INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:20 PM
SECURITY
Page 1
THE MAGAZINE FOR SECURITY PROFESSIONALS
PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION
[ M AG A Z I N E ] VOL.18 | ISSUE.5 | DEC 2013
67 26
PP255003/02390
Application Security in the cloud National Licensing – time for action | www.linkedin/company/asial
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:20 PM
Page 2
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 3
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 4
CONTENTS VOL.18 | ISSUE.5 | DECEMBER 2013
24 Application Security in the cloud
10 Registered cabler website
30 New bullying laws – make sure you are ready
06 | President’s message 08 | New look ASIAL web site 08 | 44th ASIAL Annual General Meeting - 20th November 2013
and public officials corrupt 16 | National Broadband Network 18 | Local Government Procurement Initiative – survey results
10 | ACMA rule changes for specialist competencies 12 | ICAC finds security providers
20 | SIA launches licensing of security businesses 22 | ASIAL New member listing
ASIAL Strategic Partners:
4 //SECURITY INSIDER DEC 2013
36 Making an entrance at the new Sydney Gymnastic and Aquatic Centre
28 | 34 | 38 | 41 |
30 minutes with Kevin Kalinich Designing a PSIM Hot products Monitoring centre certification listing 42 | ASIAL Calendar of events
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 5
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 6
PRESIDENT’S MESSAGE
Engagement is the key
T
THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by
o ensure its effectiveness as a peak body, ASIAL remains committed to
The Australian Security Industry
actively engaging with its members and key stakeholders.Through the upgrade of is website the Association is harnessing electronic communication
channels such as social media, online forums, blogs, webinars etc to interact and engage with more of our members.
Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au
Having said that, we still place great importance on face-to-face contact. At a
Publisher
recent function in Brisbane, the board welcomed the opportunity to meet with members to discuss the state of the Industry in Queensland. Over the coming months members will have further opportunities to engage with directors at meetings to be held in Sydney (20 November, 2013 AGM), Hobart (26 February, 2014) and Melbourne (4-5 June, Security 2014). As part of its Brisbane meeting the board was joined by Brian Bauer, Executive Director of the Office of FairTrading (OFT) who delivered a briefing on developments in
Editor Bryan de Caires | security@asial.com.au
the regulation of security providers in Queensland. It was very pleasing to receive some very positive feedback on ASIAL’s activities in Queensland and to hear that OFT are
Editorial Enquiries communications@asial.com.au
putting in place a number of proactive measures to target industry non-compliance.
Advertising
Over recent weeks ASIAL has been approached to lodge submissions by the
Tania Laird | advertising@asial.com.au Creative Director
Northern Territory Service Industries Training Advisory Council (NT Skills Occupation Priority List) and the South Australian Attorney General (Screening of those that work
Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress
or volunteer with children and vulnerable people). ASIAL will represent the industry before the Fair Work Commission in response to the low paid authorisation application lodged by United Voice in the Australian Capital Territory. We have also been approached to participate in initiatives organised by the
Webfx2 Digital | design@webfx2.com.au Editorial Contributors AON, Chris Delaney, Darren Leo and Roger Pearce
Australian Institute of Police Management,The Centre for Excellence in Policing and
Print + Distribution
Security and the Defence Science and Technology Organisation. We also continue to
Nationwide Advertising Group
work with the Fair Work Ombudsman in preparation of the Local Government Procurement Initiative and the National Emergency Communications Working Group to develop a national alarm response protocol. With the change of Federal government, the incoming Minister for Communications The Hon Malcolm Turnbull has flagged major changes to the
Published bi-monthly Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions
National Broadband Network (NBN).Through the Association’s participation on a
are welcomed, though the publisher reserves the
number of NBN sub-committees, we will continue to advocate for the interests of the
right to decline to publish or to edit for style,
industry.This is not the time to rest on your laurels, with disconnection of the copper network commencing in May next year, doing nothing is not an option. I could go on, but I won’t. I am not blowing our own trumpet, rather I am trying to highlight the growing standing with which your Association is now held and to highlight the range and diversity of issues we advocate for on behalf of the industry.
grammar, length and legal reasons. Press Releases to: security@asial.com.au. Internet
references
in
articles, stories
and
advertising were correct at the time of printing. ASIAL does not accept responsibility for misleading views. Copyright©2013 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without
Finally, I would like to bring your attention to the upcoming 2013 AGM which will
permission is strictly prohibited. Security Insider is
be held at The Park Royal Hotel at Parramatta (NSW) on 20th November. I encourage
a subscription based publication, rates and further
all Members to attend and engage with your association.
details can be found at www.asial.com.au.
[Next Issue] FEBRUARY 2014
Kevin McDonald President
6 //SECURITY INSIDER DEC 2013
ISSN 1442-1720
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 7
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 8
INDUSTRY NeWS
NEW LOOK ASIAL WEB SITE A new look ASIAL web site incorporating a range of new features and functionality will go live
at the end of November.The revamped site will include easier log-in and navigation, access to
PUBLIC-PRIVATE POLICING FORUMS Public-private partnerships is becoming an increasingly important issue.The growth in the private security industry over recent years has resulted in the industry taking on an increasing number of roles once performed by public police. With increasing contestability to service delivery, it is likely that we will see private providers moving into more areas traditionally regarded as the domain of the police force.This poses challenges for both public and private policing providers. The Australian Institute of Police Management is hosting a symposium
8 //SECURITY INSIDER DEC 2013
that will bring together world leading academics to discuss the intersect of their roles, the challenges facing both in the evolving crime and policing environment, and how both sectors can maximise their relationship. The Centre for Excellence in Policing and Security (CEPS) is also hosting a workshop on policing major events, which will look at issues relating to public / private partnerships. ASIAL CEO Bryan de Caires has been invited to participate in both events to provide an industry perspective.
online forums and mobile device friendly versions.
44TH ASIAL ANNUAL GENERAL MEETING - 20TH NOVEMBER 2013 ASIAL’s 2013 Annual & Financial Report is now available for review (www.asial.com.au/ar).The report will be presented for adoption at the 44th Annual General Meeting to be held at 7.45am on Wednesday 20th November 2013 at the Park Royal Parramatta. Members are encouraged to attend.The AGM notices have been dispatched to members today. Please keep an eye out for it in your mail.
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 9
INDUSTRY NeWS
INDUSTRY GUIDANCE NOTE ON MIGRATION OF BACK TO BASE MEDICAL AND SECURITY ALARMS TO THE NBN Communications Alliance has published a guidance note for industry and other stakeholders on the complex issues surrounding the migration of back-to-base Security Systems and Personal Medical Alarms to the National Broadband Network (NBN). The Guidance Note was
developed by the NBN Over-the-Top Services Transition (NOST) Working Group of Communications Alliance – a multi-stakeholder group that included ASIAL and representatives from NBN Co, service providers, medical and security alarm providers, the ACMA and relevant Government departments. The guidance note is a valuable resource to enable all stakeholders to gain an accurate picture of the relevant industry structure, the nature and operation of the more than 1.2 Million Security Systems and 350,000 Medical Alarms in-market and the responsibilities of the various parties. A copy of the guidance note is available on the ASIAL web site.
occurred involving a weapon.The positive news is that these numbers were down slightly on the previous year. However, fraud rose by 22% to almost 47,500 incidents. Don Weatherburn, Director, NSW Bureau of Crime Statistics will address the upcoming ASIAL Industry breakfast briefing in Parramatta on the 20th November on crime trends in NSW.
CRIME TRENDS IN NSW In NSW for the year ending 30 June 2013, over 38,000 homes were broken into and 2,654 robberies
SECURITY INSIDER DEC 2013// 9
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:21 PM
Page 10
CABLING NeWS
ACMA RULE CHANGES FOR SPECIALIST COMPETENCIES – ACT NOW! The Australian Communications and Media Authority (ACMA) have amended the regulatory requirements for cabling providers who install specialised cabling within customer premises. Registered cablers who intend carrying out specialised cabling after 1 July 2014 are reminded that the ACMA’s rule changes for specialised (such as Structured, Co-axial and Optical Fibre) cabling come into force on that date. Cablers undertaking Structured, Co-axial, Optical Fibre, or Broadband cabling must by then have the training competencies relevant to this specialised cabling work.The new competencies only apply to cabling providers who undertake the relevant specialised cabling work within customer premises. 30 June 2014 is the final date on
do further training in these specialisations, as these endorsements are equivalent to the current competencies.
Restricted registered cablers Also by 1 July 2014, all Restricted registered cablers intending to work on Broadband installations must have acquired the relevant Restricted Broadband specialist competency. With the transition period for the ACMA’s changes (2012-2014) fast running out, ASIAL is witnessing growing numbers of registered cablers upgrading their qualifications in readiness, indicating a sharp spike in demand for training places in these courses with Registered Training Organisations (RTOs). ASIAL urges cablers to act now to avoid missing out, and risking
which cablers may undertake the full range of cabling operations with a basic Open cabling registration. The amendments to the ACMA cabling arrangements have been made to ensure cabling providers have the necessary skills required to perform specialised cabling work for the current and emerging customer cabling environment.
disruption to their legal scope of work. Cablers seeking assistance in sourcing a reputable RTO are encouraged to contact ASIAL Cabling on Tel: 02 8425 4331 or email: cabling@asial.com.au or visit www.asial.com.au and follow the link to the registered cablers area. Alternatively, cablers can contact ACMA at comply.label@acma.gov.au.
How the changes affect Open registered cablers
Registered cablers - changing address? Notify your registrar
As previously advised to ASIAL registered cablers, all Open registered cablers doing these types of specialised/advanced cabling within customer premises must by 1 July 2014 have acquired the appropriate specialist competencies (also known as Endorsements). Cablers who have already attained Endorsements for Structured (previously Cat 5), Co-axial and Optical Fibre Cabling will not need to
When your cabling registration is up for renewal your Registrar will send you a renewal notice. Notifying your Registrar of any changes to your postal address will help ensure you receive the renewal notice, which will enable you to renew your registration on time. It is an offence under the Telecommunications Act 1997 to perform customer cabling work without a registration, so don’t forget
10 //SECURITY INSIDER DEC 2013
to keep your registration up to date. Significant penalties may apply for performing customer cabling work without a current registration. Further information can be found on www.acma.gov.au
Making sure the NBN delivers on expectations – right up to the device Regardless of whether the NBN is FTTH or FTTN, once the NBN gets to consumers homes, they will need information about what they should do. But where does the consumer and industry go to get information?
That’s all about to change, because Australia’s Cabling Registrars and the ICAA has banded together to develop www.registeredcablers.com.au - a website that provides guidance for both consumers and industry to get it right so that the NBN can deliver on expectations, right up to the devices. The NBN infrastructure is only part of the picture, albeit the biggest and most expensive. The customer wiring from the NBN box (NTD) to PCs, Smart TVs, IP cameras, Security Systems, Medical Systems and media servers are often
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 11
CABLING NeWS
overlooked, but it plays a pivotal role in whether the user experience is better or worse with the NBN. With the wrong infrastructure inside the house, broadband could drop to a trickle beyond the NBN box. The new website will provide unbiased advice using easy to understand headlines: > Do a Little > Do more > Do a lot • What to do when the NBN is installed to an existing home; • How to prepare a new home for the most cost-effective and reliable broadband installation; • What technology options are available to consumers and what are their pros and cons; • How and where to find qualified cabling and telecommunications infrastructure providers; • Making sure the cabling provider and their workmanship is legal; and • How can cabling providers make themselves known to the local community that they’re qualified and available to provide infrastructure beyond the NBN box. This innovative initiative has as its primary goal to educate both community and industry on getting the NBN right, all the way up to the devices in the home. It is a collaborative development by all of the Cabling Registrars that administer compliance to the Cabling Provider Rules (CPR) for the ACMA, in association with the ICAA. Further details about www.registeredcablers.com.au What’s in it for consumers? Consumers can be guided on the various options they have to choose from in installing broadband around their homes, including wireless, Power Line Communications (PLC) and Structured Cabling (Cat 5/6); be
directed to suitably qualified cabling providers to find out what’s best for their specific requirements; and be more informed when speaking with Retail Service Providers (RSPs) before deciding on what steps to take, be it a little or a lot.
What’s in it for Cabling Providers? Cabling Providers can find the facts on broadband reticulation and more detailed information on the technologies they can offer to consumers. With the appropriate qualifications, they will also be able to register their availability to be contacted by consumers seeking their services to make their homes ‘NBN-ready’.
best-practice within their industry sectors.They are: • Australian Security Industry Association Ltd (ASIAL) • BICSI Registered Cablers Australia (BRCA) • Fire Protection Association (FPA) • National Electrical and Communications Association (NECA) • Telecommunications Industry Training Advisory Board (TITAB) About the International Copper Association Australia: ICAA promotes the deployment of copper telecommunications infrastructure through its Smart Wired® program.
What’s in it for NBN Co? As a carrier, NBN Co has no involvement in what consumers do ‘downstream’ of the NBN box. www.registeredcablers.com.au is a ‘destination’ that NBN Co can direct consumers to, to obtain factual, noncommercial and unbiased guidance on making their home ‘NBN-ready’. What’s in it for Retail Service Providers? RSPs provide content to consumers, and typically don’t have the resources to provide individualised broadband reticulation in consumers’ homes. While a few RSPs may elect to undertake this service, most RSPs will be happy to direct customers to www.registeredcablers.com.au. In fact, several of the major RSPs have already endorsed the website and will refer its customers to it. About the Cabling Registrars: The ACMA has charged the following industry associations to administer compliance to its CPR. These associations represent specific industry segments that are affected by the CPRs and promote compliance to the regulations and
SECURITY INSIDER DEC 2013// 11
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 12
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 13
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 14
INDUSTRY NeWS
ICAC FINDS SECURITY PROVIDERS AND PUBLIC OFFICIALS CORRUPT The following is the content of the media
Kings in relation to that project in the
release issued by the NSW Independent
future. Mr Paul had served on the
Commission Against Corruption (ICAC)
tender evaluation committee (TEC) for
included paying Mr Paul the $13,000 in
on 26 September 2013.
the project, but deliberately failed to
2008 and arranging the $20,000
ICAC has found that security service
Diekman and Kings. Mr Diekman's corrupt conduct
disclose to the UWS TEC chairperson
payment in 2009. He also acted
providers and public officials engaged
his conflict of interest arising out of his
corruptly by providing or authorising the
in corrupt conduct in relation to work
personal and financial relationship with
provision of benefits including money,
for several NSW public authorities
Mr Diekman. He also used his influence
accommodation in Las Vegas and a
including the University of Western
on an AGNSWTEC, engaging in
Vespa scooter to Mr Huskic, between
Sydney (UWS), the Art Gallery of NSW
corrupt conduct by accepting $20,000
2006 and 2011 in return for Mr Huskic
(AGNSW) and the then Northern
from Mr Diekman in 2009 as a reward
having exercised his public official
Sydney Central Coast Area Health
for improperly exercising his public
functions to favour Kings and in the
Service (NSCCAHS) which resulted in
official function to help Kings win a
expectation that he would do so in the
benefits including cash, trips to Las
tender associated with the AGNSW's
future. Kings experienced a substantial
Vegas and a motor scooter being
security upgrade project. Mr Paul
increase in business from NSCCAHS
awarded to public officials in return for
accepted $27,500 from QVS that year
during that period, rising from $68,000
favouring particular companies.
as a reward for improperly exercising
in 2006 for security work to between
his official functions to help QVS
$800,000 and $1.2 million each year
allegations of corrupt conduct in the
become the main supplier for the
from 2007 to 2011. Mr Diekman also
provision of security products and
AGNSW contract, and deliberately
agreed with Mr Huskic in 2010 to
services by suppliers, installers and
failed to disclose to the gallery his
submit two dummy quotes for the
consultants, the Commission found
conflicts of interest arising from his
Gosford hospital carpark security
that security industry consultant, Daniel
relationships with Kings, Mr Diekman
upgrade, knowing Mr Huskic would
Paul, security systems installer and
and QVS. MrThompson engaged in
represent them as genuine quotes and
integrator Kings Security Group Pty Ltd
corrupt conduct by arranging for QVS
use them as genuine quotes. Mr
directors Peter (Charles) Diekman and
to pay Mr Paul the $27,500 reward. Mr
Huskic's conduct in relation to these
Peter Roche, NSCCAHS employee
Paul also deliberately failed to disclose
matters is also corrupt through seeking
Robert Huskic, Q Video Systems' (QVS)
to SPC and Woollahra Municipal
and accepting the benefits, and by
Paul Thompson, Kings employee David
Council, when engaged through his
requesting and using the dummy
McMicking and Austek Security
company to work for those public
quotes, knowing that they were false.
managing director Jonathan Nguyen
authorities, his conflicts of interest
Mr McMicking's conduct in agreeing
engaged in corrupt conduct.
arising from his relationships with Mr
with the submission of the dummy
In its report, Investigation into
Mr Paul provided consultancy
Cont. Pg 16 >
services through his company, Hootspah Pty Ltd (trading as Security Consultants International), to UWS, the AGNSW and Sydney Ports Corporation (SPC). In performing his work for these agencies, the Commission is satisfied that Mr Paul was a public official for the purposes of the Independent Commission Against Corruption Act 1988. Mr Paul had particularly close relationships with Kings and Mr Diekman, with whom he had been friends from about 2007. Mr Paul's conduct included accepting $13,000 from Mr Diekman in 2008 as a reward for assisting Kings in relation to a UWS access control project, and to influence him to favour CopyrightŠ2013 Independent Commission Against Corruption.
14 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 15
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 16
INDUSTRY NeWS
ICAC CONT. quotes knowing they were false and
NSW government agencies ensure
Prosecutions should be obtained with
would be represented by Mr Huskic as
that overall responsibility for identified
respect to the prosecution of Mr Paul,
genuine is also corrupt.
tasks associated with the selection of
Mr Diekman and Mr Huskic for
security integrators is maintained in-
offences under the Crimes Act 1900.
Mr Diekman also engaged in corrupt conduct by dishonestly
house, and that agencies explore
providing Austek with the Kings
alternatives to relying exclusively on
inquiry, as part of the investigation,
costings for an SPC project in 2007 so
the advice of specialist consultants
over 24 days between 18 June 2012
they could be used by Mr Nguyen to
when selecting security integrators
and 31 August 2012. Commissioner
submit a higher Austek quote to SPC,
through a competitive process. NSW
the Hon David Ipp AO QC presided at
thereby increasing Kings chances of
government agencies embarking on
the public inquiry, at which 31
winning the SPC contract. Mr Nguyen
new large-scale security projects
witnesses gave evidence.
conduct in this deceit is also corrupt.
should also adopt a
Findings are made against Mr
rigorous product
Roche for agreeing to pay the $20,000
selection process, and
reward in 2009 to Mr Paul over the
should ban employees
AGNSW contract, and for agreeing with
directly involved in
Mr Diekman to provide the benefits to
procurement activities
Mr Huskic between 2006 and 2011.
from accepting any gifts,
The Commission has found that
benefits and hospitality
procurement processes for the
from potential and
provision of highly specialised security
existing contractors and
and IT services pose serious
consultants.
corruption risks and has made 11
The Commission held a public
The ICAC is of the
corruption prevention
opinion that the advice of
recommendations.These include that
the Director of Public
UK – SECURITY INDUSTRY AUTHORITY (SIA) LAUNCHES LICENSING OF SECURITY BUSINESSES
From 6 April 2015, all regulated security businesses in the UK will need to hold an SIA business licence. The Home Office has been working with the SIA on the introduction of business licensing. Home Office Ministers have publicly stated their commitment to the regulatory reforms and the introduction of business regulation; which will help create a fair business environment for security
16 //SECURITY INSIDER DEC 2013
companies, remove rogue operators, and deliver better value regulation. To qualify for an SIA business licence, a security business must demonstrate that it is 'fit and proper' to supply security industry services. When processing a business licence application, the SIA will consider: identity; criminality; financial probity; integrity; business competency (including British Standards). A business will need to obtain approval for each sector in which it supplies a security industry service.The relevant sectors are: • Manned guarding – Cash and Valuables in Transit, Close Protection, Door Supervision, Public Space Surveillance (CCTV), and Security Guarding • Key holding. • Immobilisation of vehicles (including the restriction and removal of vehicles) in Northern Ireland only. A business licence will last for five years.To maintain a business licence
businesses will be required to comply with the conditions of the licence, provide a yearly return evidencing its continued compliance, and pay an annual subscription fee.
SCHEME TO REGULATE LICENSED PREMISES WITH HIGH LEVELS OF ASSAULT AND OTHER VIOLENT INCIDENTS The NSW Office of Liquor, Gaming & Racing has issued a fact sheet relating to licensed premises with high levels of assault and other violent incidents. A copy of the fact sheet is available on the ASIAL web site.
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 17
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 18
LGPI SURVEY
ASIAL Survey Tendering for government work 18 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 19
LGPI SURVEY
ASIAL and the Fair Work Ombudsman (FWO) have been working on the development of a Government Procurement Initiative (initially focusing on local government) which aims to educate government agencies on the pitfalls of using price as the sole determinant when allocating security contracts. Work is well underway in developing Model Tender Clauses and a Model Workplace Management Plan to provide more objective criteria with which tenderers must comply. An education campaign will also be conducted to ensure that the key messages get through to government decision makers. In developing this initiative, ASIAL conducted a survey of its members to ascertain their perspectives and experiences in tendering for government work. A summary of the survey’s findings is included below.
Business turnover of survey respondents
Number of employees of survey respondents
Responses to the Survey showed that around 70% of government tenders requested evidence of documents confirming the use of contractors. Among the documentation requested included: • Certificates of currency for all insurances; • Organisation and management structure; • Induction and training plans; • Compliance with minimum wages and conditions for employees; • Grievance and dispute resolution management; • KPIs and productivity management; • Use of direct labour; • and Sub-contractor management plan. Frequency of compliance evidence required during the life of the tender to prove you are meeting your compliance obligations
Of those who responded, 72% had tendered for government security contracts and 28% had not. Of those who had not tendered for government work, the primary reason given was that they could not compete with the contract prices quoted and make a sustainable profit. Typical contract period 0-12 months 12-24 months 24-36 months
Local 23% 35% 42%
State 24% 24% 52%
Federal 37% 17% 46%
Top 5 factors in influencing the awarding of government contracts 1. Price 2. Expertise/qualifications of management team / employees 3. Quality service provision 4. Proof of capacity / ability to provide the service required 5. Reputation of the security provider
Local Once during the tender process 52% At the beginning of the contract 31% Every six months 6% Never 10%
State 49% 33% 9% 9%
Federal 50% 37% 7% 7%
State 24% 20% 10% 20% 15% 10%
Federal 32% 6% 12% 17% 9% 15%
Typical value of government tenders
$0-$100,000 $100,001-$250,000 $250,001-$500,000 $500,001-$1 million $1 - $ 5 million $5 million +
Local 33% 24% 14% 19% 6% 3%
Further information on the Local Government Procurement Initiative will be provided over the coming months.
SECURITY INSIDER DEC 2013// 19
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:26 PM
Page 20
FEATURE: NATIONAL LICENSING
National Licensing (time for action) By Bryan de Caires*
The private security industry performs a vital and increasingly important role in safeguarding the Australian community. With increasing contestability to service delivery, it is anticipated that we will see private security providers moving into more and more areas traditionally viewed as being in the domain of the public police. As this occurs and the industry’s role grows, so too does the need for a national licensing regime for the industry. Whether it is a major event such as the upcoming G20 meeting in Brisbane which will require hundreds of security personnel (many of whom will be interstate licence holders), security providers operating across state/territory borders or security technicians / consultants servicing national clients, the need for a uniform national standard and approach is long overdue. If you to speak to security providers operating in multiple states and/or territories, you will find that one of their biggest bugbears is the frustration of having to hold multiple licences to perform the same activity. Not only does this create significant red tape and excessive costs for the business and/or individual, but it is unclear as to what public benefit this approach delivers, apart from generating additional licensing revenue for government.
20 //SECURITY INSIDER DEC 2013
Whilst a national driving licence system has been in place for many years and a national approach to the licensing of cablers has operated since 2001, it appears that a national security licence has been placed in the ‘too hard’ basket. In 1997 ASIAL adopted a policy seeking the introduction of a uniform and consistent national approach to the licensing of the security industry. For the past 16 years ASIAL has advocated the need for a uniform and consistent national approach. We were encouraged when in July 2008 the Council of Australian Governments (COAG) agreed to the introduction of a National Occupational Licensing System as part of a program of regulatory reform to increase Australia’s productivity. COAG agreed to adopt a nationallyconsistent approach to the regulation of the private security industry, focusing initially on the guarding sector of the industry, to improve the probity, competence and skills of security personnel and the mobility of security industry licences across jurisdictions. COAG asked the Ministerial Council of Police and Emergency Management, in consultation with the Security Industry Regulators Forum, to undertake further work on minimum regulatory standards
for the technical sector of the industry by mid 2009, as well as proposals for a possible national system for security industry licensing by mid 2010. The COAG decision had the widespread support of industry, which had long called for a uniform and consistent national approach to licensing, compliance and skills training.The disparate patchwork of State and Territory regimes presented inherent vulnerabilities and posed an increasing risk across a range of areas. These included impacting on the effectiveness of securing critical infrastructure and assets; safeguarding Australian communities; and in achieving the governments’ goals of preventing organised crime from infiltrating the sector. Disappointingly, this appears to have been a false dawn. For whilst there has been some progress in implementing agreed nationally consistent regulation of the industry, ongoing concerns remain within the industry about the inefficiencies, duplication and compliance costs associated with operating across multiple, disjointed jurisdictions. ASIAL recently wrote to Federal, State and Territory Ministers seeking responses on a number of issues relating to red
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 21
FEATURE: NATIONAL LICENSING
licensed occupations. We remain optimistic that common sense will finally prevail. Until it does, we will continue to advocate for the inclusion of security as part of the National Occupational Licensing Scheme. We are also committed to ensuring that any national licensing system introduced results in measurable improvements in service standards and professionalism within the industry. The support of members and other like minded professional bodies will be invaluable in helping to ensure that security is not overlooked again when the next wave of occupations are considered.
tape reduction and the need for a uniform national approach (details of the issues raised can be found in the members area of the ASIAL web site). It is clear that overlapping and inconsistent regulation impedes productivity and growth.The move towards a seamless national economy through the reform of business and other regulation cannot come quickly enough.The introduction of a national licence would make it easier for businesses and individuals to operate across State and Territory borders. It would also make life simpler for businesses and consumers, while continuing to provide the necessary protections and access for consumers and the community.
Whilst we have been advised that regulators across the country continue to work cooperatively on developing policy in relation to the industry, no date has been set as to when we can expect the security industry to be considered for inclusion in the National Occupational Licensing Scheme. In working towards the introduction of a national security licence, ASIAL is cognisant that many practical issues will need to be resolved.These include the issue of cross-jurisdictional access to databases (including police databases), the variances in policy settings, licensing administration and fee structures. However, similar issues have been resolved in the process of developing a system for national licensing for other
*Bryan de Caires is CEO of ASIAL.
National Occupational Licensing System (NOLS)
working with state and federal governments, stakeholders, industry associations and regulators to define and implement a national occupational licensing system that will allow licence holders to use their national licence to work anywhere in Australia. Under NOLS, companies and individuals will hold a single national licence that allows them to work anywhere or hire staff from other states without having to worry about paying for multiple licences. NOLS will enhance the integrity of licences and occupational licensing in general.The reduced red tape and increased mobility of workers will improve the efficiency of Australian businesses, with knock-on benefits to the Australian economy.The cost of unnecessary training will reduce, while appropriate qualification requirements will be retained. Complications and inconsistencies will
be removed. The benefits of national licensing include: • improved business efficiency and competitiveness of the national economy • reduced red tape • improved labour mobility • enhanced productivity • enhanced consumer confidence and protection without imposing unnecessary costs or lessening competition. The first wave of occupations include electrical, plumbing / gasfitting, airconditioning and refrigeration.The second wave will include conveyancers and valuers. COAG has announced that the National Occupational Licensing System will be implemented in 2014 following additional consultation conducted by States and Territories.
Currently, occupations are licensed by each state or territory with the licence only covering work performed in that state. Under a national licence, companies and individuals would be licensed to work anywhere in Australia, removing duplicated and inconsistent regulation between states and territories for specific occupations. The National Occupational Licensing Authority (NOLA) is the independent statutory authority responsible for establishing the National Occupational Licensing System for specific occupations across Australia. NOLA is
SECURITY INSIDER DEC 2013// 21
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 22
ASIAL NEW MEMBERS
WELCOMETO OUR NEW MEMBERS ASIAL is pleased to welcome the following new members who have joined the Association over the past few months. Members A1 Data & Security Solutions Pty Ltd Secure Tech Group B&S Security Pty Ltd Blue Force Pty Ltd Blue Heeler Services Pty Ltd C-Port Security Pty Ltd Coin Co International PLC Compass Security Group Pty Ltd Coopers Training Elude Security Pty Ltd ESS Security Pty Limited Glow Electronics Golden Point Security Pty Ltd Greenco Security Pty Ltd Intiga Security iSecure Security Services Nitestar Security Pty Ltd JJJ Group Services Pty Ltd Joglen Investments Pty Ltd Katanning Security Services PTY LTD Laser Electrical Traralgon Lionheart Security Services Lions Corp Security Pty Ltd Live Visual Monitoring The ASIAL member recognition program acknowledges longstanding association members. Recognition categories include Platinum (25 years+), Gold (16-24 years), Silver (11-15 years) and Bronze (6-10 years). If you are eligible and have not already signed up to the program (there is no cost to sign up).You can find out more information by visiting
22 //SECURITY INSIDER DEC 2013
Magnum Protection Pty.Ltd Mascot Security Services Merit Security & Protective Services Pty Ltd New Age Professionals Pty Ltd NQ Video Surveillance Pty Ltd Omega Security Solutions Pty Ltd Pantac Security Protection 1 Pty Ltd PTI Australasia Pty Ltd Qld Protection Security Pty Ltd Queensland Professional Security Pty Ltd Reliance Security RJG Security and Investigations Pty Ltd ScrutinEyes Secureline Security Services Pty Ltd Security Guard Solutions Security Risk Management Pty Ltd Selectlok (South) Pty Ltd SNA Security Services Group Pty Ltd Spyvision Australia Pty Ltd RPS Security Australia Pty Ltd SureFact Australia Pty Ltd TCP Crowd Control Services Pty Ltd
Tessa Security Pty Ltd Skehan Antenna's Pty Ltd Carver NQ Pty Ltd Top Smart Vision Australia Pty Ltd Western Eagles Security Solutions Pty Ltd
www.asial.com.au/Memberecognitionpr ogram or you can email security@asial.com.au
Safeguard Security Specialists Pty Ltd BRONZE K D Murphy Security Pty Ltd Tactical Training (Australia) Pty Ltd Security Plus Alarm & Electrical Northex Australia Pty Ltd National Management Group Pty Ltd Allcare Monitoring Services Total Security Management
Recent member recognition program recipients GOLD Crackweld Pty Ltd SILVER Prime Group (Aust) Pty Ltd
Upgrades to Corporate Membership Arc Security Systems Pty Ltd Angus Consolidated Pty Ltd Simran Security Sonic Security Services Pty Ltd Grouped Property Services Pty Ltd TXM Group 1 Services Pty Ltd Customised Security Group Pty Ltd Customlink Pty Ltd Infocus Protection Industries Pty Ltd Blue Force Pty Ltd Safe Security Services SolSec Pty Ltd PCW Commercial Windows Pty Ltd Wayne L Hall Pty Ltd Securezone Security Services (AUS) Pty Ltd
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 23
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 24
CLOUD SECURITY
Application Security in the cloud By Darren Leo* When looking for new software for your business, be it accounting, CRM or job management, one of the fundamental questions is ‘Should I use a cloud-based or on-premise solution?’ For many products there is now no longer an option: as cloud technology matures, many vendors have stopped offering on premise solutions in favour of providing their software via the cloud as a priority.Yet many users are still hesitant about cloud solutions, often because of concerns about security. There are many factors to consider when deciding between cloud and onpremise solutions, but we often see clients focusing on security and ignoring other important factors such as reliable access across multiple locations, reduced capital expenditure, minimal infrastructure maintenance costs, vendor managed updates, rapid deployment, data validity and redundancy. In my opinion, the answer settled securely in favour of the cloud a long time ago for many reasons, not least because of the security vendors can offer over and above on-premises solutions. Here are some other things to consider.
Maintenance & Support In most small to medium sized
24 //SECURITY INSIDER DEC 2013
businesses there is no specialist IT team to maintain your applications and servers.You may have a great IT contractor, but do they really understand your new software vendor’s systems, and can they quickly get you up and running when something goes wrong? Are they always available when you need them? If the application is mission critical for you, are you going to have to put your business on hold until they can respond to your request? A good software vendor providing software in the cloud will be in a stable and highly managed environment with 24 hour, 7 day staffing that performs all networking, database and web server monitoring.This ensures your application is running at its best and is accessible when you need it. They will also be able react quickly in an emergency: knowing the systems back to front, they will always be far more capable of restoring service efficiently.Your IT contractor simply won’t be able to compete with that level of service provision.
Security & Data Recovery Cloud applications are generally hosted with enterprise grade expert providers that supply hosting for thousands of other companies.This means they can
afford to utilise the best security to protect your system, including: • physical premises protection (Before a recent visit to one of our data centres, I waited three weeks for my background check to be completed. Even then, I was escorted everywhere in the building. How easy is it for someone to get to the server in your office?) • highly controlled access to the operating floor • world class network security • redundant and fault tolerant power and cooling systems • redundant internet service providers • onsite and highly experienced technical staff 24/7 • onsite replacement hardware The cloud in most cases delivers some great security and data recovery benefits over on-premises systems. It is not possible to steal your cloud data and server because they are physically protected in a secure data centre and often distributed over different machines. Contrast this with a client of ours, who actually had all their servers and computers stolen before implementing simPRO Enterprise.They had no offsite backups and lost nine
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 25
CLOUD SECURITY
months of operational and financial information.This simply can’t happen in the cloud. During the 2011 Queensland floods, some of our clients got first hand experience the dangers of an onpremises solution. As their office went under water, so did their server and all of its data, making recovery impossible. Clients who were fortunate enough to remain dry were in most cases without power for up to nine days, so while their onsite server was safe, it was unusable. However, simPRO clients that were hosted in the cloud simply had their staff work from home and access the
system from there—not quite business as usual, but business continued.
Redundancy & Backups With enterprise grade hosting solutions, your software vendor will also generally provide a setup consisting of high availability and failover technologies, meaning if a part of it fails, mechanisms will kick in to prevent operational disruption.Your data is also protected with numerous backups and can be recovered through a redundancy mechanism in the event of an outage. Network downtime and application
crashes are more common in an onpremises setup due primarily to less stringent (or a complete lack of) monitoring and maintenance regimes. On-premises software hosting can suffer quickly through technical incompetence, a lack of backup processes, poor network health monitoring, or failure to implement upto-date security technologies across the network and associated computers. Something as simple as not updating your internet router’s firmware could you leave you open to attack and data loss.
SECURITY INSIDER DEC 2013// 25
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 26
CLOUD SECURITY
Big Business in the Cloud Company size used to greatly impact the decision making process when it came to implementing cloud technology. But size doesn’t matter anymore: the Australian Federal and State Governments along with many global counterparts such as the CIA have begun a massive operation to move their data to the cloud. We also see this with large simPRO clients, such as Masters, AGL and Energy Australia, who run all of their mission critical operations in the cloud. If it’s safe enough for the CIA, I would hazard a guess that it is safe enough for your business. simPRO and the Cloud Just five years ago, 50% of all new clients joining simPRO were running Enterprise on-premises.This figure has dropped to less than 5%. At simPRO we have built our cloud with one of the world’s most highly regarded data centre providers, Rackspace, to ensure that we are providing both performance and reliability in a world class set of data centres. We are now midway through a major upgrade of our cloud service to handle a growing global base of simPRO clients.
2 Geographical Redundancy At 1 am every day, all data in our primary data centre (including customisations, databases and attachments) is automatically synchronised to a secondary, geographically separated data centre. This ensures that in the event of a catastrophic failure in our primary data centre, we can fall back to the secondary data centre in the time it takes for our DNS to update. With the upgrades we are currently undergoing, we will have three geographically diverse data centres, all with real time (up-to-date) copies of the primary servers’ data and all ready to be switched to in real time should an issue occur at the primary facility, with no data loss and minimal service impact. 3 Backups Each night, databases and attachments are backed up to a number of silos in each of our operating data centres and further replicated into the Amazon S3 storage network.The Amazon S3 solution gives us an enterprise grade data backup solution that is replicated throughout the global Amazon network of around 30 data centres. Known as “eventually persistent
storage”, a backup sent to Amazon is then distributed throughout the Amazon global network and becomes available to us for use from any of their data centres within seconds. As Robert Geller of InstanTek recently explained in an interview,“Much of the concern about cloud security is fear, uncertainty, and doubt, perpetuated by legal and privacy pundits with little to no actual technical or operational knowledge. A server sitting in a datacenter, a server room, or a closet is ripe for a disgruntled employee or thief’s picking or destruction.” So just because you can see it, it doesn’t mean it’s safe. Geller also states that,“With true cloud solutions, the sheer amount of data and the size of the infrastructure at cloud service providers means that thieves or bad actors couldn’t even identify which server hosted which application or customer’s data.” Of course, the cloud might not suit every business as there are more things to consider than just the security of your applications and data, as I have mentioned above. I see availability and reliability as far more pressing concerns for most businesses, and concerns that the cloud can address brilliantly.
The three factors paramount in our cloud design are as follows: 1 Primary Redundancy and Failover Our primary service has multiple layers of redundancy. The frontend servers used to host the primary operation is replicated with a group of secondary (slave) servers in the background. Every time a transaction occurs on the frontend servers, the exact same transaction occurs on the secondary servers. In the unlikely event of a problem occurring on the primary servers, we instantaneously switch users to the secondary servers without any loss of data. *Darren Leo, Business Development Manager NSW-ACT-SA, simPRO Software Pty Ltd.
26 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 27
INSIDER_Nov/Dec 2013 Iss5_52pp
28 //SECURITY INSIDER DEC 2013
24/10/13
8:34 PM
Page 28
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 29
For further information contact Eric Lowenstein at Aon Australia at eric.lowenstein@aon.com
SECURITY INSIDER DEC 2013// 29
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:34 PM
Page 30
WORKPLACE BULLYING LAWS
New bullying laws – make sure you are ready By Chris Delaney
From 1 January 2014 a worker who "reasonably believes" they have been bullied in the workplace will be able to apply to the Fair Work Commission (FWC) for orders against the perpetrator and their employer requiring them to stop the bullying. A worker will be taken to have been bullied at work if an individual or group of individuals "repeatedly behaves unreasonably towards the worker... and that behaviour creates a risk to health and safety". Although "reasonable management action carried out in a reasonable manner" will not amount to a case being made it is inevitable that there will be disputes about what did or did not amount to bullying. The protections will extend to "workers" including: • employees; • contractors and sub-contractors; • outworkers; • apprentices and trainees; • work experience students; and • volunteers. Where the FWC is satisfied that bullying has occurred and there is a risk of further occurrences, it will be able to make "any order it considers appropriate" – except an order requiring payment of compensation – to stop the bullying. The FWC is required to consider anything else it believes to be relevant,
30 //SECURITY INSIDER DEC 2013
including if the worker attempted to resolve their issues at the workplace level through grievance or workplace harassment policies. The new laws will introduce a new part to the Fair Work Act 2009 (Cth) headed "Workers Bullied at Work" and will not be limited to employees. It will also cover contractors, subcontractors, outworkers, apprentices, trainees and students gaining work experience as well as volunteers. Under the new laws, a worker is bullied at work if an individual or a group of individuals repeatedly behave unreasonably towards a worker, or a group of workers which the worker is a member and that behaviour creates a risk to health and safety. It is important to note the following: • there must be repeated behaviour; • the behaviour must be unreasonable; and • that behaviour must create a risk to health and safety. However, it is not a requirement that the risk to health and safety is to the workers being bullied.
Powers of the Fair Work Commission Once an application for relief from bullying is filed the FWC must deal with it within 14 days. If bullying has taken place, the FWC can make orders to restrain the conduct of the employer until the matter is either resolved by the parties in conference or determined by the FWC with a final order.The employer must follow any order of the FWC or face the possibility of a fine from the Federal Circuit Court of up to $51,000 for a corporation and $10,200 for an individual. It is therefore crucial that employers have an effective workplace bullying policy in place.That policy should include: • a definition of workplace bullying including a statement that workplace bullying is unlawful; • a complaints process; and • consequences for the worker that has engaged in workplace bullying. Definition of Workplace Bullying Bullying at work is repeated, unreasonable behaviour directed towards a worker, or a group of workers, that creates a risk to their health and safety.
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 31
WORKPLACE BULLYING LAWS
Repeated behaviour refers to the persistent nature of the behaviour and can include a range of behaviours over time. Unreasonable behaviour means behaviour that a reasonable person, having regard for the circumstances, would see as victimising, humiliating, undermining or distressing. Whether intended or not, bullying is a health and safety risk. Types of unreasonable behaviour that may be considered as workplace bullying, when part of a repeated pattern of events, can include: • abusive, insulting or offensive language • undue criticism • excluding, isolating or marginalising a person from normal work activities • withholding information that is vital for effective work performance • unreasonably overloading a person with work, or not providing enough work • setting unreasonable timelines, or constantly changing deadlines • setting tasks that are unreasonably below or beyond a person’s skill level • denying access to information, supervision, consultation or resources, resulting in detrimental effects to the worker • spreading misinformation or malicious rumours • improper treatment in relation to accessing workplace entitlements, such as leave or training. Sometimes these are conducted in social media, via email or SMS. Employers should ensure that policies are developed to include electronic and/or social media. What is not workplace bullying? Reasonable workplace management There is no definition of what is "reasonable management action carried out in a reasonable manner." In our opinion performance and conduct management (disciplinary procedures) conducted objectively and professionally will fall within this exception. In defending against a bullying complaint employers will be required to provide evidence to the FWC that the performance management is "reasonable management action" and
SECURITY INSIDER DEC 2013// 31
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 32
WORKPLACE BULLYING LAWS
escalate into bullying. Workplace violence occurs when a person is abused, threatened or assaulted in circumstances relating to their work. Unlike bullying, an action does not need to be repeated to be considered violent. To conclude, an effective, an antibullying policy should include all of the following: 1. A clear definition of prohibited abusive or "bullying" behaviours. 2. A complaints procedure that requires employees experiencing or witnessing abusive behaviour to promptly report it.The policy should designate at least two persons to whom complaints should be made under the policy, in the event one of the person's designated is the alleged bully. 3. An investigation procedure that provides a prompt, thorough and impartial investigation. 4. Assurance that employees who make complaints or participate in an investigation will be protected against retaliation. that that it has been "carried out in a reasonable manner, creating further expense for employers. Examples of reasonable management action include: • setting reasonable performance goals, standards and deadlines • rostering and allocating reasonable working hours • transferring a worker for operational reasons • failing to promote someone after a proper, documented selection process • informing a worker that their performance is unsatisfactory, after following established performance management guidelines • informing a worker, objectively and confidentially, that their behaviour is inappropriate • a restructure.
Discrimination occurs when someone is treated unfairly because of a particular individual characteristic, such as age, race or gender. For example, it would be discriminatory not to hire or promote a person because of their religion. Harassment involves unwelcome behaviour that intimidates, offends or humiliates someone. Unlike bullying, discrimination and harassment do not have to be repeated. Anti discrimination, equal employment opportunity, workplace relations and human rights laws deal with these matters. Workplace conflict is not workplace bullying. Not all conflict is negative nor does it always pose a risk to health and safety. A single incident of unreasonable behaviour is not bullying, although it may have the potential to
5. Assurance that the employer will take immediate and appropriate corrective action when an investigation determines that a violation of the policy has occurred. 6. Regular training for all employees on the policy. 7. Consistent enforcement of the policy. An anti-bullying policy should provide a fair, efficient and confidential complaint mechanism and the consequences of non-compliance with the policy should be made clear to all "workers". ASIAL can assist you with developing workplace policies dealing with bullying complaints and all other workplace issues. For more information email ir@asial.com.au
Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au
32 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 33
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 34
PSIM
DESIGNING A PHYSICAL SECURITY INFORMATION MANAGEMENT (PSIM) SYSTEM By Roger Pearce*
PRINCIPLES OF DESIGN
points being monitored with a further
responses are handled for them by the
My article on “the Geometry of PSIM” in
factor built in based on the type of
PSIM.
the September issue of Security Insider
facility. A campus with a large
generated interest, so I will expand
population of students and staff will
that it allows a “clean desk policy” to be
further on the theme in this article.
have more interaction with people than
implemented. By this I mean a minimum
an office complex. A multi-use site like
of equipment should be needed for the
where you will be designing a PSIM.
a port or airport will have complexity
operators to do their job. I would hope
One will be for a large Greenfield site
and large numbers of people
that, at each operator’s console, all that
where all new systems are being
compared with a prison where there is
is needed is a keyboard, mouse, 3 x 22”
installed and commissioned.The other
a much more controlled environment.
monitors and an audio (phone, intercom
There are two most likely situations
will be for an upgrade, expansion or
The number of operators needed will
One of the main benefits of a PSIM is
& two way radio) console.
relocation of an existing Security
vary considerably with each application
Control Room. What they will have in
however a PSIM will make the
would be a central report printer and
common is a large number of sub-
operators more efficient and therefore
Standard Operating Procedures (SOP)
systems probably installed by different
may reduce the number needed
files. In front of the operators will be the
integrators and subcontractors all of
compared with the number you might
video wall with the large screen
which are to be controlled and
need with separate sub-systems to
monitors.The number of screens or the
monitored by an in house security
manage. As described in my previous
size of the video wall will vary based on
team.
article the PSIM manages events with
the application, the determining factors
pre programmed Scenarios which are
being the same as those mentioned
the design of the Security Control
loaded into the software. Each
above for the number of operators.
Room and operator’s consoles, (2) the
scenario defines the automatic
interfacing of all the sub-systems to
response required for each known or
the PSIM and (3) interfacing of
predicted event likely to occur.This
(2) INTERFACING SUB-SYSTEMS |TO THE PSIM
The challenge is in three parts (1)
Common to all operators close by
library of scenarios is built up using
The number of interfaces needed and
previous history and the experience
manner in which they are interfaced
(1) THE SECURITY CONTROL ROOM
gathered over many years of operation.
varies greatly.The first thing to do is to
The size of the room and the number
This means that the control room
work up a list and then work out how
of operators will be determined by the
operators have more time to be
easy or hard each interface is going to
number of locations, buildings and
proactive during a crisis as the routine
be. If you are lucky some will already
databases.
34 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 35
PSIM
have been developed.The PSIM vendors
a general rule the one directional
mind that the Control Room operators
have been working hard developing
interfaces would be for Fire, intercoms
are not necessarily system
interfaces over recent years so many
and Building Automation System (BAS).
administrators.They may not be
have already been tried and tested.
Bi-directional interfaces would be
managing the databases of sub-systems
However depending on your sub-
more important for Security Access
in the control room. System
systems there is a reasonable chance
System (SAS) which includes security
administrators will be using the sub
many have not been developed.
and duress alarms and CCTV.
system head ends at another location
The sub-systems that only need a
All voice can be integrated using a
such as the Operations Area to program
signal received by the PSIM and do not
purpose built console.This allows two
the system data, time zones and
require an acknowledgement or signal
way radio, Intercom & phones to all be
configuration as well as user groups,
back can be one directional and should
handled on the one instrument or
cardholders, alarm parameters etc.
be the simplest.
headset.
Since the mapping is done in the
An interface with the two way radio
The Visitor Management System (VMS) will probably be run from
PSIM each point can be given an
system will allow the GPS positioning of
Reception or the Concierge Desk. A link
address so that it shows up on a map
radios as well as signalling a duress call
to this system offers the option of
without the need for a bi-directional
or man down alarm from a radio into the
issuing visitors an access card instead
interface.
PSIM.This will allow rapid location of the
of a Visitors badge.This is very useful for
Security Guard out in the field.
visitors requiring access to secured
Where there is a need for interaction between the PSIM and the sub-system
areas of the facility.
needed via a keyboard command or
(3) INTERFACING OF DATABASES There will be a number of sub-system
where staff or student information is held
clicking on an icon on a map a bi-
databases that may need linking via the
in a personnel database a high level
directional interface, more than likely
PSIM depending on the level of
interface (HLI) is most important.
high level (HLI) will be necessary.
functionality that the Control Room
such as when control of a point is
It may not always be the case but as
Operators are going to have. Keep in
For sites with large user databases
Depending on the operational requirements of the security team a HLI to an Incident Reporting System might also be required.The level of reporting and analysis of incidents as well as dispatching patrols and management of the security team may be beyond the standard capabilities of the PSIM and a specialist software package which has greater capabilities in this area should be considered. Transfer of data between these system databases will eliminate duplication of data entry tasks as well as better reporting on events and activity. BACK UP AND SUPPORT Naturally all this technology will need the right sort of back up and support. It goes without saying that Uniterruptable Power Supply (UPS) will be needed for all systems.There will be a significant amount of hardware needed, including servers and network switches so data racks will have to be located close to the Control Room.
About the author: *Roger Pearce is an independent security consultant with over 30 years experience in the electronic security industry. Over 15 years of which have been as an independent consultant advising clients on a range of security technology applications. He can be contacted at sbtb@people.net.au or www.sydneysecurityconsultants.com.au
SECURITY INSIDER DEC 2013// 35
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 36
CENTAMAN ENTRANCE CONTROL
Making an entrance at the new Sydney Gymnastic and Aquatic Centre The Rooty Hill RSL Group (RHR Group) with over 48,000 members has a vision to be “Sydney's Leading Leisure Venue”. With 3 dining venues, 8 bars, 600 seat theatre, sports bar, live entertainment venue, private function rooms, child minding facilities, AMF Bowling and 160 room Novotel Hotel, RHR Group is positioned at the forefront of innovation and success in the entertainment and hospitality industry. ONE55 Health & Fitness, a state of the art health, fitness and gym sports centre, (established in May 2008) is also on the RHR Group site and offers the biggest gym facilities in Western Sydney and provides activities and services for all things health & fitness to 5,000 active members.The next part of RHR Groups vision was to develop a state of the art gymnastic and aquatic centre. As such the Sydney Gymnastic and Aquatic Centre (SGAC) came about and now features a 4,000m2 Olympic grade gymnastics facility, two 25 metre swimming pools and a sports medicine and rehabilitation centre. Importantly, the SGAC is as much about striving as it is about success. In addition to catering for first-rate, top-level ranked athletes, the centre aims to encourage sport participation and skill development for all community
36 //SECURITY INSIDER DEC 2013
members of all ages and physical ability. One of the key design issues for SGAC was to develop an entrance control solution that would allow its members and visitors quick and easy access to the facilities. Centaman Entrance Control worked alongside SGAC’s architects, Cox Architecture, to come up with an entrance control solution designed to complement this exciting new development. Cox Architecture had evaluated a number of different turnstile solutions in its effort to balance not only the budget, but to maximise efficiency, provide the best visitor experience all while maintaining the high level of aesthetic design evident throughout the facility. In the end it was decided that a speedgate with glass barriers which opened in a user friendly ‘door like’ motion was the best solution and Centaman Entrance Control promoted the operational speed, slim design and ease of use features of their EasyGate SG for the main entrance.The sleek and stylish nature of the product was in synergy with the design of the building itself. Centurion EasyGate SG uses glass barriers in conjunction with state-of-theart optical technology to provide a high throughput security gate.The bidirectional glass barriers are designed
to work in a ‘normally closed' mode and open after a valid card has been presented to allow the authorised user to gain entry.The barriers are designed to close quickly behind the authorised person to deter tailgaters whilst the IR sensors monitor the lane to detect unauthorised entry and ensure the safety of users.The barriers open in a door like motion which enables the pedestal to be only 200mm wide and the same slim pedestal can be used in wide Disabilities Discrimination Act compliant lanes which ensures the turnstiles have a minimal visual impact to distract from the overall building design. The LMS membership solution where already providing the Point of Sale & Access control solution for ONE55
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 37
CENTAMAN ENTRANCE CONTROL
THE SYDNEY GYMNASTIC AND AQUATIC CENTRE • The Sydney Gymnastic and Aquatic Centre (SGAC) features a 4,000 sqm Olympic grade gymnastics facility, two 25 metre swimming pools and a sports medicine and rehabilitation centre. • The specialist facilities are complemented with a central service area with members assistance, merchandise and a café with seating for 80 people. Health & Fitness, and as such, it was decided to extend this system to the new site. Members can use their existing membership RFID cards whilst casual visitors who wanted one time entry to the site for certain events would be supplied with bar coded tickets printed at the point of sale. The Gantner, dual technology controller, was used as the interface between the turnstiles and the membership system.These network enabled devices feature both a RFID and bar code reader as well as a display to guide users through the
system. As soon as a ticket is sold it is added to the database so that the visitor can then scan their ticket at the turnstile to gain access. When a member or ticket holder scans their card at the turnstile it is automatically checked to see if it is valid at that time. If so, the EasyGate SG quickly opens to provide a clear lane for easy ‘hands free’ access. If not, the user is directed to reception by the on board displays. ‘As many SGAC members carry sports bags and other items we definitely wanted a hands free solution for the turnstiles. But, of course, with the
high number of visitors they have coming each day it needed to be quick and efficient as well.The EasyGate barriers fulfil these requirements and blend perfectly with the foyer surroundings.The dual technology controllers allow SGAC to offer the ease of use of RFID to its members whilst one time users get a printed bar coded ticket which is highly cost effective’. Says Michael Bystram, General Manager of Centaman Entrance Control.
SECURITY INSIDER DEC 2013// 37
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 38
HOT PRODUCTS
Hikvision 2MP PTZ with IR & Edge recording
NEW!
■ Central Security Distribution > 1300 319 499 ■ Web > www.centralsd.com.au Recording at 2 MP and built on the latest Davinci processing platform the Hikvision HIK-2DF7286-A delivers outstanding images regardless of conditions. With just about every available acronym in its feature list this PTZ is equally comfortable in low light or utilising its high ratio wide dynamic range. Hikvision have included the usual host of programming options for patrols as well as high speed pan/tilt with ±0.1° pre-set accuracy and support for smart tracking. Rounded off with a built-in Web server, Edge Recording, support for up to 8 NAS devices along with 120m IR illumination making this powerfully versatile weatherproof PTZ.
iCare Personal Tracker ■ Grade One Monitoring > 1300 723 185 ■ Email > info@grade1.com.au ■ Web > www.grade1.com.au
NEW!
Grade One Monitoring has launched the iCare Personal Tracker. Our Grade A1 monitoring centre now offers the peace of mind of a trackable hand held device utilising the Telstra Next G network. The iCare unit offers a rapid and accurate GPS positioning, 2 way on board communication as well as a geo-fencing solution. iCare monitoring has many benefits including the ideal solution for OH&S/WHS legislation, a safety device for loved ones, immediate notification in the case of a medical emergency as well as GPS tracking for dementia patients. Phone us on 1300 723 185 to discover the full range of features and benefits that the iCare Personal Tracker has to offer for your staff and clients as part of an overall security solution.
simPRO eForms ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Paper forms capture all the information you need on the job, but they’re not well suited for the field and can be easily lost or damaged.They require manual handling and processing that can waste valuable time better spent getting the job done. simPRO eForms digitises your forms workflow, ending your dependency on paper forms. Field employees use a tablet to complete and submit PDF forms to the eForms Portal, where they can be viewed, downloaded, or automatically actioned. • Send forms back to the office instantly • Attach photos • Updates forms for all users at once • Integrate with simPRO Enterprise and other software packages • Employ paperless technology Find out how eForms can simplify your workflow at www.simpro.com.au
38 //SECURITY INSIDER DEC 2013
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 39
HOT PRODUCTS
DTU3G/IP ■ SCSI > 1300 555 570 ■ Email > daleacott@securitycommunications.com ■ Web > www.securitycommunications.com SCSI’s DTU3G/IP wireless alarm communicator is Australian made and designed. Dual-SIM technology provides 6 secure paths using Telstra NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. With thousands already sold and installed, the DTU3G/IP has been released to the Australian Security Industry with outstanding success. The combination of multiple, proven communication paths ending the days of nuisance “poll fails” and unwarranted guard attendances. The DTU3G/IP connects to the DirectWireless Network, Australia’s only dedicated and private alarm transmission network. To find out more about the DTU3G/IP, contact SCSI on 1300 555 570.
NEW!
NEW!
Maximum Camera Value: All-new Sarix IL10 Series Box Cameras and Micro Domes ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix The all-new Sarix™ Value Range of mini box and micro dome cameras are high-definition, cost-effective IP network cameras perfect for most any indoor fixed video security application.These cameras produce high-quality, color HD video, and the integrated pre-focused fixed focal length lens makes sharp scene alignment and installation quick and easy. Convenient network connectivity, PoE models, and a simple Web user interface, make for easy plug-and-play finalisation of settings and positioning adjustment. And by delivering industry-leading Sarix image quality, backed by the Pelco™ by Schneider Electric™ satisfaction guarantee, the IL10 series are the value-driven cameras that you can choose with confidence.
Schneider Electric Expands Investment in IP Video with Major Additions to Pelco Line ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix Schneider Electric announced a major expansion and commitment to its Pelco IP Video Surveillance product line by announcing the planned rollout of more than 50 new IP cameras in 2013, including the new Sarix IL10 Series mini box and micro dome cameras. Schneider Electric continues to make major investments in IP video, expanding its R&D effort, product line and industry-leading education and training programs to meet the needs of partners and customers. The company has achieved several major milestones in its continuing evolution as an IP market leader, including the expansion of its Fort Collins, Colo. Facility.
NEW!
SECURITY INSIDER DEC 2013// 39
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 40
HOT PRODUCTS
Looking for a Security Partner in the ACT? ■ Leader Security > 1800 LEADER ■ Web > www.leadersecurity.com.au We’re about developing long term partnerships based on honesty, trust, transparency, reliability and accountability. Oh… Not forgetting to mention exceptional service? These are not just words to us; they are our underlying core value that best describes the Leader Security approach to business partnerships. We stand by our values. Leader Security offers a seamless extension of your business here in Canberra. Allow our expert team to safeguard your clients along with your reputation. We're here to help… • Mobile Patrols / Alarm Responses • Static Guards / Crowd Control / Event Management / Man & Dog Teams • Electronic Security Technicians • Cash in Transit / Banking Services
Powerful Mobile Control ■ Inner Range > +61 3 9780 4300 ■ Web > Central Security Distribution - www.centralsd.com.au ■ Web > Inner Range - www.innerrange.com
NEW!
The Integriti Mobile App packs a powerful punch of accessibility and control for your Integriti Security and Access Control System from any smart mobile device. The Mobile App puts you in control, allowing you to individually tailer the App to fit your needs and requirements. Advanced customisation lets you create custom page views and Widgets for fast access to common tasks. The App provides real-time system status and control, from locking or unlocking doors and gates, arming or disarming your security system, to controlling auxiliary devices like heating and cooling. It even gives you the power to start automated tasks and view system activity logs. Whatever your schedule or wherever you are, the Integriti Mobile App empowers you to take charge of your Integriti Security and Access Control System. It really is convenient System Control at your fingertips.
Multipath-IP - SkyCommand ■ Inner Range Melbourne > +61 3 9780 4300 ■ Email > admin@innerrange.com ■ Web > www.innerrange.com SkyCommand is a new browser based application for Multipath-IP, it allows you to take command of youralarm system like neverbefore and control your home or business with convenience. SkyCommand gives you remote access you can depend on using Multipath-IP connectivity. Take full control of your alarm system & integrated systems like lighting and access control from anywhere in the world. SkyCommand is on call anytime from anywhere via any desktop or mobile device, it is included as a standard option with selected Multipath-IP monitoring plans. For more information contact: Inner Range Melbourne 03 9780 4300 | www.innerrange.com
40 //SECURITY INSIDER DEC 2013
NEW!
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 41
ASIAL Certified Security Monitoring Centres*
Current as at: 11 October 2013
Company (short form name)
Australian Security Industry Association Limited
State
Cert. No.
Grade
WA
379
A2
28 Feb 2014
ADT Security
NSW
404
A1
30 Jun 2014
ADT Security (Data Centre)
NSW
405
A1
30 Jun 2014
ARM Security
WA
402
A1
10 Mar 2015
ART Security
VIC
392
A1
30 Sep 2014
Calamity Monitoring
NSW
383
A1
20 Mar 2014
Central Monitoring Services
NSW
380
B1
21 Mar 2014
Commonwealth Bank of Australia
NSW
389
A1
24 Sep 2014
VIC
391
C2
18 Mar 2014
NSW
398
A1
25 Nov 2014
Allcare Monitoring Services
Energize Australia Glad Security
Expires
Golden Electronics
TAS
395
A1
17 Oct 2014
Grade One Monitoring
NSW
378
A1
13 Feb 2014
Grid Security Services
NSW
381
A1
18 Mar 2014
Instant Security Alarms
QLD
413
A1
23 Sep 2015
ISS Security
NSW
373
B3
25 Nov 2013
Linfox Armaguard
VIC
393
A1
08 Aug 2014
Mekina Technologies
TAS
399
A1
02 Nov 2014
NSS Group
NSW
384
A1
07 May 2014
Onwatch
NSW
396
B1
31 May 2014
Paul-Tec Australia
NSW
409
A1
01 Aug 2015
Protection Pacific Security
VIC
394
C2
9 Aug 2014
RAA Security Services
SA
400
A1
12 Dec 2014
NSW
374
A1
14 Dec 2013
Secom Australia Sectrol Security
VIC
412
B2
01 Dec 2014
Securemonitoring
VIC
414
A1
23 Nov 2015
NSW
386
A1
04 May 2014
Security Alarm Monitoring Service
SA
387
A1
18 Jun 2014
Security Control Room
VIC
411
A1
18 Aug 2015
Sesco Security
WA
407
A1
03 Jun 2015
Signature Security
WA
403
A1
30 Jun 2014
SMC Australia
QLD
372
A1
07 Dec 2013
SMC Australia
VIC
371
A1
16 Dec 2013
Securenet Monitoring Services
SNP Security (Newcastle)
NSW
410
A1
17 Aug 2015
SNP Security (Sydney)
NSW
408
A1
13 Aug 2014
Spectus
WA
406
A1
12 Apr 2015
State Government Protective Security Service
QLD
388
C1
22 May 2014
Westpac Banking Corporation
NSW
382
A1
19 Mar 2014
Woolworths Limited
NSW
397
C1
04 Nov 2014
*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.
SECURITY INSIDER DEC 2013// 41
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 42
ASIAL NATIONAL CALENDAR OF EVENTS 2014 JANUARY-MARCH
JULY-SEPTEMBER
26 February, Hobart 7 March, Melbourne 19 March, Sydney 20 March, Adelaide 21 March, Perth 26 March, Canberra 26 March, Brisbane
10 July, Adelaide ASIAL Industry Briefing 11 July, Perth ASIAL Industry Briefing 23 July, Sydney ASIAL Industry Briefing 6 August, Brisbane ASIAL Industry Briefing 24 September, Canberra ASIAL Industry Briefing 25 September, Hobart ASIAL Industry Briefing
ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing
APRIL-JUNE 4-6 June, Melbourne Security 2014 Exhibition & Conference
OCTOBER - NOVEMBER 15 October, Brisbane 16 October, Melbourne 23 October, Sydney
ASIAL Industry Briefing ASIAL Industry Briefing 2014 Australian Security Industry Awards for Excellence 6 November, Adelaide ASIAL Industry Briefing 7 November, Perth ASIAL Industry Briefing 26 November, Sydney ASIAL Industry Briefing and 45th Annual General Meeting
To find out more register online www.asial.com.au/eventscourses or email events@asial.com.au
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 43
INSIDER_Nov/Dec 2013 Iss5_52pp
24/10/13
8:41 PM
Page 44