Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

BSBXCS303 Mapping and Delivery Guide
Securely manage personally identifiable information and workplace information

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency BSBXCS303 - Securely manage personally identifiable information and workplace information
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills and knowledge required to securely manage personally identifiable information (PII) and workplace information. It applies to those working in a broad range of industries and job roles under some supervision and guidance who manage large amounts of PII and workplace information.No licensing, legislative or certification requirements apply to this unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards, organisational procedures, and legislative requirements required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Prerequisites/co-requisites
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Handle PII and workplace information responsibly
  • Review current standards, practices and procedures relating to workplace information
  • Identify sensitive data in own workplace environment according to organisational policies and procedures and within scope of own role
  • Classify workplace information types according to organisational procedures
  • Apply privacy policies to all data devices that require confidentiality
       
Element: Store and share PII and workplace information securely
  • Organise obtained data sets in an easily retrievable format
  • Implement required access control protocols for identified sensitive data
  • Confirm that data is accurate, up-to-date, and comprehensive
  • Identify and report malfunctioning infrastructure and attacks on infrastructure that pose a threat to data integrity
       
Element: Apply information protection protocols
  • Conduct back-up of on-site and off-site data according to organisational policies and procedures
  • Conduct privacy impact assessments on data
  • Confirm adherence to data protection compliance standards
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

use data protection techniques to manage workplace information for one work area over the life of a small project or work cycle.

In the course of the above, the candidate must store and share personally identifiable information (PII) in a secure manner.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to securely managing PII and workplace information, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

organisational policies and procedures relating to:

identifying sensitive data

securely storing, sharing and managing customer information

encryption, and protocols for its uses

data classification

media and document labelling

monitoring and reporting faults and malfunctions in IT infrastructure

industry best practice and Australian government sources of information relating to access control, including:

password protection

storage locations

securely sharing

data deletion

risks and benefits of cloud storage

risks of communicating sensitive information via non-secure means e.g. email and SMS

framework for distributed storage

technologies, techniques and protocols for storing and retrieving data

data protection protocols and industry-standard compliance standards relating to:

back-up

data sharing

data storage

disposal of sensitive information

privacy impact assessments.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Review current standards, practices and procedures relating to workplace information 
Identify sensitive data in own workplace environment according to organisational policies and procedures and within scope of own role 
Classify workplace information types according to organisational procedures 
Apply privacy policies to all data devices that require confidentiality 
Organise obtained data sets in an easily retrievable format 
Implement required access control protocols for identified sensitive data 
Confirm that data is accurate, up-to-date, and comprehensive 
Identify and report malfunctioning infrastructure and attacks on infrastructure that pose a threat to data integrity 
Conduct back-up of on-site and off-site data according to organisational policies and procedures 
Conduct privacy impact assessments on data 
Confirm adherence to data protection compliance standards 

Forms

Assessment Cover Sheet

BSBXCS303 - Securely manage personally identifiable information and workplace information
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

BSBXCS303 - Securely manage personally identifiable information and workplace information

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: