NTISthis.com

Evidence Guide: DEFEO008 - Folllow security procedures

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

DEFEO008 - Folllow security procedures

What evidence can you provide to prove your understanding of each of the following citeria?

Maintain security of goods and cargo

  1. Where applicable, goods and cargo are secured within specified locations, transport vehicles, vessels or aircraft.
  2. Seals, tamper proof packaging, locks and other security measures on goods or cargo are checked and maintained.
  3. Signs of pillaging, theft and interference are recognised and reported.
  4. Signs of suspicious goods and cargo are recognised and reported promptly to designated personnel.
  5. Any breaches of security requirements are reported promptly to designated personnel.
Where applicable, goods and cargo are secured within specified locations, transport vehicles, vessels or aircraft.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Seals, tamper proof packaging, locks and other security measures on goods or cargo are checked and maintained.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Signs of pillaging, theft and interference are recognised and reported.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Signs of suspicious goods and cargo are recognised and reported promptly to designated personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Any breaches of security requirements are reported promptly to designated personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain security of workplace personnel and visitors

  1. Where applicable, security checks of workplace personnel and visitors are carried out.
  2. Precautions and measures aimed at protecting the security of workplace personnel and visitors are followed.
  3. Signs of security threats are recognised and investigated.
  4. Signs of suspicious behaviour of other personnel are recognised and reported promptly to designated personnel.
  5. Any breaches of security requirements for workplace personnel and visitors are reported promptly to designated personnel.
Where applicable, security checks of workplace personnel and visitors are carried out.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Precautions and measures aimed at protecting the security of workplace personnel and visitors are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Signs of security threats are recognised and investigated.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Signs of suspicious behaviour of other personnel are recognised and reported promptly to designated personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Any breaches of security requirements for workplace personnel and visitors are reported promptly to designated personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify a security threat or situation

  1. Security threat or situation is promptly identified and assessed and response is prioritised.
  2. Implications of the security threat or situation are evaluated.
  3. Relevant personnel are alerted to the security threat or situation as required.
  4. Communications are maintained with relevant personnel to.
Security threat or situation is promptly identified and assessed and response is prioritised.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implications of the security threat or situation are evaluated.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant personnel are alerted to the security threat or situation as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Communications are maintained with relevant personnel to.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to a security threat or situation

  1. Identified security threat or situation is responded to.
  2. Security threats or incidents are handled appropriately in accordance with established response plan and within limits of responsibility and duty of care.
  3. Assistance is provided in controlling the site both prior to and following arrival of security and/or emergency services.
  4. In the case of a security threat or emergency, assistance is provided to other staff and emergency services personnel conducting an initial survey of the scene.
  5. Directions of the controlling security/emergency authority are followed and all possible assistance is provided in response to those directions.
Identified security threat or situation is responded to.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security threats or incidents are handled appropriately in accordance with established response plan and within limits of responsibility and duty of care.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assistance is provided in controlling the site both prior to and following arrival of security and/or emergency services.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

In the case of a security threat or emergency, assistance is provided to other staff and emergency services personnel conducting an initial survey of the scene.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Directions of the controlling security/emergency authority are followed and all possible assistance is provided in response to those directions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain security records

  1. Records of security checks and precautions are maintained.
  2. Reports of security incidents or threats are completed.
Records of security checks and precautions are maintained.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Reports of security incidents or threats are completed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the Performance Criteria, Required Skills and Knowledge, the Range Statement and the Assessment Guidelines for this Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Assessment must confirm the ability to apply security procedures within an explosive ordnance workplace.

Consistency in performance

Competency should be demonstrated in a range of actual or simulated workplace security contexts.

Context of and specific resources for assessment

Context of assessment

Competency should be assessed in the workplace or in a simulated work environment, in accordance with all relevant legislation and organisational requirements.

Specific resources for assessment

Access is required to:

a range of relevant exercises, case studies and other simulated practical and knowledge assessment, and/or

an appropriate range of relevant operational situations in the workplace

relevant and appropriate materials and/or equipment, and/or

applicable documentation including workplace procedures, regulations, codes of practice and operation manuals

Required Skills and Knowledge

This describes the essential skills and knowledge and their level, required for this unit.

Required Skills

apply explosive ordnance design principles

read, access, interpret and apply technical instructions

conduct risk and hazard assessment

assess explosive ordnance for transportation

apply operational safety

conduct research

analyse data

communicate orally and in writing

conduct liaison

maintain complex documentation

Required Knowledge

theory of explosive ordnance design

characteristics and limitations of explosive ordnance

explosive ordnance chemistry

explosive ordnance physics

explosive ordnance materials and structures

risk and hazard assessment

analysis techniques

research techniques

documentation requirements

security requirements

operational safety

Range Statement

The Range Statement relates to the Unit of Competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording in the Performance Criteria is detailed below.

Designated personnel may include:

management

security staff

supervisors

Communication may include:

electronic data transfer (EDI)

email

fax

internet

oral, aural or signed communications

phone

radio