logo

Investigation Law: Handling Sensitive Information, Workplace Safety, Planning and Initiating Investigation, Conducting Personnel Security

   

Added on  2022-12-23

17 Pages5295 Words89 Views
 | 
 | 
 | 
Investigation Law
Investigation Law: Handling Sensitive Information, Workplace Safety, Planning and Initiating Investigation, Conducting Personnel Security_1

Table of Contents
INTRODUCTION...........................................................................................................................5
HANDLE SENSITIVE INFORMATION.......................................................................................5
ACTIVITY 1....................................................................................................................................5
1. what criteria should be used to determine whether an item of information should be
classified......................................................................................................................................5
2. Describe the steps that need to be performed from the time that an item of non-national
security information is collected/created....................................................................................6
3. Describe how these documents should be marked - describe the different markings used for
this information...........................................................................................................................6
4. How should these documents be stored?................................................................................6
5. Is security classified information allowed to be copied? .......................................................7
ASSESSMENT-1 ACTIVITY 2......................................................................................................7
1. Describe the procedure involved in the manual transmission of the document to another
staff member................................................................................................................................7
2. Describe the procedure involved in the electronic transmission of the document to another
staff member................................................................................................................................7
3. Describe the minimum requirements for physical storage of the document...........................7
4. You propose to conduct a staff meeting to discuss this particular document. Describe how
this should be done and what restrictions are present.................................................................8
MAINTAIN WORKPLACE SAFETY...........................................................................................8
1.what are the relevant provisions of OH&S legislation and code of practice that you would
need to explain to your designated work group?........................................................................8
2.What are the key considerations when presenting information to the work group on OH&S
issues?.........................................................................................................................................8
3.What are the key steps in managing the implementation of risk control procedures in the
workplace?..................................................................................................................................8
4.What are the important considerations when consulting on OH&S issues?............................8
EVALUATION QUESTION 1........................................................................................................9
Investigation Law: Handling Sensitive Information, Workplace Safety, Planning and Initiating Investigation, Conducting Personnel Security_2

1. What is the burden of proof for civil matters?........................................................................9
2. What is the burden of proof for criminal matters?..................................................................9
3. Describe the methods that you use to prove the chain of custody for an exhibit?..................9
4. Describe how you can protect your integrity when gathering money and other valuables to
avoid allegations of impropriety?..............................................................................................10
EVALUATION QUESTION 2......................................................................................................10
1. How would you monitor and review the process of evidence collection to address gaps and
inadequacies and protect its evidential integrity?.....................................................................10
2. Describe how you would maintain continuity, security and integrity of exhibits?...............10
RESEARCH PROJECT.................................................................................................................10
1. Research project What are likely anticipated defences to:....................................................10
PLAN AND INITIATE INVESTIGATION.................................................................................11
EVALUATION QUESTION 1......................................................................................................11
Provide a definition of non-compliance in simple English and list three factors or tools used to
determine if non-compliance exists?.........................................................................................11
Discuss what methods are utilised to plan an investigation?....................................................11
When conducting an investigation what is the recognised starting point?...............................12
EVALUATION QUESTIONS......................................................................................................12
1. What background information do you require?....................................................................12
2. Who would be your first point of contact, and how would you determine full particulars of
the allegation?...........................................................................................................................12
3. What would be your investigation plan?...............................................................................12
CONDUCT PERSONNEL SECURITY ......................................................................................13
1. Explain the term Baseline Security Clearance?....................................................................13
2. Explain the term A Negative Vetting 1 (NV1) Security Clearance? will allow the holder to
access classified information and resources that are classified up to and including SECRET. 13
3. How many years background information is required to be supplied for an NV1 Security
Clearance?.................................................................................................................................13
4. List six supporting documents that may be required for an initial or upgrade security
assessment?...............................................................................................................................14
ACTIVITY 2..................................................................................................................................14
Investigation Law: Handling Sensitive Information, Workplace Safety, Planning and Initiating Investigation, Conducting Personnel Security_3

What must the assessing officer be confident of when recommending against a clearance
subject.......................................................................................................................................14
Explain the term “Procedural Fairness” as it applies to vetting?..............................................14
What is an "Originator".............................................................................................................14
In what situations would a vetting agency not recognise a clearance from another agency.....14
CONCLUSION..............................................................................................................................15
REFERENCES..............................................................................................................................16
Investigation Law: Handling Sensitive Information, Workplace Safety, Planning and Initiating Investigation, Conducting Personnel Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Department Of Computing And Information Technology
|10
|2871
|16

Childcare Assessment
|35
|12250
|44

Risk Management Question Answer 2022
|19
|4398
|29

Impact of physical layout on workplace culture: A case study of Dhillon Farm
|6
|937
|62

Academic Misconduct Investigation
|2
|554
|42

Project Management Tools Assignment
|22
|7184
|240