|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
Tender may be: | in-housenegotiatedopenselective. |
Tender specificationsmay detail: | client requirementsidentification of deliverablesinsurance requirementslegal requirementsperformance standardsproject managementproject scopeproposed activities to be undertakenquality assuranceresource requirements eg human and physicalspecific requirementsstakeholder involvementtime and cost parameters. |
Relevant informationmay include: | client details contract documentationdetails of security goods and services to be providedorganisational cost schedulestender details. |
Tender requirementsmay include: | compliance with tender criteria and conditionsformat and layoutlegal complianceresponse to all tender clausessubmission date. |
Tendercriteria and conditionsmay relate to: | eligibility for submission of tender which may include:interview, meeting or presentation of tenderselection criteria and weightingsspecial requirementssubmission datetender document format. |
Viability may include consideration of: | available resources, equipment and suppliesclient requirementscompetitioncompliance with regulationscost of tender preparation and processingfinancial considerationsgeographic constraintslikely profitother projectsprospect of winning the tenderskills required for the provision of servicestime constraints. |
Security requirements may relate to the provision of: | security equipment and systemsaccess control systemsaudible and visual warning devicescameras and monitorscommercial and residential alarm systemsdetection deviceselectric and mechanical fire safety and fire locking systemselectronic locks and locking systemselectronic readerselectronic screen equipmentintercoms and control panelssecurity doors and door controlsspecialised access control systems eg biometricssecurity servicesclose personal protectioncrowd controlescortingguardingpatrollingscreening. |
Evaluationmay relate to: | capabilitycapacityprevious projectsrisksecurityserviceverification of quality accreditation. |
Riskrelates to: | the chance of something happening that will have an impact on objectives. |
Risk assessmentmay include: | identifying risks in isolation or as part of a broader risk management strategy and addressing risks such asdamage to property or equipmentenvironmental landscapeequipment or system failuresfinancial or economic loss or failureinability to deliver or meet the timelines if selectedOHSprofessional incompetency. |
Organisational requirements may relate to: | access and equity policies, principles and practicesbusiness and performance plansclient service standardscode of conduct, code of ethicscommunication and reporting procedurescomplaint and dispute resolution proceduresemergency and evacuation proceduresemployer and employee rights and responsibilities insurance coverOHS policies, procedures and programsown role, responsibility and authority personal and professional developmentprivacy and confidentiality of informationquality assurance and continuous improvement processes and standardsresource parameters and proceduresrisk managementroles, functions and responsibilities of security personnelstorage and disposal of information. |
Legislative requirements may relate to: | Australian standards and quality assurance requirementsgeneral 'duty of care' responsibilitieslicensing or certification requirementsprivacy and confidentialityprofessional indemnityrelevant commonwealth, state and territory legislation, codes and national standards for:anti-discriminationcultural and ethnic diversityenvironmental issuesequal employment opportunityindustrial relationsOHSrelevant industry codes of practice. |
Interpersonal techniques may involve: | active listening being non-judgementalbeing respectful and non-discriminatoryconstructive feedbackcontrol of tone of voice and body languageculturally aware and sensitive use of language and concepts demonstrating flexibility and willingness to negotiateeffective verbal and non-verbal communicationmaintaining professionalismproviding sufficient time for questions and responses reflection and summarisingtwo-way interactionuse of plain Englishuse of positive, confident and cooperative language. |
Relevant personsmay include: | clientscolleaguesmanagersecurity goods and services supplierssecurity personneltenderer. |
Resources may include: | equipmentfinancialhumanphysicaltime. |
Capacity may relate to: | facilitiesother prioritiespersonnel expertiseresource availabilitytime. |
Organisationalrate schedulesmay relate to: | award and enterprise agreementsequipment costsinstallation costslabour ratesmaterials costsmonitoring costsservice costsunit costs. |
Factorsmay relate to: | access to assistance and resourcesbudget constraintscompeting work demandscompliancecontractual requirementsdisputesinsurancetechnology and equipment breakdownstime penalties. |
Business technologymay include: | computers:database software applicationsemail, Internet, intranetgraphical presentation softwareprintersproject management softwareword processing software. |
Tender submissionmay detail: | client briefcompany informationcostsevaluation criteriaimplementation planrecommended security goods or servicessecurity and risk assessmentservice and maintenance informationstatutory declarationterms of tradetimelineswarranty and liability terms and conditions. |
Feedbackmay be gained through: | participation in meetings and briefings recorded observations on progress of activitiesregular communication with relevant persons. |
Relevant documentationmay include: | client details and recordscontract documentationcost schedulesdetails of security goods and servicestender documentation. |