Vol.23 | Issue 2 | June/July 2018
THE MAGAZINE FOR SECURITY PROFESSIONALS
Securing Innovation 2018 Security Exhibition + Conference
14 Q & A with ASIAL President, Kevin McDonald
20 Insider threats beyond data and computer systems
28 Australian Security Industry Awards for Excellence- call for nominations
ASIAL SECURITY CONFERENCE Your annual opportunity to receive fundamental updates from the organisations shaping todays security landscape.
25 – 27 JULY 2018
SECURING INNOVATION
MELBOURNE CONVENTION + EXHIBITION CENTRE The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcases the latest technology and cutting edge thinking. From physical and electronic solutions, to biometrics and cyber security. Australia’s largest security event offers three days of business networking and intelligence sharing.
HEADLINE SPEAKERS Dr Lisa Warren Clinical/Forensic Psychologist and Founder of Code Black Threat Code Black Threat Management
Philip Dimitriu Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks Arye Kasten Chief Executive Officer, M.I.P Security
Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation
Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks.
Jim Fidler Director, Secure Events & Assets P/L
INNOVATIONS AND INVENTIONS
David Crompton-Guard Business Continuity Manager Safety, Security & Resilience, Metro Trains
Discover new products from 300 leading Australian and international brands including:
Dr Gavriel Schneider Group CEO, Risk 2 Solutions Group & Head Lecturer of Psychology of Risk, ACU
CELEBRATE YOUR INDUSTRY Make new connections and celebrate with colleagues at the ultimate networking evening – the Security Gala Dinner, held in partnership with ASIAL.
Caroline Sapriel Managing Director CS & A International
For a less formal option, continue meaningful business conversations at the Networking Drinks.
EXHIBITION HOURS
CONFERENCE HOURS
Wed 25 July 9:30am–5:00pm
Wed 25 July 9:00am–5:00pm
Thurs 26 July 9:30am–5:00pm
Thurs 26 July 9:00am–3:30pm
Fri 27 July 9:30am–3:30pm
Fri 27 July 9:00am–3:30pm
Principal Sponsor:
FREE EXHIBITION REGISTRATION – securityexpo.com.au
T + 61 3 9261 4500 E securityexpo@divcom.net.au #security2018 secexpo @Security_Expo Security Exhibition & Conference
Lead Industry Partner:
The ASIAL Security Conference hosts a compelling program of renowned local and international experts and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability.
+ CONFERENCE
Critical industry updates to future-guard your business Wednesday 25 July 2018 Morning (9.00am – 12.45pm)
Afternoon (1.45pm – 5.15pm)
9.00am
Welcome – MC
1.45pm
9.05am
Conference Opening – Kevin McDonald, President, ASIAL
2018 Gold Coast Commonwealth Games-Post Games Analysis Danny Baade, Head of Security, Gold Coast 2018 Commonwealth Games Corporation
9.10am
Strategic Security Imperatives for Australia
2.30pm
9.50am
How to Build a Security Plan for the Future rather than the Past Arye Kasten, Chief Executive Officer, M.I.P. Security
Terrorism and Security Culture David Crompton-Guard, Business Continuity Manager – Safety, Security & Resilience, Metro Trains
10.40am
BREAK
3.15pm
BREAK
11.10am
Crisis Management – Best Practice Strategies Caroline Sapriel, Managing Director, CS & A International
4.00pm
Cyber Security Defence and Resiliency Philip Dimitriu, Director of Systems Engineering, Australia and New Zealand, Palo Alto Networks
12.00pm
Insider Threats: An Expanded View of the Risks Emanating from Current or Prior Employees Dr Lisa Warren, Clinical/Forensic Psychologist and Founder of Code Black Threat
4.30pm
Intelligent Building Automation: Guidance in Protecting your Organization Against Vulnerabilities, Threats & Risks Dave Brooks, Post Graduate Course Coordinator Security Science, Edith Cowan University
12.45pm
Catered Lunch in VIP Lounge
5.15pm
CLOSE OF DAY 1
+ EXECUTIVE BRIEFINGS
Tailor your experience with hands-on strategies that will mitigate risk and alleviate operational challenges Thursday 26 July 2018 Morning (9.00am – 11.30am) – Please choose from one of the briefings below Mitigating Risk Cost Effectively using Threat Oriented Protection Plans Arye Kasten, Chief Executive Officer, M.I.P. Security
OR
How to Develop an Effective CCTV Policy and Guidelines for your Organisation Arthur Barker, Principal Consultant, T & L Enterprises P/L
Afternoon (1.00pm – 3.30pm) – Please choose from one of the briefings below Managing Stakeholder Communication during a Cyber Crisis and Preventing a Reputation Meltdown Caroline Sapriel, Managing Director, CS & A International
OR
Migration of Multiple Standalone CCTV Systems into an Enterprise Level Video Management System Arthur Barker, Principal Consultant, T & L Enterprises P/L
Friday 27 July 2018 Morning (9.00am – 11.30am) – Please choose from one of the briefings below Designing “Secure” Buildings – Insights, Current and Future Practices Kerran Campbell, Director, CCD Alliance Security Consultants
OR
Security in High Risk Environments: a Balanced Approach David Van Lambaart, Senior Security & Risk Consultant, JBS
OR
Why Security Risk is Everyone’s Business Dr Gavriel Schneider, Group CEO, Risk 2 Solutions Group & Head Lecturer of Psychology of Risk, ACU
Afternoon (1.00pm – 3.30pm) – Please choose from one of the briefings below Security by Design for New Developments and Security Guidelines for Ensuring Cost Effectiveness Arye Kasten, Chief Executive Officer, M.I.P. Security
3 DAY PASS $1,295
OR
+ ACCESS TO CONFERENCE + EXECUTIVE BRIEFINGS + GALA DINNER + ENTRY TO THE EXHIBITION FLOOR
Crowd & Event Management Jim Fidler, Director, Secure Events & Assets P/L
2 DAY PASS $1,195
+ ACCESS TO CONFERENCE + EXECUTIVE BRIEFINGS + ENTRY TO THE EXHIBITION FLOOR
1 DAY PASS
+ ACCESS TO CONFERENCE + ENTRY TO THE EXHIBITION FLOOR
$795
Book now to avoid disappointment as 2016 and 2017 Conference programs sold out! Conference Passes, Gala Dinner and other networking event tickets are available to purchase.
au
ASIAL SECURITY CONFERENCE 2018
W . O m N .co K o O exp BOity r cu se
INTELLIGENCE AND APPLICATIONS TO MITIGATE RISK AND VULNERABILITY
Contents Vol.23 | Issue 2 | June/July 2018
INSIDER THREATS BEYOND DATA AND COMPUTER SYSTEMS
20 14
26
31
Q & A WITH ASIAL PRESIDENT, KEVIN MCDONALD
WHY SECURITY RISK AND FRONTLINE RISK MANAGEMENT IS EVERYONE’S BUSINESS BY DR GAVRIEL SCHNEIDER
VICTORIAN AND QUEENSLAND EMPLOYERS FACE NEW CHALLENGES WITH RED TAPE AND INCREASED LABOUR COSTS
06 President’s Message
12 Smoke Alarm Legislation
37 ASIAL monitoring centre listing
07 2018 Security Exhibition and Conference
18 ASIAL staff profile
39 ASIAL new member listing
34 Your Workplace Relations Questions Answered
42 ASIAL event calendar
09 ASIAL Board Elections 11 OSPAs partner with ASIAL for a fourth consecutive year
ASIAL STRATEGIC PARTNERS
4 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
PRES IDE NT’S ME SS AG E
Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited
THE GAMES WERE A GREAT SUCCESS. DANNY BAADE, HEAD OF SECURITY AND HIS TEAM AT GOLDOC DID A GOOD JOB.
PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 | Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher
Editor Bryan de Caires
The world’s second largest mass-gathering event for 2018, the Commonwealth Games on the Gold Coast, has come and gone with no failure in the delivery of Security. Additionally, Queensland Police were not required and the Armed Forces were not mobilised as has been the case in other recent massgathering sporting events and there were no major security incidents. In short, the Games were a great success. Danny Baade, Head of Security and his team at GOLDOC did a good job. Danny will provide a post games analysis of security at the Games and share his learnings at the 2018 ASIAL Security Conference in Melbourne. That said, as always there are many lessons that can be learned in putting together a large scale workforce for a short period of time. Behind the scenes the four prime security contractors experienced challenges during the games with some Games Security Officers concerning transport, meals, accommodation and rostering. Whilst the prime contractors were not responsible for the provision of these services, they have all continued to work with GOLDOC to ensure that any issues raised were handled in a timely and professional manner. On April 16th 2018 the Queensland Labour Hire Licensing regulations came into effect. ASIAL made a submission on behalf of members calling for an exemption of security from the requirement on the basis that the regulations are effectively a duplication of the current security licensing requirements and effectively represent a “double dipping” of
6 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
licence fees. Unfortunately this request appears to have fallen on deaf ears, however we will continue to advocate for an exemption. In the meantime, providers operating in Queensland have until 15 June 2018 to get their licence application in. Failure to do so by this date will require the business to cease trading until a licence has been granted. Victoria is also seeking to introduce labour hire legislation later this year. SA introduced labour hire legislation but have sensibly excluded Security to avoid duplication and unnecessary red tape. Finally, the 2018 Security Exhibition and Conference in Melbourne is fast approaching. Entry to the Exhibition is free but don’t put off reserving your place at the Conference and Gala Dinner as they sell quickly. Thank you to MSS Security, our Gala Dinner sponsor and Panasonic our Entertainment sponsor, without their support the Gala Dinner would not be the event that it is. I look forward to seeing you at the 2018 Security Exhibition and Conference.
Editorial Enquiries communications@asial.com.au Advertising Anna Ho I events@asial.com.au advertising@asial.com.au Graphic Design + Digital Mitch Morgan Design 0402 749 312 mitch@mitchmorgandesign.com www.mitchmorgandesign.com Editorial Contributors Chris Delaney, Kevin McDonald, Lisa Warren, Gavirel Schneider and Emily Caws Print + Distribution Whirlwind Print Pty Ltd Published bi-monthly Estimated readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases can be emailed to: communications@asial.com.au. Internet references in articles, stories and advertising were correct at the time of printing. ASIAL does not accept responsibility form is leading views. Copyright©2018 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at www.asial.com.au. [NEXT ISSUE] AUG/SEPT 2018 Printed ISSN 1442-1720 Digital ISSN 2207-8282
Kevin McDonald President
2,802
Avg Net Distribution per Issue
Security Insider Magazine has been independently audited under the AMAA's CAB Total Distribution Audit.
Audit Period: 01/04/17 – 31/03/18
IN DUS T RY NE WS
2018 SECURITY EXHIBITION & CONFERENCE Thousands of security industry professionals will converge at the Melbourne Convention and Exhibition Centre (MCEC) from July 25-27 July for Australasia’s premier security industry event, the 2018 Security Exhibition & Conference. Organised by Diversified Communications Australia in partnership with ASIAL, the 33rd annual event will feature an impressive exhibition display, conference program, gala dinner and networking events. The ASIAL Security Conference is your annual opportunity to receive updates from local and international security experts who will share their insights on the issues and challenges facing security managers and providers. Curated by the industry’s peak body the format and content has been updated to reflect critical industry updates on the first day, followed by your choice of streamed executive briefing sessions on days two and three.
The conference program sold out in 2016 and 2017, so don’t delay and reserve your place today!.
FREE* LISTINGS WITH SECURITY JOBS BOARD AN INITIATIVE BY
Advertise with the peak body for security professionals in Australia *Security Jobs Board is FREE for ASIAL members who can post an unlimited number of job vacancies online. Nonmembers can advertise for a small subscription fee.
Find or Post job opportunities today. SECURITY
www.asial.com.au/jobs
POST A JOB
J BS BOARD Australian Security Industry Association Limited
SECU RIT Y INSIDE R | JUN/J UL 2 018 7
INDUST RY NE W S
SCAMS AWARENESS WEEK Stop and Check – Is this for real?
Protect yourself yy When dealing with unexpected contact from government agencies or trusted businesses—whether over the phone, by email or through social media—always consider the possibility that it may be a scam. yy Don’t be pressured by a threatening caller. Hang up then check whether their story is real. You can verify the identity of the contact through an independent source, such as a phone book or online search. Don’t use the contact details provided by the caller or in the message they sent to you. yy Never send money, give your bank account or credit card details, or other personal information to anyone you don’t know or trust. yy Don’t open suspicious texts, pop-up windows or emails and don’t click on links or open attachments—just delete them. yy Never give anyone remote access to your computer if they’ve contacted you out of the blue—whether through a phone call, pop up window or email—and even if they claim to be from a well-known company that you know and trust.
Stop and check – Is this for real? Sometimes scams are obvious, sometimes they’re harder to spot. We are urging all Australians to stop and check – ‘Is this for real?’ If you received a call out of the blue from someone saying you had a tax debt that you had to pay immediately or you’d be arrested - what would you think? If Telstra called you and said there were internet problems in your area and they needed remote access to your computer to help you, otherwise they would disconnect your service - what would you do? Typically scammers pretend to be from a government agency or a well-known, trusted business. They often use threats to pressure or scare you into giving them your personal information and your money. They also may threaten you with fines, disconnecting your internet, arrest, court action or even deportation. Scams Awareness Week was held from 21-25 May 2018.
Read more about threat based impersonation scams, including case studies and more tips on staying safe. Read more tips about protecting yourself from all types of scams. Blog by Stay Smart Online: staysmartonline.gov.au
8 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
What to do if you have been scammed If you’ve lost money or given personal information to a scammer, there are steps you can take straight away to limit the damage and protect yourself from further loss: yy If you’ve sent money or shared your banking or credit card details, contact your bank immediately. They may be able to stop or reverse a transaction, or close your account. yy If you’ve given your personal information to a scammer, visit IDCARE, Australia’s not-for-profit national identity and cyber support service. IDCARE can work with you to develop a specific response plan to your situation, and support you through the process. yy As scammers are often based overseas, it is extremely difficult to track them down or to take action against them. So take the time to warn your friends and family about these scams.
IN DUS T RY NE WS
INTERESTED IN NOMINATING FOR A TAG POSITION? The Construction and Property Services Industry Reference Committees (IRC) have agreed to the establishment of several Technical Advisory Groups (TAGs). TAGs are comprised of people with specific industry sector expertise who assist with the project work as outlined by the project Terms of Reference. They report to the appropriate IRC which holds the final decision-making authority. TAG members are drawn from the IRC and general industry, and meetings are usually chaired by an IRC member. Membership of a TAG is voluntary and there is no remuneration; however, expenses for one face-to-face meeting are covered. Where possible, meetings are held on-line, but if further face-to-face meetings are required they are at the participants own expense.
To nominate for a position on one of the following TAGs and to see the pertinent Terms of Reference visit asial.com.au/news/technical-advisorygroups-call-for-nominations
ASIAL BOARD ELECTIONS Elections for ASIAL Board Members occur every two years. The election process is managed by the Australian Electoral Commission. The 2018 Election Timetable, Nomination Form and Election Notice are now available. Nominations and voting is open to ASIAL financial Full Corporate Members only.
For more information please visit asial.com.au/ members/2018-boardelection-and-agm.
The key timelines for the elections are as follows: Close of Roll – 2 July 2018 Roll delivered to Returning Officer – 4 July 2018 Nominations Open – 1 August 2018 Nominations Close – 22 August 2018 at 12:00 noon AEST Withdrawal of nominations Close – 29 August 2018 AEST Candidate Statement Close – 29 August 2018 at 12:00 noon AEST Postal Ballot Opens – 2nd October 2018 Postal Ballot Closes – 23rd October 2018 at 5:00pm AEST SECU RIT Y INSIDE R | JUN/JUL 2 018 9
INDUST RY NE W S
QUEENSLAND LABOUR HIRE LICENSING REGULATION 2018 The Queensland Labour Hire Licensing Regulation 2018 came into effect on 16 April 2018. Existing labour hire providers will have until 15 June 2018 to apply for a licence, and can continue to operate while their licence application is being assessed. Labour hire providers who apply for a licence after 15 June 2018 must not operate until their licence is granted.
AUSTRAC EASES REPORTING BURDEN ON CIT PROVIDERS
For further information please see page 32 The Anti-Money Laundering and Counter-Terrorism Financing Rules Amendment Instrument 2018 (No. 2) has been registered on the Federal Register of Legislation (FRL). This has specific impact on Cash in Transit (CIT) providers. CIT providers have previously been required to be registered as a reporting entity and submit Threshold Transaction Reports (TTRs) and collect significant information relating to knowing your client (KYC), and the reporting of suspicious transactions. The administration and cost burden has been significant to CIT providers and the legislative change will remove this burden and what was considered duplication of transaction reporting. On 16 April 2018, AUSTRAC removed the registered CIT businesses from the Reporting Entity Roll.
Further information is available on the AUSTRAC website: austrac.gov.au
Victoria’s Portable Long Service Leave On 28 March 2018, the Minister for Industrial Relations Victoria, The Hon. N Hutchins, presented for a second reading the Long Service Benefits Portability Bill 2018. The Bill seeks to introduce a Portable Long Service Leave Scheme for various industries including Security as prescribed, and Cleaning. If passed, the legislation will require employers to register themselves, their employees and contract workers. Failure to register will attract a financial penalty. In its submissions ASIAL strongly opposed the introduction of the scheme.
10 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
IN DUS T RY NE WS
OSPAs PARTNER WITH ASIAL FOR A FOURTH CONSECUTIVE YEAR ASIAL has partnered with the Outstanding Security Performance Awards (OSPAs) for a fourth consecutive year to deliver the 2018 Australian Security Awards.
A limited number of sponsorship opportunities are also available. Please contact events@asial.com.au to obtain details of the packages on offer.
The awards include, the Australian Security Industry Awards for Excellence – an initiative of the Australian Security Industry Association Limited (ASIAL) for 23 years, and the Outstanding Security Performance Awards (OSPAs). The security industry will unite on 18 October 2018 to promote excellence and innovation within the sector and celebrate the success of the 2018 award winners and finalists at a prestigious Awards Ceremony and Dinner. The event takes places between 18:30 - 22:30 on Thursday, 18th October 2018 at Doltone House Hyde Park, Sydney. Entry to the awards will open on 1st July 2018 and close on the 31st August 2018.
To book tickets, view the award categories and criteria please visit asial.com.au/securityawards2018
SECU RIT Y INSIDE R | JUN/JUL 2 018 11
INDUST RY NE W S
Reporting to the Workplace Gender Equality Agency is now open Reporting to the Workplace Gender Equality Agency is now open. There are a number of resources available to assist employers with preparing reporting data before they access the report in the portal, such as the Indicative format of the reporting questionnaire. “Entity level reporting� is the term used to describe how relevant employers in corporate structures need to report. Entity level reporting is not new, it simply means that all information being reported on must reflect what happens at the entity (e.g. subsidiary) level, not at the group level. Providing standardised, accurate information when reporting to the Workplace Gender Equality Agency is a requirement under the Workplace Gender Equality Act 2012 and ensures meaningful comparisons of data can be made from reporting organisations. This will build the evidence base needed to support improved gender equality outcomes for women and men in Australian workplaces.
SOUTH AUSTRALIA DIGITAL LICENSES AND PASSES The South Australian Government has introduced digital passes and licences. This means that South Australians can carry selected government issued passes and licences on an Apple or Android smart phone or tablet device using the mySA GOV app. Occupational licences and registrations, including security and investigation agents, are now able to be carried digitally. Hard copy licences will continue to be issued. While businesses and customers transition to the ability to validate a digital licence it is recommended that hard copy licences still be carried. For more information visit: asial.com.au
For more information: wgea.gov.au
T OU W NO
CURRENT SMOKE ALARM LEGISLATION ASIAL in conjunction with the Australian Fire and Emergency Services Council (AFAC) have prepared a helpful document that summarises smoke alarm legislation across Australia.
To view the guidelines please visit: asial.com.au/news/smoke-alarm-legislation
12 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
IN DUS T RY NE WS
CONSUMER BUILDING & OCCUPATIONAL SERVICES
NEW ONLINE SERVICES FOR SECURITY AGENT LICENCES STARTS 1 JUNE 2018 As of 1 June 2018, you need to apply for and renew your licence online using a computer, tablet or mobile phone. Approximately 8 weeks before your licence expires, Consumer, Building and Occupational Services (CBOS) will contact you at the email address and mobile phone number we have recorded for you. You can also phone our office on 1300 654 499 to check that we have your correct details.
Please complete your online renewal as early as possible to avoid holding an expired licence card.
Changes that affect you from 1 June 2018 You can: 33Apply for or renew (re-application) your licence online 24 hours a day, 7 days per week as long as you have an internet connection 33Pay for your fees online by credit card 33Pay for your fingerprints check online and take your receipt to a police station to have your fingerprints taken 33Apply for a security guarding with dog, security guarding with firearm and exemption to display an ID badge online We will: 33Order a convictions history and district report for you 33Send you a licence card after your renewal has been approved (14 working days)
33Give you a My Licence account if you already hold a security agent licence 33Send you a paper-based renewal reminder until 2020 My Licence account Your My Licence account is similar to an online bank account and you have access to it 24 hours a day, 7 days a week. As long as you have an internet connection and we have your current mobile phone number and email address, you can access your account. With your My Licence account, you can: 33Renew your licence online 33Order a replacement licence card 33Change your contact details 33Add / remove a Director 33Pay your fees 33Get someone to complete your renewal on your behalf
Get help with online services from 1 June 2018 You can: • Learn about what you need to do by reading the licence page that best matches your occupation at bos.tas.gov.au/topics/ licensing-and-registration. • Ask someone to complete your renewal online on your behalf. • Visit one of 60 LINC Tasmania locations (State libraries) for help to learn how to renew your licence online; use the internet, computers, printers, scanners; save documents to a digital format. • Learn about your My Licence account and more by reading the Guide to licensing services online atcbos.tas.gov.au/topics/ licensing-and-registration. • Speak with a customer service officer on 1300 654 499.
SECU RIT Y INSIDE R | JUN/JU L 2 018 13
Q& A
Emily Caws, Marketing and Communications Coordinator talks to our ASIAL President, Kevin McDonald
ASIAL PRESIDENT
Kevin McDonald Emily: Please tell us a little about yourself. Kevin: Rightly or wrongly I have been in the Security Industry all my working life. I was fortunate to start my time at Wormald Security in the days when employers invested in structured training through apprentice and cadet programs. Many of those who also benefited from Wormald training, like me, are still in the Industry. It was at Wormald Security where I worked with Brian Foster a current Director, Peter Rae and Neville Kiely who are Association Life Members. It was their influences that encouraged me to get involved with the Association, firstly on the State Committee, then State Committee Chairman and now as a Director. Importantly, involvement in the Association is not reserved just for owners and Directors of member companies, employees can also become involved 14 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
Q& A
to make a difference and leave the Industry in a better place. I have worked in a number of companies over the years, both big and SME, electronics and manpower which has given me a solid understanding in how each sector operates, their weaknesses and strengths.
“The most significant challenges to the Industry are all linked; licensing, training and value.”
Emily: What changes have you seen in the security industry? Kevin: As you would expect I have seen many changes during my time in the industry. The electronics sector has moved from expensive solutions with a heavy reliance on mechanical switches and unreliable, movement detectors on single zone panels to affordable solutions with highly reliable detectors on multi-zone panels embracing access control with tailored programming parameters. Manguarding has evolved from the stereotypical static guard outside a bank to the concierge, facilities manager and customer service representative while still being a highly visible deterrent. Patrols have also changed. Less of the nightwatchman ticketing doors and windows to being the monitoring centre’s team in the field responding to alarms that State/Territory police no longer respond to. It has often been said that as electronic solutions became more reliable, advanced and affordable it would take over the manpower sector. This has yet to happen and the manpower sector is still strong and enjoying continued growth. Emily: What is the most significant challenge/opportunity facing the security industry over the next five years? Kevin: The most significant challenges to the Industry are all linked; licensing, training and value. The States/Territories are responsible for managing licensing and training. This happens independently of each other which creates business inefficiencies for security companies, their operatives and our customers. It is widely agreed, except it would appear for Regulators, that some form of uniform and consistent national approach to industry licensing is a must moving forward.
The current review into Cert II & III training for Security will result in a common national training package where the certifications will be recognised across borders. This is an important first step in the journey towards national licensing. ASIAL continues to take every opportunity to advocate the need for change and to reinforce the message and its importance. It took over 5-years for the States/ Territories to agree on a common descriptor for response to duress alarms, this may take a little longer. While this is occurring, in the background end users of our services have greater expectations of the skills available to them. They are calling for Officers with higher skill sets and training beyond Cert II & III to deal with the heightened terrorist threat, yet there is little appetite to pay for the increased competencies. This is where users of our services can take a proactive lead and make a positive difference by acknowledging and rewarding security providers who provide quality and skilled personnel. Unfortunately the continued existence of ABN’s and questionable employment tactics used by some within our industry who compete on the lowest price rather than value for money continue and those end users who condone these practices continue to drag the Industry down. Emily: What are your top two focus points as ASIAL Board member and why? Kevin: In 2019 ASIAL will celebrate its 50th year and thanks to the foresight of the founders of the Association and the strength of those that have
continued their work we are financially strong, well-structured and the clear “go to” organisation for regulators and all those seeking advice and input on our Industry. It has taken a while time to get to this point, but thanks to the hard work of volunteers, the ASIAL Secretariat and its consultants we have made a significant positive difference to the Industry. This activity is vital to the ongoing strength of the Association, our members and the Industry. The Association offers a suite of practical benefits to members and in particular assistance with employee, industrial relations and licensing governance advice. It is important that the Association continues to offer existing and new benefits to add value to our members businesses. My focus is on continued representation of the Industry and support for our members. Emily: How do you find your role at MSS Security? Kevin: As I mentioned at the start I have worked in the big and the SME, electronics and manpower sectors and the standout for any company is its culture, the DNA of the business. MSS Security is a company that has a great culture and all staff enjoy coming to work and committing to the company. The company’s culture can be measured by the tenure of its employees (at the State awards nights Officers with 30+ years are regularly honoured) and very long-term customer relationships that exist. Yes, I enjoy coming to work every day, the challenges, the support and the people. SECU RIT Y INSIDE R | JUN/JUL 2 018 15
A DV E RT ORIAL
2018 SECURITY EXHIBITION & CONFERENCE LAUNCHES NEW THEME AND INNOVATIONS Diversified Communications and the Australian Security Industry Association Limited (ASIAL) have announced the launch of this year’s premier security event, the 2018 Security Exhibition & Conference. Now in its 32nd year, the largest security event in Australia will be back at the Melbourne Convention & Exhibition Centre, having enjoyed a very successful 2017 event at Sydney’s new International Conference Centre (ICC). The 2018 event will feature three core elements: the ASIAL Security Conference, introducing a wide range of headline speakers including international experts, held alongside the Security Exhibition, with over 170 leading security brands showcasing the latest innovations and future directions of the security industry; and several industry networking events. The 2018 ASIAL Security Conference will provide analysis and updates on the issues and challenges shaping the today’s security landscape. With a theme of ‘Intelligence and Applications to Mitigate Risk and Vulnerability’, the speakers and content have been carefully curated by the industry’s peak body, ASIAL. “The format and content for this year’s event has been designed to provide critical
“The ASIAL Security Conference program will feature an exceptional line up of renowned local and international experts who will share their insights on how to protect your organisation, brand reputation, vital assets and how you can mitigate risk and vulnerability,” said ASIAL CEO, Bryan de Caires.
industry updates on the first day through the plenary sessions, followed by your choice of practical and interactive streamed
Speakers at the 2018 ASIAL Conference event will include:
sessions on the second and third day.” New to the Exhibition in 2018 will be a Seminar Theatre hosting a number of industry-specific security sessions addressing the issues impacting security installers and integrators. The popular and cutting-edge Cyber Zone which was introduced at the Sydney Exhibition in 2017, will make a re-appearance at this year’s event with a number of exhibitors already confirmed. The CSD Drone Demonstration area is another innovation at this year’s Exhibition, featuring drone flying and product displays every half hour.
Hon Angus Taylor MP Minister for Law Enforcement and Cyber Security, Federal Member for Hume Dr Lisa Warren Founder and Director, Code Black Threat Management Caroline Sapriel MD, CS & A International Danny Baade Head of Security, Gold Coast 2018 Commonwealth Games Corporation Arye Kasten CEO, MIP Security David Crompton-Guard Business Continuity Manager, Metro Trains
To view the full the full 2018 ASIAL Conference program or purchase passes head to: securityexpo.com. au/asial-securityconference
16 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
25 – 27 JULY 2018
SECURING INNOVATION The 2018 Security Exhibition + Conference: Powered by ingenuity and invention, showcasing the latest technology and cutting edge thinking. From physical and electronic solutions, to biometrics and cyber security. Australia’s largest security event offers three days of business networking and intelligence sharing. Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks. Lead Industry Partner:
MELBOURNE CONVENTION + EXHIBITION CENTRE EXHIBITION IS FREE REGISTER NOW securityexpo.com.au
#security2018
A SIA L STAF F PROF I L E
5 Minutes with Emily Caws ASIAL Marketing and Communications Coordinator
What is the most-read book on your shelf? Great Gatsby by F.Scott Fitzgerald. It’s my absolute favourite book. A classic novel bursting with meaningful quotes. What film can you watch over and over again? The Harry Potter series. I grew up amidst the Harry Potter generation, the films never get old. Every year we make time to have a Harry Potter marathon. Where is your favourite place in the world and what makes it so special to you? My favourite place in the world would have to be Hawaii. I have been there three times in the past two years I can’t get enough of the sun, surf and shopping. I am yet to travel to Europe so my choice will most likely change after Santorini. Tell us your favourite quote of all time? ‘The world only exists in your eyes, you can make it as big or as small as you want’ What is your favourite song or album? I recently went to Lorde’s concert at Sydney Opera House and it was incredible. I have been obsessed with her music for a long time. How do you like to spend your weekends? I enjoy going to Coogee beach with my friends to catch some waves and eat acai bowls. I also love to spend time with my family and puppy Coco. What do you most enjoy about working at ASIAL?
EMILY CAWS
18 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
I enjoy working alongside the Marcoms team. It’s my first role in a communications position. The ASIAL Marcoms team have welcomed me into the workplace graciously making my experience so far really positive. I have already learnt so much and I’m very thankful to have such inspiring and hard working mentors to guide the way.
TAKE YOUR BRAND TO NEW HEIGHTS Advertise in Security Insider
As the leading security industry publication, our print distribution engages more than 3,000 decision makers and has an online reach of more than 10,000. ASIAL member rates are available. Talk to our team about how we can tailor-make packages to support your next campaign and take your brand to new heights.
1300 127 425 | advertising@asial.com.au
SEC URIT Y F E AT URE
Insider Threats
Beyond data and computer systems By Dr Lisa Warren, Clinical/ Forensic Psychologist and Founder of Code Black Threat
The world has changed. Cars are now being used as weapons, major incidents are broadcast almost live to air and mass shootings are reported with increasing frequency (Advanced Law Enforcement Rapid Response Training Centre, 2018). It feels like our need for security has never been higher. While our national security is aided by us being “alert, but not alarmed” (www.nationalsecurity.gov.au), subtle threats can still be difficult to detect, especially when they come from people that are meant to be trustworthy. Consider the following hypothetical example: “Max is in his 50’s and has worked in the security industry for over 30 years. He is well respected by many within the industry. Max views himself as role model to all junior staff, although has a reputation for taking special interest in promoting female security staff. The latest example is Melissa - young, energetic and wanting to impress. While she says she has enjoyed Max’s mentoring, Melissa recently disclosed to another senior staff 2 0 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
member that Max had begun texting her after hours, offering advice. She tried to laugh it off but was clearly uncomfortable. As the conversation progressed Melissa appeared conflicted and said she felt Max’s texts were becoming more personal and last night he said he was tired of life and his career, feeling burnt out, however, was inspired to keep going due to the energy she brought to the team”. An insider threat is traditionally defined as an employee, or former employee, who takes proprietary data for their own gain. There is benefit in challenging this definition to include the range of behaviours that threaten the work environment. Melissa’s case is an example of the threat emerging as subtle and ambiguous then
escalating. When not detected and contained early, staff like Max become an expensive, disruptive and damaging insider threat.
Aggression and Psychological Safety Sometimes called mind games, the problem behaviours of colleagues can distract, frustrate and distress even the most psychologically resilient. Mind games can be hard to describe, even when your instincts make it clear you’re being targeted. Sometimes mind games are very subtle and involve rudeness and inflexibility. Other times the behaviour is more overt and involves intimidation and explicit threats. As a forensic psychologist, I have worked with many people who
S E C URIT Y FE ATU RE
play mind games and use aggression in all its forms to try and meet their needs. The subtler the behaviour, the more it can be denied and the more important it is to challenge it and prevent repetition or escalation. When these behaviours are repeated, they can be definable as bullying. To support the definition of the subtler behaviours, I developed an Aggression Continuum (See p22) to describe the behaviours that cause others distress, offence, fear or trauma. All of these behaviours use force to interact. Force that ranges from applying mild psychological pressure (such as saying: “You must…you have to….you need to…”), to physical force so strong it results in loss of life. While Max has arguably not been aggressive, he has applied force through coercion to a young and ambitious employee who is struggling outside her skill set. Who uses aggression? While anyone can, some people are more likely. One group, are people in a position of power who believe they are not competent. This was highlighted in a study where groups of workers were primed to power and authority by writing about a time they were in authority (Fast & Chen, 2009). Some were asked to write about a time they were competent and skilful, priming them for competence. Workers who were primed for power but not competence were the most aggressive and punitive. Age and gender made no difference at all, only the degree to which workers felt powerful yet incompetent. My research focused on people who use the most extreme form of psychological aggression – uttering threats to assault, rape or kill. Men who threatened to kill and caused fear were often suspicious of others, tended to brood, lacked energy to tackle their problems and were often pessimistic (Warren, Ogloff, & Mullen, 2013). Threatening increased the risk of committing acts of physical violence, including homicide (Warren, Mullen, Thomas, Ogloff, & Burgess, 2008). The research added support to the growing acceptance that, much like threatening suicide, all threateners needed to be taken seriously and supported to choose another way
to manage their distress. This was an important finding for workplaces as the people we interact with most often are the people who we are most likely to hurt. Called the intimacy-effect, risk is greatest in cases where the threatener and their target are well acquainted (Calhoun & Weston, 2003). Max is pushing the boundaries with Melissa in an attempt to create intimacy. Having colleagues means interacting regularly with people who can be either enjoyable to interact with, a mystery to understand, or completely frustrating. This is the usual spectrum of workplace interactions. Knowing the threshold, however subtle, of the interactions that should be labelled psychologically unsafe and therefore and insider threat is an area of considerable debate. Terms such as bullying help define some interactions, although definitions often require the behaviour to be repeated to reach the threshold for intervention.
Warning Behaviours While any level of force is unacceptable, some behaviours have been found to carry greater risk of serious violence. On the face of it Max’s disclosure he: ‘was tired of life and his career, feeling burnt out, however, was inspired to keep going due to the energy she brought to the team’ may be interpreted as two colleagues sharing thoughts. In a similar case, this lack of boundaries was not reciprocated and left the young female troubled to the point she required time off work and moved department. An underlying mental health issue complicated matters for her. Team disruption, financial loss and staff performance were all impacted. Max’s behaviour had escalated to a point of concern and a forensic assessment of violence risk was required. He had become an insider threat. The research on violence risk is considerable. Researchers have found that those not trained in violence risk can be guided in their concern levels by analysing warning behaviours (Meloy, Hoffman, Guldimann, & James, 2011).
THE WARNING BEHAVIOURS ARE:
1
Pathway behaviours: Planning, researching or preparing for violence.
2
Fixation behaviours: Perseverating on one or more people, causes or perceived injustices where a person’s attention becomes increasingly narrowed, caustic and negative.
3
Identification behaviours: Dress, declarations or idealization of sectors of the community affiliated with frequent violence.
4
Energy bursts: Discrete periods of increased frequency, intensity or duration of seeking out and intruding upon a targeted person.
5
Last resort behaviour: A declaration that a person has reached the limit of their coping and now see violence as the justified, and sometimes only, option.
6
Novel aggression: Behavioural try-outs that appear to be unrelated to the people or issues persons of concern are focused upon. Behaviour that appears more a test of nerve and commitment, such as carrying a concealed weapon to a public place.
7
Threats: Explicit utterances of violence to the intended target of the violence.
8
Leakage: Utterances of intended violence to persons other than the intended victim. This is not uncommonly a professional who witnesses a person of concern threaten to harm or kill someone they believe deserves their wrath.
Continues over page > SECU RIT Y INSIDE R | JUN/JUL 2 018 2 1
FEAT URE
There is no one, or combination, of these behaviours that should elicit the greatest concern. However, the presence of any concern suggests the need for evaluation by someone well versed in targeted violence and threat assessment. In this case forensic investigation provided the context to discover and intervene providing Max the support he required given he was found to have made a last resort statement to Melissa, this was not the only leakage but an important sign post to investigate further.
Management of Insider Threats As well as managing the security of company data, management is the ability to assess staff for the motive and capacity to harm. Management of psychological violence has frustratingly limited scientific evidence to guide strategies that meaningfully reduce risk (Schindeler & Reynald, 2017). Policies and procedures that are clear and specific help, as does a Code of Conduct that sets out the values to which all employees aspire and will be held to account. These tools help define the reasonably practicable efforts every workplace must make to under their OH&S obligations. They do not resonate, however, with staff who are motivated to harm their
colleagues. Managing these people requires a hierarchy of increasingly intrusive interventions - from employee support to performance management to police involvement. When faced with a colleague who has become an insider threat like Max, collaborating with management and Human Resources is the ideal course of action. Supporting psychological resilience starts with validating the people impacted, silencing your inner critic to buy out of the mind games and focusing on preventing further harm. Guide the person of concern to support before discipline as an educative rather than disciplinary approach is more likely to prevent escalation and recidivism. Workplaces that engage their staff through learning opportunities that interest and suit the skill set of as many staff as possible have been found to increase performance as well as safety as teams are psychologically safer to share ideas, offer feedback, make mistakes and learn from experience (Idris, Dollard, & Tuckey, 2015).
Conclusion Traditional insider threats can be overlooked when computer systems are made less accessible to external hackers and similar precautions are considered unnecessary for employees who either inadvertently breach protocols by clicking on sinister links or attachments or who profit from thieving company data. The deliberate insider can detect weak spots and plot to exploit this for their own purposes. This behaviour goes well beyond the risks to computer data. Expanding the definition to include the range of behaviours that threaten the work environment protects Melissa’s and supports a physically and psychologically safe workplace. Not taking these situations seriously and containing them quickly means staff like Max are an expensive, disruptive and damaging insider threat.
AGGRESSION CONTINUUM Skilled interaction
Inflexibility
Rudeness
Autocracy
Intimidation
codeblacktm.com
Fatal Assault
Explicit Threats
Deliberate Property Damage
Physical and Sexual Assault ŠCopyright CodeBlackTM 2018
About the Author: Dr Warren is a pioneer of the behavioural threat management field in Australia. This is an internationally recognised field of expertise in the evaluation of those who persistently perpetrate aggression, sexual harms and social media harms. She was the Foundation President of the Asia Pacific Association of Threat Assessment Professionals (APATAP) and has collaborated with the European Threat Assessment Professionals (AETAP) on developing professional standards for threat managers. She has presented at the American Association of Threat Assessment Professionals (ATAP) conferences and is a Senior Editor for the Journal of Threat Assessment and Management. Her research in this field has focused on clinical and risk evaluation of those who threaten to kill themselves and others.
References - Advanced Law Enforcement Rapid Response Training Centre. (2018). Active shooter incidents in the United States in 2016 and 2017. Washington, DC: Texas State University and Federal Bureau of Investigation - Calhoun, F. S., & Weston, S. W. (2003). Contempoary threat management. San Diego, CA: Specialized Training Services. - Fast, N. J., & Chen, S. (2009). When the boss feels inadequate: Power, incompetence and aggression. Psychological Science, 20(11), 1406-1413
2 2 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
- Idris, M. A., Dollard, M. F., & Tuckey, M. R. (2015). Psychosocial safety climate as a management tool for employee engagement and performance: A multilevel analysis. International Journal of Stress Management, 22(2), 183-206. doi:10.1037/a0038986 - Meloy, J. R., Hoffman, J. L., Guldimann, A., & James, D. V. (2011). The role of warning behaviors in threat assessment: An exploration and suggested typology. Behavioral Sciences and the Law, 30(3), 256-279.
- Schindeler, E., & Reynald, D. M. (2017). What is the evidence? Preventing psychological violence in the workplace. Aggression and Violent Behavior, 36, 25-33. doi:10.1016/j.avb.2017.07.004 - Warren, L. J., Mullen, P. E., Thomas, S. D., Ogloff, J. R., & Burgess, P. M. (2008). Threats to kill: A follow-up study. Psychological Medicine, 38(4), 599-605. doi:10.1017/S003329170700181X - Warren, L. J., Ogloff, J. R. P., & Mullen, P. E. (2013). The psychological basis of threatening behaviour. Psychiatry, Psychology and Law, 20(3), 329-343. doi:10.1080/13218719.2012.674716
ASIAL eLearning The peak body for security professionals.
Flexible and affordable professional development for the security industry Access to over 100 short courses (20-30 minutes each) The flexibility to purchase courses individually or through multiple enrolments at discounted rates The option to modify content (additional fee applies) Nominate an internal training manager to manage, monitor and track the process of the team’s training The ability to generate reports on learner progress, course competitions, organisation wide statistics for learners and courses
Access to over 100 short courses NEW COURSES: • • • • •
Privacy Awareness Cyber Security Awareness Sexual Harassment Prevention Managing Unconscious Bias Diversity in the Workplace
24/7 access to learning courses Access to flexible learning options which includes use on mobile devices
www.asial.com.au/elearning
A DV E RT ORIAL
Why owners and operators
need to consider systemisation in 2018 Some popular pain points that owners and operators without a system in place are known to experience are: Limited staff productivity due to excessive time spent on administrative tasks
Amidst the waves of new technology breaking on our shores, many security business owners and operators can find themselves overrun with 101 different applications and programs that all claim to make a certain grouping of administrative tasks easier. Job scheduling, quoting, invoicing and inventory control are just a small fraction of the various business operations that different companies now claim they can simplify with their software. The number of programs available alone can be overwhelming, but what many seem to be missing is a message that has come with the crest of the 21st century: businesses should be looking to systemise in order to achieve success. A security business’ success rests ultimately on customer satisfaction; if your customer isn’t happy with the service you provide, then neither are you with your profit margins. Systemisation is believed to 24 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
Lack of information on employee whereabouts and business transparency due to the difficulties in monitoring staff travel and consumption via phone or email. Minimal profits on some jobs due to delayed technicians, misquoting or invoicing errors, Loss of overall business efficiencies due to an inefficient workflow.
be the path that can lead to not only a happy customer, but also an efficient business model and reputable staff. Systemising your security business is an optimal and simple solution to these common pain points because it streamlines and automates many components of the day-to-day workflow. By implementing various systems to manage the basic components of your business, you can take the time to focus more on the areas where you or your staff are lacking in efficiency and make moves to improve the customer’s satisfaction with your security service. simPRO Software is a systemised solution that takes multiple aspects of your day-to-day workflow and rolls them into a central location from which you and your office staff can work. By keeping your field technicians in direct contact with office staff through the mobile app, ‘Connect’, and tracking your fleet through the ‘simTRAC’ app, simPRO Software gives business owners the opportunity to better understand employee whereabouts and travel and consumption data and promote better transparency and accountability across their workforce. With simPRO, security businesses can focus on forecasting profits or loss and track actual project costs all while eliminating labour-intensive processes. It’s worth noting as well that if you or someone you know is a current ASIAL member who is not already using simPRO Enterprise then you can receive 20% off the upfront cost of implementation and training of simPRO’s Enterprise solution. For more information head to simpro.com.au/asial-members
SYSTEMISE FOR
SUCCESS
SEC URIT Y F E AT URE
WHY SECURITY RISK AND FRONTLINE RISK MANAGEMENT is everyone’s business Dr Gavriel Schneider
The world is more complex than ever before. The issue of uncertainty based on disruption and change is happening at a rate that we have never experienced before which adds to the challenges of the way we manage risk as individuals, departments and at an organisational level. Dealing with threats (such as security risks) on the frontline of operations is now more crucial than ever. This is especially relevant based on the reality that reputational damage can reach epidemic proportions, via social media, from the manifestation of even the smallest or ‘insignificant’ frontline occurrence. The role of the security, safety, health, emergency response (SSHE) professional is becoming ever more difficult – with a shift to professionals needing to become more rounded and adopt multifaceted roles. Part of the challenge is that we tend to be reactive in the way we manage risk and respond to threats. In a Volatile, Uncertain, Complex and Ambiguous (VUCA) world, where our About the Author: Dr Gavriel Schneider is an acknowledged leader in the field of human based risk management and the psychology of risk.
2 6 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
work places have morphed and changed so quickly that policy frameworks and procedural guidance struggle to keep up, it is more important than ever that we think holistically. This is even more important in larger organisations where historical and structural silos have become the norm. The challenges of defining the differences, boundaries and consequences between issues, threats and hazards such as cyber security, Workplace, Health & Safety (WHS), emergency response, fraud prevention, countering violent extremism (CVE) and security is very difficult, if not impossible in many cases. To put this in some context, in many cases this has evolved as per the below table.
When one looks at the below examples, it’s easy to see how the gaps evolve. When one department has responsibility for one aspect of treating a risk and another department has responsibility for the same aspect but from a different angle there is either going to be duplication or gaps… Even when it comes to the aspect of response itself we are often so tied to historical approaches that we wait for something bad to happen before we improve future response. Outdated processes that were designed around singular response to a singular event such as a conventional fire based emergency evacuation are now, in many cases ineffective. In fact, when assessing recent incidents such as the Grenfell fires, one could question whether the way these approaches were designed and applied actually works at all in the modern era… Building on this example, we need to examine integrated response and prevention, it’s easy to see how conventional evacuation processes and their application has its challenges. Leading approaches in the field of emergency management refer to the concept of an ‘all hazards’ approach sometimes described as the ‘comprehensive approach’ as a critical success factor to effectively managing emergencies. When we have silo’s, we face many challenges. Simply implementing the Federal Government recommended ‘All Hazards’ - Prevent, Prepare, Respond, Recover (PPRR) model by trying to divide up the way we; prevent, prepare for, respond to and recover from different events can be duplicative, costly and will inevitably lead to gaps in our approaches. This is simply because in a VUCA world the ‘Unknown, Unknown’ factor is always present and there is simply no way we can plan for every event and expect the immediate first responders to apply these complex plans and actions under the pressure of an intense adrenal dump. Dave Grossman, well-known author and researcher, presents a conceptual view of people today where he subdivides society into three main roles, namely sheep, wolves and sheepdogs.
Risk, Threat or Hazard
Example of Responsible line structure
Fire risk
WHS or Facility Management
Emergency evacuation
Implemented via building and floor wardens
Cyber threat
IT Department
Staff wellbeing and enhancing decision making skills
HR Department
Physical security threat / Asset Protection
Either facilities or security departments
Risk Management
Governance risk and compliance structures
S E C URIT Y FE ATU RE
SHEEP
WOLF
SHEEPDOG
The sheep is the person going about their everyday life, not wanting to be hassled or inconvenienced by security and safety concerns. Their safety and the safety and wellbeing of those around them is generally not a primary concern of the sheep. The second role is that of wolves, who prey on the sheep due to opportunities or their own sociopathic or psychopathic tendencies. Although there is no doubt that there are some really evil people in this world, in many cases these wolves may not have direct nefarious intent. Some are preying on the sheep based on their circumstances, such as criminals who justify their actions based on need and risk (i.e. stealing to eat). It should be noted, however, that no matter how ‘noble’ their reasons for preying on sheep are, they may still cause significant harm to the sheep. Some examples of clearly defined wolves, are terrorists or career criminals. In many cases, Criminologists have found that in their own heads, wolves may have justified that what they’re doing is right from a psychological, ideological or religious perspective – even if it means blowing up a school bus full of children… No matter how these wolves rationalize their actions, from our perspectives their justifications can never validate them harming other people in pursuit of their ideology. Lastly there are the sheepdogs. Sheepdogs protect the sheep from the wolves. Generally speaking, sheep don’t like sheepdogs because they look like wolves. However, when the wolf comes knocking, the sheepdog is often valued above all else. The goal of the modernday sheepdog has morphed – it is not possible to simply be a protector or oversee Protective functions, we simply don’t have the resources or budgets to do this with the myriad of issues we face. The goal now needs to include ensuring the Sheep are educated, and empowered to develop and apply their own sheepdog capabilities. The premise of empowered personal risk management is for everyone to be able to find that little sheepdog inside themselves and be able to apply this when it counts. The sheepdogs who have made a career out of protecting the sheep, such as those in the military, law-enforcement, security and related vocations, cannot be everywhere at the same time. Because wolves are cunning, we need to further expand this capability and teach all of our people to look for
the ‘wolf in sheep’s clothing’. Whilst the everyday person might tend to think of releasing their “inner sheepdog” only in violent situations, such as an armed robbery, assault with the intent of doing grievous bodily harm, etc. These are not necessarily the only situations that might require the release of the inner sheepdog. Think of situations like a fire breaking out in someone’s home, being involved in a motor vehicle accident, or a child drowning in a swimming pool. All of these situations will require sheep to dig deep, and find the inner resolve to help those in need under immense pressure. Another example may be basic cyber security. You might invest in the very best virus protection, firewalls and various other tools for your devices, but if your people click on suspicious email links sent from an unknown source, ‘even if it is from your mysterious wealthy uncle living abroad, who would like to give them a million-dollar inheritance’, they may land up infecting and disabling your entire network. In other words, spending money on protection is not beneficial if we do not apply an integrated approach and simply believe that because we have taken basic measures we are no longer at risk at all. A fundamental shift is required to help our people firstly to identify and acknowledge the sheepdog inside themselves (even if they are diametrically opposed to violence or truly don’t think something bad will ever happen to them), and secondly to develop the confidence and realization of the need to release it as and when needed. This is the foundational outcome we need to achieve in our organizations if we are to enhance the way we manage risk. It’s imperative that your people make the shift from relying on others to protect them to accepting that responsibility for themselves. It is important to ensure that as our people become more aware of the fact that there is a crucial aspect of balance. By noting that as people are more aware of their surroundings and what could go wrong, if unchecked can lean towards them being paranoid. Being paranoid is just as ineffective as not being aware at all. The goal is to enjoy life to the full whilst at the same time being more aware of what’s going on around you. I believe that the one cannot exist without the other, i.e. you can't truly squeeze the most out of life if you are paranoid or unaware. It is important that we teach our people to continually adjust the balance for themselves. We call this balancing act Dynamic Risk Equilibrium (DRE). Living in fear of what “the wolves” might do and allowing that fear to dominate your life,
actually translates to the wolves winning. It’s crucial that our people find a healthy balance between being prepared and enjoying life. The following simplistic diagram of the Dynamic Risk Equilibrium (DRE) may help you find this balance.
SECURITY
COMFORT
DRE
Dynamic Risk Equilibrium A FULL LIFE
We can interpret the diagram as follows: The more security aware you are; the more comfort you sacrifice. Or alternatively, the more you cling to your comforts (e.g. taking a shortcut home, even though the shortcut leads through a dodgy part of town), the more you sacrifice on security. Both have a direct effect on you living a full life. The more security awareness and balance you establish in the way your people behave, in and out of the workplace, the more buy in you will achieve to real risk management and resilience in your organization. The converse is also true. The more your people cling to your creature comforts and live in denial at the expense of safety and security, the more they compromise the ability to live a life marked by relative safety. It is important to remember too that as the name highlights DRE is dynamic and needs to be monitored and adjusted all the time. In summary, some of the frontline risk management approaches that are working have unique attributes. These approaches tend to link policy and guidance with humanistic response and are firmly anchored in the world of reality, integrating key aspects of the psychology of risk seamlessly. As such, these approaches are more likely to work when we need them. Most of all they focus on building our own skills and those of our staff to be able to manage biases, be vigilant, act proactively and be able to determine effective response based on strategic and tactical decisionmaking capabilities. Lastly, there is the process of building real resilience into our people in case something does actually happen. This is important as research into accident causation shows that no matter how effectively we apply preventative practice there is always a chance something bad can still happen.
SECU RIT Y INSIDE R | JUN/JU L 2 018 2 7
2018 #SecurityAwards Call for Nominations g By
Anna Ho, Marketing and Communications Officer, Australian Security Industry Association Limited (ASIAL)
T
he vital role performed by Australia’s private security industry will be recognised later this year at a special awards ceremony in Sydney organised by ASIAL. The 2018 Australian Security Industry Awards for Excellence and Outstanding Security Performance Awards will recognise excellence in the security industry. Nominations are open to all and provide an opportunity to recognise individuals, including frontline security personnel who have gone beyond what could reasonably expected of them in providing a level of service that exceeds client’s expectations. Likewise, organisations and teams who have demonstrated leadership and innovation will also be recognised. Judging of the awards will be undertaken by an independent panel of judges, that includes Damian McMeekin, Managing Director of CT Intelligence & Insight; John Adams, Editor, Security Electronics and Networks Magazine; John Curtis, Director, IPP Consulting Pty Ltd; Michael Walker, Senior Manager, Security Services, Facilities Management, Reserve Bank of Australia; Rachell DeLuca, Senior Security Consultant, ARUP and Vlado
Damjanovski, CCTV Expert Specialist and MD, ViDi Labs. Nominations open 1 July and close 31 August. Winners will be presented at a special awards ceremony to be held at Sydney’s Doltone House Hyde Park on Thursday 18 October 2018.
2018 AWARD CATEGORIES INCLUDE: • Individual Achievement – General • Individual Achievement – Technical • Gender Diversity • Indigenous Employment • Special Security Event or Project – Under $500,000 – Over $500,000 • Integrated Security Solution – Under $500,000 – Over $500,000 • Product of the Year – Alarm – Access Control – CCTV – Camera – CCTV – IP System/Solution – Communication /Transmission System
– Physical security (bollard, gate, barrier, lock)
AWARD CATEGORIES INCLUDE: • Outstanding In-house Security Manager/ Director • Outstanding Contract Security Manager/ Director • Outstanding Security Team • Outstanding Security Training Initiative • Outstanding Security Partnership • Outstanding Security Officer • Outstanding Female Security Professional • Outstanding Guarding Company • Outstanding Security Consultant • Outstanding Security Installer • Outstanding Information Security Company For more detailed information on the award nomination criteria and process visit www.asial.com.au/ securityawards2018
RECOGNISING EXCELLENCE
#securityawards
2018
2018
Organised by:
AUSTRALIAN
Security Industry The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals. www.asial.com.au/securityawards2018 Date: Thursday 18 October 2018 | Venue: Sydney’s Doltone House Hyde Park Entertainment Sponsor:
2018
Lead Dinner Sponsor:
The world is not pixelated, neither are our maps.
Experience infinite zoom, scale and detail with Integriti Vector Maps.
T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com
T: 1300 319 499
W: csd.com.au
WO RK P L AC E RE L ATIO NS
VICTORIAN AND QUEENSLAND EMPLOYERS FACE NEW CHALLENGES WITH RED TAPE AND INCREASED LABOUR COSTS By Chris Delaney, ASIAL Workplace Relations Advisor
In the April/May edition of the Security Insider Magazine we identified some of the workplace relations issues and legislative changes that were likely to affect ASIAL members over the next 12 months. Two have already been before their respective Parliaments.and are in the process of implementation.
In this article Chris Delaney provides an overview of Portable Long Service Leave in Victoria and the Labour Hire Licensing Legislation in Queensland. Labour Hire Licensing Legislation in Queensland The Regulations supporting the Labour Hire Licensing Act 2017 (Qld) (LHL Act) were released on 6 April 2018 and applications for licences must be lodged within 60 days from 16 April
2018, so applicants have until 15 June to be licensed or face fines. ASIAL has made submissions arguing that the Security industry should be exempt from the legislation as is the case of South Australia. The security industry already is heavily regulated and including our industry would be unnecessary and onerous. In reply to ASIAL’s submissions and correspondence the Minister for Industrial Relations Queensland Grace Grace said “I note that ASIAL has been particularly concerned about the administrative burden the LHL Act places on an industry already subject to government legislation. While I appreciate that regulation already applies to your industry, the requirements to be licensed under the LHL Act reflect the elements of fitness and propriety, financial viability and compliance with relevant laws specific to the provision of labour hire services”.
In ASIAL’s opinion that the LHL Act will not resolve issues of worker exploitation and improper business practices (where they exist) in the security industry in Queensland. ASIAL recommends that private security providers obtain careful advice as to whether they satisfy the relevant criteria in the Regulations for the exceptions as there are potential penalties of up to $378,000. The Act provides that: 33A person who provides 'labour hire services' in Queensland will need a licence to do so. This licence must be renewed annually. 33'Labour hire services' is broadly defined to mean supplying a worker to another person to do work. Examples of labour hire service providers include security providers who supply workers to another security company to provide security to a client. Continues over page > SECU RIT Y INSIDE R | JUN/JU L 2 018 31
WORKPL ACE RE L ATI ON S
Applications for Licenses Applications for licences are to be lodged through the Queensland Office of Industrial Relations. The Regulations explain the information which will be required as part of the application process including:
minor effect on all other employers in Victoria. The PLSL Bill deals with PLSL for Contract Cleaning, Private Security and Social Services and is modelled on the ACT legislation. Each scheme will be discreet to the affected industry.
1. the financial viability of the
Employer Obligations
applicant;
2. the migration status of the applicant, and its associates and their workers;
3. any insolvency history of the applicant and its associates;
4. whether the applicant and its related persons have, in the last 5 years has been convicted of workplace, work health and safety or workers compensation offences or entered into undertakings in relation to such breaches;
5. the criminal history of the applicant and its associates including breaches of various specified legislation in the past 5 years;
6. whether the applicant or its associates has been subject to any sexual harassment complaints in the last 5 years. It will be some time before it is fully clear how the legislation will affect the private security industry. We will keep members informed of any changes or exemptions that may arise out of the implementation of this legislation. Portable Long Service Act (PLSA) Victoria In May Bryan de Caires, ASIAL CEO and Chris Delaney had a briefing from the Victorian IR Minister’s Office regarding the PLSA and the proposed Labour Hire Legislation. The Bill for the PLSA has passed the Lower House and is expected to be passed into law by the time this article is published. There has also been a Bill drafted to reform the current LSL Act in order to ensure consistency. This will have a
Employers will be obliged to register: 33Themselves 33Their Employees, and 33Contract Workers (independent contractors, ABN holders etc.) Employers will also have record keeping responsibilities. Contract workers and employee would be able to self-register and nominate/identify an employer by way of invoice, payslip etc. The Board A Board of 9 will be appointed by the Minister, and will comprise of 33A Chair 33Deputy Chair 33A registrar (No voting power) 333 Employee Representatives (Union) 1 for each group – Cleaning, Security and Social Services 333 Employer Representatives (Registered Organisations) The scheme will have powers to investigate, access records, prosecute and set the levy amount. The expectation is that the levy will be around 1.7% of ordinary earnings. The definition of ordinary earnings includes the base rate and shift penalties but not overtime or the 25% Casual loading. Entitlement to LSL The entitlement to take LSL will come after 7 years. The amount accrued will be 1/60th of the total hours worked in the period. The fund pays the employee at the ordinary rate of pay in place immediately prior to the commencement of leave
About the Author: Chris Delaney is ASIAL’s Workplace Relations Advisor. He can be contacted at ir@asial.com.au
32 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
What counts as Service? 33Paid work for a day or part day 33Paid parental leave 33Unpaid Parental leave up to 12 months 33What does not count as Service? 33Unpaid Parental leave over 12 months won’t count – however will not break continuity. Taking Leave The employee will make a request for permission from the employer to take leave. The employer will have the right to accept or reject (on operational grounds). The employee may appeal to the PLSL Board and the Boards decision is final. Definition of Security Industry The definition of security activities has been taken from the Private Security Act 2004 - Sect 3. It includes Cash In Transit and selling, servicing and installing security equipment. Locksmiths are not included in the scheme. Employers in the electronics sector not already a contributor to Co-Invest will be able to opt for the Security Industry scheme. Disputes about coverage or the applicable levy may be dealt with by VICAT Employer contributions Employer contributions will be made quarterly. There will be scope for late payment. Communication Campaign Once legislation is in place an education campaign with be developed and implemented by the Victorian Government. Assistance from employer groups will be sought in order to access all affected employers. IT System The IT system to support the scheme is being developed by the same provider that developed the system for the ACT Scheme.
Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.
A DV ERTO RIAL
2018 Federal Budget Update Income tax cuts for low and middle income workers, aged care support services and infrastructure funding were some of the key proposals in this year’s Federal Budget. For super, the announcement included removing compulsory default insurance from the super accounts of young people and reuniting many Australians with their lost or inactive super accounts. The focus for retirees was on helping pensioner and self-funded retirees to boost their income. Measures related to this include the expansion of the Pension Work Scheme and allowing more people to access Centrelink’s Pension Loans (home equity release) Scheme. The Budget didn’t contain any major changes to the way super is taxed or any changes to the concessional or non-concessional cap limits on voluntary contributions. In the business space, small businesses with turnover
of up to $10 million will be able to immediately write-off expenditure up to $20,000 for a further year to 30 June 2019. The Government reaffirmed its previous commitment to introduce a turnover based phase-in of the reduced company tax rate of 27.5 per cent until 2024/25 when a 27 per cent rate will apply to all companies, followed by a further reduction of 1 per cent pa for all companies until the company tax rate reaches 25 per cent by 2026/27. The Government reaffirmed its previous commitment of $75 billion for infrastructure over a 10-year period. This Budget announces the direction of $25 billion towards major infrastructure projects including Melbourne Airport rail, Melbourne North-East Link, Queensland’s Bruce Highway and Brisbane-Gold Coast M1 upgrades, Perth’s Metronet rail and Adelaide North-South corridor.
More detail on the Budget and super is available at australiansuper.com/Federal Budget2018
SECU RIT Y INSIDE R | JUN/JUL 2 018 33
WORKPL ACE RE L ATI ON S
YOUR WORKPLACE RELATIONS QUESTIONS ANSWERED By Chris Delaney, ASIAL Workplace Relations Advisor
CAN AN EMPLOYER USE EVIDENCE DISCOVERED AFTER DISMISSING A WORKER TO SUPPORT THE DISMISSAL?
About the Author: Chris Delaney is ASIAL’s Workplace Relations Advisor. He can be contacted at ir@asial.com.au
The Fair Work Commission (FWC) has confirmed that employers can rely on conduct discovered after an employee’s dismissal if it is relevant to the merits of an unfair dismissal claim. In a 2016 Unfair Dismissal case an account executive was summarily dismissed when her employer discovered that she had sent “highly sensitive” information to her private email account. The employee filed an unfair dismissal claim where she argued the email contained a “renewal list” to assist her to track her workload, and not a client list as alleged by the company. During the proceeding, the company gave evidence that following the dismissal it was informed by a rival firm that the employee had supplied them with a USB to upload some personal photographs. On inspection of the USB, a director of the firm found the employee had uploaded confidential information of the company, including client lists and other working documents. The company sought to rely on this misconduct to support its decision to dismissal.
The Commissioner concluded that the employer was entitled to rely on this discovery of misconduct, even though it was not known until after her dismissal, because it provided further confirmation that the company had a valid reason to dismiss her. In particular, the evidence established that the employee had, on several occasions, breached the confidentiality obligations set out in her contract of employment.
Tips for Employers There several cases where the FWC has decided that information discovered after the time of dismissal can be accepted into evidence by the FWC in deciding whether a dismissal was harsh, unjust or unreasonable, regardless of the employer being unaware of those facts at the time and did not rely on them when the dismissal occurred. The information gathered subsequent to the dismissal must be relevant to the reason for the dismissal and must be able to be substantiated like any other evidence. CAN AN EMPLOYER INSIST THAT APPLICANTS UNDERGO A PRE-EMPLOYMENT MEDICAL ASSESSMENT? Under federal and state WorkSafe laws an employer has a duty of care to protect the health and safety and welfare of their employees. This is particularly important when the employee is involved in physical activities requiring a high level of fitness. A pre-employment medical can help mitigate risks in the workplace. It may discover a pre-existing illness or injury that may be exacerbated by the activities the employee
34 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
WO RK P L AC E RE L ATIO NS
is expected to perform as an inherent requirement of the job.
CAN EMPLOYEES REFUSE TO WORK ON PUBLIC HOLIDAYS?
“Inherent” requirements are the essential activities of the job: the core duties that must be carried out in order to fulfil the purpose of a position.
Work in the security industry can be 24/7 with many employees working shift work and having a roster in advance. Others in administration or day workers are required to work Monday to Friday and not generally on Public Holidays. So, if you need your employees to work a public holiday – can they say no? Nothing is simple, but the Fair Work Act 2009 indicates that you can request an employee to work on a public holiday, but the employee has the right to refuse your request if they have reasonable grounds for doing so.
Can you require a candidate undergo an assessment? If you want to compel an applicant to undergo a pre-employment medical as a requirement of getting the job you may be required to prove that the medical evidence is necessary to determine whether the applicant can perform the inherent requirements of their role, with or without reasonable adjustments. In those circumstances antidiscrimination laws allow employers to refuse to employ applicants who do not submit to a medical examination. Some candidates may be reluctant to agree to a pre-employment medical. Before deciding that the medical is essential, ensure that the medical is necessary and will not be a breach of anti-discrimination laws. Employers should: 33Scope out the job and identify what are the inherent requirements that may be identified in a medical assessment; 33Where practical have the medical practitioner visit the workplace to observe the work first hand. Also provide a position description and a detailed list of tasks to be performed on the job. 33Only assess those things that directly relate to the inherent requirements of the job; 33Discuss and explain clearly to candidates and ask (both on the application for employment form and at the interview) if they are aware of any pre-existing injury or illness that might affect the performance of the inherent duties; and 33advise the candidate of the test outcome and ensure strict confidentiality.
“Inherent” requirements are the essential activities of the job: the core duties that must be carried out in order to fulfil the purpose of a position.“
So, what are ‘reasonable grounds’? When considering if a request or a refusal is reasonable the Act provides some guidance. You need to take into account:
1. The nature of the work performed by the employee, e.g. a 7day shift worker, on a rotating roster may reasonably expect to work a public holiday from time to time. NB If you expect your employees to work on public holidays as a condition of employment that should be clearly stated and agreed in a contract of employment.
2. The type of employment, e.g. fulltime, part-time or casual.
4. The employee’s personal circumstances, including family responsibilities, e.g. does the employee have children who would need to be cared for on that day?
5. Whether the employee is entitled to additional remuneration or other benefits because of working on the public holiday, e.g. double time and a half under an Award provision.
6. Whether the employee has acknowledged or could reasonably expect you to require them to work on a public holiday (or particular public holidays). e.g. the shift worker situation or custom and practice.
7. The amount of notice you gave the employee so they could organise any necessary arrangements to be available to work that day.
8. The amount of notice the employee gave you before refusing the request, e.g. was there time for you to organise a replacement to cover their shift? What can you do if they refuse? Under the general protections provisions of the Fair Work Act (FW Act) if you take adverse action against an employee because they exercised a workplace right you could face a claim for compensation. Refusing to work a public holiday is a workplace right. However, if your request is reasonable and/or the refusal to work is unreasonable a claim for adverse action may be unsuccessful. The information discussed above is of a general nature and may not be applicable in every situation. Always seek professional advice before making decisions on contentious matters.
3. The nature of the workplace or business (including its operational requirements), e.g. does all or part of your business or your client’s business shut down on a public holiday?
Contact ASIAL’s Workplace Relations Advisor ir@asial.com.au
Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.
SECU RIT Y INSIDE R | JUN/JU L 2 018 35
KP LA
SA
OR
FE
W CE MANAGEMENT
Making health and safety easier for members
Mee t yo in 1 ur WH 5m inut S oblig es p atio er w ns eek
Ava ilab ACCESSIBLE anywhere, Special l e ANYTIME t o $27 OFFER 5 (in ASIAL mem Contact us to cl G The S A T) p bediscuss our new syst SIAL S r s e em, afe for promotion r an member indu W d stry esigne orkpla n um d to c : AS4 e Mana
801 g Inclu and ement man des an Sy t ailo o pow red stem i er/e ffice acc to th s a t lectr o Crea onic unt an e Au otal W tes a s sec d a m stra WHS urity obil lian HS plan staff e acc Stor secu o for y es fo in th u busi rity our e fie nt acce ness rms, inc busi l ssib d iden ness , em l e to ploy t and ee repor se
ASIAL GRADED SECURITY MONITORING CENTRES* CURRENT AS AT: 28TH MAY 2018
COMPANY (SHORT FORM NAME)
STATE
CERT NO.
GRADE
EXPIRY
ADT Security
NSW
482
A1
ADT Security (Data Centre)
NSW
483
A1
02 Apr 2019
Allcare Monitoring Services
WA
499
A1
29 Feb 2020
02 Apr 2019
ARM Security
WA
484
A1
27 Mar 2019
ART Security
VIC
468
A1
30 Sept 2018
BENS Wholesale Monitoring
NSW
477
A1
14 Nov 2018
Best Alarm and Monitoring Services
VIC
488
A1
11 July 2019
Calamity Monitoring
NSW
501
A2
21 Mar 2020
Central Monitoring Services
NSW
485
A1
06 Apr 2019
Chubb Monitoring Centre
NSW
498
A1
09 Mar 2020
VIC
473
C2
19 Aug 2018
Energize Australia Executive Security Solutions (Monitoring)
VIC
472
A1
15 Aug 2018
Glad Security
NSW
479
A2
15 Dec 2018
Golden Electronics
TAS
475
A1
16 Oct 2018
GRID Security
NSW
476
A1
17 Oct 2018
Instant Security
QLD
496
A1
13 Nov 2019
Linfox Armaguard
VIC
467
A1
14 Aug 2018
Mekina Technologies
TAS
500
A1
01 Nov 2019
Onwatch
NSW
486
A1
15 Sept 2018
Paul-Tec (Australia)
NSW
489
A1
28 Feb 2019
Protection Pacific Security
VIC
474
C2
01 Aug 2018
RAA Security Services
SA
480
A1
14 Feb 2019
Secom Australia
NSW
495
A1
14 Dec 2019
Sectrol Security
VIC
492
B2
25 Aug 2019
Securemonitoring
VIC
494
A1
23 Nov 2019
Security 1
ACT
481
A1
14 Feb 2019
SA
502
A1
18 Jun 2020
Security Alarm Monitoring Service Security Control Room
VIC
491
A1
18 Aug 2019
SMC Australia
QLD
497
A1
10 Feb 2020
Spectus
WA
487
A1
04 May 2019
Staysafe
VIC
478
A1
01 Dec 2018
Telstra SNP Monitoring (Hamilton)
NSW
490A
A1
17 Aug 2019
Telstra SNP Monitoring (West Ryde)
NSW
471A
A1
13 Aug 2018
Ultimate Security Australia
NSW
493A
A1
22 Sept 2019
*The ASIAL Graded monitoring centres above have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for companies which may change the nature of their operations subsequent to Grading.
ASIAL CERTIFICATION CLASS 5 CAPABILITY COMPANY Inner Range Pty Ltd
STATE
CERT NO.
PRODUCT
EXPIRY
VIC
3
Infiniti Class 5
15 March 2020
The capability recommendation is based on an overview of AS/NZS 2201.1-2007 and its referenced standards. Full compliance is neither guaranteed nor implied. Whilst the product may be capable of meeting Class 5 standard, meeting this Class relies extensively on both the installer and the client. As part of the capability certification, the supplier has produced both a Compliance Statement and associated documents. These documents are dedicated to Class 5 compliance and form part of the Certification process. The supplier has agreed that: The required documentation will be maintained up-to-date for the period of the Certification, with ASIAL’s inspector being advised in writing of any such changes, and they will maintain compliance throughout the certification. Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period.
A DV E RT ORIAL
Are you Insured for Statutory Fines & Penalties? Most standard Public/Product Liability policies exclude cover for Statutory Fines & Penalties. However, they can constitute one of the greatest financial risks many businesses face. There are over 5,000 legislative provisions in Australia that cater for civil penalties for non-compliance in many areas of regulation, from Work Health & Safety, Environmental Law, Australian Consumer Law and Employment Law. The fine itself is not the only risk you face. The cost and distraction of a legal defence are also notoriously high. Combined, these financial losses could cripple your business. That’s why the combined liability insurance offered exclusively to ASIAL members via ASIAL’s strategic partner Aon, provides up to $2,000,000 any one claim in relation to Statutory Fines and Penalties.
ds, ant Product
If you would like to discuss further please contact Angelo Gannis on +61 2 9253 8350 or angelo.gannis@aon.com
When you need security insurance, contact an expert As the endorsed insurance broker to ASIAL since 2003, Aon understands your security business. Contact our dedicated team today for an obligation free alternative: Angelo Gannis 02 9253 8350 angelo.gannis@aon.com
aon.com.au/security © 2016 Aon Risk Services Australia Limited ABN 17 000 434 720 AFSL No. 241141 General Advice Warning The information contained in this advert is general in nature and should not be relied on as advice (personal or otherwise) because your personal needs, objectives and financial situation have not been considered. So before deciding whether a particular product is right for you, please consider the relevant Product Disclosure Statement or contact us to speak to an adviser. COM0350 1217
38 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
A S IA L N E W M EMBE RS
WELCOME TO OUR NEW MEMBERS ASIAL welcomes the following members who have recently joined the Association.
NEW CORPORATE MEMBERS Anticrime Protective Services Pty Ltd
WA
AW Security Services Pty Ltd
VIC
Prompt Tech Security Pty Ltd t/a Prompt Tech Security
VIC
Christopher John Bassett t/a Bassett Security
QLD
Security Council Australia Pty Ltd
VIC
Comtech Mackay Pty. Ltd.
QLD
Security One 2 One ACT Pty Ltd
NSW NSW NSW
Core Quality Management Consultants Pty Ltd
WA
SIS Security Group Pty Ltd
DockCom Pty Ltd
VIC
StanCert Pty Ltd
EGroup Protective Services Pty Ltd Five D Property Management (QLD)Pty Ltd IBEST Technology Pty Ltd Keysec Group Pty Ltd Melbourne Watching Service Pty Ltd
NSW NSW VIC QLD VIC WA
S.W. Morgan & Associates Pty Ltd
VIC
Solaris Trading Pty Ltd t/a Citadel Security Group
NSW VIC QLD
VDG Pty Ltd
NSW VIC
NEW PROVISIONAL CORPORATE Ahar Pty Ltd t/a Australian Security and Manpower Services
VIC
Ali Haider t/a Oz Corporate Security Group
VIC
Axess Control Systems Pty Ltd
NSW
BMR Group Pty Ltd
QLD
Caesar Security Services Pty Ltd
NSW
Cloverdale Security and Maintenance Pty Ltd Connected Australia Pty Ltd
Teletree Communication Pty Ltd
ACT
TJR Security Pty Ltd t/a Securepro Security Total Watch Security Pty Ltd
QLD
VIC ACT
UPGRADED TO FULL CORPORATE VIC
RECOGNITION PROGRAM The ASIAL member recognition program acknowledges members. Categories include:
VIC
Integrated Security Group Pty Ltd
WA
Jim’s Security (Australia)
VIC
Laelana Holdings Pty Ltd t/a Sommer Security
NSW
M & S Security Pty Ltd t/a Allied Patrol Services
QLD
MasterCall Electronics Pty Limited
NSW
Meridion Pty Ltd
NSW
Nova Protective Services Pty Ltd
Kemcoss Pty Ltd t/a South Burnett Security & Traffic Control QLD SILVER
Newcastle Security Pty Ltd
VIC NSW
BRONZE
QLD
ACT
QLD
GOLD
Allen Richard Smith t/a Queensland Security Fencing
ICorp Security Services Pty Ltd
NSW
Kiwi Security (QLD) Pty Ltd
VIC
QLD
Icon Electrical Services (ACT) Pty Ltd
Kintora Pty. Limited t/a Gaymoir Products
Nemesis Consultancy Group Pty Ltd NSW
NSW
VIC
Gerald James Bowen Security Pty Ltd QLD
National Protective Services Pty Ltd
Event Facility Services Pty Ltd
Hisec Pty Ltd
NSW
Gantech Integrated Solutions Pty Ltd t/a Gantech Security QLD
BRONZE – 6 – 10 YEARS
Epochal Pty Ltd t/a Commsync
Global 5Star Protective Services Pty Ltd VIC
Fort Security Systems Pty Ltd
SILVER – 11 – 15 YEARS
QLD
VIC
NSW
VIC
Alarm Monitoring Centre Pty Ltd
Forcepoint Security Group Pty Ltd
Fields Group Pty Ltd
MV Vital Security Services Pty Ltd
NSW
E Guards Pty Ltd
VIC
GOLD – 16 – 24 YEARS
NSW
WA
Designer Doorware Pty Ltd t/a Matnick Security Services
WA
PLATINUM – 25 YEARS +
Agilient Pty Ltd
Digital Plus Installations Pty Ltd
VIC
Michael Warren Drummond t/a Watchdog Alarms
Integrators Australia Pty Ltd VIC
NSW
Williamson Security Management Services Pty Ltd t/a Williamson Security Services NSW
Sequoro Security Services Pty Ltd
Springmount Services Pty Ltd
Victorian Independent Protective Services Pty Ltd
VIC
Vakamanu Pty Ltd
Mitchell and Brown Communications Pty Ltd
Security One 2 One Pty Ltd
Superb Property Personal Parking & Security Services Pty Ltd
Consec Investigation Pty Ltd t/as CSA Asset Security
VIC
Powerguard Security Group Pty Ltd t/a Powerguard Security Services QLD QuaySec Pty Ltd t/a ARMCOR
WA
Queensland Security & Investigations Pty Ltd t/a Kingaroy Security Patrol
VIC
Rakker Pty Ltd t/a Queensland Security Solutions
QLD
Secure Solutions Access and Security Pty Ltd t/a Secure Solutions Access and Security QLD Security Operations Patrol Pty Ltd
QLD
All-Locks Master Locksmiths Pty Ltd NSW
Simon John Lont t/a Sylont Watching Service
VIC
Archers Enterprise Australia Pty Ltd t/a Digital Surveillance Solutions VIC
Summit Innovations Pty Ltd
VIC
ARVG Pty Ltd t/a Stronghold Security QLD
Technet Systems Pty Ltd
QLD
AssureCore Pty Ltd
VIC
Tekaz Pty Ltd t/a Laguna Bay Security Service QLD
ATR Communications Pty Ltd
VIC
Virtual Intelligence (Aust) Pty Ltd
NSW
AusGroup Protective Services Pty Ltd
VIC
Wrightway Security Services Pty Ltd
NSW
Job Musa t/a Security Concepts Services VIC
Australian Security Leaders Pty Ltd t/a ASL Security Group QLD
ML & BK Bryant Corporation Pty Ltd
QLD
Boss Surveillance Systems Pty Ltd
OM Security Pty Ltd t/a Holt Security
NSW
Business Risks International Pty Ltd t/a BRI Security NSW
QLD
SECU RIT Y INSIDE R | JUN/JUL 2 018 39
HO T PRODUCT S
HOTPRODUCTS
HOTPRODUCTS
DAVANTIS are the experts in video DAVANTIS the experts in video analytics for are perimeter protection
analytics for perimeter protection
•
Advanced perimeter protection for intrusion, loitering, tampering, object removal and • stopped Advanced perimeter protection vehicle detection.
•
Intrusion videos of any breached perimeter object removal stoppedstation or to are sent directly to and a monitoring detection. avehicle mobile device APP for remote viewing.
for intrusion, loitering, tampering,
• • CCTV cameras are great, once coupled with Intrusion videos of any breached the Davantis software and its algorithms they perimeter are sent directly to a become extremely efficient security tools. •
monitoring station or to a mobile
Providing effective perimeter protection device APP for remote viewing. solutions around the world, the Davantis is internationally recognised • solution CCTV cameras are great, once for its quality.
coupled with the Davantis software
•
PERSON DETECTION
VEHICLE DETECTION
AREA ENTER/EXIT DETECTION
TAMPERING DETECTION
LOITERING DETECTION
Video Alarm Technologies Pty Ltd p videoalarmtechnologies.com.au 1300 46 44 55 info@videoalarmtechnologies.com.au
APPEAR DISAPPEAR DETECTION
VIRTUAL ONVIF CAMERA
RULES CHANGING
With 6000 km’s of combined perimeter andover its algorithms they become currently under surveillance with Davantis extremely efficient securityit’s tools. across more than 40 countries, proven a solution you can trust.
• Providing effective perimeter protection solutions around the world, p Video Alarm Technologies Pty Ltd the Davantis solution is internationally videoalarmtechnologies.com.au recognised for its quality. 1300 46 44 55 • info@videoalarmtechnologies.com.au With over 6000 km’s of combined perimeter currently under surveillance with Davantis across more than 40 countries, it’s proven a solution you can trust.
Integriti Guard Tour. The highly anticipated release of Integriti Version 18.1 from Inner Range, will feature Guard Tour. The Guard Tour Manager is a configurable framework where guard tours can be created, scheduled and monitored in real time. The application offers a high amount of flexibility in the creation of steps, tasks, actions and warnings for each tour. The progress of guard tours can be monitored in real time from within Gatekeeper with the option of using live video feeds from an integrated CCTV system. Warnings and alarms can also be raised where the timing or the expected sequence of events within a tour has not been met. Visit the CSD & Inner Range stand for a demo at this year’s Security & Exhibition Conference in Melbourne. p Central Security Distribution 1300 319 499 4 0 S EC U R I T Y I N S I D ER | JU N/ JU L 201 8
H O T P RO D U CTS
Presco PSK16 INDOOR KEYPAD When a PSK16 is coupled with any PAC series door controller you get the benefits of a secure door access control solution with all the features of the PrescoTM system. • Outputs PrescoTM format data • Compatible with PrescoTM PAC access controllers and other PrescoTM decoders • Over 19,000,000 possible code combinations • Long lasting tactile membrane with raised buttons • Location pip on 5 buttons for visually impaired users • Designed and manufactured in Australia
Inner Range Mobile Reader
Presco PSC16 INDOOR COMBO KEYPAD & PROXIMITY CARD READER
Inner Range have released a new smartphone app for their Integriti and Infiniti platforms. The Inner Range Mobile Reader is an Android smartphone application that allows security personnel to view and verify cardholder details with a simple scan of a user’s access card. The Mobile Reader app can be used for on-the-spot identity verification, suspension of access cards and as a “check-in” reader at emergency mustering assembly points. Inner Range Mobile Reader will be on display at the CSD & Inner Range stand during the 2018 Security & Exhibition Conference in Melbourne. p Central Security Distribution 1300 319 499
• The PrescoTM PSC16 Combination keypad and Proximity Reader is an advanced, self-contained RFID reader with the added security of PIN/PROX access. • Outputs PrescoTM and Wiegand format data • Compatible with PrescoTM PAC access controllers and all other PrescoTM decoders • Compatible with industry standard 26bit Wiegand systems, fully configurable for other systems with up to 64bits of data from the keypad • Low cost non-shielded cable up to 1km from decoder p www.presco.com.au 03 9808 6244 sales@nidac.com
• Operating Voltage 8 to 15V DC, 150mA.max • 36 month warranty
SECU RIT Y INSIDE R | JUN/JUL 2 018 41
Upcoming ASIAL Events WA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Hotel Northbridge Venue address: 210 Lake Street, Northbridge, WA
QLD INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL’s Tania Laird. Time: 7.30am-9.00am Venue: Hillstone St Lucia Venue address: Carawa Street, St Lucia, QLD
NSW INDUSTRY BRIEFING - NEW VENUE A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Pullman Sydney Olympic Park Venue address: 9 Olympic Blvd, Sydney Olympic Park, NSW
SA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Sebel Playford Hotel Venue address: 120 North Terrace, Adelaide, SA
WA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Hotel Northbridge Venue address: 210 Lake Street, Northbridge, WA
VIC INDUSTRY BRIEFING The Victoria breakfast briefing will include a security industry update from ASIAL’s Peter Johnson. Earn three CPD points for attending. Time: 7.30am-9.00am Venue: Batman’s Hill on Collins Venue address: 623 Collins Street, Melbourne, VIC
To book: visit www.asial.com.au
15 Jun 2018
18 Jul 2018
8 Aug 2018
20 Sep 2018
21 Sep 2018
27 Sep 2018
Welcome Welcome to to ASIAL ASIAL We Weare arehere heretotohelp helpyour yourbusiness businesssucceed. succeed.As Asan anASIAL ASIALmember, member, advice adviceand andsupport supportisisalways alwayswithin withineasy easyreach. reach.
Leadership Leadership Providing Providing a strong a strong industry industry voice voice && advocacy advocacy
Networking Networking
Commitment Commitment
&& Professional Professional Development Development
ToTo Quality Quality
Promoting Promoting Your Your
AA Trusted Trusted
Partner Partner
Business Business
Professional Professional Advice Advice &&
Access Access ToTo Industry Industry
Support Support
News News&&Resources Resources
ASIAL ASIALisisthe thepeak peakbody bodyfor forsecurity securityprofessionals. professionals. We Weare arededicated dedicatedtotosupporting supportingmembers, members,promoting promotingstandards standards and andsafeguarding safeguardingpublic publicinterests. interests.
asial.com.au asial.com.au| |1300 1300127 127425 425
Don’t break the link. Use a Central Monitoring Services monitored alarm.
1300 655 009 | customerservice@centralmonitoring.com.au MASTER LICENCE 401988582