The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Collect, analyse and evaluate personal information
|
|
Information is collected from the subject to be assessed in accordance with the purpose of the security assessment. Completed |
Evidence:
|
Where gaps, anomalies, deficiencies or discrepancies exist in the information provided, additional information is obtained in accordance with organisational policy and procedures. Completed |
Evidence:
|
Information is corroborated in accordance with organisational policy and procedures and assessed for its validity and reliability. Completed |
Evidence:
|
Analysis is conducted in accordance with general suitability indicators in accordance with legislation and security standards. Completed |
Evidence:
|
Data is extracted and interpreted and outcomes are recorded in accordance with organisational policy and procedures. Completed |
Evidence:
|
Assessment process is conducted with care and sensitivity to assist subjects to deal with its discriminatory and intrusive nature. Completed |
Evidence:
|
Make recommendations on security assessment outcomes
|
|
Recommendations are formulated consistent with the information obtained. Completed |
Evidence:
|
Recommendations are consistent with organisational guidelines and security standards. Completed |
Evidence:
|
Recommendations are conveyed in accordance with organisational guidelines. Completed |
Evidence:
|
Where recommendations are negative, the right to seek a review of the decision is confirmed with the requester of the security assessment and the subject, where appropriate, in accordance with organisational policy and procedures. Completed |
Evidence:
|
Improvements to procedures are recommended as required as part of the cycle of continuous improvement. Completed |
Evidence:
|
Record and report on personnel security assessments
|
|
Accurate, complete, up-to-date records are presented in the required format. Completed |
Evidence:
|
Reports are prepared that are clear, fair and objective and use language suited to the purpose of the report and organisational requirements. Completed |
Evidence:
|
Reports are presented in the required format. Completed |
Evidence:
|
Urgency and levels of risk are addressed in reports. Completed |
Evidence:
|
Procedures for storage and management of confidential and sensitive information are adhered to. Completed |
Evidence:
|