List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:
protect the integrity of two different sets of big data in a work area: one set must be of transactional big data and one set of non-transactional big data.
During the above, the candidate must apply data protection policies and protocols.
The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:
legislative requirements and standards relating to protecting the integrity of big data, including data protection and privacy laws and regulations
organisational policies, procedures and protocols relating to protecting the integrity of transactional and non-transactional big data, including for:
ensuring accuracy, availability and scalability of big data
verifying security of big data platform
monitoring data discrepancies between different sources
monitoring big data integrity
identifying where big data breaches have occurred
ethical management and governance of big data, including consideration of ensuring a balance between availability and confidentiality of big data
key components of workplace governance arrangements relating to protection, performance, scalability and availability of big data, including:
procedures for creating and maintaining inventory of big data assets
policies to prevent big data being used inappropriately
protocols for dynamic and scalable access control of big data
compliance requirements and regulations relating to big data loss
key components of policies in place for protecting the confidential and private business information and intellectual property in big data assets:
privacy policies
security policies
intellectual property policies
infrastructure security, integrity and reactive security as they relate to protecting the integrity of big data.
Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment that uses big data.
Access is required to:
information and telecommunications equipment required to protect the integrity of big data
big data sets suited to requirement in performance evidence
industry standards, organisational procedures, and legislative requirements required to demonstrate the performance evidence.
Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.