Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Prepare to identify security requirements
  2. Identify security requirements
  3. Document security requirements

Evidence Required

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment

What critical aspects are required for evidence of competency

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets activities and existing security arrangements

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations

Prepare a summary of assessed client needs and recommended security options in a format suitable for review

What specific knowledge is needed to achieve the performance criteria

Knowledge and understanding are essential to apply this standard in the workplace to transfer the skills to other contexts and to deal with unplanned events The knowledge requirements for this competency standard are listed below

available security equipmentsystem options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes

What specific skills are needed to achieve the performance criteria

To achieve the performance criteria some specific skills are required These include the ability to

recognise security threats to people property and premises

observe and assess technical security requirements

read and interpret plans designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills

What resources may be required for assessment

Access to a suitable venue and equipment

Access to plain English version of relevant statutes and procedures

Assignment instructions work plans and schedules policy documents and duty statements

Assessment instruments including personal planner and assessment record book

Access to a registered provider of assessment services

What is required to achieve consistency of performance

For valid and reliable assessment of this unit the competency should be demonstrated over a period of time and observed by the assessor The competency is to be demonstrated in a range of situations which may include involvement in related activities normally experienced in the workplace

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work

Assessment against this unit may involve the following

Continuous assessment in a setting that simulates the conditions of performance described in the elements performance criteria and range of variables statement that make up the unit

Continuous assessment in the workplace taking into account the range of variables affecting performance

Selfassessment on the same terms as those described above

Simulated assessment or critical incident assessment provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs They are fundamental processes and generally transferable to other work functions Some of these are covered by the key competencies although others may be added

Information below highlights how these processes are applied in this competency standard

perform the process

perform and administer the process

perform administer and design the process

How can communication of ideas and information be applied

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements

How can information be collected analysed and organised

A site assessment may be carried out accurately documented and organised by records or reports

How are activities planned and organised

Site assessments may be arranged with minimal disruption to client services or normal work routines

How can team work be applied

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements

How can the use of mathematical ideas and techniques be applied

Mathematical techniques may be used to estimate resource and equipmentsystem requirements It may also be used to plan and schedule work tasks

How can problem solving skills be applied

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought

How can the use of technology be applied

Technology may be used to communicate schedule source and document information

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment

What critical aspects are required for evidence of competency

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets activities and existing security arrangements

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations

Prepare a summary of assessed client needs and recommended security options in a format suitable for review

What specific knowledge is needed to achieve the performance criteria

Knowledge and understanding are essential to apply this standard in the workplace to transfer the skills to other contexts and to deal with unplanned events The knowledge requirements for this competency standard are listed below

available security equipmentsystem options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes

What specific skills are needed to achieve the performance criteria

To achieve the performance criteria some specific skills are required These include the ability to

recognise security threats to people property and premises

observe and assess technical security requirements

read and interpret plans designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills

What resources may be required for assessment

Access to a suitable venue and equipment

Access to plain English version of relevant statutes and procedures

Assignment instructions work plans and schedules policy documents and duty statements

Assessment instruments including personal planner and assessment record book

Access to a registered provider of assessment services

What is required to achieve consistency of performance

For valid and reliable assessment of this unit the competency should be demonstrated over a period of time and observed by the assessor The competency is to be demonstrated in a range of situations which may include involvement in related activities normally experienced in the workplace

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work

Assessment against this unit may involve the following

Continuous assessment in a setting that simulates the conditions of performance described in the elements performance criteria and range of variables statement that make up the unit

Continuous assessment in the workplace taking into account the range of variables affecting performance

Selfassessment on the same terms as those described above

Simulated assessment or critical incident assessment provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs They are fundamental processes and generally transferable to other work functions Some of these are covered by the key competencies although others may be added

Information below highlights how these processes are applied in this competency standard

perform the process

perform and administer the process

perform administer and design the process

How can communication of ideas and information be applied

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements

How can information be collected analysed and organised

A site assessment may be carried out accurately documented and organised by records or reports

How are activities planned and organised

Site assessments may be arranged with minimal disruption to client services or normal work routines

How can team work be applied

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements

How can the use of mathematical ideas and techniques be applied

Mathematical techniques may be used to estimate resource and equipmentsystem requirements It may also be used to plan and schedule work tasks

How can problem solving skills be applied

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought

How can the use of technology be applied

Technology may be used to communicate schedule source and document information


Range Statement

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.