NTISthis.com

Evidence Guide: CPPSEC4003A - Advise on security needs

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC4003A - Advise on security needs

What evidence can you provide to prove your understanding of each of the following citeria?

Determine client needs.

  1. Applicable legislative and organisational requirements, and relevant standards for providing security advice are identified and complied with.
  2. Consultative processes are conducted to determine and verify the immediate, short and long term security needs and expectations of the client.
  3. Appropriate communication and interpersonal techniques are used which reflect sensitivity to individual social and cultural differences.
  4. Security risk assessment is undertaken in accordance with organisational procedures.
  5. Existing or potential security issues are identified, anticipated and assessed to determine impact on client requirements.
  6. Specialist resources and sources of information are accessed and assessed as required.
  7. Limitations in determining client needs are recognised and specialist advice is sought as required.
Applicable legislative and organisational requirements, and relevant standards for providing security advice are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consultative processes are conducted to determine and verify the immediate, short and long term security needs and expectations of the client.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate communication and interpersonal techniques are used which reflect sensitivity to individual social and cultural differences.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security risk assessment is undertaken in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Existing or potential security issues are identified, anticipated and assessed to determine impact on client requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Specialist resources and sources of information are accessed and assessed as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Limitations in determining client needs are recognised and specialist advice is sought as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Provide advice.

  1. Business equipment is used to prepare and present advice in required format and style.
  2. Advice contains comprehensive information about available security products and services to meet identified security needs.
  3. Recommendations and alternative options are prioritised and supported by verifiable evidence.
  4. Advice is presented for review in accordance with organisational procedures.
  5. Feedback on suitability and sufficiency of advice is obtained and reviewed for improved future processes.
  6. Information is securely maintained with due regard to client confidentiality.
Business equipment is used to prepare and present advice in required format and style.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice contains comprehensive information about available security products and services to meet identified security needs.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations and alternative options are prioritised and supported by verifiable evidence.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice is presented for review in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feedback on suitability and sufficiency of advice is obtained and reviewed for improved future processes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information is securely maintained with due regard to client confidentiality.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate effectiveness of advice.

  1. Client service delivery is reviewed and evaluated to ensure client needs are satisfied.
  2. Client satisfaction with service delivery is reviewed using verifiable data in accordance with organisational procedures.
  3. Changes necessary to maintain client service standards are identified and recommendations to modify advice are presented to relevant persons.
  4. Industry trends are monitored and options for upgrading client services are presented to relevant persons.
  5. Relevant documentation is completed and processed in accordance with organisational procedures.
Client service delivery is reviewed and evaluated to ensure client needs are satisfied.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Client satisfaction with service delivery is reviewed using verifiable data in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Changes necessary to maintain client service standards are identified and recommendations to modify advice are presented to relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Industry trends are monitored and options for upgrading client services are presented to relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant documentation is completed and processed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately and concisely completing all necessary documentation summarising security requirements and assessed security risk

accurately assessing client security requirements and determining appropriate security options to meet client needs and expectations

monitoring client services, evaluating feedback and modifying services as required

providing and presenting in a suitable format appropriate security recommendations and alternative options to benefit client and organisation

using appropriate security assessment methods to determine client and risk assessment requirements.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

apply active listening

apply safe and efficient work practices

assess security requirements

coaching and mentoring to provide support to colleagues

communicate in a clear and concise manner

comply with relevant legislative and regulatory requirements

enter data using basic keyboarding skills

identify potential security threats to people, property and premises

negotiation

organise work tasks in a methodical manner

prepare and present reports

present a professional image to members of the public and colleagues

prioritise tasks and complete work within designated timeframes

read and interpret plans, designs and specifications

risk assessment

seek feedback and take appropriate action.

Required knowledge

applicable legislation relevant to implementing security services

basic problem solving strategies

basic requirements for installation of security systems

building construction methods and types

duty of care

guidelines for use of force and restraints

interpretation of security systems, including how and where security manpower can be effectively utilised

operational principles of information technology for security systems and equipment

organisational and client confidentiality requirements

principles of AS/NZS 4360: 2004 Risk management and related guidelines

principles of effective communication

relevant industry standards and codes of conduct

reporting procedures and documentation requirements and processes

security risk assessment methods

types and functions of a range of security equipment and systems.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian Standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

Occupational Health and Safety (OHS)

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Relevant standards:

must include AS/NZS 4360: 2004 Risk management

may relate to:

AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises

HB 167:2006 Security Risk Management

HB 436 Risk Management Guidelines - Companion to AS/NZS 4360

HB 231:2000 Information security risk management guidelines.

Client may be:

agent

building supervisor

government and legal instruments or agencies

manager

owner

project manager

property agent

tenant.

Interpersonal techniques may involve:

active listening

being non-judgemental

being respectful and non-discriminatory

constructive feedback

control of tone of voice and body language

culturally aware and sensitive use of language and concepts

demonstrating flexibility and willingness to negotiate

effective verbal and non-verbal communication

maintaining professionalism

providing sufficient time for questions and responses

reflection and summarising

two-way interaction

use of plain English

use of positive, confident and cooperative language.

Social and cultural differencesmay relate to:

age

dress and personal presentation

food

language

religion

social conventions

traditional practices

values and beliefs.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Securityrisksmay relate to:

assault or harm

break-in

burglary

deliberate or accidental damage

pilferage

sabotage

theft

threats of loss, harm or damage to persons or property

trespass

unauthorised access

vandalism.

Client requirementsmay include:

assets and areas to be protected

available security system options

budgetary parameters

conformance with insurance, government or other requirements

property or assets

protection of persons

systems or function requirements.

Business equipment and technology may include:

calculators

facsimile machines

internet

standard commercial computer software and hardware

telephones.

Relevant personsmay include:

client

colleagues

management

manufacturers

other professional or technical staff

security consultants.