NTISthis.com

Evidence Guide: DEFIN003A - Edit intelligence material for security purposes

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

DEFIN003A - Edit intelligence material for security purposes

What evidence can you provide to prove your understanding of each of the following citeria?

Conduct source and method protection risk assessment

  1. Sensitivity of the information is determined and documented in accordance with standard procedures
  2. Standard procedures for security of intelligence material are accessed and used throughout the editorial process
  3. Information that requires source and/or method protection is identified in accordance with standard procedures so that suitable risk control measures may be applied
  4. Risk of potential security compromise on release of intelligence material is assessed and documented in accordance with standard procedures
  5. Risk control measures are confirmed with appropriate authorities
  6. Legal requirements for activities are identified and applied during the process
Sensitivity of the information is determined and documented in accordance with standard procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Standard procedures for security of intelligence material are accessed and used throughout the editorial process

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information that requires source and/or method protection is identified in accordance with standard procedures so that suitable risk control measures may be applied

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risk of potential security compromise on release of intelligence material is assessed and documented in accordance with standard procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risk control measures are confirmed with appropriate authorities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Legal requirements for activities are identified and applied during the process

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Edit intelligence material to achieve security criteria

  1. Intelligence material is edited to remove identified risks and non-essential information
  2. Edited material is reviewed to confirm that it meets security criteria, in accordance with standard procedures
  3. Edited material is released in accordance with standard procedures
  4. Stakeholder requirements for intelligence material are considered
Intelligence material is edited to remove identified risks and non-essential information

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Edited material is reviewed to confirm that it meets security criteria, in accordance with standard procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Edited material is released in accordance with standard procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Stakeholder requirements for intelligence material are considered

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Nil

Consistency in performance

Competence should be demonstrated over time and should be observed in a range of actual or simulated work contexts

Context of and specific resources for assessment

Context of assessment

Competency should be assessed in the workplace or in a simulated workplace environment.

Specific resources for assessment

Access is required to:

workplace documentation

suitable material available for editing

Required Skills and Knowledge

This describes the essential skills and knowledge and their level, required for this unit.

Required Skills

maintain security

manage own professional performance

operate computer packages

present logical and structured arguments

write reports

work as part of a team

work independently

Required Knowledge

data storage systems

databases

evaluation criteria

intelligence assessments and reports

intelligence community

legal responsibilities

organisational operational considerations

relevant legislation and procedures in relation to environmental requirements and Rules of Engagement

relevant work health and safety (WHS) regulations/requirements, equipment, material and personal safety requirements

risk assessment techniques

security of classified information

workplace communication strategies

workplace equity and diversity

workplace safety procedures

Range Statement

The Range Statement relates to the Unit of Competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording in the Performance Criteria is detailed below.

Standard procedures may include:

Australian Quality Training Framework

Australian Standards

Defence instructions

Doctrine pamphlets

Industry practices

Job guides and other publications

Maintenance schedules

Manufacturer's specifications, procedures and technical instructions

WHS requirements and regulations

Organisational instructions and journals

Organisational policies and procedures

Quality control

Regulatory requirements

Relevant local government by-laws

Routine orders

Security instructions and procedures

Standard Operating Procedures

Standing orders

Workplace agreements

Written and verbal orders

Intelligence material may include:

Aural and visual transmissions

Briefings

Downlinks

Downloads

Graphics via any media

Notes

Other documents

Written and verbal reports

Editorial process may include:

Arranging information for dissemination

Revising information for dissemination

Risk control measures may include:

Alterations

Compartmenting

Cover stories

Elimination of hazards

Modifications

Risk reduction

Appropriate authorities may include:

External agencies

Managers

Security authorities

Supervisors

Legal requirements may include:

National laws