The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Plan security awareness activities
|
|
Need for activities is determined, taking into account identified client needs and feedback from clients and staff, and priorities are identified in the organisation's security plan. Completed |
Evidence:
|
Ideas for new or improved activities are initiated, gathered and assessed, taking into account the human, financial and physical resources required. Completed |
Evidence:
|
Approval for security awareness activities is obtained in accordance with organisational guidelines. Completed |
Evidence:
|
Design security awareness activities
|
|
Individuals and groups are targeted, and formal and informal networks are established and used regularly as communication channels. Completed |
Evidence:
|
Precedents in security management are incorporated into security awareness activities. Completed |
Evidence:
|
Effective awareness/information presentations are implemented where required. Completed |
Evidence:
|
Security awareness activities are linked in an integrated and cohesive manner with organisational ethical and security management standards and guidelines, codes of conduct and include related aspects of corporate policy. Completed |
Evidence:
|
Security awareness activities are based on a knowledge of the organisation's corporate objectives, core business, the culture of the organisation and a knowledge of the organisation's client base. Completed |
Evidence:
|
Promote government security management
|
|
Incidents and effects of non-compliance are publicised in accordance with organisational requirements. Completed |
Evidence:
|
Information to promote government security management is provided in line with audience needs. Completed |
Evidence:
|
Develop and nurture cooperative client relationships
|
|
Expectations of clients and contractors are established and documented. Completed |
Evidence:
|
Opportunities for establishing contacts and networks with external and internal clients are anticipated in consultation with work colleagues and managers. Completed |
Evidence:
|
Changes in organisational focus are monitored for effects on organisation-client relationships and action is taken to inform clients of changes in accordance with organisational policy and procedures. Completed |
Evidence:
|
Feedback on organisational activities is obtained and reported within the organisation in accordance with policy and procedures. Completed |
Evidence:
|
Organisation's security management philosophy, policy and procedures are imparted in a way which facilitates stakeholder understanding. Completed |
Evidence:
|
Where required, clients are advised when and how they should modify their practices to meet organisational standards. Completed |
Evidence:
|
Conduct security management activities
|
|
Security management activities are planned and are feasible within existing resource and time constraints. Completed |
Evidence:
|
Intended outcomes are identified and are based on realistic expectations of the target audience. Completed |
Evidence:
|
Activities are varied, refined and adapted as indicated by audience response or by changes in the organisation's security strategy and procedures. Completed |
Evidence:
|
Adult learning techniques are utilised. Completed |
Evidence:
|
Security awareness information is linked with codes of conduct and ethical and security management guidelines of the organisation, together with its broader corporate goals. Completed |
Evidence:
|
Evaluate success of awareness raising activities
|
|
Security awareness activities are assessed against predetermined objectives. Completed |
Evidence:
|
Results of evaluation are documented and used as the basis for planning future activities. Completed |
Evidence:
|
Opportunities for new security awareness activities are identified and acted on as required. Completed |
Evidence:
|
Evidence, if any, is obtained of a decrease in the level of security breaches as a result of activities. Completed |
Evidence:
|