NTISthis.com

Evidence Guide: CPPSEC3018A - Provide for the safety of persons at risk

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC3018A - Provide for the safety of persons at risk

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare for security assignment.

  1. Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.
  2. Assignment instructions and other relevant information is clarified as required with relevant persons.
  3. Resource and equipment requirements are confirmed and organised in accordance with organisational procedures.
  4. Route and site assessment is undertaken in accordance with organisational procedures.
  5. Equipment is checked for operational effectiveness and faulty or damaged equipment is reported in accordance with organisational procedures.
  6. Personal dress and presentation is maintained to professional standards at all times.
  7. Communication channels and processes are confirmed with relevant persons in accordance with organisational procedures.
Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assignment instructions and other relevant information is clarified as required with relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Resource and equipment requirements are confirmed and organised in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Route and site assessment is undertaken in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Equipment is checked for operational effectiveness and faulty or damaged equipment is reported in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Personal dress and presentation is maintained to professional standards at all times.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Communication channels and processes are confirmed with relevant persons in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and maintain safety of VIPs.

  1. Security procedures are conducted and confirmed in accordance with assignment instructions.
  2. Security operations are continually monitored and adjusted as required to maintain maximum security.
  3. Communication is maintained continually throughout security operations in accordance with assignment instructions and organisational procedures.
  4. Interpersonal techniques are used which reflect an awareness of individual social and cultural differences.
  5. Potential security risk situations are identified, risk assessed and responded to within own scope of responsibility and competence.
  6. VIPs are advised of all factors which may affect their personal safety in accordance with organisational procedures.
  7. Need for extra assistance or advice is promptly identified and sought from relevant persons in accordance with organisational procedures.
Security procedures are conducted and confirmed in accordance with assignment instructions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security operations are continually monitored and adjusted as required to maintain maximum security.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Communication is maintained continually throughout security operations in accordance with assignment instructions and organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Interpersonal techniques are used which reflect an awareness of individual social and cultural differences.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Potential security risk situations are identified, risk assessed and responded to within own scope of responsibility and competence.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

VIPs are advised of all factors which may affect their personal safety in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Need for extra assistance or advice is promptly identified and sought from relevant persons in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review and evaluate security operations.

  1. A process of continual assessment is applied to review and evaluate the efficiency and effectiveness of security operations.
  2. Reports and relevant documentation are prepared in a timely manner presenting all relevant facts and information in accordance with organisational procedures.
  3. Incident observations are provided accurately and constructively and opportunities for improvement are identified.
  4. Security operations are reviewed and written findings and recommendations are provided to inform future practice.
A process of continual assessment is applied to review and evaluate the efficiency and effectiveness of security operations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Reports and relevant documentation are prepared in a timely manner presenting all relevant facts and information in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Incident observations are provided accurately and constructively and opportunities for improvement are identified.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security operations are reviewed and written findings and recommendations are provided to inform future practice.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately assessing assignment needs and instructions and determining approaches and resources to be applied

accurately identifying and assessing factors which might impact on the safety and security of VIPs and formulating and implementing appropriate responses

reviewing and evaluating security operations through a process of continual assessment, feedback and exchange of information with relevant personnel

systematically monitoring security activities and varying operational plans as required to meet changing circumstances.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

assess client security requirements

communicate effectively with people from different social, cultural and ethnic backgrounds and of varying physical and mental abilities

communicate using appropriate channels and clear and concise language

determine response appropriate to security risk situation

escort persons

estimate and calculate resource and equipment requirements

identify and comply with applicable legal and procedural requirements including licensing requirements

identify and comply with security incident response procedures

identify potential security threats and the likely source of risks

identify support and assistance requirements

operate security and communications equipment

present a professional image to members of the public and colleagues

record, report and document information

select and use appropriate personal protection equipment

use negotiation techniques to defuse and resolve conflict.

Required knowledge

client confidentiality requirements

communication channels, codes and signals

emergency and evacuation procedures

escort procedures

first aid procedures and their application

instructions and procedures for responding to security risk situations

legal provisions relating to 'use of force' guidelines

limits of own responsibility and authority

observation and monitoring techniques

operational functions and procedures for the use of communications, security and personal protection equipment

principles of effective communication including interpersonal techniques

procedures and requirements for documenting security incidents

reporting structure and processes

security incidents and appropriate responses

security risk assessment methods.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

Occupational Health and Safety (OHS)

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructions may include:

assignment purpose and objective

assignment tasks and procedures

assignment timeframe

client identification information

incident and security risk response procedures

personal presentation requirements

personal protection equipment

premises location and layout

reporting and documentation requirements

resource and equipment requirements

travel routes and schedules.

Relevant personsmay include:

clients

colleagues

emergency services personnel and agencies

security personnel

supervisor.

Resources and equipment may include:

communications equipment:

earpiece

pager

portable and mounted two-way radio

telephone and mobile phone

maps

pen and security notebook

personal protection equipment

security equipment:

electronic screening equipment

video cameras and monitors

security personnel and specialist services

transport.

Communication channels and processes may relate to:

direct line supervision paths

established communication protocols

formal communication pathways

lateral supervision paths

organisational communication networks

verbal and non-verbal communication procedures eg pro-words, phonetic alphabet, call signs, coded messages, use of abbreviations, hand signals.

Security proceduresmay include:

appropriate positioning of relevant persons

communication of 'need to know' information to relevant persons

escort procedures

establishment and guarding of 'no go zones'

establishment of communication strategies

installation and operation of surveillance and communication equipment

issuance of ID cards for relevant persons

keying off lifts

negotiation and communication with VIPs own security staff

search of premises

security checks of relevant persons

setting up a central 'command post'.

Interpersonal techniques may involve:

active listening

being non-judgemental

being respectful and non-discriminatory

constructive feedback

control of tone of voice and body language

culturally aware and sensitive use of language and concepts

demonstrating flexibility and willingness to negotiate

effective verbal and non-verbal communication

maintaining professionalism

providing sufficient time for questions and responses

reflection and summarising

two-way interaction

use of plain English

use of positive, confident and cooperative language.

Social and cultural differencesmay relate to:

dress and personal presentation

food

language

religion

social conventions

traditional practices

values and beliefs.

Security risksmay relate to:

breaches of law eg criminal damage, offences against people, public order, misuse of drugs and alcohol

emergencies eg fire, scenes of crime, accidents

hazards eg physical, chemical, electrical, psychological, biological

threats eg bombs, sabotage, kidnap, assassination.

Responsemay involve:

defusing the situation

evacuating the premises

isolating area of potential risk

isolating risk

notifying relevant emergency services agencies

provision of first aid

request for support and assistance

restraint of person

tactical withdrawal

use of basic defensive techniques

use of negotiation techniques.

Assessmentmay include:

review to specifications and other documentation within organisational and industry policy guidelines

competency assessment for recording purposes.

Documentationmay include:

activity logs

incident reports

request for assistance forms

security risk and incident details

vehicle and personnel movements

written and electronic reports.