NTISthis.com

Evidence Guide: CPPSEC3045A - Determine security equipment and system modifications

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC3045A - Determine security equipment and system modifications

What evidence can you provide to prove your understanding of each of the following citeria?

Assess security equipment and system status.

  1. Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.
  2. Assignment instructions are obtained, reviewed and client objectives confirmed.
  3. Normal operational functions and performance parameters of security equipment and system are confirmed against specifications.
  4. Current operational functions and capabilities of security equipment and system are confirmed based on an assessment of accurate and reliable information.
  5. Historical information and operational data of security equipment and system is obtained and reviewed.
  6. Specifications of security equipment and system are reviewed to determine modification capability and feasibility in accordance with manufacturer's instructions and client requirements.
Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assignment instructions are obtained, reviewed and client objectives confirmed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Normal operational functions and performance parameters of security equipment and system are confirmed against specifications.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Current operational functions and capabilities of security equipment and system are confirmed based on an assessment of accurate and reliable information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Historical information and operational data of security equipment and system is obtained and reviewed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Specifications of security equipment and system are reviewed to determine modification capability and feasibility in accordance with manufacturer's instructions and client requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine modifications.

  1. Terms of reference and budgetary constraints relevant to security equipment and system modifications are identified and complied with.
  2. Design concepts and options are researched and evaluated to identify most appropriate modification to meet security equipment and system capabilities.
  3. Security equipment and system schematics, specifications and configuration are adjusted to clearly and accurately show details of planned modifications.
  4. Proposed modifications to security equipment and system satisfy changed operational requirements and client requirements.
  5. Proposed modifications comply with relevant legislative, regulatory and industry requirements.
Terms of reference and budgetary constraints relevant to security equipment and system modifications are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design concepts and options are researched and evaluated to identify most appropriate modification to meet security equipment and system capabilities.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security equipment and system schematics, specifications and configuration are adjusted to clearly and accurately show details of planned modifications.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Proposed modifications to security equipment and system satisfy changed operational requirements and client requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Proposed modifications comply with relevant legislative, regulatory and industry requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document recommended modifications.

  1. Business equipmentand technology is used to prepare and present information in required format and style.
  2. Recommended security equipment and system modifications and modification requirements are clearly and accurately documented.
  3. Modification options and recommendations are supported by reliable and verifiable information.
  4. Feedback is sought from relevant persons and all queries are responded to promptly, courteously and accurately.
  5. Client confirmation to proceed with proposed security equipment and system modifications is obtained and processed in accordance with organisational procedures.
  6. Relevant documentation is securely maintained with due regard to client confidentiality in accordance with organisational procedures.
Business equipmentand technology is used to prepare and present information in required format and style.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommended security equipment and system modifications and modification requirements are clearly and accurately documented.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Modification options and recommendations are supported by reliable and verifiable information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feedback is sought from relevant persons and all queries are responded to promptly, courteously and accurately.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Client confirmation to proceed with proposed security equipment and system modifications is obtained and processed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant documentation is securely maintained with due regard to client confidentiality in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately determining modification feasibility and capabilities of specific security equipment and system

clearly and accurately adjusting system schematics, configuration and specifications to show detail of modifications

determining and preparing security system schematics and specifications which detail the modification of security equipment and systems

interpreting and complying with all applicable legislative and licensing requirements

preparing and presenting security system specifications and configuration in formats suitable for review by client

using appropriate methods to assess and determine modifications to accurately meet the changed operational requirements of security equipment and system.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

accurately determine client requirements

accurately determine status of security equipment and system

communicate in a clear and concise manner

complete documentation

determine specifications for a security system

draw and draft plans, layouts, structures and systems

estimate and organise materials, tools and equipment requirements

identify and comply with applicable legislative requirements including licensing

identify and control workplace hazards

identify and follow routine workplace safety procedures

make modifications to schematics, specifications, charts and diagrams

organise and prioritise work tasks

prepare and present security system specification and configuration documentation in suitable formats

read and interpret schematics, specifications, charts and diagrams

solve routine problems

use suitable tools and equipment, including hand and power tools.

Required knowledge

applicable legislative requirements including licensing and client confidentiality

building construction methods and types

drawing and drafting symbols and techniques

duty of care

emergency procedures

operational principles of security equipment and systems

organisational pricing policy and procedures

principles of security system design, specifications and configuration

principles of security system programming and configuring

range of security equipment and system modifications

reporting and documentation requirements

requirements for installation and modification of security equipment and systems

safe workplace procedures

technical terminology

types of security system configurations

types, functions and specifications of security equipment and systems

waste disposal procedures.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirementsmay relate to:

applicable commonwealth, state and territory legislation which affects work such as:

workplace safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity

Australian building codes and regulations

Australian Communications Authority cabling standards

Australian standards and quality assurance requirements

award and enterprise agreements

evidence collection

freedom of information

licensing arrangements and certification requirements

privacy requirements

relevant industry codes of practice

telecommunications

trade practices.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

Occupational Health and Safety (OHS) policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructionsmay include:

access to site and specific site requirements

equipment, tools and material requirements

personal protection clothing and equipment requirements

reporting requirements

specific client requirements:

budget constraints

equipment and system types

equipment locations and positions

installation procedures and schedule

monitoring requirements

service and maintenance

system capabilities and functions

warranties or guarantees.

timeframes

work schedules

work tasks and procedures.

Client objectivesmay relate to:

conformance with insurance requirements

legal, regulatory or industry requirements

protection of persons, property or assets.

Security equipment and systems may include:

access control systems

audible and visual warning devices

cameras and monitors

commercial and residential alarm systems

detection devices

electric and mechanical fire safety and fire locking systems

electronic locks and locking systems

electronic readers

electronic screen equipment

intercoms and control panels

security doors and door controls

specialised access control systems eg biometrics.

Historical informationmay be found in:

activity reports

alarm history

central station records

client records

installation records

maintenance and repair documentation

site logs.

Operational data may be found in:

back-up information

central monitoring station records

maintenance documentation

manufacturer's instructions

software records

visual inspections.

Modificationmay relate to:

change in system capabilities and functions

equipment, parts and components

installation procedures

labour

locations, placement and positions

materials

monitoring requirements

programming functions.

Schematicsmay relate to:

cable routes

control panel locations

fixtures

frame location

locations of detectors

power points

security system component positioning

switchboards

telephone mainframes.

Business equipment and technology may include:

calculators

facsimile machines

internet

personal schedulers

photocopiers

printers

standard commercial computer software and hardware

telephones.

Clear and accuratedocumentation may relate to:

drawing title and details

inclusion of dimensions and other measurements

key providing explanation for symbols or abbreviations used

plans drawn to scale

use of standard drawing and drafting symbols.

Relevant personsmay include:

clients

colleagues

engineers and technicians

equipment and systems manufacturers

security consultants

security personnel

site managers or project managers

supervisor.

Documentationmay include:

changed client requirements

changes to equipment and system schematics, specification and configuration

equipment and system modifications

estimates and quotes

floor plans

materials requirements

schematic drawings

security equipment and system, parts and components

warranty conditions.