NTISthis.com

Evidence Guide: TLIO5017A - Manage security of storage facilities

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

TLIO5017A - Manage security of storage facilities

What evidence can you provide to prove your understanding of each of the following citeria?

Assess security risks

  1. Records of security breaches, thefts and damage are reviewed to identify past security incidents of storage facilities
  2. Assessment of potential risks to the security of stock, personnel, facilities, information and equipment are made, considering both internal and external factors
  3. Discrepancies between identified risk and current security of storage facilities are noted
Records of security breaches, thefts and damage are reviewed to identify past security incidents of storage facilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessment of potential risks to the security of stock, personnel, facilities, information and equipment are made, considering both internal and external factors

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Discrepancies between identified risk and current security of storage facilities are noted

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Specify security requirements

  1. Decisions and adjustments to equipment and procedures regarding security for the facilities are made based on risk assessment
  2. Questions and feedback from stakeholders are sought and responded to promptly
  3. A finalised storage security plan offering optimal security of storage facility is devised taking into all feedback and assessments of security risks
Decisions and adjustments to equipment and procedures regarding security for the facilities are made based on risk assessment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Questions and feedback from stakeholders are sought and responded to promptly

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

A finalised storage security plan offering optimal security of storage facility is devised taking into all feedback and assessments of security risks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement storage security plan

  1. Storage security plan is implemented with appropriate workplace personnel informed
  2. Competency needs for staff to implement security plan is addressed with allocation of training
  3. Equipment and needs for improvements are allocated and/or obtained
  4. Storage security plan, policies and procedures are trialled in conjunction with a system for feedback to identify and suggest further improvements
Storage security plan is implemented with appropriate workplace personnel informed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Competency needs for staff to implement security plan is addressed with allocation of training

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Equipment and needs for improvements are allocated and/or obtained

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Storage security plan, policies and procedures are trialled in conjunction with a system for feedback to identify and suggest further improvements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and review storage security plan performance

  1. Security reports are collated and categorised
  2. Reports are compared to identify any trends in breaches
  3. Security procedures are modified to rectify any gaps identified
Security reports are collated and categorised

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Reports are compared to identify any trends in breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security procedures are modified to rectify any gaps identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required knowledge and skills, the range statement and the assessment guidelines for this Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

The evidence required to demonstrate competency in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria of this unit and include demonstration of applying:

the underpinning knowledge and skills

relevant legislation and workplace procedures

other relevant aspects of the range statement

Context of and specific resources for assessment

Performance is demonstrated consistently over a period of time and in a suitable range of contexts

Resources for assessment include:

a range of relevant exercises, case studies and/or other simulated practical and knowledge assessment, and/or

access to an appropriate range of relevant operational situations in the workplace

In both real and simulated environments, access is required to:

relevant and appropriate materials and equipment, and

applicable documentation including workplace procedures, regulations, codes of practice and operation manuals

Method of assessment

Assessment of this unit must be undertaken by a registered training organisation

As a minimum, assessment of knowledge must be conducted through appropriate written/oral tests

Practical assessment must occur:

through activities in an appropriately simulated environment at the registered training organisation, and/or

in an appropriate range of situations in the workplace

Required Skills and Knowledge

REQUIRED KNOWLEDGE AND SKILLS

This describes the essential knowledge and skills and their level required for this unit.

Required knowledge:

Regulations, codes of practice and legislative requirements relevant to the planning and management of security procedures within a workplace

Relevant OH&S and environmental procedures and regulations

Licence and permit requirements relevant to security procedures

Relevant Australian Standards and certification requirements

Workplace procedures for the planning and management of security procedures

Problems that may occur during the planning and management of security procedures and action that can be taken to resolve the problems

Risks and hazards related to the planning and management of security procedures and ways of controlling the risks involved

Business policies for security provision, including out-sourcing of components of operations and engaging additional resources

Focus of operation of security systems, resources, management and workplace operating systems

Resource availability including the competencies of individuals in the team/group

Required skills:

Communicate effectively with others when completing work activities to ensure securityapproaches are understood and implemented

Complete documentation related to work activities including documentation of loss, damage or other security issue

Work collaboratively with others in order to enhance security awareness

Adapt appropriately to cultural differences in the workplace, including modes of behaviour and interactions with others

Monitor work activities in terms of planned schedule

Monitor performance of equipment or technology designed to enhance security

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance.

Regular insurance assessments may include:

conditions of insurance

insurance assessment of premises

monitoring insurance requirements

Security coding for the identification of assets may include:

stocktakes

assets register (coded and labelled)

Worksite environment may involve:

twenty-four hour operation

single and multi-site location

large, medium and small workplaces

security may be provided by internal or contract staff

Depending on the organisation concerned, workplace procedures may be called:

standard operating procedures (SOPs)

company procedures

enterprise procedures

organisational procedures

established procedures

Communication in the work area may include:

phone

electronic data interchange (EDI)

fax

email

internet

RF systems

oral, aural or signed communications

Consultative processes may involve:

police

security consultants

relevant authorities, government departments and institutions

other employees and supervisors

suppliers of security equipment

relevant authorities and institutions

management and union representatives

industrial relations and OH&S specialists

Documentation and records may include:

insurance notes and information

documentation of physical protection facilities

security programs operations manuals, job specifications and procedures and induction documentation

supplier and/or client instructions

relevant OH&S and environmental protection regulations

workplace policies and procedures related to ADG code

dangerous goods declarations and material safety data sheets, where applicable

relevant Australian Standards and certification requirements

Applicable legislation and regulations may include:

relevant planning and management of security procedures within a workplace

relevant state/territory OH&S and environmental protection legislation

workplace relations regulations