NTISthis.com

Evidence Guide: CPPSEC4009A - Interpret information from advanced security equipment

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC4009A - Interpret information from advanced security equipment

What evidence can you provide to prove your understanding of each of the following citeria?

Evaluate information.

  1. Applicable provisions of legislative and organisational requirements relevant to receiving security information and data are identified and complied with.
  2. Security systems and equipment are operated and monitored in accordance with manufacturer's instructions.
  3. Data is received from verifiable sources and checked for consistency in accordance with organisational procedures.
  4. Security systems are cross-checked with companion monitoring systems to ensure an accurate and consistent exchange of information.
  5. Information conveyed by security systems is interpreted and evaluated in accordance with organisational procedures.
Applicable provisions of legislative and organisational requirements relevant to receiving security information and data are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security systems and equipment are operated and monitored in accordance with manufacturer's instructions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is received from verifiable sources and checked for consistency in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security systems are cross-checked with companion monitoring systems to ensure an accurate and consistent exchange of information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information conveyed by security systems is interpreted and evaluated in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to situations.

  1. Potential security risk situations are assessed on available information and appropriate response is formulated and implemented in accordance with organisational procedures.
  2. Contingencies and additional resources are anticipated to support a prompt and effective response.
  3. Changing circumstances are identified and variations to response are determined and implemented in accordance with organisational procedures.
  4. Continual exchange of information is maintained with relevant persons.
  5. Requirements for additional support or specialist advice is promptly actioned in accordance with organisational procedures.
Potential security risk situations are assessed on available information and appropriate response is formulated and implemented in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contingencies and additional resources are anticipated to support a prompt and effective response.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Changing circumstances are identified and variations to response are determined and implemented in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Continual exchange of information is maintained with relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Requirements for additional support or specialist advice is promptly actioned in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Control security systems.

  1. Security systems are systematically monitored and tested to ensure performance is maintained within defined operating guidelines.
  2. Preventative and breakdown maintenance arrangements for security systems are confirmed.
  3. Actual or suspected faults or deficiencies in security systems are reported in accordance with organisational procedures.
  4. Back-up procedures are implemented to maintain security and integrity of security systems in accordance with manufacturer's instructions.
  5. Relevant documentation is completed and securely maintained in accordance with organisational procedures.
Security systems are systematically monitored and tested to ensure performance is maintained within defined operating guidelines.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Preventative and breakdown maintenance arrangements for security systems are confirmed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Actual or suspected faults or deficiencies in security systems are reported in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back-up procedures are implemented to maintain security and integrity of security systems in accordance with manufacturer's instructions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant documentation is completed and securely maintained in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

formulating and implementing responses appropriate to the situation based on existing information

varying operational plans as required to meet changing circumstances and information

interpreting and verifying authenticity of conveyed information and carrying out consistent and accurate inputting of data using a standardised style and format

maintaining operational efficiency and effectiveness of security systems and equipment

promptly identifying and arranging remedial actions for actual or suspected faults and malfunctions in security systems and equipment.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

analyse and implement response to information

appreciate different cultural and social practices

back up security systems

coaching and mentoring to provide support to colleagues

communicate in a clear and concise manner when sending and relaying information

comply with relevant legislative and regulatory requirements

estimate and calculate resource and equipment requirements

evaluate and interpret information

identify and diagnose faults or deficiencies in operation of security systems

interpret security codes and alarm signals

operate and maintain a range of security systems and equipment

prepare and present written and computer-based information

prioritise work tasks and maintain schedules.

Required knowledge

appropriate information responses

communication terminology (approved company greeting, call signs, codes, signals, phonetic alphabet)

emergency procedures

local hazards and environmental threats

operational principles and functions of security systems and equipment

principles of effective communication

procedures for finding faults, maintenance and repair of equipment

product knowledge for security systems

relevant legislative provisions including Occupational Health and Safety (OHS) and licensing requirements, evidence, privacy, confidentiality, trespass, use of force, arrest and operational legislation (such as firearms and prohibited weapons)

reporting, documentation requirements and processes

roles and responsibilities of emergency and support services

routine problem solving strategies

security risk assessment methods

systems back-up procedures

verification requirements for assessing authenticity of received information.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

OHS

relevant industry codes of practice

telecommunications

trespass and the removal of persons

use of listening and recording devices

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Security systemsmay include:

acoustic sensors

automatic entrance and exit devices

closed circuit television

electronic field detection systems

fire alarms

infra-red sensors

intelligent building systems

movement detectors

other access control systems

other intruder alarm systems

weighbridge operation

wide angle cameras.

Sourcesmay include:

audio, visual, or digital recording devices

computer data files

local, state and commonwealth government documents and registers

policy statements and media reports

statistical summaries

statutes.

Companion monitoring systemsmay include:

audio, visual, or digital backup recording systems

parallel systems and may be a written record or electrical monitoring systems.

Responsesmay involve:

disciplinary action according to organisational requirements

dispatching field support staff

execution of standard operating procedures for the occurrence of particular events

notifying emergency services

notifying relevant personnel.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Security risks may relate to:

biological hazards

chemical spills

client contact

electrical faults

explosives

financial viability

injury to personnel

noise, light, heat, smoke

persons carrying weapons

persons causing a public nuisance

persons demonstrating suspicious behaviour

persons suffering from emotional or physical distress

persons under the influence of intoxicating substances

persons with criminal intent

persons, vehicles and equipment in unsuitable locations

property or people

security systems

suspicious packages or substances

systems or process failures

terrorism

violence or physical threats.

Relevant personsmay include:

clients

colleagues

emergency services personnel

employer

equipment manufacturer

field staff

supervisor.

Documentationmay include:

activity reports

field notes and security notebooks

incident and accident reports

radio and telephone records

records of conversation

request for assistance forms

running sheets

situation reports

task allocation sheets

written and computer-based information.