UNIT
Not Applicable
This unit of competency specifies the outcomes required to determine the technical security requirements for small domestic or commercial environments. It requires the ability to use appropriate methods and techniques to gather and assess information to accurately determine and recommend security options to meet identified client needs. This unit may form part of the licensing requirements for persons providing advice, solutions or strategies to minimise security risks in those states and territories where these are regulated activities. |
This unit of competency has application in those work roles involving the assessment of technical security requirements for domestic and commercial environments. Competency requires legal and operational knowledge applicable to relevant sectors of the security industry. The knowledge and skills described in this unit are to be applied within relevant legislative and organisational guidelines. |
Refer to Unit Descriptor
Not Applicable
This unit contains employability skills. |
Elements describe the essential outcomes of a unit of competency. | Performance criteria describe the required performance needed to demonstrate achievement of the element. Where |
The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. | ||
A person who demonstrates competency in this unit must be able to provide evidence of: identifying applicable legislative requirements which will impact on security assessment and accurately completing all documentation preparing a summary of assessed client needs and prioritising security recommendations in a format suitable for review sourcing and gathering relevant information and conducting a comprehensive site assessment to identify client assets, activities and existing security arrangements using appropriate methods to determine suitable technical security requirements and options to meet client needs and expectations using appropriate security assessment methods to determine client security requirements. | ||
Context of assessment includes: a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement. Resource implications for assessment include: access to plain English version of relevant statutes and procedures access to a registered provider of assessment services access to a suitable venue and equipment assessment instruments including personal planner and assessment record book work schedules, organisational policies and duty statements. Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support. | ||
This unit of competency could be assessed using the following methods of assessment: observation of processes and procedures questioning of underpinning knowledge and skills. | ||
Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge. Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical. Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff. |
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. | |
applicable commonwealth, state and territory legislation which affects work such as: workplace safety environmental issues equal employment opportunity industrial relations anti-discrimination and diversity Australian building codes and regulations Australian Communications Authority cabling standards Australian standards and quality assurance requirements award and enterprise agreements evidence collection freedom of information licensing arrangements and certification requirements privacy requirements relevant industry codes of practice telecommunications trade practices. | |
access and equity policies, principles and practices business and performance plans client service standards code of conduct, code of ethics communication and reporting procedures complaint and dispute resolution procedures emergency and evacuation procedures employer and employee rights and responsibilities Occupational Health and Safety (OHS) policies, procedures and programs own role, responsibility and authority personal and professional development privacy and confidentiality of information quality assurance and continuous improvement processes and standards resource parameters and procedures roles, functions and responsibilities of security personnel storage and disposal of information. | |
access to site, security clearance and specific site requirements budget constraints equipment requirements: business equipment communication equipment reporting and documentation requirements specific client requirements timeframes work schedules and completion dates work tasks and procedures. | |
clients colleagues engineers and technicians equipment and systems manufacturers security consultants security personnel site managers or project managers supervisor. | |
conformance with insurance requirements legislative, regulatory or industry requirements protection of persons, property or assets. | |
building supervisor government authorities manager project manager property agent property owner tenant. | |
active listening being non-judgemental being respectful and non-discriminatory constructive feedback control of tone of voice and body language culturally aware and sensitive use of language and concepts demonstrating flexibility and willingness to negotiate effective verbal and non-verbal communication maintaining professionalism providing sufficient time for questions and responses reflection and summarising two-way interaction use of plain English use of positive, confident and cooperative language. | |
dress and personal presentation food language religion social conventions traditional practices values and beliefs. | |
access and egress points access codes, keys or passes building codes and regulations heritage requirements noise control obtaining security clearance OHS requirements time of access to site union requirements. | |
areas requiring a higher level of security business and operational plans core business activities and functions current and proposed operating environments, assets and systems current management strategies existing security systems and equipment insurance policies security incident history. | |
access and egress patterns existing security equipment and systems floor plan site restrictions and regulations type and condition of building structures. | |
checklists client briefs existing security equipment and systems floor plans recommendations specifications written and electronic reports. | |
adequacy of street lighting break-in burglary client habits eg doors left unlocked deliberate or accidental damage entry points screened from public view external doors without deadlocks or with hinges opening outward neighbourhood crime rating pilferage proximity of other buildings sabotage theft threats of loss, harm or damage to persons or property traffic flow trespass unauthorised access unsecured windows and doors vandalism. | |
calculators facsimile machines internet personal schedulers photocopiers printers standard commercial computer software and hardware telephones. |
Security |
Technical security |
Not sure where to start? Sign up to download unit details or start mapping in Michi's help.
Effortlessly sync unit data from training.gov.au
Create mapping groups from one or more units, for streamlined unit & cluster mapping.
Easily download your maps stylised to your taste as Excel, Word, or PDF documents
Receive an alert whenever training.gov.au updates or supersedes a unit you have mapped. Choose to apply the update, or migrate your map
Experience the efficiency of our AI-driven tools that make importing and organising your mapping content effortless.