The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Assess security risks |
|
Completed |
Evidence:
|
Records of security breaches, thefts and damage are reviewed to identify past security incidents |
|
Completed |
Evidence:
|
Potential risks to the security of stock, personnel, facilities, information and equipment are identified, considering internal and external factors |
|
Completed |
Evidence:
|
Relative risks from a range of sources are assessed and compared with existing security measures |
|
Completed |
Evidence:
|
Discrepancies between identified risk and current security processes are noted |
|
Completed |
Evidence:
|
Specify security requirements |
|
Completed |
Evidence:
|
Decisions and adjustments to security equipment, facilities and services are made based on risk assessment in relation to organisational benefits |
|
Completed |
Evidence:
|
Security organisational arrangements are documented and implementation strategies are established |
|
Completed |
Evidence:
|
Security plan including performance indicators is prepared in accordance with workplace requirements and is circulated for feedback prior to finalisation and implementation |
|
Completed |
Evidence:
|
Questions and feedback from stakeholders are responded to promptly and, where appropriate, incorporated in the plan |
|
Completed |
Evidence:
|
Implement security plan |
|
Completed |
Evidence:
|
Implementation priorities are identified, and management and workplace personnel are informed |
|
Completed |
Evidence:
|
Competency requirements for the work are identified and staff are allocated and/or trained and assessed to meet identified requirements |
|
Completed |
Evidence:
|
Equipment and facilities are allocated and/or obtained |
|
Completed |
Evidence:
|
Workplace personnel and equipment are organised to meet requirements ensuring that work loads are balanced and other workplace activities are met |
|
Completed |
Evidence:
|
Workplace security policies and procedures are amended and trialled to improve performance |
|
Completed |
Evidence:
|
Operating procedures and methods are explained to workplace personnel and follow-up communication methods are used to ensure work requirements are applied |
|
Completed |
Evidence:
|
Monitor and review system performance |
|
Completed |
Evidence:
|
Security reports are collated and categorised |
|
Completed |
Evidence:
|
Reports are compared to identify trends in breaches |
|
Completed |
Evidence:
|
Security procedures are modified to rectify identified gaps |
|
Completed |
Evidence:
|