Security Insider April/ May 2019

Page 1

Vol.24 | Issue 1 | Apr/May 2019

THE MAGAZINE FOR SECURITY PROFESSIONALS

National Labour Hire Licensing More Red Tape? Page 16

20 ASIAL’s 50th Blast from the Past

26 Consultants as a Security Resource

30 Executive Briefing Program


Lone Worker Safety - A Closer Look A Lone Worker Safety Device is a discrete tool used to provide support and protection to your customers working alone in the field, travelling or meeting with vulnerable individuals. With the simple press of a button, duress alarm and voice communication can be established and a location validated for a swift monitoring response to the situation. We are able to monitor clients in any scenario including high-risk workers, victims of Domestic Violence, healthcare workers and any one of your clients working alone.

BUREAU MONITORING Meeting the personal safety requirements of your customers has never been easier. Our customised responses ensure WHS procedures are actioned

LONE WORKER SOLUTIONS

and direct contact is made to verify the alarm. Your clients are in good hands with S1 Monitoring.

Monitored in a Grade A1 environment Support available 24/7 Customised alarm responses Devices to suit every situation

CCTV VIDEO VERIFICATION Video verification for Lone Workers Genuine events identified Immediate confirmation and response

YOUR S1 MONITORING CONTACT Myke Thomas 0428 861 997 Email: mthomas@security1.com.au

Contact 136 000 www.security1.com.au


Contents Vol.24 | Issue 1 | Apr/May2019

CELEBRATING 50 YEARS OF ACHIEVEMENT

20 16

26

30

NATIONAL LABOUR HIRE LICENSING MORE RED TAPE?

CONSULTANTS AS A SECURITY RESOURCE

EXECUTIVE BRIEFING PROGRAM

06 President’s Message

12 Focus on Security

08 VIC - Commencement of the labour hire licensing scheme

14 Introducing ASIAL’s podcast series

32 National Alarm Activation Guideline

11 2019 Awards for Excellence call for nominations

15 Welcome to our new members 30 Security 2019 Executive Briefing Program

34 Hot Products 35 Upcoming ASIAL events

ASIAL STRATEGIC PARTNERS

SEC URI T Y I N SI DER | APR /M AY 2 019 3


A DV E RT ORIAL

Celebrating International Women’s Day! Sponsored by AustralianSuper

International Women’s Day (IWD), 8 March 2019, is a global day celebrating the social, economic, cultural and political achievements of women. However you celebrated IWD, taking some time now to become more financially empowered is something AustralianSuper actively supports. First, we’re encouraging women to “take the hour of power challenge” – one that involves putting aside an hour a week to focus on finances. For example, week one could be setting a budget, week two looking for lost super, followed by making extra contributions to super and then reviewing insurance needs. Second, we’re highlighting simple actions women can take to look after their finances and super including: 3 Combining super. Moving from multiple to one single super account means paying less in fees and makes account management easier. Visit australiansuper.com/ combine to learn more 3 Adding extra to super. Small amounts can add up over time and taking action earlier in life means super has more time to earn investment returns and grow. 3 Share and save. Super members whose spouse earns less than $40,000 a year may be entitled to a tax offset of up to $540 per year if they make after-tax payments into their spouse’s super account. Visit australiansuper. com/grow to learn more

And finally, we’re encouraging women to seek advice. At AustralianSuper, we have a few options to choose from: 3 Online. Members can contact us through Live Chat at australiansuper.com or via our app. We’ve also got a range of online calculators to assist with planning. Visit australiansuper.com/calculators for more. 3 Simple. Members can call us on 1300 300 273 and ask to speak to a member of our advice team for a general advice Super Health Check or for simple personal advice on topics like adding extra to super, sorting insurance and transition to retirement. 3 Comprehensive. For more complex advice, meeting face-to-face with an accredited adviser can help when a detailed financial plan is required. Learn more at australiansuper.com/find-an-adviser 3 Seminars. AustralianSuper conducts free retirement and financial planning seminars Australia-wide. Seminars can be booked at australiansuper.com/seminars We can also assist businesses to support IWD by supplying you with: � Women and Super brochure(s) � An intranet tile and supporting text regarding IWD

For more information visit australiansuper.com/women

Sponsored by AustralianSuper Pty Ltd ABN 94 006 457 987, AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898. This information may be general financial advice which doesn’t take into account your personal objectives, situation or needs. Before making a decision about AustralianSuper, you should think about your financial requirements and refer to the relevant Product Disclosure Statement, available at australiansuper.com/pds.

4 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9


It’s Australian. It’s super. And it’s yours.

As Australia’s biggest super fund, 2.2 million Australians trust us with their hard-earned money. And they do their bit too by taking small simple actions, so together we can make a big difference to their future.

This is general information only and doesn’t take into account you personal objectives, situation or needs. Before making a decision about AustralianSuper, consider the PDS at australiansuper.com. AustralianSuper Pty Ltd ABN 94 006 457 987, AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898.

A035 08/18

We could make a big difference to yours too. Let’s get started at australiansuper.com


PRES IDE NT’S ME SS AG E

Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited

SECURITY HAS BECOME EVERYONE’S BUSINESS WE ALL HAVE A ROLE TO PLAY IN COUNTERING THE THREATS FACED.

PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 | Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher

Editor Bryan de Caires

Security is everyone’s business The tragic events in Christchurch last month were a salient reminder of the changing time we live in and the threats we now face. I am sure that I speak for all ASIAL members in passing on our condolences and thoughts to all who have been impacted by this terrorist act. The attack has brought into sharp focus the sheer scale and breadth of possible origins of attack now faced and the realisation that there needs to be a re-think of traditional approaches to protective security thinking. Security has become everyone’s business - we all have a role to play in countering the threats faced. The traditional role performed by police in protecting the public is being re-evaluated with law enforcement agencies publically acknowledging that responsibility needs to be shared by the private sector. The security industry in particular plays a vital role in safeguarding Australia. It is encouraging to witness a genuine commitment from law enforcement agencies to engage and work with the security industry to protect the community. The integration of private and public sectors in keeping people safe will be the theme of the keynote presentation at the Security 2019 Conference in Sydney from the 24th26th July (see page 12). The recently retired UK Counter-Terrorism National Coordinator will speak on his lead role

in making the UK stronger and more resistant to terrorism as well as more resilient in the aftermath of attacks. This included the establishment of what has become known as the ‘StepChange’ Programme that is driving forward the integration of private and public sectors. From a practical perspective security professionals can make a real difference by being diligent in performing their duties of detecting, deterring and reporting suspicious behaviour and activities. Working together in a collaborative manner we can make a difference.

Kevin McDonald President

Editorial Enquiries communications@asial.com.au Advertising Anna Ho I events@asial.com.au advertising@asial.com.au Graphic Design + Digital Mitch Morgan Design 0402 749 312 mitch@mitchmorgandesign.com www.mitchmorgandesign.com Editorial Contributors Dr Tony Zalewski and Chris Delaney Print + Distribution Whirlwind Print Pty Ltd Published bi-monthly Estimated readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases can be emailed to: communications@asial.com.au. Internet references in articles, stories and advertising were correct at the time of printing. ASIAL does not accept responsibility form is leading views. Copyright©2019 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at www.asial.com.au. NEXT ISSUE: JUNE/JULY 2019 Printed ISSN 1442-1720 Digital ISSN 2207-8282

2,802

Avg Net Distribution per Issue

Security Insider Magazine has been independently audited under the AMAA's CAB Total Distribution Audit. Audit Period: 01/04/17 – 31/03/18

6 SEC UR IT Y IN S IDE R | A PR/ M AY 201 9


A DV E RTO RIAL

CYBER PROTECTION AND INSURANCE

sonal needs, the relevant Product

As a business owner ask yourself these key questions? 33 What would a cyber hack or incident cost your business (loss of income)? 33 If your data is hacked and your client’s information is leaked are you able to front up the cost of: • Remediation • Notifying your entire client database of a breach • I.T Forensic investigation 33 Are you aware of the recent data and privacy breach regulatory changes and the impact on the fines and penalty cost that can incur? 33 What would happen if your invoice was impersonated via a phishing email to your customers and they paid your hard earn money to a fraudsters account and the bank is unable to recoup funds? We understand that whilst you manage a successful business the threats are real. We would like to partner with you to provide a wholistic approach to Risk Management and provide you with peace of mind should a Cyber Attack occur. Interesting Fact According to the FBI, between October 2013 and May 2018 alone, some $12.5 billion was lost worldwide due to funds being transferred following a type of social engineering scam known as business e-mail compromise (BEC). And any business that transfers funds electronically can be susceptible to losses of this nature.

Case Studies Even with these preventative measures, however, no organisation is immune, regardless of their size or exposure. In our office alone, we have seen a spike in cyber incidents recently, including: ­­ A security firm had emails forged from a key person in the business with over $130,000 in funds transferred to false accounts. ­­ A small security business subject to ransomware resulting in business interruption for 5 days. ­­ A security company experienced a significant data breach resulting in the release of hundreds of personal records. ­­ A security company received an invoice from a legitimate supplier requesting a change in bank account details and then requesting to pay outstanding invoices. The security company transferred $305,000 to the fraudsters bank account. ­­ A security company which offered alarm monitoring service had their systems hacked and was shut down for a short period. During this time a robbery occurred at their client premise and mobile patrol was not dispatched in time to prevent the loss. All of these companies had similar characteristics, they were all SMEs, and none of them had a cyber policy.

Be ahead of the curve and contact your friendly Aon Risk Advisor – Michael Pham on 02 9253 7326 or Michael.pham@aon.com for a non-obligated free quote

SEC URI T Y I N SI DER | APR /M AY 2 019 7


INDUST RY NE W S

VIC - Commencement of the labour hire licensing scheme The Victorian labour hire licensing scheme will commence on 29 April 2019. The Victorian Parliament passed the Labour Hire Licensing Act 2018 (the Act). Labour hire is generally where one business provides labour to another business, but different industries may use other words to describe this arrangement. To check whether your business provides labour hire as defined in Victoria under the Act, information is available on the Labour Hire Licensing Authority website. If you are uncertain you may wish to seek independent legal advice. This Act introduces a licensing scheme for all providers of labour hire. Its objectives are to protect labour hire workers from being exploited and improve the transparency and integrity of the labour hire industry. The Act establishes the Labour Hire Licensing Authority to oversee the licensing system to regulate the provision of labour hire services, to ensure all Victorian labour hire providers are licensed and that users of labour hire only use licensed providers. An applicant for a labour hire licence must satisfy several tests including being a fit and proper person and compliance with existing workplace laws. Applications for a labour hire licence can be made from 29 April 2019 through the Labour Hire Authority website labourhireauthority.vic.gov.au.

The Act includes a six-month transition period to allow labour hire providers who make valid applications to continue to operate while their applications are being considered. The Authority website will publish details of applications received and a Register of Licensed Labour Hire Providers. The Authority will work in partnership with State and Commonwealth agencies to protect the rights of workers in Victoria.

National Alarm Activation Guideline Reminder The National Emergency Communications Working Group – Australia and New Zealand in consultation with the Australian Security Industry Association Limited have developed a National Police Alarm Activation Response Guideline (‘the Guideline’) to align police classification, requirements and response to alarms and alarm activations. The Guideline provides a framework for: 33 National consistency in the way in which Australian policing jurisdictions and security companies who are members of recognised security industry organisations define and respond to alarm activations; 33 Processes and procedures for the handling of alarm responses; 33 More efficient use of police resources. Members are reminded that the transitional period to enable Alarm Monitoring Centres to meet the National Alarm Activation Guideline ends on the 30th June 2019. After this date police will respond to requests for assistance from accredited Alarm Monitoring Providers who: 8 SEC UR IT Y IN S IDE R | A PR/ M AY 201 9

33 Are a current member of an recognised security industry organisation, and 33 Comply with Australian Standard 2201.2 (as revised from time to time) monitoring centre certification, and 33 Are capable of showing Caller Line Identification (CLI) to the relevant police jurisdiction’s telephone links. View consumer information document here asial.com.au/documents/item/1588 or to request a copy of the National Alarm Activation Guideline email security@asial.com.au


Install and monitor CCTV surveillance from almost anywhere. Solar street lighting and camera systems Deliver LED lighting & CCTV to any location with our Solar Series of street lights & surveillance systems. These 4G capable, remote-view enabled, standalone solutions can transform areas without network or power infrastructure.

View and Control via 4G or WiFi

The perfect solution for monitoring:

Remote Entry Points

On-site Equipment

Construction Sites

External Facilities

4K Ultra HD Resolution Cameras • Remote Pan-Tilt-Zoom • 40W Solar LED Area Lighting Motion Activated Lighting • Efficient Monocrystalline Panel • Long Uptime LiFePO4 Battery

Thrive in the industry with RhinoCo Technology. Surveillance Camera Systems Building Alarms & Security • Vehicle Security & Cameras

Over 40 Years | Est. 1978

Residential Intercom Systems Networking Infrastructure • LED Lighting & Energy Saving

Power & Cabling Products Professional Access Control • Solar Surveillance & Lighting

Head Office & Distribution: 9 Hannabus Place, McGraths Hill NSW 2756

Haberfield Branch: 223-225 Ramsay Street, Haberfield NSW 2045

Villawood Branch: 63-69 Middleton Road, Villawood NSW 2163

www.rhino.com.au

Find your solar solution today: (02) 9671 6711 • sales@rhino.com.au


INDUST RY NE W S

Migrant Workers Taskforce Report

Safe Workplace Management System ASIAL SWMS upgrade The ASIAL SWMS system will soon move to a new platform. This will mean that in addition to the current features, members will soon have access to a host of exciting new benefits and enhancements. Among the additional enhancements the new platform will offer include: 33 Coverage for all sectors via the one account 33 Different access levels for multiple users/contractors 33 Enhanced reporting functionality 33 Improved incident reporting 33 Integrated action workflow 33 Automatic risk calculation and much more Why you need a SWMS The WHS Act 2011 places significant obligations on you to demonstrate active participation of Workplace, Health and Safety prevention. Failure to do so can attract fines of up to $3 million per breach of a corporation, $600,000 per breach for an officer, $300,000 per breach for an individual and up to five years’ imprisonment. While most approach their obligations with the best of intentions, WHS compliance can be complex and time-consuming.

The Migrant Workers’ Taskforce was established as part of the Government’s response to the revelation of significant wage underpayments in certain industry sectors. There was much publicity concerning 7-Eleven franchisees, but demonstrably the problem was more widespread. The Migrant Workers Taskforce handed down its report on the 7th March 2019. Among the 22 recommendations accepted in principle by Government is the establishment of a National Labour Hire Registration Scheme for security which was named as one of the four high risk industry sectors.

Recommendation 14 It is recommended that in relation to labour hire, the Government establish a National Labour Hire Registration Scheme with the following elements: a. focused on labour hire operators and hosts in four high risk industry sectors — horticulture, meat processing, cleaning and security — across Australia. b. mandatory for labour hire operators in those sectors to register with the scheme. c. a low regulatory burden on labour hire operators in those sectors to join the scheme, with the ability to have their registration cancelled if they contravene a relevant law d. host employers in four industry sectors are required to use registered labour hire operators. For further comment on this issue turn to page 16.

How we can help

2019 Security Gala Dinner in Sydney’s Town Hall

Imagine a complete online Safe Workplace Management System that creates a Workplace Health and Safety plan tailored to your business. It keeps you informed of your obligations, safeguarding against costly breaches. It’s accessible anytime via any internet enabled device and is available to ASIAL members only.

The Association will celebrate its 50th anniversary with a special Gala Dinner in Sydney on Thursday 25th July 2019 at Sydney Town Hall. A special price of $219.90 inc GST is available to ASIAL Members who register by 31 May 2019 (a saving of $29). Please Gala Dinner Sponsor email events@asial.com.au to purchase your special ASIAL member discounted tickets. The dinner will be hosted by author and commentator, Jean Kittson and comedian, Vince Sorrenti.

10 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9


IN DUS T RY NE WS

NOMINATIONS CLOSE ON 26 AUGUST 2019

2019 Awards for Excellence call for nominations

Nominations are now open for the 2019 Australian Security Industry Awards for Excellence and Outstanding Security performance Awards. Award categories include: Australian Security Industry Awards for Excellence 33 Individual Achievement Security Apprentice General Technical 33 Gender Diversity 33 Indigenous Employment 33 Special Security Event or Project Under $500,000 Over $500,000 33 Integrated Security Solution Under $500,000 Over $500,000

33 Product of the Year Alarm Access Control CCTV Camera CCTV IP System/Solution Physical Security (i.e. bollard, gate, barrier, locksmith) Outstanding Security Performance Awards 33 Outstanding In-House Security Manager/Director

33 Outstanding Guarding Company 33 Outstanding Security Consultant 33 Outstanding Security Training Initiative 33 Outstanding Security Partnership 33 Outstanding Female Security Professional

Lead Dinner Sponsor

Entertainment Sponsor

33 Outstanding Contract Security Manager/Director 33 Outstanding Security Team

For information on award categories and how to nominate visit www.asial.com.au/securityawards2019 Winners and finalists will be announced at a special dinner at the Park Hyatt Melbourne on 17 October 2019.

Supporting health and wellbeing in the security industry ASIAL has partnered with Lifeline to help work towards a suicide free Australia. The effects of suicide have a far reaching ripple effect that impacts many people. Through its partnership with Lifeline ASIAL wants to empower the security industry and remind all security professionals that help is at hand. As a member driven organisation, ASIAL would like to ensure a healthy environment, both on and off the job for all those working in the security industry. By promoting awareness of the resources available through organisations such as Lifeline, ASIAL is seeking to make a positive difference.

The ASIAL website includes access to a range of resources. To Find out more and download the Coping Kit visit asial.com.au/ resources/lifeline

SEC URI T Y I N SI DER | APR /MAY 2 019 11


FOCUS ON SECURITY THE 2019 SECURITY EXHIBITION & CONFERENCE:

WHERE YOUR SECURITY NEEDS ARE BROUGHT INTO FOCUS

24-26 JULY 2019 ICC SYDNEY DARLING HARBOUR

Gain insight into the newest innovations that are reinventing the industry. Ai, biometrics and tech inventions are moving at lightning speed and smart technology is inspiring new discoveries every day.

EXHIBITION IS FREE REGISTER NOW

Industry leaders, new visionaries and expert users are all joining together to exchange ideas and developments. The Security Exhibition + Conference is Australia’s largest and most established commercial security event that cultivates innovation, solves problems and leads an industry to be the best in the world.

#security2019

securityexpo.com.au


LD RS SO A E YE C N T3 RE AS FE L N E O H C TT U

O

THE ASIAL SECURITY 2019 CONFERENCE

BUILDING RESILIENCE TO COMBAT CHANGING SECURITY THREATS The ASIAL Security Conference hosts a compelling program of renowned local and international experts, academics and visionaries addressing how to strengthen your capabilities, managing risk, a digital future, emerging technologies and innovations, integration and more. It is your annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. The format and content of the program reflects critical industry updates and challenges on the first day, followed by your choice of streamed executive briefings on the second and third day of the program. Bring your security needs into focus, stay up to date with the latest developments and gain a competitive advantage with proven strategies to tackle a rapidly changing industry.

SECURE YOUR EARLY BIRD TICKET & ENTER THE DRAW

TO WIN A PENTHOUSE HOTEL SUITE DURING THE EVENT!

HEADLINE SPEAKERS

HUGH RIMINTON

NICK A

DR TONY ZALEWSKI

JOHN LOMAX

Author, Television News Presenter, Radio Broadcaster. Conference Moderator

MPA DipPR, National Coordinator Protect & Prepare, Counter Terrorism Policing National HQ, New Scotland Yard

Director, Global Public Safety Pty Ltd

General Manager Asset Protection, The Star

KELLY SUNDBERG

SHARA EVANS

NICK DE BONT

DR LISA WARREN

Associate Professor, Mount Royal University (Canada)

Futurist, Market Clarity

Chief Security Officer, Thales Australia

Clinical/Forensic Psychologist, Clinical Director, Code Black Threat Management

SECURITYEXPO.COM.AU FOR FULL SESSION DETAILS

BOOK NOW TO SECURE YOUR PLACE and take advantage of the early bird discount.

EXHIBITION HOURS

CONFERENCE HOURS

Wed 24 July: 9:30am – 5.00pm

Wed 24 July: 9:00am – 5.00pm

Thurs 25 July: 9:30am – 5.00pm

Thurs 25 July: 9:00am – 2:30pm

Fri 26 July: 9:30am – 3:30pm

Fri 26 July: 9:00am – 2:30pm

Lead Industry Partner


INDUST RY NE W S

TAILORED WORKPLACE RELATIONS ADVICE AND SUPPORT ASIAL corporate members are entitled to FREE over the phone advice on workplace and industrial relations matters. This includes a wide range of resources tailored to assist members in managing their workplace relations issues at every level. To find out more about the advice and support ASIAL offers visit asial.com.au/employee-relations Advanced Alarms Mackay presented with ASIAL Platinum membership Established 28 years ago, Mackay based ASIAL Member Advanced Alarms Mackay is the latest ASIAL member to be presented with an ASIAL Platinum Membership Certificate. Tony Karst, Managing Director of Advanced Alarms Mackay is pictured receiving the certificate from ASIAL CEO Bryan de Caires recently in Brisbane.

Introducing ASIAL’s Security Insider Podcast Series In the first episode of a new Podcast series from ASIAL, Dr Anthony Bergin, Senior Analyst with the Australian Strategic Policy Institute (ASPI) and Don Williams, thought leader and independent security consultant co-author’s of a recently released paper titled Safety In Numbers, look at the role of private security in Australia’s counter terrorism arrangements. They are also joined by Bryan de Caires, Chief Executive Officer of ASIAL and John Bigelow of Security Solutions. The podcast is available on iTunes, GooglePlay and Spotify. Listen to the podcast at www.asial.com.au/asial-podcasts

14 SEC UR IT Y IN S IDE R | A PR/ M AY 201 9

Thank you to our Round 1 2019 Industry Breakfast Briefing Sponsor

Boon Edam is a leading global entrance security organisation, and the largest provider of speed gate systems in the world. The company has a strong focus on mitigating risk through products that control crowds, deter, detect and prevent tailgating. Boon Edam operates in markets where there are strong duty of care obligations to employees and visitors. Its clients comprise Fortune 500 companies and household names in public and private facilities, including corporate HQs, Government, financial institutions, public broadcasters and data centres. Boon Edam is consistently developing and extending the latest security trends, such as biometrics, and shaping its products to suit a modern, integrated and advanced security landscape.


IN DUS T RY NE WS

WELCOME TO OUR NEW MEMBERS ASIAL welcomes the following members who have recently joined the Association. NEW CORPORATE MEMBERS

NEW PROVISIONAL CORPORATE MEMBERS

Asset Protection Systems Pty Ltd

QLD

360 Security Access and Surveillance Pty Ltd

QLD NSW

Crown Security (WA) Pty Ltd

WA

Absolute Security and Communications Pty Ltd

ECA Systems Pty Ltd

WA

Alpha One Security Pty Ltd

ACT

Global Growth Solutions Pty Ltd t/a Command IT Services

WA

Asset Resources Group Pty Ltd

QLD

Concentric Concepts Pty Ltd t/a Concentric Concepts

QLD

Global Network Services (Australasia) Pty. Ltd.

NSW

JK & TK Cross Pty Ltd t/a Cross Security Services

WA

DataRate Australia Pty Ltd

VIC

Partisan Protective Services Pty Ltd

NSW

Digital Edge Security Pty Ltd

RIC Electrics Pty Ltd

NSW

Elevate Security Pty Ltd

ACT

Full View Security Pty Ltd

QLD

Site Sentry Pty Ltd

WA

QLD

W & J Enterprises Pty Ltd t/a Southwest Electrical (Aust)

NSW

Guard1 Security Pty Ltd

Wolftech Electrical & Security Pty Limited

NSW

Integrity Security Services Pty Ltd

VIC

JCG Security Group Pty Ltd NEW CORPORATE UPGRADES

VIC

Metro Protective Services Pty Ltd

Australasian Security Services Pty Ltd t/a Australasian Security Services

VIC

Chief Group Services Pty Ltd

NSW

CSO Crowd Control Services Pty Ltd

QLD

Leo Paul Mahoney t/a Wellington Security Services

NSW

ML Security Services Pty Ltd

VIC

ORIA Systems Pty Limited

ACT

Solution Cleaning Services Aust Pty Ltd t/a Lions Security Services

VIC

SPS Security Services Pty Ltd

VIC

Team Harvey Pty Ltd t/a Harveys Security Services

QLD

Vertus 1 Pty Ltd

VIC

NSW VIC

Montebar Holdings Pty Ltd t/a TVD Services

NSW

Queensland Security Protection Pty Ltd

QLD

Quotes Unlimited Pty Ltd

QLD

R I Holdings Pty Ltd

VIC

Redfern Retail Risk Pty Ltd

VIC

RISK Consultancy Group Pty Ltd

QLD

Steve Pattrick Electrical (ACT) Pty Ltd

ACT

Sweeper Solutions Pty Ltd

VIC

TAS Security Australia Pty Ltd t/a TAS Security Australia

QLD

Tehnika Pty Ltd

QLD

Ultimate Mortgage Solutions Pty Ltd t/a 1800 Gotcha Security and Alarms

VIC

Ultrasecure Pty Ltd

NSW

Wercom Pty Ltd

ACT

RECOGNITION PROGRAM The ASIAL member recognition program acknowledges longstanding members. CATEGORIES INCLUDE: PLATINUM – 25 YEARS +

|

GOLD – 16 – 24 YEARS

BRONZE

|

SILVER – 11 – 15 years

|

BRONZE – 6 – 10 years

SILVER

A&V Security Services Pty Ltd

QLD

Aksem Pty Ltd t/a Aksem Security

Australian Bureau Monitoring Pty Ltd

NSW

ASF Protection Pty Ltd

NSW

VIC NSW

Bona Management Group Pty Ltd

VIC

Brent Paull Installations Pty Ltd

Casa Security Pty Ltd

WA NSW

Citywide Patrol and Security Services Pty Ltd t/a CPS Security Services

Cube4 Security Pty Ltd

NSW

Create Security Pty Ltd

QLD

Dansec Pty Ltd

QLD

David John Turnbull t/a Hi Teck Systems

QLD

NSW

Lockyer Valley Security Services Pty Ltd

QLD

NSW

Pirzada Hafeezurrahman t/a Gold Strike Protective Services

Claybrook Pty Ltd t/a Urban Protective Services

Future Electrical Technologies Pty Ltd Ideal Gate Automation Pty Ltd

Security Enterprises Pty Ltd t/a Security Enterprise

Intelligent Surveillance Group Pty Ltd t/a Intelligent Surveillance & Pentacom

QLD

KC Security Services Pty Ltd

NSW

Maximum Protection Pty Ltd Scope Protective & Data Solutions Pty Ltd Tactical Conflict Solutions Pty Ltd

SA VIC WA

The Geek Shed Pty Ltd

NSW

TZ Electrical Services Pty Ltd

NSW

United Risk Management Group Pty Ltd Wilcomm Pty Ltd

VIC NSW

VIC

VIC QLD

GOLD Admax Security Services Pty Limited

NSW

AFN Solutions Pty Ltd t/a AFN Solutions

NSW

Diamond Protection Pty Ltd

VIC

Harvey Norman Security Pty Limited Kelaart Security Training Services Pty Ltd SIS Australia Group Pty Ltd

NSW VIC NSW

PLATINUM Advanced Alarms Mackay Pty Ltd

QLD

SEC URI T Y I N SI DER | APR /MAY 2 019 15


SEC URIT Y F E AT URE

NATIONAL LABOUR HIRE LICENSING MORE RED TAPE? By Chris Delaney

In March 2019, the Migrant Workers’ Taskforce issued its Report (the Report). The Taskforce was established as part of the Government’s response to the revelation of significant wage underpayments in certain industry sectors. Those sectors included horticulture, meat processing, cleaning and security. Evidence to the Report suggests ‘that the horticulture, cleaning, meat processing and security industries are particularly high risk for unscrupulous labour hire practices’.

About the Author: CHRIS DELANEY is a highly regarded Employee Relations professional with over 40 years’ experience in Industrial Relations and Human Resources. He has held senior executive Industrial Relations positions with Nestle & BHP. He has represented (ASIAL) and members in the 4 Yearly Review of Modern Awards and many matters before the Fair Work Commission and other Industrial tribunals. He is a regular contributor to the Security Insider.

We have, in Australia, an extremely complex workplace regulatory system. Many employers fall foul of the law through ignorance or confusion. And while ignorance is no excuse sometimes even the best workplace relations practitioners argue about the interpretation of awards and workplace legislation. Workplace legislation that is not well defined is more likely to damage those making honest mistakes than those “most serious and egregious forms of deliberate exploitation of workers”. ‘Wage theft’ and Labour Hire investigations have taken place in Victoria and Queensland and currently underway in Western Australia. Labour Hire Licensing legislation has been enacted in both Queensland and Victoria and it is clear that almost all security manpower companies will be required to hold a Labour Hire License in order to operate their businesses. The definitions used for Labour Hire in Queensland and Victoria are extremely broad. Employees of private security providers who fall under the direction and control of the client (Queensland) or work in or as part of the client’s business (Victoria) are considered to be under labour hire arrangements.

16 SEC U R IT Y IN S IDE R | A PR/ M AY 201 9

Examples from Queensland and Victoria A security officer working in a Shopping Centre, or at a venue – pub, club or sporting event – a security officer working in a government or commercial building as a concierge will be considered to be working under a labour hire arrangement.

The Report’s recommendation(s) There are over 20 recommendations including stronger regulations, more power and resources to the Fair Work Ombudsman (FWO), strengthening of accessorial liability provisions of the Fair Work Act 2009 (the act) and criminal sanctions for deliberate and systemic underpayment of wages.

Recommendation 14 Among the recommendations was that the Government establish a National Labour Hire Registration Scheme with the following elements:


S E C URIT Y FE ATU RE

a. focused on labour hire operators and hosts in four high risk industry sectors — horticulture, meat processing, cleaning and security — across Australia b. mandatory for labour hire operators in those sectors to register with the scheme c. a low regulatory burden on labour hire operators in those sectors to join the scheme, with the ability to have their registration cancelled if they contravene a relevant law d. host employers in four industry sectors are required to use registered labour hire operators.

The Morrison Budget In the recent Budget $27 million has been set aside to set up a national labour hire registration scheme and funds for the Fair Work Ombudsman to establish a sham contracting unit to address education and enforcement through to litigation of those businesses that “knowingly or recklessly misrepresent employment relationships as independent contract to avoid statutory obligations and employment entitlements.”

How the scheme would operate

contractor’ where the labour hire operator maintains control and supervision of the workers (e.g. providing security at a sporting event). Requirements for labour hire operators 33 Mandatory for labour hire operators to register with the Scheme. A civil penalty contravention could apply if operating unregistered. 33

Labour hire operators to pay a fee at the time of registration and annually.

33

Labour hire operators register via a once-off process, supplying prescribed information about the owners/ operators and the business.

33

If a labour hire operator has previously seriously breached a relevant law, the labour hire operator cannot register until they are compliant with relevant laws. ‘Relevant laws’ could include workplace, tax, migration, WHS and workers’ compensation laws, obligations for operating a corporation (including liquidation processes) and criminal history of owners/operators.

33

Labour hire operators must review, update and confirm details annually.

33

Registered labour hire operators undergo periodic audits undertaken by the administering authority to check compliance with their employer obligations. The audit could involve sharing of government-held data, request for information or on-site visits. Periodic audits could be set according to the operator’s risk rating or in response to complaints.

33

Registered labour hire operators that seriously breach a relevant law, fail to engage in audits or fail to pay the annual fee could be de-registered.

Scope and coverage The Scheme proposes to operate nationally and applies to labour hire operators and hosts that operate in horticulture, meat processing, cleaning and/or security. Definition of labour hire operators The definition of labour hire operators captures a broad range of activities by labour hire operators while minimising unintended consequences. A labour hire operator may be involved in the supply of a worker to a host; a party in a supply chain of entities between the host and the workers; or act as a ‘workforce

Continues over page > SEC URI T Y I N SI DER | APR /MAY 2 019 17


SEC URIT Y F E AT URE

Public register of labour hire operators The Government maintains a public register of registered labour hire operators to allow hosts to find a registered labour hire operator.r. Requirements on host employers Host employers must use registered labour hire operators with a penalty for not using a registered labour hire operator. Administration 33 A separate administrative entity to be established and funded to administer the Scheme (this could be within an existing government agency). 33 The entity would maintain the online registration process; grant and suspend registrations; deregister labour hire operators; undertake audits; make referrals to regulators; and administer the host penalty regime. 33 The Scheme would carry an establishment and ongoing cost. The proposed annual fees paid by labour hire companies could contribute to this, but other funding will also be required to support the Scheme.

ASIAL’s View ASIAL supports any move to eliminate the opportunity for unscrupulous operators to benefit at the cost of employees and/or legitimate operators complying with workplace laws. We do not support unnecessary ‘red tape’ that is not supported by strong enforcement. Nor do we support a ‘piece meal’ approach that does not recognise the need to align several sets of legislation in order to achieve the desired result. If there is to be a National Labour Hire Licensing Scheme covering Private Security Businesses, at the very least it needs to: 33 be harmonised with any state enacted legislation; 33 have a clear and concise definition of “Labour Hire” so that there is no ambiguity for employers and end users when deciding whether there is a need for registration;

18 SEC UR IT Y IN S IDE R | A PR/ M AY 201 9

33 be appropriately enforced by one enforcement agency, with the power to deal with breaches efficiently and without drawn out legal procedures and 33 be supported by harmonised security licensing legislation throughout Australia.

Security Licensing Legislation / Regulation Apart from being a national security risk persons who are not citizens or permanent residents of Australia have been identified in the Migrant Taskforce Report as being vulnerable to exploitation by unscrupulous labour hire operators. Legislation that prohibits student and working holiday visa holders from being eligible to apply for a security licence will mitigate both problems. Similarly removing the eligibility for individual ABN holders from holding a security business licence will go a long way towards eliminating the opportunity for sham contracting arrangements also identified by the FWO as a way to exploit vulnerable workers.

Supply Chain Issues ASIAL identified the role of Local Governments (and others) in forcing contract prices down to unsustainable levels. The result was the Local Government Procurement Initiative (LGPI) aimed eliminating unlawful procurement practices by educating and auditing procurement officers to understand their exposure to accessorial liabilities under s550 of the Fair Work Act 2009. While there have been some prosecutions under this part of the Act a strengthening of the provisions and greater sanctions for breaches is necessary.

conditions and penalties for breaches of an award provision. The Fair Work Ombudsman has power to inspect records and prosecute those employers that underpay wages or fail to provide minimum conditions of employment. Labour Hire Licensing provides another layer to the regulations already in place. If the regulators took a stronger role in dealing with unscrupulous employers under current legislation Labour Hire Licensing (at least for the security industry) would be unnecessary.

The Solution to Exploitation of Security employees We do not need any more regulation. New legislation will however be implemented needed or not. For it and the current legislation to be effective regulators must: 33 Develop National Licensing or least harmonised licensing for security providers and individuals.. 33 Only allow eligible permanent residents and citizens to hold security licenses. 33 Only allow eligible incorporated companies to hold a security business license. 33 Prosecute breaches of s550 accessorial liability breaches. 33 Prosecute sham contracting arrangements Unless regulators actively enforce the legislation, all that will be gained for compliant security providers is more red tape.

Over regulated? Regulating licensing and activities of private security providers and individual security officers is essential for national security, training and service standards. These regulations, in ASIAL’s view should be the same across the country not unlike harmonised Work Health and Safety legislation. The Fair Work Act 2009 provides minimum workplace wages and

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations Specialist.


Introducing ASIAL’s Security Insider Podcast Series ASIAL’s Security Insider Podcast Series has been designed to help engage with the wider security community and industry to help gain key insights on specific topics with guest speakers and discussions.

Subscribe on Apple Podcasts


SEC URIT Y F E AT URE

CELEBRATING

50 YEARS OF ACHIEVEMENT

20 S SEC EC U R IT I T Y IN I NS IDE I D ER R || AAPR/ PR/M MAY AY 201 20199


S E C URIT Y FE ATU RE

In 1969, a small group of individuals in the security began meeting in Sydney’s Hotel Australia. Until then it was not unheard of for people to cross the road to avoid talking to a competitor! Through the establishment of ASIAL a forum was created where issues could be discussed and work towards professionalising the security industry commenced. The Association’s membership base of approximately 2,600 is a far cry from the 20 or so members the original founders of the Association anticipated. As the security industry has grown and developed over the past 50 years, so too has ASIAL. For five decades ASIAL has provided strong leadership to effect positive change in the industry. Whether it is driving industry professionalism through the development of training

competencies and codes of practice, providing advocacy in the development industry regulation, developing industry certification programs, promoting the industry’s capabilities through consumer awareness campaign and industry events, representing the industry on industrial relations matters or driving the development of technical standards, ASIAL has been at the forefront in driving positive change. As the peak national body for security professionals in Australia,

ASIAL’s input is actively sought and valued on a wide range of industry issues. Operating from its Secretariat in Security Industry House (a property the Association owns), ASIAL’s dedicated team of 17 employees and consultants have a strong commitment to servicing the needs of members. That said, it is important to remember that none of this would have been possible without the efforts of countless individuals over the past 50 years Continues over page > SEC URI T Y I N SI DER | APR /MAY 2 019 2 1


SEC URIT Y F E AT URE

who have volunteered significant time to the Association to effect meaningful change in the industry and of course the support of ASIAL’s loyal membership base. Through this support the Association has been able to advocate strongly for the security industry and provide direction for the industry’s growth and development. There have literally been hundreds of individuals who have contributed over the years towards the Association’s success, too many to acknowledge all here. However, there are fourteen individuals recognised by the Association through the awarding of Life Membership for their outstanding service and contribution. These individuals include:

33 Ged Byrnes | 2016 33 Antony Elliott | 2016 33 Neville Kiely | 2015 33 Robert Bruce | 2013 33 Peter Rae | 2009) 33 Larry Circosta | 2009 33 Arthur McIntyre | 2009 33 Devon Minchin | 1999 33 John Elliott | 1997 33 Kevin Roche OAM | 1996 33 Joe Sonnberger | 1983 33 Harold Rosengarten | 1983 33 Stan Masters | 1983 33 Jack Ashby | 1983 The commitment demonstrated by ASIAL’s early members continues today with a strong focus and commitment to driving professionalism and promoting the industry’s capabilities. The Association’s growing maturity and standing was reflected at its Strategy Planning Day held in February which included representatives from security industry regulators in Queensland, New South Wales and Victoria, Australian Security Intelligence Organisation, Federal Attorney

2 2 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9

ASIAL LIFE MEMBERS

Ged Byrnes

Antony Elliott

2016

2016

Neville Kiely

Robert Bruce

2015

2013

Peter Rae

Larry Circosta

2009

2009

Arthur McIntyre

Devon Minchin

2009

1999

John Elliott

Kevin Roche OAM

1997

1996

Joe Sonnberger

Harold Rosengarten

1983

1983

Stan Masters

Jack Ashby

1983

1983


S E C URIT Y FE ATU RE

General’s Department, Fair Work Ombudsman, New South Wales Police, Master Locksmiths Association of Australia and Australian Information Security Association. At the core of what was discussed at the ASIAL Strategy Planning Day was the security industry’s role in safeguarding Australia. As evidenced by the key priorities arising from the Strategy Planning Day, the Association’s key focus over coming years is promoting the industry capabilities and driving professional standards.

Key ASIAL priorities: ­­

Promote the security industry’s role and capabilities

­­

Driving professional and ethical standards

­­

Driving industry research

­­

Achieving national uniformity and consistency

­­

Forging greater stakeholder collaboration

As evidenced by the tragic events in Christchurch, New Zealand last month we live in a changing security environment where security strategies must evolve and adapt, where actions once unthinkable have become a reality. The security industry is increasingly relied on by the Australian community to keep it safe. Commensurate with this comes increased responsibilities and expectations and a need to

provide quality service and a high level of professionalism. There is also acknowledgment from law enforcement and government agencies of the security industry’s significant role and capability in safeguarding the community. The reality is that security is everyone’s business and it is important that we work together collaboratively to achieve the best results. ASIAL understands the important role security professionals perform in safeguarding Australia 24 hours a day, seven days a week. Likewise, the ASIAL board is committed to building on the legacy of its forebearers by ensuring the ongoing professionalisation of the industry and building the industry’s extensive capabilities. Just as the contribution of volunteers over the past 50 years has been vital in helping get the Association to where it is today, the same will apply as we look ahead to the next 50 years. The challenges and opportunities that lie ahead for our industry are many and varied. Without your ongoing support and contribution the Association’s ability to respond and continue to be a strong industry advocate will be diminished. To ensure this does not occur, we encourage members to actively engage with the association and help make a difference. To find out how you can get involved contact the ASIAL Secretariat.

KEY ASIAL PRIORITIES

1.

Promote the security industry’s role and capabilities

2.

Driving professional and ethical standards

3.

Driving industry research

4.

Achieving national uniformity and consistency

5.

Forging greater stakeholder collaboration

Join us in celebrating ASIAL’s 50th ASIAL will celebrate its 50th anniversary on the 25th July 2019 with a special gala dinner to be held at the impressive Sydney Town Hall. Over 400 security professionals will attend the event which will provide an opportunity to celebrate this significant milestone and opportunity to catch up with old and new acquaintances. Details of the gala dinner are available at www.asial.com.au . We hope you will be able to join us in celebrating this significant milestone.

A special price of $219.90 inc GST is available to ASIAL Members who register by 31 May 2019 (a saving of $29). Book your discounted ASIAL member tickets by emailing events@asial.com.au

SEC URI T Y I N SI DER | APR /MAY 2 019 2 3


A DV E RT ORIAL

simPRO IoT will change the way you secure businesses and homes Cloud-based software has undoubtedly made its mark in the security industry as part of the first wave of technology to change the sector for the better. However, many businesses are already looking ahead as the second wave has begun to loom – the Internet of Things (IoT) age is set to have an even more profound impact on the way the industry operates. There are those who regard this new technology, driven by sensors and data, with doubt. This is understandable as IoT functionality will inevitably disrupt the security sector. However, the truth of the matter is that those who accept this disruption will be the ones to prosper from it. At simPRO we have seen how IoT systems can help any trade business, from niche start-ups to globalised industrial companies. It facilitates machine learning and automation that helps small businesses explore new growth opportunities, and larger businesses stay competitive in the market for longer. Businesses that adopt IoT are future-proofing their operations with strong, competitive advantages like realtime productivity and energy monitoring of machinery through sensors, as well as tracking of key maintenance indicators to predict and prevent failure. In the security sector, IoT is already making its initial impact on preventative and reactive maintenance through simPRO IoT. With many advancements on offer; like improved sensors, better cameras and longer-life products - all of which are making protection more comprehensive than ever. simPRO IoT is a single intelligent solution and platform that incorporates the use of machine learning, proactive

24 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9

action triggering and automation of field service activities, all in simPRO. By employing IoT sensors into existing equipment installations, simPRO IoT allows for actions to be performed in real-time from your data. For security businesses, this means less downtime and quicker resolutions through improved preventative maintenance - something that can be achieved by, for example, using IoT sensors to measure the uptime and health status of cameras. If you can get to a customer to resolve issues before they’ve even become aware of it themselves, they’ll be keeping you in service for years to come. Plus, you can utilise the intelligent IoT capability to secure new business through competitive advantage.

If you’re ready to embrace the wave, and prosper from the adoption of IoT technology, simPRO is currently offering ASIAL Members 20% off the initial implementation and training costs with simPRO Enterprise. Terms and conditions do apply. See our website for more information: simpro.com.au/signup/asial-members


SYSTEMISE FOR

SUCCESS


SEC URIT Y F E AT URE

By Dr Tony Zalewski

Consultants a SECURITY RES 2 6 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9


S E C URIT Y FE ATU RE

Introduction The use of a security consultant as a professional resource is not uncommon. Many organisations will seek independent expert or specialist guidance over and above their existing levels of internal competence. This is because a consultant will often draw from experiences across organisations and is better equipped to speak about common industry or professional practices. An independent and objective assessment in a specialist area of security has many advantages. These include advice about how to improve physical security protections across a range of “new� or emerging products available to the market, understanding the benefits or otherwise of recent advancements such as biometrics or system integration, or innovative methods for the effective development of staff in a specialist area of security work. Consultants can also be invaluable in product selection as they are generally independent of manufacturers or suppliers products. Some consultants provide services across a range of disciplines. These can include advice on risk, physical security solutions, training and/or operational security systems. Some security consultants also provide forensic services as expert witnesses during litigation, a commission of inquiry or a coronial inquest.

Competence of consultants The professional competencies of individuals providing advice or assuming responsibility for security risk management is vitally important. Some jurisdictions require security consultants to be members of an approved security association and/ or licensed against mandatory competency standards. However, not all jurisdictions have the same requirement, hence there is a need for organisations to familiarise themselves with the different requirements mandated by local authorities. Prior to engaging a security consultant or authorising the provision of any risk services by a security consultant, the local authority should be contacted to determine if there are any licensing or other professional requirements, including compulsory competency qualifications for a consultant to be effectively engaged.

The professional competencies of individuals providing advice or assuming responsibility for security risk management is vitally important.

Once a consultant is engaged, caution must be exercised to ensure the person is suitably experienced, has appropriate insurances and is currently competent. If the consultant falls short in these areas there is an increased risk of a flawed risk assessment, poor risk management practices, inappropriate advice and ultimately a deficient system of security. A deficient system increases risk and may well result in loss and damage to individuals and the organisation.

Categories of security consultant There are four general categories of security consultant:

1. Security management; 2. Physical security; 3. Operational security; and 4. Forensic. The largest group of security consultants work in the area of security management, most often in a particular professional area or industry sector. Examples are aviation, critical infrastructure, healthcare, transport and logistics, and retail. Physical security consultants will have technical expertise in a specialist area such as security hardware, security technology or security system design and integration. Operational security consultants generally have a major focus on people such as security staff and other potential guardians in or around a protected site. These consultants understand the influence of people within a system of security, the vulnerabilities associated with the exercise of human discretion by staff, and how employees are inducted, trained, supervised and influenced through formal rather than informal operational systems.

sa ESOURCE

Continues over page >

SEC URI T Y I N SI DER | APR /MAY 2 019 2 7


SEC URIT Y F E AT URE

Operational security consultants should have a broad understanding of risks and vulnerabilities involving people across a range of different socio-environmental circumstances. To this end, familiarity with contemporary thinking in the social sciences, in particular psychology, law, sociology, criminology and demography, is a noteworthy advantage. Of particular importance to the operational security risk specialist in the contemporary environment are demography and social-psychology, the study of populations and behaviours rooted in characteristics such as nationality, ethnicity, culture, ideology and religion. The forensic security consultant can specialise in all or any of the above areas, i.e. security management, physical security and/or operational security. Often referred to as an expert witness, the forensic security consultant will usually be engaged by lawyers involved in litigation, by insurance companies seeking to justify or defend a legal action, commissions of inquiry or litigants exploring the joining of a party involved in a security-related matter.

Selecting a security consultant The selection of a security consultant must be carefully thought through and balanced against the credentials and experience of potential candidates. Merely relying on a referred professional rather than considering the wider pool of potential security consultants can carry related levels of risk. Too often industry or professional referrals are based upon associations or friendships rather than an objective assessment of a particular consultant’s actual expertise and experience with the type of task at hand. When considering the engagement of a consultant, the first step should involve identifying clearly the type and scope of advice required. Properly done, this step will allow for a clearer sense of the type of security consultant,

for example security management, physical security, operational or forensic expertise, best suited to the job under consideration. From this preliminary analysis, the following steps should occur.

1. Contact a number of potential security consultants to determine their availability and interest.

2. In preliminary discussions about the proposed work consider: a. did the consultant understand the issues to be addressed? b. has the consultant recently conducted similar work? c. was the consultant able to express themselves clearly and in an informed manner, especially on the issues discussed? d. did the consultant engender a sense of confidence about their ability to foster and maintain a professionally satisfying relationship with the client for the duration of the project? e. did the consultant explain their methodologies and the timeframes encountered in similar projects? f. what insurance coverage does the consultant or consulting organisation have?

3. A copy of the consultant’s current curriculum vitae and brief information about their three most recent projects should be obtained.

4. Determine whether the jurisdiction within which the proposed project is required has licensing or registration requirements; and

5. Can the consultant provide three independent referees for whom previous work has been completed. These references should be checked.

Following each of these steps will enable an appropriate decision about which security professional would be best suited to delivering on the required outcomes. Once settled a formal proposal in writing should be obtained. Such proposal must be based upon a letter of instruction whereby consultant’s response can be gauged against the required work.

Checklist to Assess a Security Consultant Security licence or registration for the relevant jurisdiction

An assessment of the professional’s ability to effectively undertake the proposed security review

Government security clearance (if required)

A positive assessment of the professional’s written and oral communication skills

Evidence of education, qualifications, skills, and experience Professional association and affiliations Referee reports Previous experience conducting similar security reviews

2 8 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9

Impartiality/independence of advice (consider any commercial affiliations) Published professional/educational work (seek copies or references to such work).


S E C URIT Y FE ATU RE

Competence of a consultant is essential in achieving an appropriate outcome. Deficiencies in this area will result in a potentially flawed project and therefore increase rather than minimise risk. Hence, careful thought in the selection of a consultant is essential.

Costings Costings associated with the provision of security consulting services is similar to any other professional engagement. The best lawyers, accountants and medical practitioners charge according to their level of expertise. This is no different in security consulting as there are no set fees or costing standards in place. In general terms, costings align with the consultant’s expertise and level of expertise. Costings must be confirmed prior to the commencement of work and should be reflected within a Contract for Consulting Security Services. Consultants typically charge according to an hourly, daily or fixed rate. Hourly

Depending on the type and potential duration of a project, an hourly rate is either proposed as an approximate calculation (i.e. between 10 – 15 hours work), a set figure (i.e. 12 hours work), or as an additional rate for work outside a daily or fixed rate.

Daily

A day is usually 8 hours, but as this includes breaks the actual work day is somewhere between 6.5 to 7 hours. This rate is usually calculated according to an estimate of days taken to meet a client’s consulting requirements. For example, one week = 5 days at the daily rate of $? or four weeks = 5 days per week to a total of 20 days at the daily rate of $?

Fixed

A fixed rate is the total fee applied to the consulting project. Most clients prefer a fixed fee as it gives them costings certainty for a project.

It is common practice for there to be costing reductions on larger projects. However, this is ultimately a matter for the parties to negotiate as there will remain taxation, insurance, operational and related costs associated with such work and which must be taken into account when determining a final cost for a project. Invoicing is also influenced by the relevant project. On larger projects consultants will typically charge on completion at agreed stages. Again, this needs to be confirmed within the Contract for Consulting Security Services.

Conclusion Security consultants add independent expertise to any organisation provided the correct consultant is engaged. Competence of a consultant is essential in achieving an appropriate outcome. Deficiencies in this area will result in a potentially flawed project and therefore increase rather than minimise risk. Hence, careful thought in the selection of a consultant is essential. Typically, consultants should be experienced at a high level, have appropriate insurances and be currently competent. Any engagement of a security consultant should be in writing with objectives, parameters, reporting and costings clearly outlined and agreed upon at the outset of the project. It is important that careful planning is applied to the engagement of any consultant. Of course, reference checks and the quality of recent work must be considered prior to any formal engagement.

About the Author: For over 20 years Dr Tony Zalewski has been a security adviser to governments and commercial entities within Australia and abroad. He is also a recognised security expert in courts and the author of a recent publication “An Introduction to Operational Security Risk Management” available through gpsafety.com.au

SEC URI T Y I N SI DER | APR /MAY 2 019 2 9


SEC URIT Y F E AT URE

Lead Industry Partner

Executive Briefing Program The line-up of presenters for the Security 2019 Executive Briefing has been finalised.

DAY 2 | 25TH JULY 2019 9.00am -11.00am Executive Briefing 1

Executive Briefing 2

Executive Briefing 3

Occupational Violence and Aggression: Preparing Security Staff Through Proactive Measures

Video Surveillance Systems– How Upcoming Changes to Standards will Impact Planning, Tendering, Installation and Supply of Video Surveillance Systems

Tony Zalewski Director Global Public Safety

Arthur Barker General Manager T&L Enterprises

How to Develop a Robust Security Risk Culture

Dr Gavriel Schneider

Outcome-Based Video Surveillance Systems – What End Users Need to Know

Arthur Barker

Striking the Balance Between the Right to Privacy and Need for Video Surveillance

Kelly Sundberg

Safeguarding staff, operations, assets and infrastructure from increasing threats in the healthcare sector.

David Kortum

Group CEO Risk 2 Solution Group

12.30pm -2.30pm Executive Briefing 4

Executive Briefing 5

Executive Briefing 6

30 SEC U R I T Y I N S I D ER | A PR/ M AY 201 9

General Manager T&L Enterprises

Associate Professor Mount Royal University (Canada)

Director Triplex Acies Consulting


S E C URIT Y FE ATU RE

DAY 3 | 26TH JULY 2019 9.00am -11.00am Executive Briefing 7

Executive Briefing 8

Executive Briefing 9

Navigating a Complex Risk Environment – Managing the Challenges of Cyber and Physical Security Threats

Tony Vizza

Securing the Enterprise; Governance, Standards and Implementation

Jason Brown

Designing ‘secure’ buildings - Insights, Currrent and Future Practices

Director Cyber Security Advocacy - APAC, (ISC)², Inc

National Security Director Thales Australia

Kerran Campbell Director CCD Alliance Security Consultants

12.30pm -2.30pm Executive Briefing 10 Strengthening Security Capability - Forging Stronger Public and Private Partnerships

Nick A

Executive Briefing 11 Crowd & Event Management

Jim Fidler

Tony Daou

Director Secure Events and Assets

CEO/ Director iSec

Simone Elbeb General Manager Events, iSec

Luke Robinson Managing Director Platinum Event & Risk Services

BOOK NOW The conference and executive briefing program has sold out for the past three years, so book to secure your place. Visit securityexpo.com.au/asial-security-conference for more information or to register.

SEC URI T Y I N SI DER | APR /MAY 2 019 31


SEC URIT Y F E AT URE

National Police Alarm Activation Response Guideline Introduction The National Emergency Communications Working Group – Australia and New Zealand in consultation with the Australian Security Industry Association Limited have developed a National Police Alarm Activation Response Guideline (‘the Guideline’) to align police classification, requirements and response to alarms and alarm activations.

The Guideline provides a framework for: 33National consistency in the way in which Australian policing jurisdictions and security companies who are members of recognised security industry organisations define and respond to alarm activations; 33Processes and procedures for the handling of alarm responses; 33More efficient use of police resources. 33The objectives of the Guideline are to: 33Provide a consistent categorisation of alarm types; 33Provide a consistent alarm activation response priority; 33Identify those alarm types police may not respond to; 33Reduce the number of non-genuine alarm activations that police respond to; 33Define Alarm Monitoring Providers requirements for confirmation of genuine alarm activations.

Alarm Categories and Types 33Alarm category A: Hold Up Alarm – Commercial only; High Risk Premises Alarm; Monitored Personal Safety Alarm;

32 S EC U R I T Y I N S I D ER | A PR/ M AY 201 9

33Alarm category B: Multi-Sector / Multi-Break Alarms; Communication Failure; Single Sector Alarms at High Risk Premises; Duress Alarms; Vehicle Tracking Alarms; 33Alarm category C: Any alarm other than those listed above eg portable wireless devices, including pendants; 33Alarm category D: Multiple Sector Alarms, where there are no ready access to the premises; Single Sector Alarms - Non High Risk Premises; Flashing Blue Lights; Unmonitored Alarms; Vehicle Alarms; Fire or Smoke Sensor alarms; Medical Alarms and Power Failure/Low Battery.

Accredited Alarm Monitoring Provider Under the Guideline, police will respond to requests for assistance from accredited Alarm Monitoring Providers. For the purpose of this guideline, an accredited Alarm Monitoring Provider is defined as (i) being a current member of a recognised security industry organisation; (ii) complying with Australian Standard 2201.2 (as revised from time to time) monitoring centre certification and (iii) operates a telephone link in its alarm monitoring centre that is capable of showing Caller Line Identification (CLI) to the relevant police jurisdiction’s telephone links. Alarm systems are required to be maintained in accordance with the Australian Standard 2201.1: Intruder Alarm Systems – client’s premises: design, installation, commissioning and maintenance.


ASIAL GRADED SECURITY MONITORING CENTRES* CURRENT AS AT: 5TH MARCH 2019

COMPANY (SHORT FORM NAME)

STATE

CERT NO.

GRADE

EXPIRY

ADT Security

NSW

482

A1

02 Apr 2019

ADT Security (Data Centre)

NSW

483

A1

02 Apr 2019 29 Feb 2020

Allcare Monitoring Services

WA

499

A1

ARM Security Systems

WA

517

A1

27 Mar 2021

ART Security

VIC

508

A1

30 Sept 2020

Back2Base

QLD

509

A1

27 Sept 2020

BENS Wholesale Monitoring

NSW

512

A1

30 Jun 2019

VIC

488

A1

11 July 2019

Calamity Monitoring

Best Alarm and Monitoring Services

NSW

501

A2

21 Mar 2020

Central Monitoring Services

NSW

485

A1

06 Apr 2019

Chubb Monitoring Centre

NSW

498

A1

09 Mar 2020

VIC

503

C2

18 Mar 2020

Energize Australia

VIC

507

A1

15 Aug 2020

Glad Security Pty Ltd

Executive Security Solutions (Monitoring)

NSW

516

A2

25 Jan 2021

Golden Electronics

TAS

510

A1

16 Oct 2020

GRID Security

NSW

511

A1

15 Nov 2020

Instant Security

QLD

496

A1

13 Nov 2019

Linfox Armaguard

VIC

506

A1

14 Aug 2020

Mekina Technologies

TAS

500

A1

01 Nov 2019

Onwatch

NSW

486A

A1

20 April 2019

Paul-Tec (Australia)

NSW

489A

A1

1 Aug 2019

VIC

505

C2

01 Aug 2020

Protection Pacific Security RAA Security Services Secom Australia

SA

518

A1

14 Feb 2021

NSW

495

A1

14 Dec 2019

Sectrol Security

VIC

492

B2

25 Aug 2019

Securemonitoring

VIC

494

A1

23 Nov 2019

Security 1

ACT

515

A1

14 Feb 2021

Security Alarm Monitoring Service

SA

502

A1

18 Jun 2020

Security Control Room

VIC

491

A1

18 Aug 2019

SMC Australia

QLD

497

A1

10 Feb 2020

Spectus

WA

487

A1

04 May 2019

Staysafe SA

SA

513

A1

30 Apr 2020

Staysafe (Aust)

VIC

514

A1

1 Dec 2020

Telstra SNP Monitoring (Hamilton)

NSW

490A

A1

17 Aug 2019

Telstra SNP Monitoring (West Ryde)

NSW

504

A1

30 May 2020

Ultimate Security Australia

NSW

493A

A1

22 Sept 2019

The ASIAL Graded monitoring centres above have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 - 2004. PLEASE NOTE: ASIAL takes no responsibility for companies which MAY change the nature of their operations subsequent to Grading.

ASIAL CERTIFIED REDUNDANT MONITORING CENTRES CORE CENTRE

GRADE

CERTIFICATE

REDUNDANT LEVEL

EXPIRES

Chubb Monitoring Centres, Macquarie Park NSW

A1

R1

R1A

10 Feb 20

Security Monitoring Centres Australia, Salisbury QLD

A1

R2

R1A

10 Feb 20

SEC URI T Y I N SI DER | APR /MAY 2 019 33


HO T PRODUCT S

HOTPRODUCTS PSE-IL Illuminated Rugged Keypad A vandal and weather resistant keypad designed to be used in harsh environments. Add a PSE-IL to a PAC access controller to get the features of the Presco system, with the added benefit of rugged durability. • Suitable for indoor/outdoor usage • Durable and attractive metal keypad construction (chromed Zamak) • Vandal Resistant • Highly Weather Resistant • 12 or 24 Volt D.C. Backlighting • Compatible with Presco™ PAC access controllers and all other Presco™ decoders, the entire system uses low cost nonshielded cable and keypads can be up to 1 kilometer from the door controller (power supply and cable dependent)

• Only 12mm thick face when fitted • Easily surface mounted using NPPSE-SMT or flush mounted using NP-PSE-FMT • Two wire operation (third required for backlighting) • Audible confirmation of all actions • Designed and manufactured in Australia • 36 month manufacturer’s warranty

For further info and Distributor details contact NIDAC Security p  03 9808 6244 | www.presco.com.au

24/7 Colour IP Cameras Preserve colour details in challenging lighting with the latest 24/7 Colour IP cameras from VIP Vision™. 24/7 Colour cameras feature a large image sensor, wide f/1.0 aperture and no infrared illumination, providing colour images all day & night. Since these cameras have no infrared system, they require nearby external light sources for illumination in the dark. However, 24/7 Colour cameras only need light levels as low as 1 lux to capture accurate colour detail. Unlike infrared-illumination cameras, 24/7 Colour cameras preserve the colour of objects, people, clothing, vehicles & more. This colour detail is essential for usable video evidence.

34 SEC U R IT Y IN S IDE R | A PR/ M AY 201 9

To find out more   Visit www.rhino.com.au p


Upcoming ASIAL Events ROUND 2

22 May 2019

29 May 2019

30 May 2019

19 Jun 2019

11 Jul 2019

ROUND 3

12 Sep 2019

13 Sep 2019

9 Oct 2019

10 Oct 2019

13 Nov 2019

27 Nov 2019

5 Dec 2019

Event Details

Sponsor

NSW INDUSTRY BREAKFAST - SYDNEY Time: 7.30am-9.00am Venue: Holiday Inn Parramatta ACT INDUSTRY BREAKFAST - CANBERRA Time: 7.30am-9.00am Venue: Premier Hotel & Apartments TAS INDUSTRY BREAKFAST - HOBART Time: 7.30am-9.00am Venue: Hobart Function and Conference Centre QLD INDUSTRY BREAKFAST - BRISBANE Time: 7.30am-9.00am Venue: Hillstone St Lucia VIC INDUSTRY BREAKFAST - MELBOURNE Time: 7.30am-9.00am Venue: Batman’s Hill on Collins

Event Details SA INDUSTRY BREAKFAST - ADELAIDE Time: 7.30am-9.00am Venue: The Playford Hotel WA INDUSTRY BREAKFAST - PERTH Time: 7.30am-9.00am Venue: Northbridge Hotel ACT INDUSTRY BREAKFAST - CANBERRA Time: 7.30am-9.00am Venue: Premier Hotel & Apartments TAS INDUSTRY BREAKFAST - HOBART Time: 7.30am-9.00am Venue: Hobart Function and Conference Centre QLD INDUSTRY BREAKFAST - BRISBANE Time: 7.30am-9.00am Venue: Hillstone St Lucia NSW INDUSTRY BREAKFAST - SYDNEY Time: 7.30am-9.00am Venue: Holiday Inn Parramatta VIC INDUSTRY BREAKFAST - MELBOURNE Time: 7.30am-9.00am Venue: Batman’s Hill on Collins

SAVE THE DATE

To register, visit www.asial.com.au

Sponsor



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.