The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Apply the principles of confidentiality, privacy and security in own work.
|
|
Applicable Occupational Health and Safety (OHS), legislative and organisational requirements relevant to maintaining a biometric database is complied with. Completed |
Evidence:
|
Relevant privacy legislation and codes of ethics relevant to the workplace application of biometric technology are accessed and interpreted. Completed |
Evidence:
|
Privacy and confidentiality of client data and information, verbal and written, is securely maintained in accordance with legislative and organisational requirements. Completed |
Evidence:
|
Potential confidentiality issues are promptly identified and clarified as required with relevant persons. Completed |
Evidence:
|
Effective communication and interpersonal techniques are used that reflect sensitivity to individual social and cultural differences. Completed |
Evidence:
|
Manage database security and access.
|
|
Database security and access arrangements are implemented and maintained in accordance with legislative and organisational requirements. Completed |
Evidence:
|
Processes are implemented and monitored to ensure data and information is accessed by authorised personnel. Completed |
Evidence:
|
Processes are established to monitor and maintain the quality and integrity of data and information retained on the database. Completed |
Evidence:
|
Processes are established and maintained for the routine monitoring of the network server and computer system for security breaches. Completed |
Evidence:
|
Procedures for the safe storage and protection of data and information are implemented and maintained. Completed |
Evidence:
|
Maintain database.
|
|
Biometric equipment and systems performance history is accessed and assessed and faults or breaches of security are promptly identified. Completed |
Evidence:
|
Database is identified and relevant software and hardware installed as required in accordance with manufacturer's specifications. Completed |
Evidence:
|
Relevant information regarding software and hardware maintenance is accessed and reviewed as required. Completed |
Evidence:
|
Enrolment procedures are conducted in a systematic manner to ensure accuracy and currency of data. Completed |
Evidence:
|
Virus protection is checked and updated as required to ensure continuous integrity and protection of data. Completed |
Evidence:
|
Database backup procedures are appropriate for type and method of data storage and maintained in accordance with established housekeeping procedures. Completed |
Evidence:
|
Monitor database performance problems.
|
|
Operational performance-based biometric testing and reporting requirements are established and conducted in accordance with organisational requirements. Completed |
Evidence:
|
Performance problems are identified and recorded. Completed |
Evidence:
|
Appropriate database performance diagnostic tool is identified and used in accordance with manufacturer's specifications. Completed |
Evidence:
|
Appropriate fixes are undertaken based on diagnostic results in consultation with appropriate personnel. Completed |
Evidence:
|
Complex faults outside area of responsibility or competence are reported for specialist assistance. Completed |
Evidence:
|
Compile reports.
|
|
Results of maintenance operations are accurately and clearly recorded in accordance with workplace procedures. Completed |
Evidence:
|
Maintenance operations are reviewed and procedures to improve effectiveness confirmed in consultation with appropriate personnel. Completed |
Evidence:
|
Reports are prepared using appropriate formats and presentation methods in accordance with organisational requirements. Completed |
Evidence:
|
Reports are produced based on gathered data and reviewed and checked for accuracy. Completed |
Evidence:
|
Records and reports are securely maintained in accordance with legislative and organisational requirements. Completed |
Evidence:
|