Security Insider August/September 2013

Page 1

INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

SECURITY

Page 1

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[ M AG A Z I N E ] VOL.18 | ISSUE.4 | SEPT 2013

66 26

PP255003/02390

Delivering the Message on Sham Subcontracting Providing a fair and transparent environment for businesses and consumers | NBN Update


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 2


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 3


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 4

CONTENTS VOL.18 | ISSUE.4 | SEPTEMBER 2013

22 DELIVERING THE MESSAGE ON SHAM SUBCONTRACTING

20 PROVIDING A FAIR AND TRANSPARENT ENVIRONMENT FOR BUSINESSES AND CONSUMERS

30 NBN UPDATE

36 WHEN CUSTOMERS WON’TPAY

06 | President’s message

Industry to be $350 billion

32 | The geometry of PSIM

08 | Decline in robbery and theft:

market

35 | Monitoring centre

Inter-state comparisons 10 | Active shooter guidelines for places of mass gatherings 14 | Study Finds US Security

ASIAL Strategic Partners:

4 //SECURITY INSIDER SEPT 2013

16 | Security 2013 18 | Bob Bruce awarded ASIAL Life Membership 26 | Q & A with Honeywell

certification listing 38 | Hot Products 41 | ASIAL new member listing


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 5


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 6

PRESIDENT’S MESSAGE

Opportunities for the Industry to learn and network

T

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited

he past couple of months have been busy for the Association with the Security 2013 Exhibition and Conference, the annual Gala Dinner and

PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au

opportunities for the Industry to learn, network and relax.

Web: www.asial.com.au

After more than a decade in Sydney, the event will head south to Melbourne in

Publisher

2014.The move has been warmly welcomed by exhibitors with an impressive 80% of exhibitors already committed for next year. The Security 2013 Conference featured a number of distinguished international experts, including Don Randall, MBE, Chief of Security at the Bank of England and one of the architects of the successful Project Griffin who

Editor Bryan de Caires | security@asial.com.au

offered insights into the way the Police and Private Security providers successfully interact

Editorial Enquiries communications@asial.com.au Advertising

in the UK. Dr Anne Speckhard, Adjunct Associate Professor of Psychiatry at

Tania Laird | advertising@asial.com.au Creative Director

Georgetown University Medical School shared her experiences from talking to terrorists, to understand what motivates someone to become a terrorist. The week also enabled the ASIAL board, secretariat and member representatives from around the country to meet up to discuss issues and strategies impacting the Industry.The meeting included invited representatives from the NSW Police, Cameron

Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 Digital | design@webfx2.com.au Editorial Contributors AON, Chris Delaney, Greg Tanzer, John Fleming,

Smith, Director, Security Licensing Enforcement Directorate and Chris Beatson,

Roger Pearce and Colin Porter

Director NSW PoliceLink Command.

Print + Distribution

Commencing in June and concluding in November, the Association’s consumer

Nationwide Advertising Group

awareness campaign continues through advertising in the Qantas – The Australian

Way magazine. In mid-August the Association also participated as a major sponsor of the Security in Government conference attended by government security executives. ASIAL’s 2013 Annual and Financial Report is now available for members to review

Published bi-monthly Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless

(www.asial.com.au/ar). I am pleased to advise that despite numerous challenges, the

otherwise stated with permission. All contributions

Association has enjoyed another strong year. Despite the removal of the mandatory

are welcomed, though the publisher reserves the

membership requirement in NSW, membership levels have remained stable and the

right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases

Association has returned a small surplus.The Association’s 44th Annual General

to: security@asial.com.au.

Meeting will be held at 7.45am on the 20th November at the Park Royal Hotel,

Internet

Parramatta which I encourage you to attend.

advertising were correct at the time of printing.

Finally, as a recent ASIAL Survey has shown, digital business strategies are

references

in

articles, stories

and

ASIAL does not accept responsibility for misleading views. Copyright©2013 (ASIAL) All rights reserved.

becoming an increasingly important component of our members business strategies.

Reproduction of Security Insider magazine without

ASIAL’s social media footprint is also starting to grow and evolve. Whilst for some, it

permission is strictly prohibited. Security Insider is

may mean venturing into unknown territory, I would urge you all to engage with the

a subscription based publication, rates and further details can be found at www.asial.com.au.

Association through LinkedIn and Twitter. For more information contact the ASIAL Secretariat.

[Next Issue] NOVEMBER 2013 ISSN 1442-1720

Kevin McDonald President

6 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 7


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 8

INDUSTRY NeWS

DECLINE IN ROBBERY AND THEFT: INTER-STATE COMPARISONS Rates of theft and robbery in Australia have fallen dramatically since the turn of the new century, according to a new report released today by the NSW Bureau of Crime Statistics and Research.The report focuses on the period between 2001 and 2009. Changes in offence counting rules make comparisons in crime rates before and after 2009 difficult but the report notes that national theft and robbery rates continued to decline between 2009 and 2012. Between 2001 and 2009, the national robbery rate fell by 49.1%. NSW experienced the largest decline in robbery (down 58.9%) and Tasmania the smallest (down 29.7%). The Northern Territory and ACT bucked the nationwide downward trend in robbery with both jurisdictions experiencing increases (Northern Territory: up 53%, ACT: up 11.3%). All Australian jurisdictions experienced falls in burglary, motor vehicle theft and ‘other theft’.

NSW had the largest fall in burglary (down 63.4%) and the ACT had the smallest fall (down 32.3%). Victoria had the largest fall in motor vehicle theft (down 70.1%), with NSW coming in just below the national fall (down 60.3% compared with a national fall of 62.2%).The Northern Territory had the smallest fall (down 26.9%). South Australia had the largest fall in ‘other theft’ (down 50.5%), with NSW coming in just above the national average (41.5% compared with a national fall of 39.3%).The ACT experienced the smallest fall (down 15.3%). The director of the Bureau, Dr Don Weatherburn, attributed the decline in theft and robbery to a combination of factors, including a reduction in the number of people committing crime to fund their heroin use, a

2013 ASIAL ANNUAL & FINANCIAL REPORT The 2013 ASIAL Annual & Financial Report is now available at www.asial.com.au/ar.

8 //SECURITY INSIDER SEPT 2013

substantial increase in average weekly earnings and tougher law and order policies. ‘These are unlikely to be the only factors in play’ he said. ‘Changes in vehicle and household security and changes in police tactics may also have played a role.’ Dr Don Weatherburn will address the ASIAL Industry Breakfast Briefing in Parramatta on the 20th November.

44TH ASIAL AGM The 44th ASIAL Annual General Meeting will be held at 7.45am on Wednesday 20th November 2013 at the Park Royal Hotel in Parramatta. Members are encouraged to attend the AGM, which will also feature a presentation by Dr Don Weatherburn, Director, NSW Bureau of Crime Statistics and Research.


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:53 PM

Page 9

INDUSTRY NeWS

NSW FIREARMS REGISTRY AUDIT The NSW Government has announced that it will undertake an independent audit of the NSW Firearms Registry to examine whether the Registry's operations are efficient and effective and align with its legislative and regulatory responsibilities. Announcing the audit, Minister for Police and Emergency Services Michael Gallacher said “We want to ensure the NSW Firearms Registry is meeting community expectations with specific regard to public safety, and customer service. In consultation with firearm owners and stakeholders, we've been told there is a clear need for the firearm licencing regime to be modernised and updated to include the latest technology.” The review will examine the creation of a new 'Smartcard' Firearms Licence regime that better secures personal information and streamlines the process for acquiring firearms and ammunition. In other changes at the Firearms Registry, Phill Houlton, Head of the

Firearms Registry has announced his retirement. Prior to taking on the role at the NSW Firearms Registry, Houlton headed up the NSW Security Industry Registry.

Licensing requirements for interstate based monitoring centres providing electronic monitoring of premises in QLD ASIAL has sought an update from the Office of FairTrading on developments regarding the issue of interstate monitoring centres providing electronic monitoring of premises in QLD. We have been advised that a policy paper has been prepared by the Office of Regulatory Policy for consideration by the Security Regulators Forum (SIRF). Unfortunately, SIRF has not met since the issue was raised in October 2012. However, it is anticipated that the issue will be addressed at the SIRF meeting to be held in Darwin in September.

SA INQUIRY INTO SURVEILLANCE DEVICES As part of the SA Legislative Review Committee Inquiry in to Surveillance Devices held in August, ASIAL was invited to address the Committee and respond to questions.

ASIAL MEMBER BULLETINS Members can now access a series of plain English bulletins covering a variety of issues, including the latest one on Payments to Employees undertaking training. Other bulletins include: • Incident Registers • Unauthorised Subcontracting • Security Licence Classifications • Record Keeping • Queensland Worker’s Compensation Act Changes • Misleading Representation of Monitoring Centre Certification • AUSTRAC – Cash InTransit Compliance • Payments to Employees undertaking Training

SECURITY INSIDER SEPT 2013// 9


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 10

INDUSTRY NeWS

ACTIVE SHOOTER GUIDELINES FOR PLACES OF MASS GATHERINGS The Mass Gatherings Advisory Group on behalf of the AustraliaNew Zealand Counter-Terrorism Committee (ANZCTC) has released guidelines which aim to provide a better understanding of the threat that active shooter incidents (ie a person armed with a firearm(s) who is actively engaged in killing or attempting to cause serious harm to multiple people) pose to Places of Mass Gathering (PMG). Places of mass gathering (PMG) can pose a broad range of security challenges for their owners and operators.They have been specifically identified - both nationally and internationally - as attractive targets for religious and political extremists, as well as disgruntled or mentally impaired individuals. Armed offender attacks have occurred and continue to occur in crowded places such as sporting, transport and entertainment venues. The guidelines seek to illustrate the key role that private sector

10 //SECURITY INSIDER SEPT 2013

stakeholders can play in developing and implementing appropriately informed prevention, preparedness, response and recovery arrangements to reduce the risks posed by such a threat.The guide should be read in conjunction with the National Counter-Terrorism Committee’s National Guidelines for the Protection of Places of Mass Gathering from Terrorism (2011). Among the issues addressed in the guidelines include: • Characteristics of active shooter incidents – notably the intent to kill as many people as possible within a short period of time; • Primary objectives – in most incidents, active shooters need freedom of movement and ready access to victims in order to achieve their objective; • Prevention – activities that may reduce the severity or impact of the emergency event; • Preparedness – emergency planning, resourcing capability

and preparedness, as well as contingency planning; • Response – strategies aimed at evacuating or isolating people or the offender; • Recovery – strategies to address community confidence, scene preservation/ investigation and business continuity. A copy of the ‘Active Shooter Guidelines for Places of Mass Gatherings’ can be found on www.nationalsecurity.gov.au


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 11


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 12

INDUSTRY NeWS

SMALL BUSINESSES SURVIVING NOT THRIVING The findings of a recent survey of family businesses conducted by RMIT University has revealed a picture of increasingly pessimistic family businesses that are surviving, but certainly not thriving. Among some of the report’s findings include that 55% of family businesses do not have a strategic plan; 62% do not have a formal board of directors; and 64% would seriously consider selling their business if approached. To view the full report visit www.mgiaust-survey.com.

PARTY SURVIVAL APP LAUNCHED To provide parents with assistance in planning safe parties for their children, a mobile application has been released that provides a step by step guide including a party checklist, venue safety checklist together with an alcohol management plan and other features. According to the App’s creator, Naomi Oakley (a formerVictorian Police member and owner of U-Nome Security), 'on any given Friday, Saturday or Sunday night police across Australia are called to teenage parties to deal with out of control gatecrashers who have harmed guests and or caused property

damage.Poor planning is the major reason for parties getting out of control.

The App’s features include: • Assistance in party planning and registration • Step by step guide for party planners • Party checklist • Optimised guest lists • Venue safety checklist • Demonstrated alcohol management plan • Automatic reminders and prompts • Keep track of party timeline • Instant Facebook and Twitter feeds

NATIONAL PROTECTIVE SERVICES SECURITY GUARD AWARDED ‘YOUNG LEADER OF THE YEAR 2013’ One of National Protective Services popular security guards, Arsène Bounda, has been awarded the Young Leader of the Year by the Celebration of African Australian National Awards held in Canberra on 27 July 2013. National Protective Services is a certified and Quality Endorsed Security company. Based in South Melbourne, the company has delivered security services to a growing list of commercial, industrial and government organisations for over 25 years. Arsène is a passionate and diligent member of the National Protective Services Team, effectively combining both work and study. He has recently passed the Victoria Police Education

12 //SECURITY INSIDER SEPT 2013

Entrance Examination and the Australian Defence Force YOU Session, which has enabled him to join the Officer's Training School at the RAAF’s Victorian base in East Sale.

• Fast Instant Messaging between guests • Rate your guests • Quick dial to 000, taxis and friends • Administrator and guest modes The Party Survival App aims to provide parents with a level of comfort that contributes to a safe partying environment for their children and their guests. It is hoped that App will contribute towards a reduction in the level of party related trauma and hospitalisations. The Party Survival App is available through the Apple Store.

FWO ATTACKS SECURITY COMPANY FOR UNDERPAYMENTS: IGNORANCE IS NO EXCUSE” In a recent judgement handed down in the Federal Court, a security company was fined $66,000 for underpaying around 20 employees. The Fair Work Ombudsman claimed that the company did not make sufficient effort to ensure compliance with award wage rates. ASIAL members are reminded that they can access accurate professional Industrial Relations advice, assistance and wage information by calling 02 8425 4300, going to the Member Area of the website or sending an email to ir@asial.com.au.


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 13


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 14

INDUSTRY NeWS

STUDY FINDS US SECURITY INDUSTRY TO BE $350 BILLION MARKET ASIS International (ASIS) and the Institute of Finance and Management (IOFM) have jointly announced the release of “The United States Security Industry: Size and Scope, Insights, Trends, and Data,” an extensive benchmark study of the private security industry’s expansion over the past decade and projected future growth. Over 400 security industry executives participated in the United States Security Industry Survey, conducted in late 2012. A companion survey of security manufacturers and vendors, security services providers, dealers, distributors, installers and integrators was also conducted in order to enhance market projections. Information collected was analysed, aggregated and combined with additional data from related national studies conducted by

ASIS and IOFM, as well as publicly available information from U.S. government data and market research of homeland security spending. Key highlights of the report include: • $350 billion market breaks out to $282 billion in private sector spending and $69 billion in federal government spending on homeland security • Operational (non-IT) private security spending is estimated to be $202 billion with expected growth of 5.5% in 2013; IT-related private security market is estimated at $80 billion with growth of 9% projected for 2013 • Number of full-time security workers is estimated to be between 1.9 and 2.1 million • 42% of respondents indicated spending on training would increase

in 2013, with 12% anticipating a rise of 10% or more • Private detective/investigator is one of the fastest growing occupations, with anticipated growth of 21% projected through 2020; several IT positions are anticipated to grow 22% through 2020 The report is available for purchase in the ASIS Store online at www.asisonline.org/bookstore.

ADVERTORIAL

GOING MOBILE TO MINIMISE DOWNTIME AND BOOST CASH FLOW One of the main challenges facing a service business is maintaining a reliable cash flow. It’s obviously necessary to bill for all parts and labour on the job, but don’t underestimate the importance of maximising your employees’ billable hours. If your technicians write their job reports on paper forms and then make a special trip a couple of times per week to drop them into the office, how much might that cost your business? The problem goes deeper than you might first think. 1. Delayed cash flow: the sooner you create an invoice and send it to the customer, the sooner you can be paid, which can have a noticeable impact on your cash-on-hand.The best possible scenario is to bill on the same day, at the completion of the job. 2. Greater vehicle expenses: working on an estimate of one dollar per kilometre to cover wear and tear, an extra 20 km trip twice a week to drop off paperwork will cost your business $40 per technician per week. 3. Loss of billable hours: this additional driving could take up to 90 minutes per

14 //SECURITY INSIDER SEPT 2013

week. If your employee also spends half an hour per visit catching up with office staff, this could total 21/2 hours of downtime per week per employee, during which you incur employment expenses without billing customers. If you charge $75 and employee costs are $60 per hour, this could cost your business over $330 per employee per week. 4. Duplication of effort: when using paper forms, information is manually copied at different stages of the workflow. For example, your office staff may type out the customer details on a job sheet for the field employee, who then re-writes them on another form, along with details of the work performed and parts used, which is then re-typed by office staff to prepare an invoice. If this consumes one billable hour for a field employee and two hours for office staff, this could cost over $150 per week per field employee. 5. Lost, incomplete or incorrect paperwork: A job sheet misplaced or accidently thrown out will delay invoicing; a lost supplier invoice will prevent you from billing for job-specific purchases. The administrative staff time invested in

resolving these problems, or chasing up missing or erroneous information, could cost $50 per field employee per week; not resolving these issues could cost far more. In this example, the total cost to your business is $570 per week for each employee in the field. Depending on your workflows, this figure could be greater or smaller, but it’s still a significant hit to your bottom line. At $39 per licence per month, the simPRO Connect mobile app can greatly reduce all these inefficiencies. Paired with simPRO Enterprise in the office, you have a complete job management system, from quotes to invoicing, with scheduling and stock management. No more manual duplication of information, no more stopping into the office to drop off incomplete forms—just unparalleled visibility to boost your employee productivity—and your bottom line.


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:54 PM

Page 15

INDUSTRY NeWS

SAFER IN SYDNEY’S WEST Against the back drop of alcohol fuelled violence in the Sydney CBD and Kings Cross area, Rosehill Gardens Racecourse stands out as a benchmark venue for compliance and harm minimisation.This is exemplified by the result of the 2013 Sydney Carnival, where the Racecourse hosted over 40,000 patrons and saw just one individual charged for assault. Previously, the venue has had less enviable results. It has been overrepresented in the number of reported assaults and in 2009 had restrictions temporarily placed upon its liquor license as a direct result. Effective collaboration between the NSW Police – Rosehill Local Area Command (LAC), Australian Concert & Entertainment Security (ACES) and the Australian Turf Club (ATC) has significantly reduced onsite assaults and driven compliance with the Liquor Act NSW and other regulatory bodies. Since 2010, Rosehill Gardens has been classified as a Category 3 Venue (assault rating), resulting in no additional conditions being placed on the venue’s liquor license, no ‘strikes’ or imposed restrictions. A variety of initiatives, from the use of social media to the introduction of security on horseback, have assisted to achieve this result, including: • Staff training: A comprehensive training package has been developed to ensure all staff are

aware of and able to comply with the ATC’s RSA policies, and to refresh knowledge and competence in relation to the Liquor Act.The ATC also recognises the need to build RSA principles into management practices and daily operations. By undertaking this training, staff and management are consistent in the operation of ATC premises and the message the Club is delivering to patrons and the community. • Self-imposed alcoholic beverage sale restrictions: The ATC restricts alcoholic beverage purchases to four alcoholic drinks per transaction on race days and two after 4pm.This initiative is designed to combat drink stacking and curb rapid alcohol consumption. • Patron awareness / education: In addition to mandatory signage the ATC has erected customised signage at all pedestrian entrances and exits. Digital messages are also displayed at points of sale and on the ‘big screens’. The introduction of a policy that excludes entry to any patron that is observed to be consuming or in the possession of alcohol on approach to the venue.

• Live CCTV monitoring of patron behavior & crowd movement: A digital surveillance system has been installed to maintain the integrity of the venue and to monitor all public entertainment areas.Trained operators are employed during race days and major events to monitor cameras located in bars and lawn areas. • RSA Monitors: Responsible Service of Alcohol Monitors are employed by the ATC and deployed for race days and major events.This role provides customer service, age verification, and sobriety assessment and is an effective conduit between patrons, bar staff and security. • Mounted Security: The ATC Mounted Security section is deployed for race days and major events, and actively participates in incident management. ACES and the ATC have conducted combined training with ground and mounted security to ensure effective operational utilisation. • Project Eyewatch: The ATC has collaborated with the NSW Police Project ‘Eyewatch’, establishing the ‘Rosehill Racecourse Major Event Day Group’. This social media platform allows for real-time communication and information sharing between members of a closed group within the local precinct.

SECURITY INSIDER SEPT 2013// 15


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:27 PM

Page 16

INDUSTRY NeWS

Security 2013 Exhibition celebrates record visitor numbers and announces move to Melbourne Australasia’s largest annual security industry event, Security 2013 Exhibition & Conference has reaffirmed its position as the premier industry event for security professionals in Australasia, announcing a record number of key industry decision makers and buyers in attendance and an increase of almost 20% in visitor numbers compared to 2012.The success of this year’s exhibition has been further endorsed by the industry with over 80% of exhibitors already committed to exhibit at Security 2014, which will be held in Melbourne from June 4-6 for the first time in 14 years. Security 2013 exhibitorTroy Donnelly, General Manager at Ezi Security Systems commented,“Security Exhibition is one of the best platforms in Australia to display our extensive product portfolio.The quality of professionals that visit our stand each year is second to none where we get the opportunity to explain the benefits of our products, and discuss more broadly some of the current trends impacting the security sector, not only with our current clients but also with prospects as well.” Kylie McRorie, Exhibition Manager, Security 2013 Exhibition said,“Security 2013 was an outstanding success.The commitment, enthusiasm and dedication in evidence from exhibitors and visitors was overwhelming and their feedback and ongoing support has been both encouraging towards the move to Melbourne, and very positive

16 //SECURITY INSIDER SEPT 2013

towards the improvements we have made to the event this year. We are proud to host the annual Security Exhibition and to be able to work with the industry to showcase the latest security innovations, trends and insights and we look forward to an even bigger and better year in 2014 when we come to Melbourne”. Some of the highlights from this year’s show included:

CONFERENCE AND SEMINAR PROGRAMS The Security Conference organised by ASIAL saw global experts present on a range of issues.These included Don Randall, Head of Security at the Bank of England, who delivered the keynote

session on how to create safer communities through engaging with public and private security partnerships. Bruce Blythe, Chair of CMI addressed issues relating to crisis management and reputation management. A panel of industry experts also presented a series of lively, practical sessions in the Security Solutions SeminarTheatre sharing insights into the latest trends and issues impacting Australian businesses, from aviation security and hostile vehicle mitigation to managing risk in major events. Internationally recognised expert on terrorism, Dr. Anne Speckhard, made a special guest appearance at Security 2013, presenting the keynote session on the motives and factors that drives


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 17

INDUSTRY NeWS

someone to become a terrorist. NBN Co’s Strategic Consulting Architect, Anthony Camilleri, provided an update on the rollout of the NBN as well as its Security Industry Engagement Activities.

PRODUCT INNOVATION AND NEW PRODUCT OF THE YEAR AWARD This year’s exhibition showcased the latest security solutions from over 150 exhibitors both locally and from around the world including the likes of Bosch, EZI Security, MOBOTIX AG and Interlogix. CCTV cameras, biometric identification systems, bollards, electronic locks, thermal imaging cameras and access control solutions were among the hundreds of products on display.There was also a record number of new products appearing for the first time on Australian shores at Security 2013, including FLIR Systems’ FC-Series S: Thermal Imaging Camera and HID’s iCLASS SEOS Credential. Australian owned and operated, Ezi Security Systems claimed the prestigious Best New Product of the Year Award for its Ezi Elkosta M50 Bollard.The unique movable bollard is developed to withstand the impact of a 6.8 tonne vehicle travelling at 80 km/h and features a world first integrated hydraulic drive unit complete with EFO-facility. SALTO’s cloud-based access control solution Clay was recognised as first runner up, while Cognitec’s facial recognition

Don Randall addresses the Conference

technology FaceVACS-VideoScan was named second runner-up.

SECURITY 2014 EXHIBITION & CONFERENCE Following the success of 2013, the Security Exhibition & Conference will return to Melbourne in 2014.The move will offer new business and networking opportunities, and will continue to be the region’s essential meeting place for the industry. Natalie Moussa, Senior Brand Manager at ID Warehouse said,“This is our ninth consecutive year exhibiting at

the Security Exhibition. We see the event as an integral part of our marketing calendar each year, it’s always a great opportunity to showcase our latest products and we’re very pleased with the quality of visitors and new enquiries we receive each year. As an exhibitor, it delivers great value for us each year and we are very much looking forward to Security 2014 in Melbourne”. Geoff Plummer, Business Development Manager at Smartlock Digital and Davcor Group commented, “We are looking forward to moving back to Melbourne for Security 2014.This change means we are opening ourselves up to a whole new group of clients who we previously may not have been able to reach, and significantly increases our return on investment.” For more information on Security 2014 Exhibition, visit www.securityexpo.com.au or www.breakingintomelbourne.com.au

SECURITY INSIDER SEPT 2013// 17


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 18

INDUSTRY NeWS

Bob Bruce awarded ASIAL Life Membership Former longstanding ASIAL Director and widely respected industry figure Bob Bruce has been recognized for his contribution to the industry.The ASIAL Board has made Bob a Life member for his outstanding contribution to the growth and development of the Association. Bob was a long standing Director of ASIAL until he stood down in 2012 following his retirement. During this time he made a lasting contribution to the Association through his contribution to the annual exhibition and conference during its formative years and through his leadership of the Cash in Transit Special Interest Group. Bob’s integrity, honesty and

candidness made him an invaluable member of the ASIAL Board whose input was highly valued. Much of Bob’s work was conducted behind the scenes without any fuss or fanfare. He certainly didn’t seek plaudits nor acclamation for the work he did. The high regard and respect that Bob is held is reflected in the following comments from Past ASIAL Presidents:

“Bob has been a tower of strength for his company, for ASIAL, and for this Industry.” Larry Circosta (1992-2001)

“I will never forget how Bob welcomed and supported my passage onto the board. Given his status and reputation, it was greatly appreciated and never forgotten!” Antony Elliott (2002-2006) “Bob is an Old School Gentleman and a man of his absolute word. Some people are referred to as “Glass half full” people others as “Glass half empty”. What I like about Bob is that he keeps his thoughts close but wonders what idiot actually designed the glass.” Ged Byrnes (2006-2012)

From left to right, Antony Elliott, Bob Bruce and Tom Roche, pictured during an ASIAL Board meeting held at Ballymore in 2008.

18 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 19


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 20

ASIC

Providing a fair and transparent environment for businesses and consumers By Greg Tanzer*

The Australian Securities and Investments Commission (ASIC) is Australia’s corporate, markets and financial services regulator. A KEYFUNCTION OF ASIC is to maintain, facilitate and improve the Australian financial system by ensuring that businesses operate in a fair and transparent environment. ASIC does this to protect the integrity of the financial system and provide businesses and consumers with confidence and certainty. Small businesses make up almost 96 per cent of Australian businesses and have a significant financial impact on the Australian economy, so it’s vital that they are adequately regulated. ASIC is determined to help small businesses operate in a fair and transparent environment by making sure that they know and understand their legal obligations and by taking regulatory action against those that intentionally cause harm to other small businesses and consumers. In order to do this, we’re introducing a number of initiatives. ASIC is enhancing communication with small businesses about its role and their compliance obligations. We’re striving to reach as many small businesses as possible, using a variety of communications channels and working with other small business stakeholders, including other regulatory agencies, business associations and business advisers. ASIC is also developing new tools and resources that will make it easier for small businesses to know and understand their legal obligations and comply with the law. We’ve released a new booklet,Your obligations as a small businesses operator' that covers a number of topics, including: • ASIC’s regulatory role and functions; • types of business structures ASIC regulates; • individuals that may be disqualified from managing companies; • responsibilities of company officers;

20 //SECURITY INSIDER SEPT 2013

• compliance obligations of company officers; and • where to find related information on the ASIC website. The booklet can be downloaded from the ASIC website: www.asic.gov.au ASIC’s website will also shortly have a small business webpage which will provide information that is relevant to small businesses and easy to understand. Another way that ASIC is helping small business is through effective regulation. We’re focusing our attention on those that operate small businesses and intentionally set out to cause harm to other legitimate small business operators and consumers and whose actions undermine the wellbeing of the Australian economy. ASIC is particularly concerned with the high levels of fraudulent phoenix activity in the construction, labour hire, transport, security and cleaning industries. Phoenix activity involves the winding up of a company and the subsequent continuation of that business in a new company, often with a similar company name, structure and staff. The phoenix company phenomenon is a side-effect of the use of the corporate form and of limited liability; concepts that are fundamental to the global commercial system. It is essential to the concept of limited liability that, when a company fails, the directors and the shareholders, as a general rule, are not held personally responsible for the debts of the company. Phoenix activity is not, therefore, inherently unlawful. Genuine corporate failure where businesses have been responsibly managed and subsequently continue after liquidation using another corporate entity is a legitimate use of the corporate form.


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 21

ASIC

“ASIC IS PARTICULARLY CONCERNED WITH THE HIGH LEVELS OF FRAUDULENT PHOENIX ACTIVITY IN THE CONSTRUCTION, LABOUR HIRE,TRANSPORT, SECURITY AND CLEANING INDUSTRIES.”

Greg Tanzer*

Fraudulent phoenix activity, on the other hand, generally involves abuse of the corporate form by current or previous directors of the company to intentionally deny creditors their entitlements. The impact of fraudulent phoenix activity on Australian businesses and the broader community was highlighted in a recent PriceWaterhouseCoopers report commissioned by the Fair Work Ombudsman.Titled, Phoenix Activity; Sizing the Problem and Matching Solutions, this report estimates that the total annual detrimental cost of fraudulent phoenix activity on the Australian economy is approximately $3.19 billion. Of that amount, the report estimates that the annual cost of phoenixing is: • Up to $655 million for employees, in the form of unpaid wages and other entitlements; • Up to $1.93 billion for businesses, as a result of phoenix companies not paying debts for goods and services that have been paid for but not provided; and • Up to $610 million for government revenue, mainly as a result of unpaid tax – but also due to payments made to employees under the Fair Entitlement Guarantee (FEG). While there are many characteristics of illegal phoenix activity, the most common are: • The company fails and is unable to pay its debts; • Directors act in a manner which intentionally denies unsecured creditors equal access to the entity's assets in order to meet unpaid debts; and • Soon after the failure of the initial company (usually within 12 months), a new company commences using some or all of the assets of the former business, and is controlled by parties related to either the management or directors of the previous entity.

ASIC has a number of initiatives to combat fraudulent phoenix activity. Funding Liquidators: The Assetless Administration Fund (AA Fund) was established by the Australian Government and is administered by ASIC. It is used to finance preliminary investigations by liquidators into the cause of the failure of companies that have few or no assets. Liquidators prepare and lodge reports with ASIC who, in turn, may take enforcement action. Disqualifying directors: ASIC can disqualify directors from managing corporations where they are involved in two or more companies that have been placed into liquidation within the past seven years. ASIC relies on statutory reports provided by liquidators to support its decisions to disqualify directors from managing corporations. A significant number of statutory reports allege illegal phoenix activity. ASIC Delegates who review the matters have the power to disqualify directors for up to five years. ASIC disqualified 72 directors from managing companies in the 2012/13 financial year. Liquidators Assistance Program: ASIC regularly helps liquidators to secure the books and information of companies in external administration by ensuring that directors comply with their legal obligations. Directors who fail to meet their obligations may be the subject of ASIC initiated court action. In the 2011/2012 financial year, ASIC prosecuted 402 company officers for a total of 817 offences with fines and costs totalling more than $1 million ordered. Identifying and deterring phoenix activity: ASIC has undertaken a new initiative to deter fraudulent phoenix activity by focusing on directors who have a failed company in the construction, labour hire, transport, security and cleaning industries where there have been allegations of fraudulent phoenix behaviour. We have identified individuals with current companies and are using intelligence from several sources to identify which of those companies are in financial distress and tracking towards external administration. ASIC will use this information to deter those directors from engaging in fraudulent phoenix behaviour. We will also continue to work with other key Government agencies and industry representatives to raise awareness about fraudulent phoenix activity that is not only illegal, but has far reaching and unfair consequences for the Australian community. Greg Tanzer is a Commissioner with the Australian Securities and Investments Commission.

SECURITY INSIDER SEPT 2013// 21


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 22

LOCAL GOVERNMENT PROCUREMENT INITIATIVE

Delivering the Message on Sham Subcontracting By Chris Delaney

As many will be aware, ASIAL has for some time raised concerns about sham subcontracting in the Security Industry. In particular, how the practice damages the reputation of our industry by encouraging customers to seek low cost security providers. There is a genuine argument for encouraging and supporting those who wish to start their own business, large or small, and there is a compelling argument for genuine sub contracting as a necessary part of the private security contracting industry. However, there is no place in our industry for illegal arrangements that destroy the opportunities for legitimate security businesses to compete for contracts or for individuals to be compensated for their labour at lower than minimum legislative and award wages and conditions. In this article I will discuss some of the consequences of sham subcontracting, how it is “inadvertently” supported by some Government agencies, and what ASIAL is doing to deter the practice, while still supporting the rights of individuals to operate a genuine small business.

What is “sham subcontracting”? Sham contracting is when an employer attempts to conceal an employment relationship by calling it an independent contracting arrangement.This is usually to avoid paying legal minimum rates of pay, workers compensation, insurances,

22 //SECURITY INSIDER SEPT 2013

tax, and entitlements, such as annual leave and sick leave. It gives the Principal Contractor a distinct advantage over competitors by reducing their costs by anything up to 25%+. Arrangements such as these are not genuine and may be regarded as sham contracting. Sham contracting arrangements are unlawful under the Fair Work Act 2009 (FW Act). Under the FW Act an employer cannot: • Misrepresent an employment relationship, or a proposed employment relationship, to be an independent contracting arrangement. • Dismiss, or threaten to dismiss, an employee in order to re-engage that employee as an independent contractor to perform substantially the same work. • Knowingly make a false statement with the intention of persuading a person to enter into an independent contracting arrangement. When it comes to Local Government Tenders, the contract almost always goes to the proposal with the lowest price. And the lowest price very often

comes from security businesses that use subcontracting arrangements and not direct labour. While some such arrangements may be bona fide those that are not result in: • Individuals (ABN holders) underpaid and exploited. • Principal Contractors gaining an unfair business advantage over competitors. • The so called “market rates” being unsustainably low. • End users being exposed to “shonky” business practices (including uninsured and unprofessional work), and • End users exposed to accessorial liability under s550 of the Fair Work Act 2009. ASIAL and the Fair Work Ombudsman (FWO) have been working on a Government Procurement Initiative (initially focusing on local government) which aims to educate Local Government on the pitfalls of using price as the primary determinant when allocating security contracts.To that end the FWO have recently written to Local Government Associations throughout Australia and met with Local


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 23

LOCAL GOVERNMENT PROCUREMENT INITIATIVE

Government Associations in New South Wales, Western Australia and South Australia with the following message: “ASIAL has recently raised concerns with the Fair Work Ombudsman concerning the wages and conditions paid by some security businesses contracted by local councils. These concerns appear to be valid, based on recent compliance activities undertaken by the Fair Work Ombudsman. In particular, there is evidence that a focus on obtaining services for the lowest price has proven to support a range of unlawful behaviours, including underpayment of wages and illegitimate subcontracting arrangements. In some instances security firms have been found to be significantly undercutting minimum award conditions. The consequences of this are far-reaching and widespread, including for legitimate operators in the contract security industry. The alleged contraventions of the Act and the relevant modern award (the Security Services Industry 2010) reflect primarily on elements of the contract security industry, however there can also be ramifications for those who are

involved in the procurement of these services on behalf of local corporations. For example, individuals involved in the procurement of services at prices that can only be supported by the payment of below-award wages could be found to be personally liable for contraventions of the Act and the modern award. The Fair Work Ombudsman is keen to work with organisations such as yours primarily to get a better understanding of procurement practices within local government and also to establish the best way to work with local councils to ensure that they understand their obligations in ensuring that bona fide contracting arrangements are established that help limit or eliminate the risks for local government, including vicarious liability.” The Local Government Initiative will continue with the next stage to include the development of Model Tender Clauses and a Model Workplace Management Plan to ensure more objective criteria with which tenderers must comply. We will also refine the

communication processes to ensure that the key messages get through to government decision makers. A recent ASIAL survey of members who participated in government tenders has provided insights into the difficulties they face when competing for government security contracts. For example: • The overwhelming reasons for not tendering for government contracts are based on the inability to compete on price and/or make a sustainable profit from the work. • Over 80% reported price as the most important factor in winning a tender. Some of the comments provided included: “We lost contracts due to local security companies requesting staff to get ABNs so they can underpay and not comply with the Award, pay super and Workcover like the rest of us do”. “There is a lot of pressure to provide a price based tender. We get the impression that we have missed out on numerous tenders to companies that could not be complying with legislated requirements”.

SECURITY INSIDER SEPT 2013// 23


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:28 PM

Page 24

LOCAL GOVERNMENT PROCUREMENT INITIATIVE

If you have not already completed the survey, make sure you have your say by completing the Tendering for Government Work Survey available in the member’s area of the ASIAL website. Alternatively, you can email security@asial.com.au and request a link to the online survey. All responses are kept anonymous.

How Governments inadvertently promote “Sham Subcontracting” Legislation in Queensland and Victoria permits individuals who hold a security licence to operate a security firm/business as a sole trader without the need to hold a security firm or business licence.This situation has given rise to a number of unintended consequences. It encourages potentially unlawful practices whereby security businesses (Principal Contractors) engage individual ABN holders to avoid costs of employing direct labour, including minimum award wages and conditions, workers compensation, superannuation, leave etc in order to gain an advantage over competitors employing direct labour. Some in business may believe that all such arrangements are lawful.The fact is that, even though a person has agreed to be an independent contractor, that person may actually be an employee because the relationship is an employment relationship. All too often the parties to these arrangements believe that it is a genuine subcontracting arrangement only to find it is not. ASIAL will be recommending legislative amendments to provide the opportunity for security firms or businesses to operate as legitimate sole traders while protecting the industry from the deleterious effects of sham subcontracting. The High Cost of getting it Wrong Earlier this year a company and its director were fined more than $286,000

for breaches of the Fair Work Act, stemming from the incorrect classification and payment of its employees as independent contractors. The fines are a record for FWO proceedings in NSW and is one of the largest ever obtained by FWO nationally. The company admitted to 17 contraventions of the Fair Work Act relating to sham contracting, breaches of a modern award and record keeping/pay slip requirements. Its director also admitted involvement in the 17 contraventions under the "involvement in a contravention" personal liability provisions of the Fair Work Act (he was personally fined approximately $48,000). The case serves as an important reminder to businesses to correctly engage and remunerate employees and the perils associated with sham contracting arrangements. There is no single test to determine whether a relationship is truly one of employment or that of an independent contractor.The courts look at a range of factors to determine the issue and while what the parties call themselves and the contractual arrangements entered into are relevant, they are not determinative. As the Court has previously held: "Parties cannot create something which has every feature of a rooster, but call it a duck and insist that everybody else recognise it as a duck". The above prosecution (and a number of recent Federal Circuit Court decisions in similar prosecutions) highlight that: • it may not always be appropriate to engage a person or company to provide services under a contracting arrangement; • trying to squeeze a work arrangement into a 'contracting box', when the circumstances call for an employment arrangement and compliance with applicable industrial regulation, can have expensive consequences; and • using contracting to push

responsibility for compliance with applicable industrial regulation - and liability for non-compliance - down the supply chain may not work. The former Fair Work Ombudsman Nick Wilson, warned last year that: "Turning a corporately-sanctioned 'blind-eye' to outsourced work that is performed by another enterprise using contractors on below-award rates of pay may expose enterprises up the procurement chain to liability. All parties should undertake due diligence when outsourcing work to contracted workers, particularly to lowest-cost providers, to ensure lower costs are attributable to efficiencies in the business and not due to the potential exploitation of workers on below award rates."

So, what now? The very nature of the security industry means that there is a commercial imperative for security businesses to subcontract work to meet short term spikes in client demand. Having said that however, the practice of sham subcontracting has a negative effect on the entire industry and its customers. Part of the solution is for Government agencies to show leadership when allocating security contracts.They can do this by placing greater emphasis on quality service provision rather than the lowest possible price, which inevitably encourages lower quality service from unscrupulous providers. Education of clients is the key, whether government or corporate. In this regard ASIAL is working with FWO on the Local Government Procurement Initiative, which in time will extend to include other levels of government. We will work with all Government agencies to develop fair and transparent guidelines that will produce certainty and confidence throughout the supply chain, resulting in a more professional and sustainable private security industry.

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au

24 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 25


INSIDER_Aug/Sep 2013 Iss4_52pp

26 //SECURITY INSIDER SEPT 2013

29/8/13

7:34 PM

Page 26


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 27

SECURITY INSIDER SEPT 2013// 27


INSIDER_Aug/Sep 2013 Iss4_52pp

28 //SECURITY INSIDER SEPT 2013

29/8/13

7:34 PM

Page 28


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 29


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 30

NATIONAL BROADBAND NETWORK

NBN UPDATE By John Fleming* ASIAL has brought to the attention of Telstra issues concerning the migration of telecommunication services onto the NBN. As the NBN has been rolled out across Australia, Retail Service Providers (RSPs) have inadvertently disconnected some customer’s security systems.This happens when the existing PSTN service is migrated to a digital service using the UNI-D port.Typically the home owner has little or no knowledge of the differences in the technology and what is been offered by the RSP, their prime concern is that they have a telephone service and potentially a broadband connection. Usually it is not until the monitoring centre acknowledges a loss of communication from the customer’s site and a service technician is called that the problem comes to light. ASIAL has communicated industry concerns to Telstra who have been proactive in acknowledging the issue and responding to remedy the situation. It has given Telstra the opportunity to look at their processes and how that information can be used to ensure migrating legacy systems onto the NBN meets the needs of customers. The Government mandated roll-out of the NBN will create significant change in telecommunications in Australia.Telstra is committed to ensuring customers are able to achieve a smooth changeover of their copper based services to the NBN. This includes steps that can be taken to assist customers who have contracted with security and medical alarm

30 //SECURITY INSIDER SEPT 2013

companies for the installation and maintenance of those services using in premises telecommunications cabling. Alarm systems are typically not RSP products. RSPs generally do not have a detailed technical knowledge on how alarm systems operate. However,Telstra is working to make sure their staff know what to do when they become aware that

a customer does have such over the top services. It is not compulsory for Retail Service Providers (RSP) to offer UNI-V based voice products or to have the skills and appropriate licences to reconnect Security Alarm Systems when a customer changes over to the NBN. Alarm customers will be advised to test their


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 31

NATIONAL BROADBAND NETWORK

system and communicate with their alarm service provider.The NBN Co supplied network termination device port configurations (UNI-V or UNI-D) allow RSPs to choose to deliver a range of different types of telecommunication services to their customers. At the present time the UNI-V port is the only one that has a back up battery, NBN Co are looking to extend this battery offering to the UNI-D port by the end of this year. VoIP networks offer a range of codecs ranging from G.711 to a number of compressed codecs to save bandwidth.The only supported codec on the NBN UNI-V port is G.711; this is designed to provide a call quality equivalent to the PSTN. The NBN Co has advised ASIAL that it is establishing a test bench facility in Melbourne where security providers and device manufacturers can test their devices against a wide range of NBN services from a range of NBN RSPs.The NBN Plug Bench test facility will enable alarm service providers to perform a basic compatibility test against different Retail Service Providers.This is scheduled to become operational in September 2013;

interested companies are invited to submit an EOI to participate in testing their products. Key challenges for the monitored alarm industry will be when an RSP has transitioned a customer onto the NBN. • If using the UNI-V port has the RSP preserved the mode 3 connection during the cutover? • If not, what remedial wiring will the alarm company have to do and at what cost to the customer • If using the UNI-D port what hardwired IP product and or wireless product will you use and what consideration has been given to using a backup power supply. Again these are additional costs for your customer. ASIAL‘s advice to the electronic security industry remains the same as before, be vigilant and communicate with your customers.The reality is that some customers may change their phone provider without realizing the effect on their alarm system. Raising awareness among customers of the potential failure that may occur if they choose an alternative network service is paramount to ensuring the alarm system continues to

function correctly. The Association has prepared a one page electronic information sheet that members can send out to their clients with a monitored security system, which explains in plain English what they should do when the NBN rollout reaches their home.The information sheet is available to members through the members area of the ASIAL web or by emailing security@asial.com.au and includes the ability to include your company’s contact details. John Fleming is the General Manager, ASIAL. He can be contacted at gm@asial.com.au.

SECURITY INSIDER SEPT 2013// 31


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 32

PSIM

THE GEOMETRY OF PSIM By Roger Pearce*

Yes, just when you thought there were no new concepts in security they have come up with a new one. Well not so much new as an enhanced idea of what has been tried many times over the years but now looks like it has finally come of age. Physical Security Information

Both access control systems (ACS)

on response times and staff

Management (PSIM).The access

and video management systems (VMS)

performance, the ability to cross-

control industry is pretty comfortable

do part of what a PSIM does but not

reference or link records, search on any

with High Level Interfaces (HLIs) these

everything.To be completely effective

information in the security database,

days. In fact no respectable access

and improve efficiency a PSIM must not

and present your findings in a variety of

control system would not have a suite of

only integrate the physical security but

ways. Automatic dispatching of guards

HLIs available to interface to other

also link it to the manpower

to respond to an event is a great time

systems.The most important and the

management software.

most usual we have been dealing with

This means combining several

for over 20 years now are interfaces to

technologies including the physical such

Lifts, CCTV, Building Management

as the ACS, VMS, BMS, Fire, Radio,

Systems (BMS) and more recently

Intercom & phones. But importantly

intercoms. In a commercial high rise

connecting these to a system that logs

building these interfaces will probably

all physical events and can pull related

suffice where an integrated system is

events together and present them as

required. PSIM will be of more use in

one scenario to the operator by linking

larger buildings where there is in-house

an alarm, a relevant camera view or

security monitoring and guards.

views as well as bringing up a report

However when you move to larger

page so that the operator can add his

more diverse security installations with

comments and response. It also must

on-site monitoring and guards like a

automatically pull up the recommended

port authority, prison, university campus,

Standard Operating Procedure (SOP)

airport or mine site the security control

and present it to the operator. The

room is likely to have a much larger

system must then go on to allow easy

array of systems to monitor and control.

and rapid reporting and analysis of

From one central point the security

historical events to help identify patterns

department will be monitoring all the

and trends that have occurred over time.

usual security sub systems as well as

Management of operators and mobile

taking phone calls, answering intercoms

guards must also be handled within the

and communicating with mobile patrols

system.This involves creating diaries

and staff over the two way radios.

and programs of future activities, reports

32 //SECURITY INSIDER SEPT 2013

Before

After


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 33


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 34

PSIM

saving feature especially in an

This is where PSIM comes in.The aim

campus and badges his card on the

emergency when the control room is

is to put in an “Overlay” Graphical User

weekend, the air conditioning and lights

under pressure during a crisis.

Interface (GUI) with all the sub systems

in his office turn on the lift is called to

PSIM should also enable requests for

interfaced to it so that there is only one

the ground floor, and the relevant

service to be thoroughly documented—

GUI workstation for the operator to use.

cameras come up on the monitors in

from initiation, to deployment, to

This is the main differentiator between

the Security Control Room to check he

response. Routine activities should be

an integrated access control system or

gets to his office safely.

escalated into incidents for further

video management system and a PSIM.

follow-up. Operators should be able to

A PSIM does not just integrate it

call point, the nearest camera comes

search text fields across the whole

provides intelligence as well.

up on the video monitor in the security

database and consolidate related

This has many advantages over a

A student calls from an Emergency

office, if after dark additional lighting

incident and investigation data into case

control room that has grown just like

comes on, and the message is relayed

records for comprehensive tracking,

topsy with operators having to jump

to the nearest security patrol as a text

analysis and reporting.This will bring

from one keyboard to another and look

or even a video. At the same time a

clarity to complex investigations and

for information on various monitor

door or gate can be locked or unlocked

scenarios by mapping relationships

screens.

depending on the time of day or other

between seemingly disparate data.

Some of the advantages are: • All the sub system present on the same maps and screens in the same

circumstance.

Existing Security Control Rooms have probably acquired a range of sub systems over time to cope with the

format

A high temperature alarm is triggered in a computer room. An alarm is reported to all appropriate personnel via

demands of monitoring a large site but

• Consistent GUI operation for Security

mobile phone or hand held device as

because they were installed at different

Control room operators no matter

well as the Security Control room. On

times by different integrators they

which sub system is being viewed.

call IT personnel go directly to the

probably have little or no connection with each other.The security operators have to do the co-ordinating

• Operators only need one keyboard , mouse and headset • Every field device be it a reed switch,

location and take action. There is a fire alarm from a particular building the alarm reports to the

themselves. So it is not unusual to see a

movement detector, card reader,

brigade as well as security. Air

control room set up for peak loads

camera, thermostat, temperature

conditioning is shut down, an SMS text

where there are staff monitoring

alarm, fire alarm, Emergency Call

message is sent to the radio(s) of the

cameras, responding to alarms, writing

Point, lift phone, two way radio,

guard(s) nearest that building and a

reports, taking phone calls, despatching

iPhone, iPad, iPod all able to be

page is broadcast to all occupants to

guards and answering intercoms all at

linked or interrelated by

evacuate.

once. At times like this the operators

programming.

have to make snap decisions and need

The interrelationships between all

integrate all of the technologies and

four pairs of hands to work all the

devices and events are programmed

security operations.To know what is

systems.This is then followed by a lull

into the (PSIM) Overlay by way of

required the designer of a PSIM needs

when things go quiet and little is

scenarios or related Inputs and outputs.

to immerse himself in the procedures

happening, allowing time to catch up.

An input can be from a device or an

carried out day to day in the Security

These peaks and troughs can be

event and can trigger an output or

Control Room so that every facet of the

smoothed out by a PSIM as it will

create an event.The aim is to make the

operation is incorporated in the design.

automate a lot of actions even if they

whole system event driven thereby

come in rapid fire as they will in an

minimizing the Control Room operator’s

& Sullivan report on the topic “The

emergency. In an emergency dozens

involvement in routine tasks leaving him

worldwide physical security information

even hundreds of alarms occur over a

free to be proactive and ready to

management (PSIM) market is

short period. With a PSIM the pressure

respond to the exceptional events.

expected to grow from $80.0 million in

is taken off the operator leaving him or

Some good examples of these

To be effective PSIM should

According to a November 2010 Frost

2009 to $544.0 million in 2015, with a

her to concentrate on the overview of

scenarios that can be automated would

Compound Annual Growth Rate

what is happening and manage the

be:-

(CAGR) of 37.6%.” So watch this space.

most appropriate response.

The Vice Chancellor drives onto the

About the author *Roger Pearce is an independent security consultant with over 30 years experience in the electronic security industry. Over 15 years of which have been as an independent consultant advising clients on a range of security technology applications. He can be contacted at sbtb@people.net.au or www.sydneysecurityconsultants.com.au

34 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 35

ASIAL Certified Security Monitoring Centres*

Current as at: 21 August 2013

Company (short form name)

Australian Security Industry Association Limited

State

Cert. No.

Grade

WA

379

A2

28 Feb 2014

ADT Security

NSW

404

A1

30 Jun 2014

ADT Security (Data Centre)

Allcare Monitoring Services

Expires

NSW

405

A1

30 Jun 2014

ARM Security

WA

402

A1

10 Mar 2015

ART Security

VIC

392

A1

30 Sep 2014

Calamity Monitoring

NSW

383

A1

20 Mar 2014

Central Monitoring Services

NSW

380

B1

21 Mar 2014

Commonwealth Bank of Australia

NSW

389

A1

24 Sep 2014

VIC

391

C2

18 Mar 2014

NSW

398

A1

25 Nov 2014

Energize Australia Glad Security Golden Electronics

TAS

395

A1

17 Oct 2014

Grade One Monitoring

NSW

378

A1

13 Feb 2014

Grid Security Services

NSW

381

A1

18 Mar 2014

ISS Security

NSW

373

B3

25 Nov 2013

Linfox Armaguard

VIC

393

A1

08 Aug 2014

Mekina Technologies

TAS

399

A1

02 Nov 2014

NSS Group

NSW

384

A1

07 May 2014

Onwatch

NSW

396

B1

31 May 2014

Paul-Tec Australia

NSW

409

A1

01 Aug 2015

Protection Pacific Security

VIC

394

C2

9 Aug 2014

RAA Security Services

SA

400

A1

12 Dec 2014

Secom Australia

NSW

374

A1

14 Dec 2013

Sectrol Security

VIC

369

B2

19 Aug 2013

Securemonitoring

VIC

370

A1

23 Nov 2013

NSW

386

A1

04 May 2014

Security Alarm Monitoring Service

SA

387

A1

18 Jun 2014

Security Control Room

VIC

411

A1

18 Aug 2015

Sesco Security

WA

407

A1

03 Jun 2015

Signature Security

WA

403

A1

30 Jun 2014

SMC Australia

QLD

372

A1

07 Dec 2013

SMC Australia

VIC

371

A1

16 Dec 2013

SNP Security (Newcastle)

NSW

410

A1

17 Aug 2015

SNP Security (Sydney)

NSW

408

A1

13 Aug 2014

WA

406

A1

12 Apr 2015

State Government Protective Security Service

QLD

388

C1

22 May 2014

Westpac Banking Corporation

NSW

382

A1

19 Mar 2014

Woolworths Limited

NSW

397

C1

04 Nov 2014

Securenet Monitoring Services

Spectus

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.

SECURITY INSIDER SEPT 2013// 35


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 36

NEW MEMBER BENEFIT

WHEN CUSTOMERS WON’T PAY By Colin Porter

How to avoid dealing with businesses who don’t pay, and what you can do when they refuse to. Non-payers, defaulters, fly-by-nighters. It’s a sad fact of business that if you deal with customers on credit terms, you’re likely to have encountered the type of customer who – when the work is done or the product delivered – refuses to pay. Most of us have a horror story about a client who consumed time, resources and cash before dodging their debt – sometimes declaring that they couldn’t settle, other times simply going missing. When considering this problem, it’s worth remembering why we sell on credit terms in the first place. We do so because it’s part of our service, because it distinguishes us from competitors who won’t. In other words, it’s a courtesy. It doesn’t have to be extended in every case, and it pays to remember that what we are actually doing every time we work without being paid up-front is, in effect, lending to our customers. With that in mind, here are some things you can do to deal with customers who won’t pay.

1. Avoid them This is the most effective way to deal with non-payers. Unfortunately, they don’t identify themselves up front. A common practice is to ask new customers for trade references, but this is flawed because customers are unlikely to give you the details of a company they haven’t paid.

36 //SECURITY INSIDER SEPT 2013

Instead, make sure that you investigate the credit record of the customer in question. Check the company’s credit history with a credit reporting bureau such as CreditorWatch.The bigger the job, the more research you should do. If you do find something adverse, it’s up to you whether you’re going to deal with them on more stringent terms or not at all.

2. Have policies and procedures If you were a bank lending money, you’d put procedures in place to assess your customers and chase their debts. In business, things should be no different: • Make sure that you have written policies in place that govern when credit can be extended, on what terms, and how it will be pursued when overdue. • Get new customers to complete an account application form that details your terms and policies.This helps to set expectations. • Send reminders at 30 days and 45 days, or whenever is appropriate for your industry and your kind of business. • Set a limit, such as 90 days overdue, when you will begin to take further action. • Credit reporting bureaus often offer draft final notice letters informing

customers that their debt must be paid immediately to avoid legal action and the registering of a default. Having procedures to follow helps to ‘train’ your clients about your practices while showing them that you take credit seriously. In addition, businesses who don’t follow up usually get paid last, so having credit measures in place will often get your business paid ahead of someone else.

3. Chase the debt The golden rule of payment collection is that the squeaky wheel gets the grease. Make sure that your business actively pursues overdue debts.This can be by letter or telephone (try both) and – if you think it’s worth your time – you can even attempt to collect in person. When a customer won’t pay, try to understand why. Do they have a cashflow problem, or are they close to collapse? If they claim cashflow, ask them to pay in instalments. Be sure however that any agreement struck outlines a precise payment schedule and contains penalties (such as immediate legal action and the registering of a default) for a missed payment. A common reason customers cite for non-payment is that the products and services delivered weren’t what they


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:34 PM

Page 37

NEW MEMBER BENEFIT

expected. While this can be a ploy, try to discuss any issues raised in good faith. You may need to offer compensation or a discount, which – though not ideal – will at least mean that your business recovers something.

4. Consider a debt collector While debt collectors don’t do anything that you couldn’t do yourself, they are more practiced and may have more success in chasing your recalcitrant debtor.Their usual practice is to work for a percentage of the debt recovered, and using one can be a good idea if your business doesn’t have the in-house staff it needs to chase debts on its own. Keep in mind however that debt collectors don’t have additional legal powers, and if they are overzealous you may damage your relations with a customer by using them. 5. Report a default If a business refuses to pay you after 90 days, you should let other businesses know by reporting the default to credit monitoring organisations. While this might not help you to collect your particular debt, the threat of such action can often compel a customer to pay. Also, while in the past the sharing of credit data has been the domain of large companies and financial institutions, new services aimed at SMEs are now appearing on the scene. CreditorWatch, for example, is a credit reporting bureau and online community of business owners who share information about debtors in order to be instantly alerted when the businesses around them cause payment trouble. Users of the service also place a logo on their invoices to encourage on-time payment. 6.Take legal action When all else fails, it’s time to consider court action. Unfortunately, this is never a quick or inexpensive solution. Indeed, it can take 18 months or more for the process to complete, and most of anything you recover can be chewed up by legal costs.

Most jurisdictions in Australia have a Small Claims Court orTribunal – often attached to the magistrates court – in which you can make claims. While it’s cheaper to lodge in such forums, their actions are not usually enforceable. Local and magistrates courts will provide enforceable judgements, but their rulings

aren’t automatically enforced.You will need to request action from the sheriff’s office, which can run into difficulties trying to identify seizable assets.The upshot is that unless the debt that you’re pursing is large and you also know that the company in question has the ability to pay, legal action may be more trouble than it’s worth. In all cases, the best thing to do is consult a lawyer. One advantage of legal proceedings is that their initiation can often bring about mediation and negotiation. If you don’t get the debt back, remember that depending on your tax situation you can usually ‘write it off’.

Changing times The situation in Australia is that payments are taking longer and longer. In part, this is a product of the GFC, when cashflows were tight. Now however, with the economy in recovery, some businesses are likely to use these lax

payment terms as a tool for building their own cash reserves – meaning that we should be more stringent and aggressive in pursing debts. As the economy picks up, our natural inclination is also to take on as much new business as we can find. But it’s important not to do this at the expense of proper

DEALING WITH BAD DEBTORS • Perform credit checks on new customers. • Get customers to complete credit application forms. • Have processes for actively chasing debts and sending out reminders. • Specify consequences for missed payments. Report defaults to registries like CreditorWatch. • Outsource to a debt collector if you can’t chase yourself. • Take legal action only if you’re likely to succeed. debt management and careful consideration of each customer. Remember that you might have a great and profitable business with great products and still be undone by unpaid debts or by customers going under.

*Colin Porter is the founder and Managing Director of CreditorWatch, a registry where businesses share information about bad debtors to make better credit decisions. CreditorWatch is a new ASIAL member benefit - for more information contact Chris Tredwell: chris.tredwell@creditorwatch.com.au

SECURITY INSIDER SEPT 2013// 37


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 38

HOT PRODUCTS

HCA new concept in security technology ■ Harcor Security Seals & Bags > + 61 2 9454 4200 ■ Email > sales@harcor.com.au ■ Web > www.harcor.com.au Harcor Covert Authentication (HCA) is a new concept in security technology, utilised for brand protection. The technology is applied to security seals. HCA is integrated into thermal stamping foil and can be applied via conventional means. Covert Authentication Examples: Audible Infra Red Reader - The reader will beep when the HCA Foil is detected. IR Laser Pen – HCA Foil products is detected by Infrared (IR) Laser in a range of 940 – 980nm (invisible to the human eyes), HCA Foil will convert IR light to visible light. Contact Harcor for a confidential discussion on how this and other authentication technologies could be deployed to protect your business.

iCare Personal Tracker ■ Grade One Monitoring > 1300 723 185 ■ Email > info@grade1.com.au ■ Web > www.grade1.com.au

NEW!

Grade One Monitoring has launched the iCare Personal Tracker. Our Grade A1 monitoring centre now offers the peace of mind of a trackable hand held device utilising the Telstra Next G network. The iCare unit offers a rapid and accurate GPS positioning, 2 way on board communication as well as a geo-fencing solution. iCare monitoring has many benefits including the ideal solution for OH&S/WHS legislation, a safety device for loved ones, immediate notification in the case of a medical emergency as well as GPS tracking for dementia patients. Phone us on 1300 723 185 to discover the full range of features and benefits that the iCare Personal Tracker has to offer for your staff and clients as part of an overall security solution.

simPRO eForms ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Paper forms capture all the information you need on the job, but they’re not well suited for the field and can be easily lost or damaged.They require manual handling and processing that can waste valuable time better spent getting the job done. simPRO eForms digitises your forms workflow, ending your dependency on paper forms. Field employees use a tablet to complete and submit PDF forms to the eForms Portal, where they can be viewed, downloaded, or automatically actioned. • Send forms back to the office instantly • Attach photos • Updates forms for all users at once • Integrate with simPRO Enterprise and other software packages • Employ paperless technology Find out how eForms can simplify your workflow at www.simpro.com.au

38 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 39

HOT PRODUCTS

DTU3G/IP ■ SCSI > 1300 555 570 ■ Email > daleacott@securitycommunications.com ■ Web > www.securitycommunications.com SCSI’s DTU3G/IP wireless alarm communicator is Australian made and designed. Dual-SIM technology provides 6 secure paths using Telstra NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. With thousands already sold and installed, the DTU3G/IP has been released to the Australian Security Industry with outstanding success. The combination of multiple, proven communication paths ending the days of nuisance “poll fails” and unwarranted guard attendances. The DTU3G/IP connects to the DirectWireless Network, Australia’s only dedicated and private alarm transmission network. To find out more about the DTU3G/IP, contact SCSI on 1300 555 570.

NEW!

NEW!

Maximum Camera Value: All-new Sarix IL10 Series Box Cameras and Micro Domes ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix The all-new Sarix™ Value Range of mini box and micro dome cameras are high-definition, cost-effective IP network cameras perfect for most any indoor fixed video security application.These cameras produce high-quality, color HD video, and the integrated pre-focused fixed focal length lens makes sharp scene alignment and installation quick and easy. Convenient network connectivity, PoE models, and a simple Web user interface, make for easy plug-and-play finalisation of settings and positioning adjustment. And by delivering industry-leading Sarix image quality, backed by the Pelco™ by Schneider Electric™ satisfaction guarantee, the IL10 series are the value-driven cameras that you can choose with confidence.

Schneider Electric Expands Investment in IP Video with Major Additions to Pelco Line ■ Pelco Australia > +61 2 9125 9310 ■ Email > mark.romer@schneider-electric.com ■ Web > www.pelco.com/sarix Schneider Electric announced a major expansion and commitment to its Pelco IP Video Surveillance product line by announcing the planned rollout of more than 50 new IP cameras in 2013, including the new Sarix IL10 Series mini box and micro dome cameras. Schneider Electric continues to make major investments in IP video, expanding its R&D effort, product line and industry-leading education and training programs to meet the needs of partners and customers. The company has achieved several major milestones in its continuing evolution as an IP market leader, including the expansion of its Fort Collins, Colo. Facility.

NEW!

SECURITY INSIDER SEPT 2013// 39


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 40

HOT PRODUCTS

simPRO Field Mobility ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Your time is money and your hours are billable. Cut your travel and admin time down by at least 20% per day per person with simPRO Field Mobility. Our range of simPRO Field Mobility options let you and your staff stay connected and keep your entire system up-to-date with real-time overview of the labour, material and equipment costs incurred, the margin you have applied and the invoiced amount. Our SmartPhone version is optimised for phone sized devices such as Android, Windows Mobile, iPhone and devices such as the Datalogic Elf. Get out and about with simPRO Field Mobility and simplify your business processes so you can spend more time making money, not chasing it.

Effective Security From the name you trust ■ Jim’s Security > 131 546 ■ Web > www.jimssecurity.com.au

NEW!

Why invest in a Franchise with Jim's Group? The Jim's Group have been leading the way in Franchising in Australia for over 30 years. With just over 3500 Franchisees and Franchisors across some 34 Divisions , the Jim's Group is one of the most recognised brands in the country. 94% of adult Australians recognise the brand and with over 500,000 new inbound inquiries to the Customer Service Centre per year, the advantages of having your own business operating with this Trademark are enormous. From advertising and marketing, to purchasing products and services, you will be taking advantage of the strength of a proven National brand utilising proven systems to manage your own business Call 131 546 Today or check us out at www.jimssecurity.com.au

INTREPID™ Sensors Now Even Smarter! ■ Perimeter Systems Australia Pty Ltd > +61 2 9150 0651 ■ Email > info@perimetersystems.com.au ■ Web > www.perimetersystems.com.au In protecting a facility’s perimeter, two distinct challenges arise. Selecting the appropriate sensor to address site requirements, and finding cost-effective, compatible solutions when site characteristics or security level dictate layered protection. Combining 40 years of perimeter detection experience with the latest in integrated systems engineering, Southwest Microwave addresses these challenges with its new-generation INTREPID™ Intelligent Sensors. Deploy any combination of fence, buried and digital microwave solutions on a single network platform to protect each portion of your perimeter with the optimal sensor for that location. For unparalleled configuration and operating convenience, INTREPID™ employs a common communications protocol, universal set-up software, scalable system controllers and a broad input voltage range - eliminating the high cost and complication traditionally associated with integrating multiple sensor technologies.

40 //SECURITY INSIDER SEPT 2013

NEW!


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 41

Who’s monitoring your alarm?

For the past 20 years, ASIAL has operated a well-respected system of inspections that check compliance with Australian Standard 2201.2:2004 (Intruder Alarm Systems - Monitoring Centres). The scheme provides customers with the reassurance that the standards applied at a monitoring centre are independently audited on a regular basis.


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 42

ASIAL NEW MEMBERS

WELCOMETO OUR NEW MEMBERS ASIAL is pleased to welcome the following new members who have joined the Association over the past few months. MEMBERS

Hyperion Security Pty Ltd

Security 1 Manpower Pty Ltd

ADCCTV Electronics Pty Ltd

Individual Protection Group Pty Ltd

Serenity Security Systems

Aussie Surveillance

Innov8tive Systems Pty Ltd

Shredlock Australia Pty Ltd

Bestway Electronics Pty Ltd

Kevlar Security Solutions Pty Ltd

Silk's Security

Boss Electrical & Mechanical Pty Ltd

Lentek Pty Ltd

SIN SEC Australia Pty Ltd

Bring Enterprises Pty Ltd

Montal Security Corporation Pty Ltd

Skytech CCTV

Coastal Sound and Vision Pty Ltd

MPS Global Security Group Pty Ltd

Secure Security International Pty Ltd

Devtel Communications And Property

PON Project Services Pty Ltd

Superior Services Group Pty Ltd

DML Services Group Pty Ltd

Prosec Management Group and iDetect

SydneyTraining Academy Pty Ltd

Eureka Security Pty Ltd

Protectcorp Security Pty Ltd

System Technology Services

Firearms Advanced Shooting

Prox Access Pty Ltd

Track Security Pty Ltd

Techniques

Quest Security Pty Ltd

Zone Patrol Pty Ltd

Forge Group Asset Management Pty Ltd

Red Flag Systems

RECENT ASIAL MEMBER RECOGNITION PROGRAM RECIPIENTS The ASIAL member recognition

information by visiting

Bronze (6-10 years membership)

program acknowledges longstanding

www.asial.com.au/Memberecognitio

Corporate Locksmiths Pty Ltd

association members. Recognition

nprogram or you can email

Deanmac Emergency Services Pty Ltd

categories include Platinum (25

security@asial.com.au

HTP Security Pty Ltd Infront Static Services Trust

years+), Gold (16-24 years), Silver (11The following organisations have

Pacific Strategies & Assessments Pty Ltd

attained recognition levels:

Radio Data Communication Pty Ltd

the recognition program. If you are

Silver (11-15 years membership)

SCI-Blue Services Pty Ltd

eligible and have not already signed

Crackweld Pty Ltd

Southern NSW Investigations & Southern

up to the program (there is not cost

I Security & Technology Pty Ltd

NSW Security

to sign up), you find out more

MK Systems Pty Ltd

15 years) and Bronze (6-10 years). 438 members are now enrolled on

42 //SECURITY INSIDER SEPT 2013


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 43


INSIDER_Aug/Sep 2013 Iss4_52pp

29/8/13

7:41 PM

Page 44


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.