The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Assess security risks |
|
Completed |
Evidence:
|
Records of security breaches, thefts and damage are reviewed to identify past security storage incidents |
|
Completed |
Evidence:
|
Potential risks to the security of stock, personnel, facilities, information and equipment are identified, considering internal and external factors |
|
Completed |
Evidence:
|
Discrepancies between identified risk and current storage security situations are noted |
|
Completed |
Evidence:
|
Specify security requirements |
|
Completed |
Evidence:
|
Decisions and adjustments to storage security equipment and procedures are made based on risk assessment |
|
Completed |
Evidence:
|
Questions and feedback from stakeholders are sought and responded to promptly |
|
Completed |
Evidence:
|
Finalised storage security plan offering optimal security of storage facility is devised taking into account all feedback and assessments of security risks |
|
Completed |
Evidence:
|
Implement storage security plan |
|
Completed |
Evidence:
|
Storage security plan is implemented and appropriate workplace personnel are informed |
|
Completed |
Evidence:
|
Staff competency requirements to implement security plan are addressed with required training |
|
Completed |
Evidence:
|
Equipment and needs for improvements are allocated and/or obtained |
|
Completed |
Evidence:
|
Storage security plan, policies and procedures are trialled in conjunction with a system for feedback to identify and suggest further improvements |
|
Completed |
Evidence:
|
Monitor and review storage security plan performance |
|
Completed |
Evidence:
|
Security reports are collated and categorised |
|
Completed |
Evidence:
|
Reports are compared to identify trends in breaches |
|
Completed |
Evidence:
|
Security procedures are modified to rectify identified gaps |
|
Completed |
Evidence:
|