NTISthis.com

Evidence Guide: PSPSEC009 - Handle sensitive information

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC009 - Handle sensitive information

What evidence can you provide to prove your understanding of each of the following citeria?

Receive sensitive information

  1. Receive and check sensitive information to ensure transmission protocols have been exercised.
  2. Take action if protocols have not been adhered to.
  3. Record sensitive information.
Receive and check sensitive information to ensure transmission protocols have been exercised.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Take action if protocols have not been adhered to.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Deal with sensitive information

  1. Review sensitive information to ensure classification meets the security policy for protection of information.
  2. Review aggregated sensitive information to ensure that it is classified.
  3. Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.
  4. Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.
  5. Transmit sensitive information.
  6. Obtain expert advice as required.
Review sensitive information to ensure classification meets the security policy for protection of information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review aggregated sensitive information to ensure that it is classified.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Transmit sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain expert advice as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain sensitive information

  1. Secure and account for sensitive information.
  2. Dispose of sensitive information.
Secure and account for sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Dispose of sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Receive sensitive information

  1. Receive and check sensitive information to ensure transmission protocols have been exercised.
  2. Take action if protocols have not been adhered to.
  3. Record sensitive information.
Receive and check sensitive information to ensure transmission protocols have been exercised.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Take action if protocols have not been adhered to.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Deal with sensitive information

  1. Review sensitive information to ensure classification meets the security policy for protection of information.
  2. Review aggregated sensitive information to ensure that it is classified.
  3. Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.
  4. Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.
  5. Transmit sensitive information.
  6. Obtain expert advice as required.
Review sensitive information to ensure classification meets the security policy for protection of information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review aggregated sensitive information to ensure that it is classified.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Transmit sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain expert advice as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain sensitive information

  1. Secure and account for sensitive information.
  2. Dispose of sensitive information.
Secure and account for sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Dispose of sensitive information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Receive sensitive information

1.1 Receive and check sensitive information to ensure transmission protocols have been exercised.

1.2 Take action if protocols have not been adhered to.

1.3 Record sensitive information.

2. Deal with sensitive information

2.1 Review sensitive information to ensure classification meets the security policy for protection of information.

2.2 Review aggregated sensitive information to ensure that it is classified.

2.3 Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.

2.4 Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.

2.5 Transmit sensitive information.

2.6 Obtain expert advice as required.

3. Maintain sensitive information

3.1 Secure and account for sensitive information.

3.2 Dispose of sensitive information.

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Receive sensitive information

1.1 Receive and check sensitive information to ensure transmission protocols have been exercised.

1.2 Take action if protocols have not been adhered to.

1.3 Record sensitive information.

2. Deal with sensitive information

2.1 Review sensitive information to ensure classification meets the security policy for protection of information.

2.2 Review aggregated sensitive information to ensure that it is classified.

2.3 Check classification requirement to ensure it is warranted, and the level of protection is assigned in accordance with the consequences that might result from any compromise of the information’s confidentiality, integrity and availability.

2.4 Contact originators of information responsible for classifying the documents to discuss reclassification or declassification where necessary.

2.5 Transmit sensitive information.

2.6 Obtain expert advice as required.

3. Maintain sensitive information

3.1 Secure and account for sensitive information.

3.2 Dispose of sensitive information.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to government security management

applying security classification systems

using analysis and problem solving

tailoring communication to the needs of a diverse range of people inside and outside the organisation who classify, transmit or advise on sensitive information

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the depth of knowledge demonstrated must be appropriate to the job context of the candidate.

legislation, regulations, policies, procedures and guidelines relating to government security management

standards for management of sensitive information

classification system for national security and nonnational security information

procedures for confirming initial security classifications

international protocols and treaties impacting on government security management

available sources of expert advice

procedures relating to WHS and environment in the context of government security management

equity and diversity principles