiencies in security systems are reported in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Preventative and breakdown maintenance arrangements for security systems are confirmed with relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back-up procedures to maintain security and integrity of security systems are implemented in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Safe workplace practices are identified and complied with in accordance with Occupational Health and Safety (OHS) requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Process and organise data.

  1. Data is received, interpreted and processed in accordance with organisational procedures.
  2. Data is entered, checked for accuracy and processed in accordance with organisational procedures.
  3. Processed data is securely stored in accordance with organisational procedures.
  4. Processing errors and deficiencies are identified and reported in accordance with organisational procedures.
Data is received, interpreted and processed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is entered, checked for accuracy and processed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Processed data is securely stored in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Processing errors and deficiencies are identified and reported in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to incident.

  1. Security incidents are assessed on reported information for degree of risk to persons, property and premises.
  2. Appropriate response is formulated and implemented in accordance with organisational procedures.
  3. Regular and systematic checks are made with field staff and situations requiring assistance are reported in accordance with organisational procedures.
  4. Communication channels and processes are used to maintain a continual exchange of information with field staff.
  5. Relevant documentation is accurately completed and securely maintained with due regard to confidentiality in accordance with organisational procedures.
Security incidents are assessed on reported information for degree of risk to persons, property and premises.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate response is formulated and implemented in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Regular and systematic checks are made with field staff and situations requiring assistance are reported in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Communication channels and processes are used to maintain a continual exchange of information with field staff.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant documentation is accurately completed and securely maintained with due regard to confidentiality in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

identifying monitoring functions and capabilities of electronic security systems

monitoring and maintaining security systems and carrying out routine maintenance

identifying and rectifying faults and errors

inputting data and confirming accuracy

conducting testing to confirm operational performance of security systems

determining appropriate response procedures from accurate interpretation of data.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Demonstration, oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

active listening

communicate in a clear and concise manner using appropriate terminology

communication skills to accurately enter, receive, interpret and transmit data

communication to engage with minority groups (eg young people, old people, people with an addiction or disability, Indigenous Australians, people from Culturally and Linguistically Diverse (CALD) backgrounds)

identify faults and errors and omissions in the operation of security systems and implement appropriate remedial action

implement response procedures appropriate to reported security incident

monitor and maintain basic security systems

read and interpret technical data and specifications

test security systems for operational performance.

Required knowledge

approved communication terminology, codes and signals

common security system faults

communication channels and processes

monitor and interpret received data

operational and performance testing procedures for security systems

phonetic alphabet

range of security incident situations

reporting and documentation procedures

routine maintenance procedures

security response procedures

types, functions and operational requirements of security systems.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

Australian standards and quality assurance requirements

general 'duty of care' responsibilities

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

OHS

relevant industry codes of practice

telecommunications

trespass and the removal of persons.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructions may include:

assignment tasks

GPRS monitoring

GSM monitoring

IT monitoring

medical monitoring

radio monitoring

incident and security risk response procedures

monitoring centre door policy

monitoring centre premise alarm policy

monitoring centre time clock policy

personal presentation requirements

personal protection equipment

reporting and documentation requirements

resource and equipment requirements

standing instructions

subsequent or further alarms.

Security systems may include:

alarms and signals

access control systems

alarm actioning sequence

biometric devices

break and enter reporting

business equipment

communications equipment

computers and networked systems

electronic screening equipment

key register

motion sensors

patrol, static guard and foot patrols

personal and asset tracking signals

personal duress and hold up alarms

shutters

slow open or close alarms

static alarms

system alarms

time management alarms

traffic display

video cameras and monitors.

Faultsmay include:

equipment and systems break-down

power failure

programming faults

reporting problems.

Relevant personsmay include:

clients

colleagues

security system manufacturers

supervisors

technical personnel.

Data may bestored:

by hard copies of computer generated documents

by hard copies of customer generated documents

in directories and sub-directories

on back-up systems

on CDs and DVDs

on hard and floppy disk drives.

Responsemay include:

dispatching field support staff

notifying emergency services

notifying relevant personnel.

Communication channels and processes may relate to:

direct line supervision paths

established communication protocols

formal communication pathways

lateral supervision paths

organisational communication networks

verbal and non-verbal communication procedures eg pro-words, phonetic alphabet, call signs, coded messages, use of abbreviations, hand signals.

Documentationmay include:

activity logs

radio and telephone records

records of conversation

running sheets

security logs

security systems faults and diagnosis

situation reports

testing and inspection results

written and computer-based reports.