The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Collect, analyse and evaluate personal information
|
|
Collect information from the subject to be assessed in accordance with the purpose of the security assessment. Completed |
Evidence:
|
Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided. Completed |
Evidence:
|
Corroborate information and assess validity and reliability. Completed |
Evidence:
|
Conduct analysis in accordance with general suitability indicators and security standards. Completed |
Evidence:
|
Extract and interpret data and record outcomes. Completed |
Evidence:
|
Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature. Completed |
Evidence:
|
Make recommendations on security assessment outcomes
|
|
Formulate recommendations that are consistent with the information obtained. Completed |
Evidence:
|
Convey recommendations. Completed |
Evidence:
|
Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative. Completed |
Evidence:
|
Recommend improvements to procedures. Completed |
Evidence:
|
Record and report on personnel security assessments
|
|
Maintain complete and up to date records. Completed |
Evidence:
|
Prepare reports that are clear, fair and objective and use language suited to the purpose. Completed |
Evidence:
|
Address urgency and levels of risk in reports. Completed |
Evidence:
|
Adhere to procedures for storing and managing confidential and sensitive information. Completed |
Evidence:
|
Collect, analyse and evaluate personal information
|
|
Collect information from the subject to be assessed in accordance with the purpose of the security assessment. Completed |
Evidence:
|
Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided. Completed |
Evidence:
|
Corroborate information and assess validity and reliability. Completed |
Evidence:
|
Conduct analysis in accordance with general suitability indicators and security standards. Completed |
Evidence:
|
Extract and interpret data and record outcomes. Completed |
Evidence:
|
Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature. Completed |
Evidence:
|
Make recommendations on security assessment outcomes
|
|
Formulate recommendations that are consistent with the information obtained. Completed |
Evidence:
|
Convey recommendations. Completed |
Evidence:
|
Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative. Completed |
Evidence:
|
Recommend improvements to procedures. Completed |
Evidence:
|
Record and report on personnel security assessments
|
|
Maintain complete and up to date records. Completed |
Evidence:
|
Prepare reports that are clear, fair and objective and use language suited to the purpose. Completed |
Evidence:
|
Address urgency and levels of risk in reports. Completed |
Evidence:
|
Adhere to procedures for storing and managing confidential and sensitive information. Completed |
Evidence:
|