NTISthis.com

Evidence Guide: PSPSEC505A - Protect security classified information

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PSPSEC505A - Protect security classified information

What evidence can you provide to prove your understanding of each of the following citeria?

Advise on security classified information

  1. The combination of the 'need to know' principle with different levels of security clearance to protect official information, is explained to staff and contractors in accordance with organisational policy and procedures.
  2. Guidance is provided on the type of information requiring security classification and the range of classification levels available in accordance with security standards.
  3. Advice is provided on determining the necessity for security clearances and the level of access required in different situations.
  4. Advice is provided in accordance with organisational policy and procedures on the eligibility and suitability of applicants for security clearances.
  5. Advice is provided on other security measures to protect security classified information.
The combination of the 'need to know' principle with different levels of security clearance to protect official information, is explained to staff and contractors in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Guidance is provided on the type of information requiring security classification and the range of classification levels available in accordance with security standards.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice is provided on determining the necessity for security clearances and the level of access required in different situations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice is provided in accordance with organisational policy and procedures on the eligibility and suitability of applicants for security clearances.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice is provided on other security measures to protect security classified information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Improve information security

  1. Recipients of security classified information are encouraged to challenge any security classification they believe to be unnecessary or inaccurate.
  2. Originators of security classified information are contacted to discuss re-classification or de-classification of information in accordance with organisational policy and procedures.
  3. Advice is provided to senior management on the extent to which the organisation meets government standards for the protection of security classified information.
  4. Recommendations for improvements to information security measures are made in accordance with organisational policy and procedures.
Recipients of security classified information are encouraged to challenge any security classification they believe to be unnecessary or inaccurate.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Originators of security classified information are contacted to discuss re-classification or de-classification of information in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Advice is provided to senior management on the extent to which the organisation meets government standards for the protection of security classified information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations for improvements to information security measures are made in accordance with organisational policy and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The Evidence Guide specifies the evidence required to demonstrate achievement in the unit of competency as a whole. It must be read in conjunction with the Unit descriptor, Performance Criteria, the Range Statement and the Assessment Guidelines for the Public Sector Training Package.

Units to be assessed together

Pre-requisite units that must be achieved prior to this unit:Nil

Co-requisite units that must be assessed with this unit:Nil

Co-assessed units that may be assessed with this unit to increase the efficiency and realism of the assessment process include, but are not limited to:

PSPETHC501B Promote the values and ethos of public service

PSPGOV502B Develop client services

PSPLEGN501B Promote compliance with legislation in the public sector

PSPSEC504A Coordinate protective security

PSPSEC506A Communicate security awareness

Overview of evidence requirements

In addition to integrated demonstration of the elements and their related performance criteria, look for evidence that confirms:

the knowledge requirements of this unit

the skill requirements of this unit

application of the Employability Skills as they relate to this unit (see Employability Summaries in Qualifications Framework)

protection of security classified information in a range of (3 or more) contexts (or occasions, over time)

Resources required to carry out assessment

These resources include:

legislation, policy, procedures and protocols relating to protection of security classified information

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

case studies and workplace scenarios to capture the range of situations likely to be encountered when protecting security classified information

Where and how to assess evidence

Valid assessment of this unit requires:

a workplace environment or one that closely resembles normal work practice and replicates the range of conditions likely to be encountered when protecting security classified information, including coping with difficulties, irregularities and breakdowns in routine

protection of security classified information in a range of (3 or more) contexts (or occasions, over time)

Assessment methods should reflect workplace demands, such as literacy, and the needs of particular groups, such as:

people with disabilities

people from culturally and linguistically diverse backgrounds

Aboriginal and Torres Strait Islander people

women

young people

older people

people in rural and remote locations

Assessment methods suitable for valid and reliable assessment of this competency may include, but are not limited to, a combination of 2 or more of:

case studies

portfolios

projects

questioning

scenarios

authenticated evidence from the workplace and/or training courses, such as briefing plans

For consistency of assessment

Evidence must be gathered over time in a range of contexts to ensure the person can achieve the unit outcome and apply the competency in different situations or environments

Required Skills and Knowledge

This section describes the essential skills and knowledge and their level, required for this unit.

Skill requirements

Look for evidence that confirms skills in:

applying legislation, regulations and policies relating to protection of security classified information

reading and analysing complex documents such as legislation, regulations and standards in the context of information security

researching and critically analysing the operational environment and drawing conclusions

using communication with diverse stakeholders involving listening, questioning, paraphrasing, clarifying and summarising, to provide advice and support

responding to diversity, including gender and disability

applying procedures relating to occupational health and safety and environment in the context of protecting security classified information

Knowledge requirements

Look for evidence that confirms knowledge and understanding of:

legislation, regulations, policies, procedures and guidelines relating to security classified information, such as:

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

standards for the management of security classified information

government information classification system

international protocols and treaties

the organisation's security environment

Australian standards, quality assurance and certification requirements

AS/NZS ISO31000:2009 Risk management - Principles and Guidelines

equal employment opportunity, equity and diversity principles

public sector legislation such as occupational health and safety and environment in the context of protecting security classified information

Range Statement

The Range Statement provides information about the context in which the unit of competency is carried out. The variables cater for differences between States and Territories and the Commonwealth, and between organisations and workplaces. They allow for different work requirements, work practices and knowledge. The Range Statement also provides a focus for assessment. It relates to the unit as a whole. Text in bold italics in the Performance Criteria is explained here.

Information may be:

hard copy

electronic

audio-visual

photographic

encrypted

national security information

non-national security information

classified by third parties

Standards may include those referred to in:

public service Acts

protective security policy

fraud control policy

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

occupational health and safety legislation

AS/NZS ISO 31000:2009 Risk management - Principles and Guidelines

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

Other security measures may include:

correct filing

clean desk

quitting all electronic systems and networks

checking environment including:

desks

whiteboards

waste bins

computer drives

containers

cabinets

safes

vaults

windows

doors

safe carriage of keys