NTISthis.com

Evidence Guide: PSPSEC008 - Conduct personnel security assessments

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC008 - Conduct personnel security assessments

What evidence can you provide to prove your understanding of each of the following citeria?

Collect, analyse and evaluate personal information

  1. Collect information from the subject to be assessed in accordance with the purpose of the security assessment.
  2. Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.
  3. Corroborate information and assess validity and reliability.
  4. Conduct analysis in accordance with general suitability indicators and security standards.
  5. Extract and interpret data and record outcomes.
  6. Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.
Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Corroborate information and assess validity and reliability.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct analysis in accordance with general suitability indicators and security standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Extract and interpret data and record outcomes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Make recommendations on security assessment outcomes

  1. Formulate recommendations that are consistent with the information obtained.
  2. Convey recommendations.
  3. Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.
  4. Recommend improvements to procedures.
Formulate recommendations that are consistent with the information obtained.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Convey recommendations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommend improvements to procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record and report on personnel security assessments

  1. Maintain complete and up to date records.
  2. Prepare reports that are clear, fair and objective and use language suited to the purpose.
  3. Address urgency and levels of risk in reports.
  4. Adhere to procedures for storing and managing confidential and sensitive information.
Maintain complete and up to date records.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare reports that are clear, fair and objective and use language suited to the purpose.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Address urgency and levels of risk in reports.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Adhere to procedures for storing and managing confidential and sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Collect, analyse and evaluate personal information

  1. Collect information from the subject to be assessed in accordance with the purpose of the security assessment.
  2. Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.
  3. Corroborate information and assess validity and reliability.
  4. Conduct analysis in accordance with general suitability indicators and security standards.
  5. Extract and interpret data and record outcomes.
  6. Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.
Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Corroborate information and assess validity and reliability.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct analysis in accordance with general suitability indicators and security standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Extract and interpret data and record outcomes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Make recommendations on security assessment outcomes

  1. Formulate recommendations that are consistent with the information obtained.
  2. Convey recommendations.
  3. Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.
  4. Recommend improvements to procedures.
Formulate recommendations that are consistent with the information obtained.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Convey recommendations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommend improvements to procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record and report on personnel security assessments

  1. Maintain complete and up to date records.
  2. Prepare reports that are clear, fair and objective and use language suited to the purpose.
  3. Address urgency and levels of risk in reports.
  4. Adhere to procedures for storing and managing confidential and sensitive information.
Maintain complete and up to date records.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Prepare reports that are clear, fair and objective and use language suited to the purpose.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Address urgency and levels of risk in reports.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Adhere to procedures for storing and managing confidential and sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Collect, analyse and evaluate personal information

1.1 Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

1.2 Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

1.3 Corroborate information and assess validity and reliability.

1.4 Conduct analysis in accordance with general suitability indicators and security standards.

1.5 Extract and interpret data and record outcomes.

1.6 Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

2. Make recommendations on security assessment outcomes

2.1 Formulate recommendations that are consistent with the information obtained.

2.2 Convey recommendations.

2.3 Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

2.4 Recommend improvements to procedures.

3. Record and report on personnel security assessments

3.1 Maintain complete and up to date records.

3.2 Prepare reports that are clear, fair and objective and use language suited to the purpose.

3.3 Address urgency and levels of risk in reports.

3.4 Adhere to procedures for storing and managing confidential and sensitive information.

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Collect, analyse and evaluate personal information

1.1 Collect information from the subject to be assessed in accordance with the purpose of the security assessment.

1.2 Obtain additional information where gaps, anomalies, deficiencies or discrepancies exist in the information provided.

1.3 Corroborate information and assess validity and reliability.

1.4 Conduct analysis in accordance with general suitability indicators and security standards.

1.5 Extract and interpret data and record outcomes.

1.6 Conduct assessment process with care and sensitivity to assist subjects to deal with its invasive nature.

2. Make recommendations on security assessment outcomes

2.1 Formulate recommendations that are consistent with the information obtained.

2.2 Convey recommendations.

2.3 Confirm with the requester of the security assessment and the subject, where appropriate, the right to seek a review if recommendations are negative.

2.4 Recommend improvements to procedures.

3. Record and report on personnel security assessments

3.1 Maintain complete and up to date records.

3.2 Prepare reports that are clear, fair and objective and use language suited to the purpose.

3.3 Address urgency and levels of risk in reports.

3.4 Adhere to procedures for storing and managing confidential and sensitive information.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to personnel security assessments

undertaking critical analysis, evaluation and deductive reasoning

applying problem solving and decision making

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Protective Security Policy Framework

general suitability indicators

international treaties and protocols

formats for different types of reports

risk assessment

management of secure information

WHS and environment in the context of personnel security assessments