ASIAL Security Insider Dec 2013

Page 1

INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:20 PM

SECURITY

Page 1

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[ M AG A Z I N E ] VOL.18 | ISSUE.5 | DEC 2013

67 26

PP255003/02390

Application Security in the cloud National Licensing – time for action | www.linkedin/company/asial


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:20 PM

Page 2


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 3


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 4

CONTENTS VOL.18 | ISSUE.5 | DECEMBER 2013

24 Application Security in the cloud

10 Registered cabler website

30 New bullying laws – make sure you are ready

06 | President’s message 08 | New look ASIAL web site 08 | 44th ASIAL Annual General Meeting - 20th November 2013

and public officials corrupt 16 | National Broadband Network 18 | Local Government Procurement Initiative – survey results

10 | ACMA rule changes for specialist competencies 12 | ICAC finds security providers

20 | SIA launches licensing of security businesses 22 | ASIAL New member listing

ASIAL Strategic Partners:

4 //SECURITY INSIDER DEC 2013

36 Making an entrance at the new Sydney Gymnastic and Aquatic Centre

28 | 34 | 38 | 41 |

30 minutes with Kevin Kalinich Designing a PSIM Hot products Monitoring centre certification listing 42 | ASIAL Calendar of events


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 5


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 6

PRESIDENT’S MESSAGE

Engagement is the key

T

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by

o ensure its effectiveness as a peak body, ASIAL remains committed to

The Australian Security Industry

actively engaging with its members and key stakeholders.Through the upgrade of is website the Association is harnessing electronic communication

channels such as social media, online forums, blogs, webinars etc to interact and engage with more of our members.

Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au

Having said that, we still place great importance on face-to-face contact. At a

Publisher

recent function in Brisbane, the board welcomed the opportunity to meet with members to discuss the state of the Industry in Queensland. Over the coming months members will have further opportunities to engage with directors at meetings to be held in Sydney (20 November, 2013 AGM), Hobart (26 February, 2014) and Melbourne (4-5 June, Security 2014). As part of its Brisbane meeting the board was joined by Brian Bauer, Executive Director of the Office of FairTrading (OFT) who delivered a briefing on developments in

Editor Bryan de Caires | security@asial.com.au

the regulation of security providers in Queensland. It was very pleasing to receive some very positive feedback on ASIAL’s activities in Queensland and to hear that OFT are

Editorial Enquiries communications@asial.com.au

putting in place a number of proactive measures to target industry non-compliance.

Advertising

Over recent weeks ASIAL has been approached to lodge submissions by the

Tania Laird | advertising@asial.com.au Creative Director

Northern Territory Service Industries Training Advisory Council (NT Skills Occupation Priority List) and the South Australian Attorney General (Screening of those that work

Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress

or volunteer with children and vulnerable people). ASIAL will represent the industry before the Fair Work Commission in response to the low paid authorisation application lodged by United Voice in the Australian Capital Territory. We have also been approached to participate in initiatives organised by the

Webfx2 Digital | design@webfx2.com.au Editorial Contributors AON, Chris Delaney, Darren Leo and Roger Pearce

Australian Institute of Police Management,The Centre for Excellence in Policing and

Print + Distribution

Security and the Defence Science and Technology Organisation. We also continue to

Nationwide Advertising Group

work with the Fair Work Ombudsman in preparation of the Local Government Procurement Initiative and the National Emergency Communications Working Group to develop a national alarm response protocol. With the change of Federal government, the incoming Minister for Communications The Hon Malcolm Turnbull has flagged major changes to the

Published bi-monthly Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions

National Broadband Network (NBN).Through the Association’s participation on a

are welcomed, though the publisher reserves the

number of NBN sub-committees, we will continue to advocate for the interests of the

right to decline to publish or to edit for style,

industry.This is not the time to rest on your laurels, with disconnection of the copper network commencing in May next year, doing nothing is not an option. I could go on, but I won’t. I am not blowing our own trumpet, rather I am trying to highlight the growing standing with which your Association is now held and to highlight the range and diversity of issues we advocate for on behalf of the industry.

grammar, length and legal reasons. Press Releases to: security@asial.com.au. Internet

references

in

articles, stories

and

advertising were correct at the time of printing. ASIAL does not accept responsibility for misleading views. Copyright©2013 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without

Finally, I would like to bring your attention to the upcoming 2013 AGM which will

permission is strictly prohibited. Security Insider is

be held at The Park Royal Hotel at Parramatta (NSW) on 20th November. I encourage

a subscription based publication, rates and further

all Members to attend and engage with your association.

details can be found at www.asial.com.au.

[Next Issue] FEBRUARY 2014

Kevin McDonald President

6 //SECURITY INSIDER DEC 2013

ISSN 1442-1720


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 7


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 8

INDUSTRY NeWS

NEW LOOK ASIAL WEB SITE A new look ASIAL web site incorporating a range of new features and functionality will go live

at the end of November.The revamped site will include easier log-in and navigation, access to

PUBLIC-PRIVATE POLICING FORUMS Public-private partnerships is becoming an increasingly important issue.The growth in the private security industry over recent years has resulted in the industry taking on an increasing number of roles once performed by public police. With increasing contestability to service delivery, it is likely that we will see private providers moving into more areas traditionally regarded as the domain of the police force.This poses challenges for both public and private policing providers. The Australian Institute of Police Management is hosting a symposium

8 //SECURITY INSIDER DEC 2013

that will bring together world leading academics to discuss the intersect of their roles, the challenges facing both in the evolving crime and policing environment, and how both sectors can maximise their relationship. The Centre for Excellence in Policing and Security (CEPS) is also hosting a workshop on policing major events, which will look at issues relating to public / private partnerships. ASIAL CEO Bryan de Caires has been invited to participate in both events to provide an industry perspective.

online forums and mobile device friendly versions.

44TH ASIAL ANNUAL GENERAL MEETING - 20TH NOVEMBER 2013 ASIAL’s 2013 Annual & Financial Report is now available for review (www.asial.com.au/ar).The report will be presented for adoption at the 44th Annual General Meeting to be held at 7.45am on Wednesday 20th November 2013 at the Park Royal Parramatta. Members are encouraged to attend.The AGM notices have been dispatched to members today. Please keep an eye out for it in your mail.


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 9

INDUSTRY NeWS

INDUSTRY GUIDANCE NOTE ON MIGRATION OF BACK TO BASE MEDICAL AND SECURITY ALARMS TO THE NBN Communications Alliance has published a guidance note for industry and other stakeholders on the complex issues surrounding the migration of back-to-base Security Systems and Personal Medical Alarms to the National Broadband Network (NBN). The Guidance Note was

developed by the NBN Over-the-Top Services Transition (NOST) Working Group of Communications Alliance – a multi-stakeholder group that included ASIAL and representatives from NBN Co, service providers, medical and security alarm providers, the ACMA and relevant Government departments. The guidance note is a valuable resource to enable all stakeholders to gain an accurate picture of the relevant industry structure, the nature and operation of the more than 1.2 Million Security Systems and 350,000 Medical Alarms in-market and the responsibilities of the various parties. A copy of the guidance note is available on the ASIAL web site.

occurred involving a weapon.The positive news is that these numbers were down slightly on the previous year. However, fraud rose by 22% to almost 47,500 incidents. Don Weatherburn, Director, NSW Bureau of Crime Statistics will address the upcoming ASIAL Industry breakfast briefing in Parramatta on the 20th November on crime trends in NSW.

CRIME TRENDS IN NSW In NSW for the year ending 30 June 2013, over 38,000 homes were broken into and 2,654 robberies

SECURITY INSIDER DEC 2013// 9


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:21 PM

Page 10

CABLING NeWS

ACMA RULE CHANGES FOR SPECIALIST COMPETENCIES – ACT NOW! The Australian Communications and Media Authority (ACMA) have amended the regulatory requirements for cabling providers who install specialised cabling within customer premises. Registered cablers who intend carrying out specialised cabling after 1 July 2014 are reminded that the ACMA’s rule changes for specialised (such as Structured, Co-axial and Optical Fibre) cabling come into force on that date. Cablers undertaking Structured, Co-axial, Optical Fibre, or Broadband cabling must by then have the training competencies relevant to this specialised cabling work.The new competencies only apply to cabling providers who undertake the relevant specialised cabling work within customer premises. 30 June 2014 is the final date on

do further training in these specialisations, as these endorsements are equivalent to the current competencies.

Restricted registered cablers Also by 1 July 2014, all Restricted registered cablers intending to work on Broadband installations must have acquired the relevant Restricted Broadband specialist competency. With the transition period for the ACMA’s changes (2012-2014) fast running out, ASIAL is witnessing growing numbers of registered cablers upgrading their qualifications in readiness, indicating a sharp spike in demand for training places in these courses with Registered Training Organisations (RTOs). ASIAL urges cablers to act now to avoid missing out, and risking

which cablers may undertake the full range of cabling operations with a basic Open cabling registration. The amendments to the ACMA cabling arrangements have been made to ensure cabling providers have the necessary skills required to perform specialised cabling work for the current and emerging customer cabling environment.

disruption to their legal scope of work. Cablers seeking assistance in sourcing a reputable RTO are encouraged to contact ASIAL Cabling on Tel: 02 8425 4331 or email: cabling@asial.com.au or visit www.asial.com.au and follow the link to the registered cablers area. Alternatively, cablers can contact ACMA at comply.label@acma.gov.au.

How the changes affect Open registered cablers

Registered cablers - changing address? Notify your registrar

As previously advised to ASIAL registered cablers, all Open registered cablers doing these types of specialised/advanced cabling within customer premises must by 1 July 2014 have acquired the appropriate specialist competencies (also known as Endorsements). Cablers who have already attained Endorsements for Structured (previously Cat 5), Co-axial and Optical Fibre Cabling will not need to

When your cabling registration is up for renewal your Registrar will send you a renewal notice. Notifying your Registrar of any changes to your postal address will help ensure you receive the renewal notice, which will enable you to renew your registration on time. It is an offence under the Telecommunications Act 1997 to perform customer cabling work without a registration, so don’t forget

10 //SECURITY INSIDER DEC 2013

to keep your registration up to date. Significant penalties may apply for performing customer cabling work without a current registration. Further information can be found on www.acma.gov.au

Making sure the NBN delivers on expectations – right up to the device Regardless of whether the NBN is FTTH or FTTN, once the NBN gets to consumers homes, they will need information about what they should do. But where does the consumer and industry go to get information?

That’s all about to change, because Australia’s Cabling Registrars and the ICAA has banded together to develop www.registeredcablers.com.au - a website that provides guidance for both consumers and industry to get it right so that the NBN can deliver on expectations, right up to the devices. The NBN infrastructure is only part of the picture, albeit the biggest and most expensive. The customer wiring from the NBN box (NTD) to PCs, Smart TVs, IP cameras, Security Systems, Medical Systems and media servers are often


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 11

CABLING NeWS

overlooked, but it plays a pivotal role in whether the user experience is better or worse with the NBN. With the wrong infrastructure inside the house, broadband could drop to a trickle beyond the NBN box. The new website will provide unbiased advice using easy to understand headlines: > Do a Little > Do more > Do a lot • What to do when the NBN is installed to an existing home; • How to prepare a new home for the most cost-effective and reliable broadband installation; • What technology options are available to consumers and what are their pros and cons; • How and where to find qualified cabling and telecommunications infrastructure providers; • Making sure the cabling provider and their workmanship is legal; and • How can cabling providers make themselves known to the local community that they’re qualified and available to provide infrastructure beyond the NBN box. This innovative initiative has as its primary goal to educate both community and industry on getting the NBN right, all the way up to the devices in the home. It is a collaborative development by all of the Cabling Registrars that administer compliance to the Cabling Provider Rules (CPR) for the ACMA, in association with the ICAA. Further details about www.registeredcablers.com.au What’s in it for consumers? Consumers can be guided on the various options they have to choose from in installing broadband around their homes, including wireless, Power Line Communications (PLC) and Structured Cabling (Cat 5/6); be

directed to suitably qualified cabling providers to find out what’s best for their specific requirements; and be more informed when speaking with Retail Service Providers (RSPs) before deciding on what steps to take, be it a little or a lot.

What’s in it for Cabling Providers? Cabling Providers can find the facts on broadband reticulation and more detailed information on the technologies they can offer to consumers. With the appropriate qualifications, they will also be able to register their availability to be contacted by consumers seeking their services to make their homes ‘NBN-ready’.

best-practice within their industry sectors.They are: • Australian Security Industry Association Ltd (ASIAL) • BICSI Registered Cablers Australia (BRCA) • Fire Protection Association (FPA) • National Electrical and Communications Association (NECA) • Telecommunications Industry Training Advisory Board (TITAB) About the International Copper Association Australia: ICAA promotes the deployment of copper telecommunications infrastructure through its Smart Wired® program.

What’s in it for NBN Co? As a carrier, NBN Co has no involvement in what consumers do ‘downstream’ of the NBN box. www.registeredcablers.com.au is a ‘destination’ that NBN Co can direct consumers to, to obtain factual, noncommercial and unbiased guidance on making their home ‘NBN-ready’. What’s in it for Retail Service Providers? RSPs provide content to consumers, and typically don’t have the resources to provide individualised broadband reticulation in consumers’ homes. While a few RSPs may elect to undertake this service, most RSPs will be happy to direct customers to www.registeredcablers.com.au. In fact, several of the major RSPs have already endorsed the website and will refer its customers to it. About the Cabling Registrars: The ACMA has charged the following industry associations to administer compliance to its CPR. These associations represent specific industry segments that are affected by the CPRs and promote compliance to the regulations and

SECURITY INSIDER DEC 2013// 11


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 12


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 13


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 14

INDUSTRY NeWS

ICAC FINDS SECURITY PROVIDERS AND PUBLIC OFFICIALS CORRUPT The following is the content of the media

Kings in relation to that project in the

release issued by the NSW Independent

future. Mr Paul had served on the

Commission Against Corruption (ICAC)

tender evaluation committee (TEC) for

included paying Mr Paul the $13,000 in

on 26 September 2013.

the project, but deliberately failed to

2008 and arranging the $20,000

ICAC has found that security service

Diekman and Kings. Mr Diekman's corrupt conduct

disclose to the UWS TEC chairperson

payment in 2009. He also acted

providers and public officials engaged

his conflict of interest arising out of his

corruptly by providing or authorising the

in corrupt conduct in relation to work

personal and financial relationship with

provision of benefits including money,

for several NSW public authorities

Mr Diekman. He also used his influence

accommodation in Las Vegas and a

including the University of Western

on an AGNSWTEC, engaging in

Vespa scooter to Mr Huskic, between

Sydney (UWS), the Art Gallery of NSW

corrupt conduct by accepting $20,000

2006 and 2011 in return for Mr Huskic

(AGNSW) and the then Northern

from Mr Diekman in 2009 as a reward

having exercised his public official

Sydney Central Coast Area Health

for improperly exercising his public

functions to favour Kings and in the

Service (NSCCAHS) which resulted in

official function to help Kings win a

expectation that he would do so in the

benefits including cash, trips to Las

tender associated with the AGNSW's

future. Kings experienced a substantial

Vegas and a motor scooter being

security upgrade project. Mr Paul

increase in business from NSCCAHS

awarded to public officials in return for

accepted $27,500 from QVS that year

during that period, rising from $68,000

favouring particular companies.

as a reward for improperly exercising

in 2006 for security work to between

his official functions to help QVS

$800,000 and $1.2 million each year

allegations of corrupt conduct in the

become the main supplier for the

from 2007 to 2011. Mr Diekman also

provision of security products and

AGNSW contract, and deliberately

agreed with Mr Huskic in 2010 to

services by suppliers, installers and

failed to disclose to the gallery his

submit two dummy quotes for the

consultants, the Commission found

conflicts of interest arising from his

Gosford hospital carpark security

that security industry consultant, Daniel

relationships with Kings, Mr Diekman

upgrade, knowing Mr Huskic would

Paul, security systems installer and

and QVS. MrThompson engaged in

represent them as genuine quotes and

integrator Kings Security Group Pty Ltd

corrupt conduct by arranging for QVS

use them as genuine quotes. Mr

directors Peter (Charles) Diekman and

to pay Mr Paul the $27,500 reward. Mr

Huskic's conduct in relation to these

Peter Roche, NSCCAHS employee

Paul also deliberately failed to disclose

matters is also corrupt through seeking

Robert Huskic, Q Video Systems' (QVS)

to SPC and Woollahra Municipal

and accepting the benefits, and by

Paul Thompson, Kings employee David

Council, when engaged through his

requesting and using the dummy

McMicking and Austek Security

company to work for those public

quotes, knowing that they were false.

managing director Jonathan Nguyen

authorities, his conflicts of interest

Mr McMicking's conduct in agreeing

engaged in corrupt conduct.

arising from his relationships with Mr

with the submission of the dummy

In its report, Investigation into

Mr Paul provided consultancy

Cont. Pg 16 >

services through his company, Hootspah Pty Ltd (trading as Security Consultants International), to UWS, the AGNSW and Sydney Ports Corporation (SPC). In performing his work for these agencies, the Commission is satisfied that Mr Paul was a public official for the purposes of the Independent Commission Against Corruption Act 1988. Mr Paul had particularly close relationships with Kings and Mr Diekman, with whom he had been friends from about 2007. Mr Paul's conduct included accepting $13,000 from Mr Diekman in 2008 as a reward for assisting Kings in relation to a UWS access control project, and to influence him to favour CopyrightŠ2013 Independent Commission Against Corruption.

14 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 15


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 16

INDUSTRY NeWS

ICAC CONT. quotes knowing they were false and

NSW government agencies ensure

Prosecutions should be obtained with

would be represented by Mr Huskic as

that overall responsibility for identified

respect to the prosecution of Mr Paul,

genuine is also corrupt.

tasks associated with the selection of

Mr Diekman and Mr Huskic for

security integrators is maintained in-

offences under the Crimes Act 1900.

Mr Diekman also engaged in corrupt conduct by dishonestly

house, and that agencies explore

providing Austek with the Kings

alternatives to relying exclusively on

inquiry, as part of the investigation,

costings for an SPC project in 2007 so

the advice of specialist consultants

over 24 days between 18 June 2012

they could be used by Mr Nguyen to

when selecting security integrators

and 31 August 2012. Commissioner

submit a higher Austek quote to SPC,

through a competitive process. NSW

the Hon David Ipp AO QC presided at

thereby increasing Kings chances of

government agencies embarking on

the public inquiry, at which 31

winning the SPC contract. Mr Nguyen

new large-scale security projects

witnesses gave evidence.

conduct in this deceit is also corrupt.

should also adopt a

Findings are made against Mr

rigorous product

Roche for agreeing to pay the $20,000

selection process, and

reward in 2009 to Mr Paul over the

should ban employees

AGNSW contract, and for agreeing with

directly involved in

Mr Diekman to provide the benefits to

procurement activities

Mr Huskic between 2006 and 2011.

from accepting any gifts,

The Commission has found that

benefits and hospitality

procurement processes for the

from potential and

provision of highly specialised security

existing contractors and

and IT services pose serious

consultants.

corruption risks and has made 11

The Commission held a public

The ICAC is of the

corruption prevention

opinion that the advice of

recommendations.These include that

the Director of Public

UK – SECURITY INDUSTRY AUTHORITY (SIA) LAUNCHES LICENSING OF SECURITY BUSINESSES

From 6 April 2015, all regulated security businesses in the UK will need to hold an SIA business licence. The Home Office has been working with the SIA on the introduction of business licensing. Home Office Ministers have publicly stated their commitment to the regulatory reforms and the introduction of business regulation; which will help create a fair business environment for security

16 //SECURITY INSIDER DEC 2013

companies, remove rogue operators, and deliver better value regulation. To qualify for an SIA business licence, a security business must demonstrate that it is 'fit and proper' to supply security industry services. When processing a business licence application, the SIA will consider: identity; criminality; financial probity; integrity; business competency (including British Standards). A business will need to obtain approval for each sector in which it supplies a security industry service.The relevant sectors are: • Manned guarding – Cash and Valuables in Transit, Close Protection, Door Supervision, Public Space Surveillance (CCTV), and Security Guarding • Key holding. • Immobilisation of vehicles (including the restriction and removal of vehicles) in Northern Ireland only. A business licence will last for five years.To maintain a business licence

businesses will be required to comply with the conditions of the licence, provide a yearly return evidencing its continued compliance, and pay an annual subscription fee.

SCHEME TO REGULATE LICENSED PREMISES WITH HIGH LEVELS OF ASSAULT AND OTHER VIOLENT INCIDENTS The NSW Office of Liquor, Gaming & Racing has issued a fact sheet relating to licensed premises with high levels of assault and other violent incidents. A copy of the fact sheet is available on the ASIAL web site.


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 17


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 18

LGPI SURVEY

ASIAL Survey Tendering for government work 18 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 19

LGPI SURVEY

ASIAL and the Fair Work Ombudsman (FWO) have been working on the development of a Government Procurement Initiative (initially focusing on local government) which aims to educate government agencies on the pitfalls of using price as the sole determinant when allocating security contracts. Work is well underway in developing Model Tender Clauses and a Model Workplace Management Plan to provide more objective criteria with which tenderers must comply. An education campaign will also be conducted to ensure that the key messages get through to government decision makers. In developing this initiative, ASIAL conducted a survey of its members to ascertain their perspectives and experiences in tendering for government work. A summary of the survey’s findings is included below.

Business turnover of survey respondents

Number of employees of survey respondents

Responses to the Survey showed that around 70% of government tenders requested evidence of documents confirming the use of contractors. Among the documentation requested included: • Certificates of currency for all insurances; • Organisation and management structure; • Induction and training plans; • Compliance with minimum wages and conditions for employees; • Grievance and dispute resolution management; • KPIs and productivity management; • Use of direct labour; • and Sub-contractor management plan. Frequency of compliance evidence required during the life of the tender to prove you are meeting your compliance obligations

Of those who responded, 72% had tendered for government security contracts and 28% had not. Of those who had not tendered for government work, the primary reason given was that they could not compete with the contract prices quoted and make a sustainable profit. Typical contract period 0-12 months 12-24 months 24-36 months

Local 23% 35% 42%

State 24% 24% 52%

Federal 37% 17% 46%

Top 5 factors in influencing the awarding of government contracts 1. Price 2. Expertise/qualifications of management team / employees 3. Quality service provision 4. Proof of capacity / ability to provide the service required 5. Reputation of the security provider

Local Once during the tender process 52% At the beginning of the contract 31% Every six months 6% Never 10%

State 49% 33% 9% 9%

Federal 50% 37% 7% 7%

State 24% 20% 10% 20% 15% 10%

Federal 32% 6% 12% 17% 9% 15%

Typical value of government tenders

$0-$100,000 $100,001-$250,000 $250,001-$500,000 $500,001-$1 million $1 - $ 5 million $5 million +

Local 33% 24% 14% 19% 6% 3%

Further information on the Local Government Procurement Initiative will be provided over the coming months.

SECURITY INSIDER DEC 2013// 19


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:26 PM

Page 20

FEATURE: NATIONAL LICENSING

National Licensing (time for action) By Bryan de Caires*

The private security industry performs a vital and increasingly important role in safeguarding the Australian community. With increasing contestability to service delivery, it is anticipated that we will see private security providers moving into more and more areas traditionally viewed as being in the domain of the public police. As this occurs and the industry’s role grows, so too does the need for a national licensing regime for the industry. Whether it is a major event such as the upcoming G20 meeting in Brisbane which will require hundreds of security personnel (many of whom will be interstate licence holders), security providers operating across state/territory borders or security technicians / consultants servicing national clients, the need for a uniform national standard and approach is long overdue. If you to speak to security providers operating in multiple states and/or territories, you will find that one of their biggest bugbears is the frustration of having to hold multiple licences to perform the same activity. Not only does this create significant red tape and excessive costs for the business and/or individual, but it is unclear as to what public benefit this approach delivers, apart from generating additional licensing revenue for government.

20 //SECURITY INSIDER DEC 2013

Whilst a national driving licence system has been in place for many years and a national approach to the licensing of cablers has operated since 2001, it appears that a national security licence has been placed in the ‘too hard’ basket. In 1997 ASIAL adopted a policy seeking the introduction of a uniform and consistent national approach to the licensing of the security industry. For the past 16 years ASIAL has advocated the need for a uniform and consistent national approach. We were encouraged when in July 2008 the Council of Australian Governments (COAG) agreed to the introduction of a National Occupational Licensing System as part of a program of regulatory reform to increase Australia’s productivity. COAG agreed to adopt a nationallyconsistent approach to the regulation of the private security industry, focusing initially on the guarding sector of the industry, to improve the probity, competence and skills of security personnel and the mobility of security industry licences across jurisdictions. COAG asked the Ministerial Council of Police and Emergency Management, in consultation with the Security Industry Regulators Forum, to undertake further work on minimum regulatory standards

for the technical sector of the industry by mid 2009, as well as proposals for a possible national system for security industry licensing by mid 2010. The COAG decision had the widespread support of industry, which had long called for a uniform and consistent national approach to licensing, compliance and skills training.The disparate patchwork of State and Territory regimes presented inherent vulnerabilities and posed an increasing risk across a range of areas. These included impacting on the effectiveness of securing critical infrastructure and assets; safeguarding Australian communities; and in achieving the governments’ goals of preventing organised crime from infiltrating the sector. Disappointingly, this appears to have been a false dawn. For whilst there has been some progress in implementing agreed nationally consistent regulation of the industry, ongoing concerns remain within the industry about the inefficiencies, duplication and compliance costs associated with operating across multiple, disjointed jurisdictions. ASIAL recently wrote to Federal, State and Territory Ministers seeking responses on a number of issues relating to red


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 21

FEATURE: NATIONAL LICENSING

licensed occupations. We remain optimistic that common sense will finally prevail. Until it does, we will continue to advocate for the inclusion of security as part of the National Occupational Licensing Scheme. We are also committed to ensuring that any national licensing system introduced results in measurable improvements in service standards and professionalism within the industry. The support of members and other like minded professional bodies will be invaluable in helping to ensure that security is not overlooked again when the next wave of occupations are considered.

tape reduction and the need for a uniform national approach (details of the issues raised can be found in the members area of the ASIAL web site). It is clear that overlapping and inconsistent regulation impedes productivity and growth.The move towards a seamless national economy through the reform of business and other regulation cannot come quickly enough.The introduction of a national licence would make it easier for businesses and individuals to operate across State and Territory borders. It would also make life simpler for businesses and consumers, while continuing to provide the necessary protections and access for consumers and the community.

Whilst we have been advised that regulators across the country continue to work cooperatively on developing policy in relation to the industry, no date has been set as to when we can expect the security industry to be considered for inclusion in the National Occupational Licensing Scheme. In working towards the introduction of a national security licence, ASIAL is cognisant that many practical issues will need to be resolved.These include the issue of cross-jurisdictional access to databases (including police databases), the variances in policy settings, licensing administration and fee structures. However, similar issues have been resolved in the process of developing a system for national licensing for other

*Bryan de Caires is CEO of ASIAL.

National Occupational Licensing System (NOLS)

working with state and federal governments, stakeholders, industry associations and regulators to define and implement a national occupational licensing system that will allow licence holders to use their national licence to work anywhere in Australia. Under NOLS, companies and individuals will hold a single national licence that allows them to work anywhere or hire staff from other states without having to worry about paying for multiple licences. NOLS will enhance the integrity of licences and occupational licensing in general.The reduced red tape and increased mobility of workers will improve the efficiency of Australian businesses, with knock-on benefits to the Australian economy.The cost of unnecessary training will reduce, while appropriate qualification requirements will be retained. Complications and inconsistencies will

be removed. The benefits of national licensing include: • improved business efficiency and competitiveness of the national economy • reduced red tape • improved labour mobility • enhanced productivity • enhanced consumer confidence and protection without imposing unnecessary costs or lessening competition. The first wave of occupations include electrical, plumbing / gasfitting, airconditioning and refrigeration.The second wave will include conveyancers and valuers. COAG has announced that the National Occupational Licensing System will be implemented in 2014 following additional consultation conducted by States and Territories.

Currently, occupations are licensed by each state or territory with the licence only covering work performed in that state. Under a national licence, companies and individuals would be licensed to work anywhere in Australia, removing duplicated and inconsistent regulation between states and territories for specific occupations. The National Occupational Licensing Authority (NOLA) is the independent statutory authority responsible for establishing the National Occupational Licensing System for specific occupations across Australia. NOLA is

SECURITY INSIDER DEC 2013// 21


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 22

ASIAL NEW MEMBERS

WELCOMETO OUR NEW MEMBERS ASIAL is pleased to welcome the following new members who have joined the Association over the past few months. Members A1 Data & Security Solutions Pty Ltd Secure Tech Group B&S Security Pty Ltd Blue Force Pty Ltd Blue Heeler Services Pty Ltd C-Port Security Pty Ltd Coin Co International PLC Compass Security Group Pty Ltd Coopers Training Elude Security Pty Ltd ESS Security Pty Limited Glow Electronics Golden Point Security Pty Ltd Greenco Security Pty Ltd Intiga Security iSecure Security Services Nitestar Security Pty Ltd JJJ Group Services Pty Ltd Joglen Investments Pty Ltd Katanning Security Services PTY LTD Laser Electrical Traralgon Lionheart Security Services Lions Corp Security Pty Ltd Live Visual Monitoring The ASIAL member recognition program acknowledges longstanding association members. Recognition categories include Platinum (25 years+), Gold (16-24 years), Silver (11-15 years) and Bronze (6-10 years). If you are eligible and have not already signed up to the program (there is no cost to sign up).You can find out more information by visiting

22 //SECURITY INSIDER DEC 2013

Magnum Protection Pty.Ltd Mascot Security Services Merit Security & Protective Services Pty Ltd New Age Professionals Pty Ltd NQ Video Surveillance Pty Ltd Omega Security Solutions Pty Ltd Pantac Security Protection 1 Pty Ltd PTI Australasia Pty Ltd Qld Protection Security Pty Ltd Queensland Professional Security Pty Ltd Reliance Security RJG Security and Investigations Pty Ltd ScrutinEyes Secureline Security Services Pty Ltd Security Guard Solutions Security Risk Management Pty Ltd Selectlok (South) Pty Ltd SNA Security Services Group Pty Ltd Spyvision Australia Pty Ltd RPS Security Australia Pty Ltd SureFact Australia Pty Ltd TCP Crowd Control Services Pty Ltd

Tessa Security Pty Ltd Skehan Antenna's Pty Ltd Carver NQ Pty Ltd Top Smart Vision Australia Pty Ltd Western Eagles Security Solutions Pty Ltd

www.asial.com.au/Memberecognitionpr ogram or you can email security@asial.com.au

Safeguard Security Specialists Pty Ltd BRONZE K D Murphy Security Pty Ltd Tactical Training (Australia) Pty Ltd Security Plus Alarm & Electrical Northex Australia Pty Ltd National Management Group Pty Ltd Allcare Monitoring Services Total Security Management

Recent member recognition program recipients GOLD Crackweld Pty Ltd SILVER Prime Group (Aust) Pty Ltd

Upgrades to Corporate Membership Arc Security Systems Pty Ltd Angus Consolidated Pty Ltd Simran Security Sonic Security Services Pty Ltd Grouped Property Services Pty Ltd TXM Group 1 Services Pty Ltd Customised Security Group Pty Ltd Customlink Pty Ltd Infocus Protection Industries Pty Ltd Blue Force Pty Ltd Safe Security Services SolSec Pty Ltd PCW Commercial Windows Pty Ltd Wayne L Hall Pty Ltd Securezone Security Services (AUS) Pty Ltd


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 23


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 24

CLOUD SECURITY

Application Security in the cloud By Darren Leo* When looking for new software for your business, be it accounting, CRM or job management, one of the fundamental questions is ‘Should I use a cloud-based or on-premise solution?’ For many products there is now no longer an option: as cloud technology matures, many vendors have stopped offering on premise solutions in favour of providing their software via the cloud as a priority.Yet many users are still hesitant about cloud solutions, often because of concerns about security. There are many factors to consider when deciding between cloud and onpremise solutions, but we often see clients focusing on security and ignoring other important factors such as reliable access across multiple locations, reduced capital expenditure, minimal infrastructure maintenance costs, vendor managed updates, rapid deployment, data validity and redundancy. In my opinion, the answer settled securely in favour of the cloud a long time ago for many reasons, not least because of the security vendors can offer over and above on-premises solutions. Here are some other things to consider.

Maintenance & Support In most small to medium sized

24 //SECURITY INSIDER DEC 2013

businesses there is no specialist IT team to maintain your applications and servers.You may have a great IT contractor, but do they really understand your new software vendor’s systems, and can they quickly get you up and running when something goes wrong? Are they always available when you need them? If the application is mission critical for you, are you going to have to put your business on hold until they can respond to your request? A good software vendor providing software in the cloud will be in a stable and highly managed environment with 24 hour, 7 day staffing that performs all networking, database and web server monitoring.This ensures your application is running at its best and is accessible when you need it. They will also be able react quickly in an emergency: knowing the systems back to front, they will always be far more capable of restoring service efficiently.Your IT contractor simply won’t be able to compete with that level of service provision.

Security & Data Recovery Cloud applications are generally hosted with enterprise grade expert providers that supply hosting for thousands of other companies.This means they can

afford to utilise the best security to protect your system, including: • physical premises protection (Before a recent visit to one of our data centres, I waited three weeks for my background check to be completed. Even then, I was escorted everywhere in the building. How easy is it for someone to get to the server in your office?) • highly controlled access to the operating floor • world class network security • redundant and fault tolerant power and cooling systems • redundant internet service providers • onsite and highly experienced technical staff 24/7 • onsite replacement hardware The cloud in most cases delivers some great security and data recovery benefits over on-premises systems. It is not possible to steal your cloud data and server because they are physically protected in a secure data centre and often distributed over different machines. Contrast this with a client of ours, who actually had all their servers and computers stolen before implementing simPRO Enterprise.They had no offsite backups and lost nine


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 25

CLOUD SECURITY

months of operational and financial information.This simply can’t happen in the cloud. During the 2011 Queensland floods, some of our clients got first hand experience the dangers of an onpremises solution. As their office went under water, so did their server and all of its data, making recovery impossible. Clients who were fortunate enough to remain dry were in most cases without power for up to nine days, so while their onsite server was safe, it was unusable. However, simPRO clients that were hosted in the cloud simply had their staff work from home and access the

system from there—not quite business as usual, but business continued.

Redundancy & Backups With enterprise grade hosting solutions, your software vendor will also generally provide a setup consisting of high availability and failover technologies, meaning if a part of it fails, mechanisms will kick in to prevent operational disruption.Your data is also protected with numerous backups and can be recovered through a redundancy mechanism in the event of an outage. Network downtime and application

crashes are more common in an onpremises setup due primarily to less stringent (or a complete lack of) monitoring and maintenance regimes. On-premises software hosting can suffer quickly through technical incompetence, a lack of backup processes, poor network health monitoring, or failure to implement upto-date security technologies across the network and associated computers. Something as simple as not updating your internet router’s firmware could you leave you open to attack and data loss.

SECURITY INSIDER DEC 2013// 25


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 26

CLOUD SECURITY

Big Business in the Cloud Company size used to greatly impact the decision making process when it came to implementing cloud technology. But size doesn’t matter anymore: the Australian Federal and State Governments along with many global counterparts such as the CIA have begun a massive operation to move their data to the cloud. We also see this with large simPRO clients, such as Masters, AGL and Energy Australia, who run all of their mission critical operations in the cloud. If it’s safe enough for the CIA, I would hazard a guess that it is safe enough for your business. simPRO and the Cloud Just five years ago, 50% of all new clients joining simPRO were running Enterprise on-premises.This figure has dropped to less than 5%. At simPRO we have built our cloud with one of the world’s most highly regarded data centre providers, Rackspace, to ensure that we are providing both performance and reliability in a world class set of data centres. We are now midway through a major upgrade of our cloud service to handle a growing global base of simPRO clients.

2 Geographical Redundancy At 1 am every day, all data in our primary data centre (including customisations, databases and attachments) is automatically synchronised to a secondary, geographically separated data centre. This ensures that in the event of a catastrophic failure in our primary data centre, we can fall back to the secondary data centre in the time it takes for our DNS to update. With the upgrades we are currently undergoing, we will have three geographically diverse data centres, all with real time (up-to-date) copies of the primary servers’ data and all ready to be switched to in real time should an issue occur at the primary facility, with no data loss and minimal service impact. 3 Backups Each night, databases and attachments are backed up to a number of silos in each of our operating data centres and further replicated into the Amazon S3 storage network.The Amazon S3 solution gives us an enterprise grade data backup solution that is replicated throughout the global Amazon network of around 30 data centres. Known as “eventually persistent

storage”, a backup sent to Amazon is then distributed throughout the Amazon global network and becomes available to us for use from any of their data centres within seconds. As Robert Geller of InstanTek recently explained in an interview,“Much of the concern about cloud security is fear, uncertainty, and doubt, perpetuated by legal and privacy pundits with little to no actual technical or operational knowledge. A server sitting in a datacenter, a server room, or a closet is ripe for a disgruntled employee or thief’s picking or destruction.” So just because you can see it, it doesn’t mean it’s safe. Geller also states that,“With true cloud solutions, the sheer amount of data and the size of the infrastructure at cloud service providers means that thieves or bad actors couldn’t even identify which server hosted which application or customer’s data.” Of course, the cloud might not suit every business as there are more things to consider than just the security of your applications and data, as I have mentioned above. I see availability and reliability as far more pressing concerns for most businesses, and concerns that the cloud can address brilliantly.

The three factors paramount in our cloud design are as follows: 1 Primary Redundancy and Failover Our primary service has multiple layers of redundancy. The frontend servers used to host the primary operation is replicated with a group of secondary (slave) servers in the background. Every time a transaction occurs on the frontend servers, the exact same transaction occurs on the secondary servers. In the unlikely event of a problem occurring on the primary servers, we instantaneously switch users to the secondary servers without any loss of data. *Darren Leo, Business Development Manager NSW-ACT-SA, simPRO Software Pty Ltd.

26 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 27


INSIDER_Nov/Dec 2013 Iss5_52pp

28 //SECURITY INSIDER DEC 2013

24/10/13

8:34 PM

Page 28


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 29

For further information contact Eric Lowenstein at Aon Australia at eric.lowenstein@aon.com

SECURITY INSIDER DEC 2013// 29


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:34 PM

Page 30

WORKPLACE BULLYING LAWS

New bullying laws – make sure you are ready By Chris Delaney

From 1 January 2014 a worker who "reasonably believes" they have been bullied in the workplace will be able to apply to the Fair Work Commission (FWC) for orders against the perpetrator and their employer requiring them to stop the bullying. A worker will be taken to have been bullied at work if an individual or group of individuals "repeatedly behaves unreasonably towards the worker... and that behaviour creates a risk to health and safety". Although "reasonable management action carried out in a reasonable manner" will not amount to a case being made it is inevitable that there will be disputes about what did or did not amount to bullying. The protections will extend to "workers" including: • employees; • contractors and sub-contractors; • outworkers; • apprentices and trainees; • work experience students; and • volunteers. Where the FWC is satisfied that bullying has occurred and there is a risk of further occurrences, it will be able to make "any order it considers appropriate" – except an order requiring payment of compensation – to stop the bullying. The FWC is required to consider anything else it believes to be relevant,

30 //SECURITY INSIDER DEC 2013

including if the worker attempted to resolve their issues at the workplace level through grievance or workplace harassment policies. The new laws will introduce a new part to the Fair Work Act 2009 (Cth) headed "Workers Bullied at Work" and will not be limited to employees. It will also cover contractors, subcontractors, outworkers, apprentices, trainees and students gaining work experience as well as volunteers. Under the new laws, a worker is bullied at work if an individual or a group of individuals repeatedly behave unreasonably towards a worker, or a group of workers which the worker is a member and that behaviour creates a risk to health and safety. It is important to note the following: • there must be repeated behaviour; • the behaviour must be unreasonable; and • that behaviour must create a risk to health and safety. However, it is not a requirement that the risk to health and safety is to the workers being bullied.

Powers of the Fair Work Commission Once an application for relief from bullying is filed the FWC must deal with it within 14 days. If bullying has taken place, the FWC can make orders to restrain the conduct of the employer until the matter is either resolved by the parties in conference or determined by the FWC with a final order.The employer must follow any order of the FWC or face the possibility of a fine from the Federal Circuit Court of up to $51,000 for a corporation and $10,200 for an individual. It is therefore crucial that employers have an effective workplace bullying policy in place.That policy should include: • a definition of workplace bullying including a statement that workplace bullying is unlawful; • a complaints process; and • consequences for the worker that has engaged in workplace bullying. Definition of Workplace Bullying Bullying at work is repeated, unreasonable behaviour directed towards a worker, or a group of workers, that creates a risk to their health and safety.


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 31

WORKPLACE BULLYING LAWS

Repeated behaviour refers to the persistent nature of the behaviour and can include a range of behaviours over time. Unreasonable behaviour means behaviour that a reasonable person, having regard for the circumstances, would see as victimising, humiliating, undermining or distressing. Whether intended or not, bullying is a health and safety risk. Types of unreasonable behaviour that may be considered as workplace bullying, when part of a repeated pattern of events, can include: • abusive, insulting or offensive language • undue criticism • excluding, isolating or marginalising a person from normal work activities • withholding information that is vital for effective work performance • unreasonably overloading a person with work, or not providing enough work • setting unreasonable timelines, or constantly changing deadlines • setting tasks that are unreasonably below or beyond a person’s skill level • denying access to information, supervision, consultation or resources, resulting in detrimental effects to the worker • spreading misinformation or malicious rumours • improper treatment in relation to accessing workplace entitlements, such as leave or training. Sometimes these are conducted in social media, via email or SMS. Employers should ensure that policies are developed to include electronic and/or social media. What is not workplace bullying? Reasonable workplace management There is no definition of what is "reasonable management action carried out in a reasonable manner." In our opinion performance and conduct management (disciplinary procedures) conducted objectively and professionally will fall within this exception. In defending against a bullying complaint employers will be required to provide evidence to the FWC that the performance management is "reasonable management action" and

SECURITY INSIDER DEC 2013// 31


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 32

WORKPLACE BULLYING LAWS

escalate into bullying. Workplace violence occurs when a person is abused, threatened or assaulted in circumstances relating to their work. Unlike bullying, an action does not need to be repeated to be considered violent. To conclude, an effective, an antibullying policy should include all of the following: 1. A clear definition of prohibited abusive or "bullying" behaviours. 2. A complaints procedure that requires employees experiencing or witnessing abusive behaviour to promptly report it.The policy should designate at least two persons to whom complaints should be made under the policy, in the event one of the person's designated is the alleged bully. 3. An investigation procedure that provides a prompt, thorough and impartial investigation. 4. Assurance that employees who make complaints or participate in an investigation will be protected against retaliation. that that it has been "carried out in a reasonable manner, creating further expense for employers. Examples of reasonable management action include: • setting reasonable performance goals, standards and deadlines • rostering and allocating reasonable working hours • transferring a worker for operational reasons • failing to promote someone after a proper, documented selection process • informing a worker that their performance is unsatisfactory, after following established performance management guidelines • informing a worker, objectively and confidentially, that their behaviour is inappropriate • a restructure.

Discrimination occurs when someone is treated unfairly because of a particular individual characteristic, such as age, race or gender. For example, it would be discriminatory not to hire or promote a person because of their religion. Harassment involves unwelcome behaviour that intimidates, offends or humiliates someone. Unlike bullying, discrimination and harassment do not have to be repeated. Anti discrimination, equal employment opportunity, workplace relations and human rights laws deal with these matters. Workplace conflict is not workplace bullying. Not all conflict is negative nor does it always pose a risk to health and safety. A single incident of unreasonable behaviour is not bullying, although it may have the potential to

5. Assurance that the employer will take immediate and appropriate corrective action when an investigation determines that a violation of the policy has occurred. 6. Regular training for all employees on the policy. 7. Consistent enforcement of the policy. An anti-bullying policy should provide a fair, efficient and confidential complaint mechanism and the consequences of non-compliance with the policy should be made clear to all "workers". ASIAL can assist you with developing workplace policies dealing with bullying complaints and all other workplace issues. For more information email ir@asial.com.au

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au

32 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 33


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 34

PSIM

DESIGNING A PHYSICAL SECURITY INFORMATION MANAGEMENT (PSIM) SYSTEM By Roger Pearce*

PRINCIPLES OF DESIGN

points being monitored with a further

responses are handled for them by the

My article on “the Geometry of PSIM” in

factor built in based on the type of

PSIM.

the September issue of Security Insider

facility. A campus with a large

generated interest, so I will expand

population of students and staff will

that it allows a “clean desk policy” to be

further on the theme in this article.

have more interaction with people than

implemented. By this I mean a minimum

an office complex. A multi-use site like

of equipment should be needed for the

where you will be designing a PSIM.

a port or airport will have complexity

operators to do their job. I would hope

One will be for a large Greenfield site

and large numbers of people

that, at each operator’s console, all that

where all new systems are being

compared with a prison where there is

is needed is a keyboard, mouse, 3 x 22”

installed and commissioned.The other

a much more controlled environment.

monitors and an audio (phone, intercom

There are two most likely situations

will be for an upgrade, expansion or

The number of operators needed will

One of the main benefits of a PSIM is

& two way radio) console.

relocation of an existing Security

vary considerably with each application

Control Room. What they will have in

however a PSIM will make the

would be a central report printer and

common is a large number of sub-

operators more efficient and therefore

Standard Operating Procedures (SOP)

systems probably installed by different

may reduce the number needed

files. In front of the operators will be the

integrators and subcontractors all of

compared with the number you might

video wall with the large screen

which are to be controlled and

need with separate sub-systems to

monitors.The number of screens or the

monitored by an in house security

manage. As described in my previous

size of the video wall will vary based on

team.

article the PSIM manages events with

the application, the determining factors

pre programmed Scenarios which are

being the same as those mentioned

the design of the Security Control

loaded into the software. Each

above for the number of operators.

Room and operator’s consoles, (2) the

scenario defines the automatic

interfacing of all the sub-systems to

response required for each known or

the PSIM and (3) interfacing of

predicted event likely to occur.This

(2) INTERFACING SUB-SYSTEMS |TO THE PSIM

The challenge is in three parts (1)

Common to all operators close by

library of scenarios is built up using

The number of interfaces needed and

previous history and the experience

manner in which they are interfaced

(1) THE SECURITY CONTROL ROOM

gathered over many years of operation.

varies greatly.The first thing to do is to

The size of the room and the number

This means that the control room

work up a list and then work out how

of operators will be determined by the

operators have more time to be

easy or hard each interface is going to

number of locations, buildings and

proactive during a crisis as the routine

be. If you are lucky some will already

databases.

34 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 35

PSIM

have been developed.The PSIM vendors

a general rule the one directional

mind that the Control Room operators

have been working hard developing

interfaces would be for Fire, intercoms

are not necessarily system

interfaces over recent years so many

and Building Automation System (BAS).

administrators.They may not be

have already been tried and tested.

Bi-directional interfaces would be

managing the databases of sub-systems

However depending on your sub-

more important for Security Access

in the control room. System

systems there is a reasonable chance

System (SAS) which includes security

administrators will be using the sub

many have not been developed.

and duress alarms and CCTV.

system head ends at another location

The sub-systems that only need a

All voice can be integrated using a

such as the Operations Area to program

signal received by the PSIM and do not

purpose built console.This allows two

the system data, time zones and

require an acknowledgement or signal

way radio, Intercom & phones to all be

configuration as well as user groups,

back can be one directional and should

handled on the one instrument or

cardholders, alarm parameters etc.

be the simplest.

headset.

Since the mapping is done in the

An interface with the two way radio

The Visitor Management System (VMS) will probably be run from

PSIM each point can be given an

system will allow the GPS positioning of

Reception or the Concierge Desk. A link

address so that it shows up on a map

radios as well as signalling a duress call

to this system offers the option of

without the need for a bi-directional

or man down alarm from a radio into the

issuing visitors an access card instead

interface.

PSIM.This will allow rapid location of the

of a Visitors badge.This is very useful for

Security Guard out in the field.

visitors requiring access to secured

Where there is a need for interaction between the PSIM and the sub-system

areas of the facility.

needed via a keyboard command or

(3) INTERFACING OF DATABASES There will be a number of sub-system

where staff or student information is held

clicking on an icon on a map a bi-

databases that may need linking via the

in a personnel database a high level

directional interface, more than likely

PSIM depending on the level of

interface (HLI) is most important.

high level (HLI) will be necessary.

functionality that the Control Room

such as when control of a point is

It may not always be the case but as

Operators are going to have. Keep in

For sites with large user databases

Depending on the operational requirements of the security team a HLI to an Incident Reporting System might also be required.The level of reporting and analysis of incidents as well as dispatching patrols and management of the security team may be beyond the standard capabilities of the PSIM and a specialist software package which has greater capabilities in this area should be considered. Transfer of data between these system databases will eliminate duplication of data entry tasks as well as better reporting on events and activity. BACK UP AND SUPPORT Naturally all this technology will need the right sort of back up and support. It goes without saying that Uniterruptable Power Supply (UPS) will be needed for all systems.There will be a significant amount of hardware needed, including servers and network switches so data racks will have to be located close to the Control Room.

About the author: *Roger Pearce is an independent security consultant with over 30 years experience in the electronic security industry. Over 15 years of which have been as an independent consultant advising clients on a range of security technology applications. He can be contacted at sbtb@people.net.au or www.sydneysecurityconsultants.com.au

SECURITY INSIDER DEC 2013// 35


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 36

CENTAMAN ENTRANCE CONTROL

Making an entrance at the new Sydney Gymnastic and Aquatic Centre The Rooty Hill RSL Group (RHR Group) with over 48,000 members has a vision to be “Sydney's Leading Leisure Venue”. With 3 dining venues, 8 bars, 600 seat theatre, sports bar, live entertainment venue, private function rooms, child minding facilities, AMF Bowling and 160 room Novotel Hotel, RHR Group is positioned at the forefront of innovation and success in the entertainment and hospitality industry. ONE55 Health & Fitness, a state of the art health, fitness and gym sports centre, (established in May 2008) is also on the RHR Group site and offers the biggest gym facilities in Western Sydney and provides activities and services for all things health & fitness to 5,000 active members.The next part of RHR Groups vision was to develop a state of the art gymnastic and aquatic centre. As such the Sydney Gymnastic and Aquatic Centre (SGAC) came about and now features a 4,000m2 Olympic grade gymnastics facility, two 25 metre swimming pools and a sports medicine and rehabilitation centre. Importantly, the SGAC is as much about striving as it is about success. In addition to catering for first-rate, top-level ranked athletes, the centre aims to encourage sport participation and skill development for all community

36 //SECURITY INSIDER DEC 2013

members of all ages and physical ability. One of the key design issues for SGAC was to develop an entrance control solution that would allow its members and visitors quick and easy access to the facilities. Centaman Entrance Control worked alongside SGAC’s architects, Cox Architecture, to come up with an entrance control solution designed to complement this exciting new development. Cox Architecture had evaluated a number of different turnstile solutions in its effort to balance not only the budget, but to maximise efficiency, provide the best visitor experience all while maintaining the high level of aesthetic design evident throughout the facility. In the end it was decided that a speedgate with glass barriers which opened in a user friendly ‘door like’ motion was the best solution and Centaman Entrance Control promoted the operational speed, slim design and ease of use features of their EasyGate SG for the main entrance.The sleek and stylish nature of the product was in synergy with the design of the building itself. Centurion EasyGate SG uses glass barriers in conjunction with state-of-theart optical technology to provide a high throughput security gate.The bidirectional glass barriers are designed

to work in a ‘normally closed' mode and open after a valid card has been presented to allow the authorised user to gain entry.The barriers are designed to close quickly behind the authorised person to deter tailgaters whilst the IR sensors monitor the lane to detect unauthorised entry and ensure the safety of users.The barriers open in a door like motion which enables the pedestal to be only 200mm wide and the same slim pedestal can be used in wide Disabilities Discrimination Act compliant lanes which ensures the turnstiles have a minimal visual impact to distract from the overall building design. The LMS membership solution where already providing the Point of Sale & Access control solution for ONE55


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 37

CENTAMAN ENTRANCE CONTROL

THE SYDNEY GYMNASTIC AND AQUATIC CENTRE • The Sydney Gymnastic and Aquatic Centre (SGAC) features a 4,000 sqm Olympic grade gymnastics facility, two 25 metre swimming pools and a sports medicine and rehabilitation centre. • The specialist facilities are complemented with a central service area with members assistance, merchandise and a café with seating for 80 people. Health & Fitness, and as such, it was decided to extend this system to the new site. Members can use their existing membership RFID cards whilst casual visitors who wanted one time entry to the site for certain events would be supplied with bar coded tickets printed at the point of sale. The Gantner, dual technology controller, was used as the interface between the turnstiles and the membership system.These network enabled devices feature both a RFID and bar code reader as well as a display to guide users through the

system. As soon as a ticket is sold it is added to the database so that the visitor can then scan their ticket at the turnstile to gain access. When a member or ticket holder scans their card at the turnstile it is automatically checked to see if it is valid at that time. If so, the EasyGate SG quickly opens to provide a clear lane for easy ‘hands free’ access. If not, the user is directed to reception by the on board displays. ‘As many SGAC members carry sports bags and other items we definitely wanted a hands free solution for the turnstiles. But, of course, with the

high number of visitors they have coming each day it needed to be quick and efficient as well.The EasyGate barriers fulfil these requirements and blend perfectly with the foyer surroundings.The dual technology controllers allow SGAC to offer the ease of use of RFID to its members whilst one time users get a printed bar coded ticket which is highly cost effective’. Says Michael Bystram, General Manager of Centaman Entrance Control.

SECURITY INSIDER DEC 2013// 37


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 38

HOT PRODUCTS

Hikvision 2MP PTZ with IR & Edge recording

NEW!

■ Central Security Distribution > 1300 319 499 ■ Web > www.centralsd.com.au Recording at 2 MP and built on the latest Davinci processing platform the Hikvision HIK-2DF7286-A delivers outstanding images regardless of conditions. With just about every available acronym in its feature list this PTZ is equally comfortable in low light or utilising its high ratio wide dynamic range. Hikvision have included the usual host of programming options for patrols as well as high speed pan/tilt with ±0.1° pre-set accuracy and support for smart tracking. Rounded off with a built-in Web server, Edge Recording, support for up to 8 NAS devices along with 120m IR illumination making this powerfully versatile weatherproof PTZ.

iCare Personal Tracker ■ Grade One Monitoring > 1300 723 185 ■ Email > info@grade1.com.au ■ Web > www.grade1.com.au

NEW!

Grade One Monitoring has launched the iCare Personal Tracker. Our Grade A1 monitoring centre now offers the peace of mind of a trackable hand held device utilising the Telstra Next G network. The iCare unit offers a rapid and accurate GPS positioning, 2 way on board communication as well as a geo-fencing solution. iCare monitoring has many benefits including the ideal solution for OH&S/WHS legislation, a safety device for loved ones, immediate notification in the case of a medical emergency as well as GPS tracking for dementia patients. Phone us on 1300 723 185 to discover the full range of features and benefits that the iCare Personal Tracker has to offer for your staff and clients as part of an overall security solution.

simPRO eForms ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Paper forms capture all the information you need on the job, but they’re not well suited for the field and can be easily lost or damaged.They require manual handling and processing that can waste valuable time better spent getting the job done. simPRO eForms digitises your forms workflow, ending your dependency on paper forms. Field employees use a tablet to complete and submit PDF forms to the eForms Portal, where they can be viewed, downloaded, or automatically actioned. • Send forms back to the office instantly • Attach photos • Updates forms for all users at once • Integrate with simPRO Enterprise and other software packages • Employ paperless technology Find out how eForms can simplify your workflow at www.simpro.com.au

38 //SECURITY INSIDER DEC 2013


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 39

HOT PRODUCTS

DTU3G/IP ■ SCSI > 1300 555 570 ■ Email > daleacott@securitycommunications.com ■ Web > www.securitycommunications.com SCSI’s DTU3G/IP wireless alarm communicator is Australian made and designed. Dual-SIM technology provides 6 secure paths using Telstra NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. With thousands already sold and installed, the DTU3G/IP has been released to the Australian Security Industry with outstanding success. The combination of multiple, proven communication paths ending the days of nuisance “poll fails” and unwarranted guard attendances. The DTU3G/IP connects to the DirectWireless Network, Australia’s only dedicated and private alarm transmission network. To find out more about the DTU3G/IP, contact SCSI on 1300 555 570.

NEW!

NEW!

Maximum Camera Value: All-new Sarix IL10 Series Box Cameras and Micro Domes ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix The all-new Sarix™ Value Range of mini box and micro dome cameras are high-definition, cost-effective IP network cameras perfect for most any indoor fixed video security application.These cameras produce high-quality, color HD video, and the integrated pre-focused fixed focal length lens makes sharp scene alignment and installation quick and easy. Convenient network connectivity, PoE models, and a simple Web user interface, make for easy plug-and-play finalisation of settings and positioning adjustment. And by delivering industry-leading Sarix image quality, backed by the Pelco™ by Schneider Electric™ satisfaction guarantee, the IL10 series are the value-driven cameras that you can choose with confidence.

Schneider Electric Expands Investment in IP Video with Major Additions to Pelco Line ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix Schneider Electric announced a major expansion and commitment to its Pelco IP Video Surveillance product line by announcing the planned rollout of more than 50 new IP cameras in 2013, including the new Sarix IL10 Series mini box and micro dome cameras. Schneider Electric continues to make major investments in IP video, expanding its R&D effort, product line and industry-leading education and training programs to meet the needs of partners and customers. The company has achieved several major milestones in its continuing evolution as an IP market leader, including the expansion of its Fort Collins, Colo. Facility.

NEW!

SECURITY INSIDER DEC 2013// 39


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 40

HOT PRODUCTS

Looking for a Security Partner in the ACT? ■ Leader Security > 1800 LEADER ■ Web > www.leadersecurity.com.au We’re about developing long term partnerships based on honesty, trust, transparency, reliability and accountability. Oh… Not forgetting to mention exceptional service? These are not just words to us; they are our underlying core value that best describes the Leader Security approach to business partnerships. We stand by our values. Leader Security offers a seamless extension of your business here in Canberra. Allow our expert team to safeguard your clients along with your reputation. We're here to help… • Mobile Patrols / Alarm Responses • Static Guards / Crowd Control / Event Management / Man & Dog Teams • Electronic Security Technicians • Cash in Transit / Banking Services

Powerful Mobile Control ■ Inner Range > +61 3 9780 4300 ■ Web > Central Security Distribution - www.centralsd.com.au ■ Web > Inner Range - www.innerrange.com

NEW!

The Integriti Mobile App packs a powerful punch of accessibility and control for your Integriti Security and Access Control System from any smart mobile device. The Mobile App puts you in control, allowing you to individually tailer the App to fit your needs and requirements. Advanced customisation lets you create custom page views and Widgets for fast access to common tasks. The App provides real-time system status and control, from locking or unlocking doors and gates, arming or disarming your security system, to controlling auxiliary devices like heating and cooling. It even gives you the power to start automated tasks and view system activity logs. Whatever your schedule or wherever you are, the Integriti Mobile App empowers you to take charge of your Integriti Security and Access Control System. It really is convenient System Control at your fingertips.

Multipath-IP - SkyCommand ■ Inner Range Melbourne > +61 3 9780 4300 ■ Email > admin@innerrange.com ■ Web > www.innerrange.com SkyCommand is a new browser based application for Multipath-IP, it allows you to take command of youralarm system like neverbefore and control your home or business with convenience. SkyCommand gives you remote access you can depend on using Multipath-IP connectivity. Take full control of your alarm system & integrated systems like lighting and access control from anywhere in the world. SkyCommand is on call anytime from anywhere via any desktop or mobile device, it is included as a standard option with selected Multipath-IP monitoring plans. For more information contact: Inner Range Melbourne 03 9780 4300 | www.innerrange.com

40 //SECURITY INSIDER DEC 2013

NEW!


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 41

ASIAL Certified Security Monitoring Centres*

Current as at: 11 October 2013

Company (short form name)

Australian Security Industry Association Limited

State

Cert. No.

Grade

WA

379

A2

28 Feb 2014

ADT Security

NSW

404

A1

30 Jun 2014

ADT Security (Data Centre)

NSW

405

A1

30 Jun 2014

ARM Security

WA

402

A1

10 Mar 2015

ART Security

VIC

392

A1

30 Sep 2014

Calamity Monitoring

NSW

383

A1

20 Mar 2014

Central Monitoring Services

NSW

380

B1

21 Mar 2014

Commonwealth Bank of Australia

NSW

389

A1

24 Sep 2014

VIC

391

C2

18 Mar 2014

NSW

398

A1

25 Nov 2014

Allcare Monitoring Services

Energize Australia Glad Security

Expires

Golden Electronics

TAS

395

A1

17 Oct 2014

Grade One Monitoring

NSW

378

A1

13 Feb 2014

Grid Security Services

NSW

381

A1

18 Mar 2014

Instant Security Alarms

QLD

413

A1

23 Sep 2015

ISS Security

NSW

373

B3

25 Nov 2013

Linfox Armaguard

VIC

393

A1

08 Aug 2014

Mekina Technologies

TAS

399

A1

02 Nov 2014

NSS Group

NSW

384

A1

07 May 2014

Onwatch

NSW

396

B1

31 May 2014

Paul-Tec Australia

NSW

409

A1

01 Aug 2015

Protection Pacific Security

VIC

394

C2

9 Aug 2014

RAA Security Services

SA

400

A1

12 Dec 2014

NSW

374

A1

14 Dec 2013

Secom Australia Sectrol Security

VIC

412

B2

01 Dec 2014

Securemonitoring

VIC

414

A1

23 Nov 2015

NSW

386

A1

04 May 2014

Security Alarm Monitoring Service

SA

387

A1

18 Jun 2014

Security Control Room

VIC

411

A1

18 Aug 2015

Sesco Security

WA

407

A1

03 Jun 2015

Signature Security

WA

403

A1

30 Jun 2014

SMC Australia

QLD

372

A1

07 Dec 2013

SMC Australia

VIC

371

A1

16 Dec 2013

Securenet Monitoring Services

SNP Security (Newcastle)

NSW

410

A1

17 Aug 2015

SNP Security (Sydney)

NSW

408

A1

13 Aug 2014

Spectus

WA

406

A1

12 Apr 2015

State Government Protective Security Service

QLD

388

C1

22 May 2014

Westpac Banking Corporation

NSW

382

A1

19 Mar 2014

Woolworths Limited

NSW

397

C1

04 Nov 2014

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.

SECURITY INSIDER DEC 2013// 41


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 42

ASIAL NATIONAL CALENDAR OF EVENTS 2014 JANUARY-MARCH

JULY-SEPTEMBER

26 February, Hobart 7 March, Melbourne 19 March, Sydney 20 March, Adelaide 21 March, Perth 26 March, Canberra 26 March, Brisbane

10 July, Adelaide ASIAL Industry Briefing 11 July, Perth ASIAL Industry Briefing 23 July, Sydney ASIAL Industry Briefing 6 August, Brisbane ASIAL Industry Briefing 24 September, Canberra ASIAL Industry Briefing 25 September, Hobart ASIAL Industry Briefing

ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing ASIAL Industry Briefing

APRIL-JUNE 4-6 June, Melbourne Security 2014 Exhibition & Conference

OCTOBER - NOVEMBER 15 October, Brisbane 16 October, Melbourne 23 October, Sydney

ASIAL Industry Briefing ASIAL Industry Briefing 2014 Australian Security Industry Awards for Excellence 6 November, Adelaide ASIAL Industry Briefing 7 November, Perth ASIAL Industry Briefing 26 November, Sydney ASIAL Industry Briefing and 45th Annual General Meeting

To find out more register online www.asial.com.au/eventscourses or email events@asial.com.au


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 43


INSIDER_Nov/Dec 2013 Iss5_52pp

24/10/13

8:41 PM

Page 44


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.