Security Insider Oct/Nov 2012

Page 1

INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

SECURITY

Page 1

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[ M AG A Z I N E ] VOL.17 | ISSUE.5 | OCT/NOV 2012

Economic crime trends: the era of cybercrime

61 26

PP255003/02390

Smoke detector/sensor installation guidelines


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 2


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 3


INSIDER_Oct/Nov 2012 Iss5_44pp

25/9/12

7:28 PM

Page 4

CONTENTS VOL.17 | ISSUE.5 | OCT/NOV 2012

18 ECONOMIC CRIME TRENDS: THE ERA OF CYBERCRIME

26

32

SMOKE DETECTOR / SENSOR INSTALLATION GUIDELINES

SURVEILLANCE DEVICES - ARE EMPLOYERS LOOKING ATALL OF THE IMPLICATIONS?

06 | Editor’s message 08 | Private Robert Poate 10 | Security Industry Leadership Program 10 | QLD – Compliance Audits 12 | NSW – Cash in Transit NSW Firearms Registry Announcement

12 | New Police Minister for WA 12 | 43rd ASIAL AGM 14 | Professional Recognition for Security Technicians 16 | Using technology to simplify super 17 | UK – Survey of the Security

ASIAL Strategic Partners >

4 //SECURITY INSIDER OCT/NOV 2012

35 THE ROLE OF SECURITY IN DESIGNING OUT CRIME

29 | 37 | 38 | 39 | 42 |

Sector ASIAL New Member Listing SIG 2012 Monitoring Centres List Hot Products ASIAL Calendar of events


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 5


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 6

EDITOR’S MESSAGE

‘COMPLIANCE’ IS NOT A DIRTYWORD

T

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by

he security industry is without

web sites and resources that can assist

doubt one of the more heavily

you in understanding and meeting your

regulated industry sectors in

compliance obligations.

Australia. Whilst compliance with legal

A case in point is a short fictional film

and regulatory requirements can often

called The Marker released recently by

seem a daunting and overwhelming

the Australian Competition and

task, failure to have in place compliance

Consumer Commission (ACCC).The film

systems and procedures will be to the

seeks to engage people at all levels of

detriment of your business.

business and educate them about the

As a business owner or manager, it can be all too easy to get caught up in the day-to-day running of the business,

make agreements to fix prices, rig bids,

high governance standards. In an

share markets or restrict outputs or

increasingly competitive business

supply. The film shows how cartel activity can

Clients expect faster turnaround times

ruin relationships, careers, reputations

and more innovative solutions. As a

and long term financial security, and may

result, pressure can be placed on

land guilty parties in jail. It also sheds

providers to make “quick fix" solutions in

light on the ACCC’s immunity program,

order to secure a client’s business.

which provides successful applicants

Often, such decisions can be made

with immunity from court proceedings in

without a full understanding of the

exchange for cooperation with ACCC

consequences on other areas of the

investigations.

As an operator of a security business it cannot be stated strongly enough how

Email: communications@asial.com.au Web: www.asial.com.au Publisher

Under Australian law, it is a criminal

time to plan strategically and maintain

compliance related.

Tel: 02 8425 4300 • Fax: 02 8425 4343

on participants.

at the expense of spending appropriate

business, both economic and

Association Limited PO Box 1338 Crows Nest, NSW 1585

devastating impact that cartels can have

offence for competing businesses to

environment expectations are changing.

The Australian Security Industry

Editor Bryan de Caires | security@asial.com.au Editorial Enquiries communications@asial.com.au Advertising Tania Laird | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 Digital | design@webfx2.com.au Editorial Contributors Malcolm Shackell, Andrea Perry, Chris Delaney, AusSuper and Dr Lindsay Asquith. Print + Distribution Nationwide Advertising Group

ASIAL encourages you to view this

Published bi-monthly

film (a link to the film can be found at www.asial.com.au). ‘Compliance’ is not a dirty word or

Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising

important it is that you fully understand

something to be feared. Rather, it should

your compliance obligations and have in

be an integral part of how you run your

otherwise stated with permission. All contributions

place appropriate systems and

business to ensure that it operates in a

are welcomed, though the publisher reserves the

procedures. If you don’t, then you need

sustainable and successful manner.

to seek help immediately. Putting things off won’t make the problem go away! That said, often the hardest step is the first step. So what should you do?

If you find it all too overwhelming, you

does not imply endorsement by ASIAL, unless

right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases to: security@asial.com.au.

can always call us on 1300 1ASIAL to

Internet

seek advice and support on your

advertising were correct at the time of printing.

compliance obligations. Remember, advice and support is

references

in

articles, stories

and

ASIAL does not accept responsibility for misleading views. Copyright© 2012 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without

To help you navigate through the

never more than a phone call away for

permission is strictly prohibited. Security Insider is

compliance maze, ASIAL’s online resource

ASIAL members.

a subscription based publication, rates and further details can be found at www.asial.com.au.

centre – the Centre for Compliance [Next Issue] DEC/JAN 12/13

(www.asial.com.au/CentreforCompliance) will help direct you to relevant information and links.There are many valuable

Bryan de Caires

Federal/State and Territory government

Editor

6 //SECURITY INSIDER OCT/NOV 2012

ISSN 1442-1720


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 7


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:02 PM

Page 8

INDUSTRY NeWS

PRIVATE ROBERT POATE ASIAL has passed on its

was posted as a rifleman to 6

condolences to the Poate family

RAR. Private Poate was a highly

following the announcement by

qualified soldier, having

the Australian Defence Force of

completed specialist training as

the tragic death on 29 August

a Protected Mobility Vehicle

2012 of their son/brother, Private

Driver in 2010 and Protected

Robert Poate on operations in

Mobility Vehicle Commander in

Afghanistan.

2011.

Robert’s father, Hugh Poate

He was known for having

was a long time ASIAL member,

outstanding leadership potential,

Director and Chairman of the

which led to him completing a

Association’s ACT branch.

promotion course for Corporal in

Private Robert Poate was a

2011. Private Poate had a

member of the 3rd Battalion, the

reputation for creating mischief

Royal Australian Regiment Task

without getting caught, and was

Group and was from the 6th

proud of his family, his military

Battalion, Royal Australian

service, his Canberran origins,

Regiment (6 RAR), based in

and his red hair, which he

Brisbane, Queensland. He

vehemently defended as being

enlisted in the Army in 2009. On

‘strawberry blonde’.

completion of his basic and initial employment training, he

8 //SECURITY INSIDER OCT/NOV 2012

He is survived by his parents and sister.


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 9


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 10

INDUSTRY NeWS

SECURITY INDUSTRY LEADERSHIP PROGRAM Designed specifically for managers and business owners in the security industry, the program focuses on developing the skills of the industry’s future leaders. Featuring an exceptional teaching faculty, the three-day program provides practical and interactive insights into the key factors to successfully managing and growing a security business. • Day 1: Strategy & marketing • Day 2: Finance for managers • Day 3: Leading and managing people The program will focus on developing practical skills that you can apply at a personal, business and national industry level.These include an understanding of how to: • communicate effectively • develop high performance teams • drive change • brand and differentiate the product or service you offer

• manage conflict • identify the key elements that underpin the financial health of your business • use key principles of financial management to make effective business decisions Teaching faculty Chris Clark is a strategist, who teaches corporate strategy and strategic marketing at Macquarie University, including fifteen years teaching on the MBA program of the Macquarie Graduate School of Management, where he was until 2006 the Director of Corporate and Executive Education. From 20022004 he was director of the MBA program. He is also a consultant to some of Australia’s leading companies, across a wide range of industries, who draw on his problem solving and facilitation skills.

Graham Godbee has been a lecturer in finance at Macquarie University Graduate School of Management and remains Visiting Fellow in the Centre for Money, Banking and Finance at Macquarie University. He has held executive management positions in large corporates in the roles of business development, marketing and finance. Associate Professor Peter McGraw is Director of the LabourManagement Studies Foundation and a faculty member in the Department of Business, Faculty of Business and Economics at Macquarie University. The program will be held in Sydney (23-25 October 2012), Macquarie Graduate School of Management Executive Hotel and Conference Centre and Melbourne (19-21 February 2013), Melbourne Business School.

QLD – COMPLIANCE AUDITS Amendments to the Security Providers Act 1993 which came into effect in February 2011 provided a role for peak security industry bodies to take on a compliance role to assist the Office of FairTrading in its regulation of the private security industry in Queensland. As a condition of approval as an Approved Security Industry Association, ASIAL is required to assess compliance of its members to the Code of Conduct approved by the Chief Executive of the Office of Fair Trading at least once every 3 years. ASIAL has appointed a chartered accountancy firm to conduct compliance audits of its members.To assist members in preparing for these audits, ASIAL has prepared an Audit Compliance Guide which sets out the information which we require from you when requested.This includes:

10 //SECURITY INSIDER OCT/NOV 2012

• Compliance Audit Overview which outlines your obligations and those of ASIAL. • Compliance Audit Form which must be completed and returned by the date requested; supporting documentation (including certified copies of specified documentation); a declaration of Compliance; a signed reaffirmation of the ASIAL Code of Professional Conduct; and a signed Statutory Declaration stating that the information provided is true and accurate (this must be certified by a Justice of the Peace/Commissioner for Declarations). All information provided will be treated strictly in confidence. Members will be notified of the outcome within 3 months completion of their compliance audit. If unsuccessful, members will be

advised of the areas of noncompliance and will be provided with an opportunity to rectify them. Failure to rectify identified non-compliance issues as a result of the audit or failure to complete and return the audit form by the specified date, may result in your firm being deemed as noncompliant. ASIAL is required to report to the Office of FairTrading the findings of each audit. Should you have any queries about the compliance audit process contact us on 131 ASIAL or email security@asial.com.au.


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 11


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 12

INDUSTRY NeWS

NSW – CASH IN TRANSIT NSW FIREARMS REGISTRY ANNOUNCEMENT Following enquiries made by ASIAL concerning Firearms business licences and references to the Cash Transportation (Non-Armoured Vehicles) Interim Award No. 2 Cash limits, the Firearms Registry has advised that: “Armed Security Firms authorised to possess and use firearms whilst performing ‘Cash in Transit’ activities currently have the following condition endorsed on the business licence, ‘must comply with cash in transit (State) Award including cash limits.’

On 29 July 2011 the Cash Transportation (Non-Armoured Vehicles) Interim Award No. 2 was terminated consequently this requirement is no longer applicable. However compliance with the WorkCover Cash in Transit Code of Practice will continue to apply. It should be noted, item 3.3.6 within this document provides – ‘Cash limits for each CIT operation are to be determined in accordance with the safety and security risk assessment’. In this regard, all future Risk

AFAC / ASIAL SMOKE DETECTOR/SENSOR INSTALLATION GUIDELINES As a joint initiative, the Australasian Fire and Emergency Service Authorities Council (AFAC) and the Australian Security Industry Association Limited (ASIAL) have recently released smoke detector/sensor installation guidelines. The guidelines have been developed to assist security companies in installing, servicing and monitoring smoke detectors/sensors connected to security alarm systems in an appropriate manner, without requiring detailed knowledge of fire alarm standards, individual

state regulations or building codes. A PDF copy of the guidelines can be downloaded by visiting www.asial.com.au, alternatively you can turn to page 26 to view a copy. Representatives from the various state and territory fire services will provide an update on the guidelines at the coming series of ASIAL Industry Breakfast Briefings around the country.

ACT – SECURITY INDUSTRY WORKPLACE INFORMATION REQUIREMENT The Security Industry Amendment Act 2010 expanded the suitability criteria and prerequisites for individuals applying for a licence to work in the security industry.The amendments included the requirement for applicants to attend a face-to-face workplace information

12 //SECURITY INSIDER OCT/NOV 2012

session about their employment rights and obligations with representatives of a registered organisation (usually union officials). Following a recent review, the ACT Government has decided that the Security Industry Workplace Information requirement should continue.

Assessments undertaken for each Cash in Transit activity must address the cash limits.

43RD ASIAL ANNUAL GENERAL MEETING ASIAL’s 43rd Annual General Meeting will be held on Wednesday, 28 November 2012 from 8.45am at the Mantra Hotel (Cnr Parkes and Valentine St) Parramatta. A ballot for Directors of the Association will be conducted by the Australian Electoral Commission during October.

NEW POLICE MINISTER FOR WA The Hon Liza Fraser MLA (pictured) has been appointed as the new Minister for Police and Emergency Services in WA.The Minister will be ASIAL’s special guest at its upcoming industry breakfast briefing in Perth on the 19th October.


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 13


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 14

INDUSTRY NeWS

PROFESSIONAL RECOGNITION FOR SECURITY TECHNICIANS The SecurityTechnician Certification (STC) program is an ASIAL industry initiative to provide a training course that offers professional recognition and an industry recognised career pathway for technicians working in the security industry. The STC credential is a technical certification program that covers alarms, access control and CCTV. Through a combination of selfpaced study, face-to-face theory and practical assessments at approved assessment centres (located in Adelaide, Brisbane, Melbourne, Sydney and Perth), participants are required to demonstrate their theory and practical skills. Designed to provide a career pathway for security technicians, the program is also a proactive initiative to attract and retain appropriately skilled workers capable of meeting the future needs of the industry. Units associated with the program can be recognised as competency based units under the Australian Quality Training Framework.

The program incorporates 3 levels of recognition: - Certified SecurityTechnician - Advanced SecurityTechnician - Master SecurityTechnician Certification benefits for individuals • Professional development - The acquisition of knowledge and skills demonstrates your commitment to self improvement, which increases your career prospects in the security industry. • Demonstrates your industry readiness – Proves your capability and expertise to work within the security industry. • Career advancement – Supports career path development and opens doors. • Targets and builds upon the skills you have as an industry professional Certification benefits for employers • Competitive advantage – provides a mechanism to recognise staff

ACT – PORTABLE LONG SERVICE LEAVE SCHEME The ACT Minister for Industrial Relations has signed a Legislative

14 //SECURITY INSIDER OCT/NOV 2012

Instrument that sets the levy payable by employers, at 1.47% of ordinary salaries. The portable long service leave scheme will come into effect from 1 January 2013, with the first installments due in March 2013.The scheme will apply to all security manpower employees (by license category) in the ACT; contributions will be paid quarterly into the fund and the scheme pays for long service leave (pro rate) when taken.

expertise and maintain the currency of skills. • Recruiting standard – provides an industry skills threshold and an easy way to recognize skill qualifications gained by candidates. • Professional development – provides a pathway for the development and retention of valued employees. • Quality – provides a mechanism to improve operational efficiency and enhance customer satisfaction. For more information visit www.securitytechniciancertification. com.au

FWO UPDATE Representatives from the Fair Work Ombudsman will address the upcoming ASIAL Industry Briefings on FWO’s audit priorities and the outcomes of the recent security audit campaign. For more information on the upcoming ASIAL Industry Briefings around the country, turn to page 42.

2012 ASIAL Annual & Financial Report ASIAL's 2012 Annual and Financial Report can be viewed at www.asial.com.au/ar


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 15

INDUSTRY NeWS

VIC – PRIVATE SECURITY BUSINESS FORUM INVITATION The Licensing & Regulation

these risks.This invitation is

Concourse Meeting Room, Adjacent

Division is extending an invitation to

extended to all managers and

to Tower 4 lifts, World Trade Centre,

all Private Security Business

supervisors within your security

18 – 38 Siddeley Street, Docklands.

Licence & Registration holders to

business. An agenda for the Forum

attend a Private Security Business

will be listed on our website at

forum please provide your name

Forum.

www.police.vic.gov.au/Private

and mobile number via email to

Security/News and Publications.

karin.rethwisch@police.vic.gov.au by

The Forum will focus on risks that

If you would like to attend this

are currently impacting on security

The Forum will be held on

businesses and provide strategies

Thursday 25th October 2012

can be recorded for catering and

to assist businesses to minimise

(1:30pm to 4:30 pm) in the

communication purposes.

20 October 2012 so that numbers

2013 AUSTRALIAN SECURITY INDUSTRY AWARDS FOR EXCELLENCE Nominations will open shortly for the 2013 Australian Security Industry Awards for Excellence. Award categories include: Individual • Individual Achievement – General Security • Individual Achievement – Technical Security

• Security Student of the Year

• Special Security Event or Project

Organisational • Security Management • In-House SecurityTeam • Training • Integrated Security Solution (projects above $250,000) • Technical Security Solution (projects below $250,000)

The awards will be presented at the Park Hyatt Hotel Melbourne on the 2nd May 2013. Further details on the awards are available at www.asial.com.au/awardsforexcellence or by emailing marketing@asial.com.au

SECURITY INSIDER OCT/NOV 2012// 15


INSIDER_Oct/Nov 2012 Iss5_44pp

26/9/12

11:15 AM

Page 16

AUSTRALIAN SUPER

USING TECHNOLOGY TO SIMPLIFY SUPER Stronger Super – part of the Government’s super reforms – aims to make the super system easier to administer and focuses on technology to drive efficiencies. The reforms will start to roll out over the coming 12 months. But with our secure online solutions, you can save time now and get ready before Stronger Super starts. To get the most out of an online solution you first need to ask two questions. How many employees do I pay for? And do I pay super to more than one fund? Using AustralianSuper’s online options to make single payments For all your employees in AustralianSuper, you can use our easy and secure online solutions to manage your super obligations. AustralianSuper has two online systems that participating employers can use to send contribution details:

• EmployerOnline Who? Good if you have less than 30 employees. How?You enter employee details once and then just update the contribution amount for each payment period. • Super FileManager Who? For any size business that uses an electronic payroll system. How?You upload a payroll file so you never need to re-key contribution information.

employer number. Or call us on 1300 300 273 and we can help.

These online options both work well with paying electronically – BPAY®, Electronic Funds Transfer, direct debit and Postbillpay® – and will save you from possible future penalties for paying contributions by cheque under the new reforms.

To use QuickSuper free-of-charge: • you must be a participating employer of AustralianSuper • AustralianSuper must be your default fund, and • at least half of the total number of your employees must be members of AustralianSuper.

To get started online go to www.australiansuper.com/PaySupe r and sign up.This only takes a minute or two and you’ll need your

Using a clearing house to pay super to other funds To help make paying super to other funds easier, we offer you access to a free clearing house facility. QuickSuper – provided and managed by Westpac – is a simple and secure way to pay and manage the super contributions for your employees who aren’t members of AustralianSuper.

For more details or to register go to www.australiansuper.com/ClearingHo use or call us on 1300 300 273.

BPAY is registered to BPAY Pty Ltd ABN 69 079 137 518. Postbillpay is registered to the Australian Postal Corporation ABN 28 864 970 579.

16 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 17

INDUSTRY NeWS

SURVEY OF THE SECURITY SECTOR Every year Perpetuity Research in the UK undertakes a research project for the Security Research Initiative (SRI). This year's report is based on the findings of three groups: corporate security specialists who buy security, contract security company managers, and security operatives (particularly guards). Findings from the survey of corporate security specialists: • Over two fifths of the 209 specialists surveyed admitted they felt that security was viewed as a 'grudge purchase' and most accepted that security was a low priority. • They felt that in house services were of a higher quality but that contract services were better value for money. • The research suggests the need for the contract security sector to provide more evidence of its effectiveness and value against a background where those buying security need to be persuaded. Findings from contract security company managers: • Managers were concerned about how security was perceived. Almost two thirds felt 'low margins change the focus of contract security directors/managers from security to cost control'. • Over two thirds of 509

directors/managers cited the need to cut costs as a reason for severing contracts or changing suppliers. • When asked about reasons for staff leaving contract security work managers /directors cited poor pay, limited development opportunities, and lack of appreciation as the main push factors. Findings from security operatives: • Most security guards have their licensing fee paid for by their employers.

• A quarter of security guards work more than 60 hours a week. • Over half of the 504 operatives surveyed agreed that 'most of my colleagues are totally committed to providing a quality service'. As Professor Martin Gill who led the study noted: "Security is facing a challenging time...The security sector needs to respond in a more coordinated way in highlighting with evidence what you get from a good security company that you don't get from a bad one".

This report is available and can be requested via prci@perpetuitygroup.com or visit www.perpetuityresearch.com/sri.html.

SECURITY INSIDER OCT/NOV 2012// 17


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:03 PM

Page 18

CYBERCRIME

ECONOMIC CRIME TRENDS: THE ERA OF CYBERCRIME By Malcolm Shackell and Andrea Perry

Just under half (47%) of Australian organisations have experienced at least one economic crime incident over the past 12 months. This is up from 40% in the last PwC survey in 2009 and above the global average of 34%. More than 50% of the Australian organisations experiencing fraud had more than 10 incidents of fraud, and 16% suffered combined losses of more than $5 million. The raises the question: is there more fraud in Australia or are we better at detecting fraud? The answer is a bit of both.

CYBERC 18 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 19

CYBERCRIME

RCRIME SECURITY INSIDER OCT/NOV 2012// 19


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 20

W

CYBERCRIME

hat is particularly interesting is the rapid rise in cybercrime – defined as any economic crime where a computer or the internet plays a central role in the crime. Cybercrime is now globally ranked the fourth most common form of economic crime. In Australia it is ranked the second with 63% of respondents perceiving the risk of cybercrime to have increased over the last 12 months.

our clients about why there is this apparent shift. Our experience tells us that people are experiencing a higher level of financial hardship in the current environment (the “need” factor) and as always, greed remains a factor. Regardless of the reasons, employees are taking advantage of control weaknesses in organisations to commitment fraud. We can build a profile of an internal fraudster based on the survey responses we received.The average fraudster (55%) is

The survey

usually young (in their 30s), but with enough experience to

The PwC Global Economic Crime Survey has been

understand the systems and controls in an organisation.They

conducted every two years since 1999 and in Australia since

are typically in some sort of management role (90%), or at

2001. It is one of the largest and most comprehensive surveys

least in a position where they can influence the way money or

of its kind surveying just under 3,900 organisations in 78

assets leave an organisation.They are usually male (75%),

countries.The global and Australian surveys were last

though not exclusively so. Recent major frauds we have seen

released in 2009.

have been committed by both sexes, and the male to female

Respondents were asked about the types of economic

ratio may mirror the gender ratio in many organisations.

crimes they had suffered during 2011.The top four economic crimes experienced in Australia were asset misappropriation,

Hotspot 1: Asset misappropriation

accounting fraud, bribery and corruption and cybercrime.

Asset misappropriation includes theft of funds, cash and

Asset misappropriation was the most common crime,

assets and this type of economic crime is one of the

experienced by 86% of respondents.This has been the case

The increase of internal fraudsters has elicited queries from our clients about why there is this apparent shift. Our experience tells us that people are experiencing a higher level of financial hardship in the current environment (the “need” factor) and as always, greed remains a factor. throughout the history of the survey with this category

consistent crimes we see every day in our business. Over the

increasing from 64% in 2003.

last year there is no doubt that we have seen a rise in

The survey has identified trends in economic crime with

corporate theft of one form or another, but there are three

global reports of cybercrime and bribery and corruption on

types of fraud we are seeing most often: (1) Employee

the rise.This is due to a combination of factors including

expense fraud – we have seen a significant increase in this

increased publicity of these issues and changes in legislation

type of fraud, potentially because of the ease in which it can

such as the UK Bribery Act.

be committed when controls are not enforced.The size of some of these frauds is surprising, with organisational losses

Who is committing fraud?

running into the $100,000s in many cases. (2) Fraudulent

A significant feature of the latest survey results is the apparent

invoicing / suppliers – this method of economic crime

shift towards internal fraud, as opposed to external fraud. In

remains the most common way for employees to

Australia 54% of reported economic crimes were committed

misappropriate funds.This type of fraud usually involves

by internal fraudsters, increasing from 33% in the last survey

conflicts of interest and fraudulent invoice approvals. Recently

in 2009.These statistics mirror what we are seeing in our

there has also been increasing evidence of manipulation of

work, particularly regarding asset misappropriation where we

electronic records such as payment files. (3) Asset write down

find the majority of this economic crime is commitment by

and theft – we have seen an increase in the occurrence of

internal fraudsters.The exception to this trend is financial

high value assets being fraudulently written down to zero and

services, telecommunications and retail industries, where

then on sold for scrap or on auction sites by employees.This

external fraud remains the main concern.

is a particularly problem in the construction, mining and

The increase of internal fraudsters has elicited queries from

20 //SECURITY INSIDER OCT/NOV 2012

telecommunications industries. It is important for


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 21

CYBERCRIME

organisations to review the way they mitigate the risks associated with the write down and disposal of assets.

Hotspot 2: Cybercrime One of the more remarkable insights from the survey was the increase in cybercrime, and respondents are seeing this risk predominantly as an external risk.The vast majority of what we are seeing in cybercrime relates to improper access to and/or theft of electronic information that has value (monetary, competitive advantage, reputation).There are 5 different “motives” for this. 1. Insiders (employees or contractors) who have authorised access to systems, and abuse this access for personal gain (usually employee fraud).This form of cybercrime is closely linked to asset misappropriation, with the increased use of technology creating new avenues for this traditional fraud. 2. Competitors seeking unfair advantage through theft of or access to confidential information.This has occurred in Australia, however to a much lesser extent than in some

cybercrime techniques used are often extremely sophisticated and difficult to detect. 4. Trans-national criminal enterprises stealing and / or extorting information to generate income.This is arguably the most common type of external cybercrime and is the focus of many IT Security professionals.There have been many high profile examples of this type of crime.These incidents are usually associated with major financial and reputational damage to the targeted organisation. Customer information is a highly commoditised item on the information black-market with credit card details selling for approximately $25 and higher prices for matching email addresses and passwords. 5. Hactivists protesting against organisational actions or policies.This type of motivation has been on the rise, with the most notable example being the ‘Anonymous’ hackivist attack on Visa.com and Mastercard.com as part of “Operation Payback” in response to Matercard,Visa, Paypal and a number of other payment processing companies stopping donation transactions to the WikiLeaks group.

other countries. Most of what occurs in this category is in relation to disgruntled employees. 3. Foreign governments committing espionage for political or economic gain. Similar to the previous category this has occurred, by is primarily focussed in countries where the line between government and businesses is “blurred”. The

Our experience is that most organisations treat cybercrime as an “IT issue”, when really it is a whole of business issue. Often when we are called in to manage a cybercrime incident we find it is more extensive than originally believed, with victims often being targeted over a lengthy period. When an

SECURITY INSIDER OCT/NOV 2012// 21


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 22

CYBERCRIME

incident occurs we recommend that organisations “assume a

government officials overseas (by the organisation or their

position of compromise” rather than assuming their ITsecurity

agents). Most of the incidents we see involve bribery through

procedures are adequate. Having a three step strategy for

local agents or through sales staff expenses. In these cases is it

protecting against and responding to cybercrime is effective.

rare that Australian executives or the Board are aware of the

1. Have an incident response plan ready to go as soon as an

bribery, although this does not mitigate reputational risk.

incident is suspected.This should include when and which specialists to involve. 2. Ensure there is cyber security awareness in the organisation

Organisations should be aware that changes to anti-bribery legislation are looming.The UK Bribery Act is now law and this legislation is much more rigorous than the current Australian

as this goes a long way to delaying or stopping threats.

or United States bribery legislation.There is a strong belief that

Regular training and well resourced security goes a long way.

the Australian and United States governments are under

Many organisations continue to remain very reactive – either because they just hope a problem won’t occur or because they don’t have the resources or understanding to implement preventative techniques and detective controls. 3. Involve senior level leadership such as the Board and CEO.

pressure to strengthen their anti-bribery laws, potentially to

This will encourage the “tone from the top” that is so vital for

bring them into line with the UK. There are 4 key differences

any type of risk awareness.

between our laws and the UK legislation: 1. There are no exemptions for“facilitation payments” – this will

Hotspot 3: Bribery and corruption

have significant impact on companies operating in

Recent media has highlighted the risks that Australian

Indonesia, for example, where minor value facilitation

businesses face when operating in countries where the risk of bribery is high.Whilst it could be said that the actual risk of bribery has not changed, the consequences of being exposed to bribery and corruption have been heightened. Under current Australian legislation, the risk for Australian organisations is in relation to the payment of bribes to

22 //SECURITY INSIDER OCT/NOV 2012

payments are commonly paid. 2. “Private to private” bribery is covered – this is as opposed to Australian and United States legislation which is focussed on bribery of foreign officials. 3. A new offence of “failure to prevent” – this means that executives and boards cannot just blame rogue


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 23


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 24

CYBERCRIME

employees. Organisations have a duty to have “adequate

Summary

procedures”, and there is official guidance on what

The PwC Global Economic Crime Survey has shown the ever

prevention means.

increasing impact of fraud from both a value and volume

4. The legislation casts a “wide net’ – which means

perspective. Most significantly the survey brought to focus the

organisations do not have to have significant operations

emergence of cybercrime. Incidents of cybercrime have rapidly

within the UK to be covered by the UK Bribery Act in every

risen in Australia and many organisations are struggling to stay

other operational location.

one step ahead. Particularly in the current environment, all Australian

Prevention and detection

organisations should consider the economic crime risks within

We are regularly asked to advise clients on steps to avoid

their operations and their capabilities to proactively mitigate

being an economic crime statistic.The key is establishing

these risks.

a fraud control framework which broadly covers three components: prevention, detection and incident management.The framework should include sound policies and training, due diligence procedures to ensure you know more about those you do with business with (prevention), having a robust control environment with detective controls and avenues for whistleblowing (detection) and lastly, understand what you have to do quickly should a problem occur (incident management). Many organisations continue to remain very reactive – either because they just hope a problem won’t occur or because they don’t have the resources or understanding to implement preventative techniques and detective controls.There have been some positive trends emerging regarding our ability to detect fraud, with the majority of survey respondents stating they had performed a fraud risk assessment (which is in our view a vital tool in fraud control). Interestingly, whistleblower techniques and suspicious transactions analysis (or fraud focused data analytics) are being employed more often. In our work we are seeing increasing demand in these areas.

Andrea Perry is a Senior Consultant in the PwC Forensic Services practice specialising in forensic accounting, investigations and corporate intelligence.

Malcolm Shackell is a partner in PwC’s forensics practice with over 20 years experience in the prevention,detection and investigation of economic crime.

24 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 25


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 26

SMOKE DETECTORS

A joint initiative

Guidelines for the installation and servicing of smoke detectors/sensors connected to residential and commercial security systems. The following Guidelines have been

hard wired smoke alarms in premises.

should always be at the discretion of the customer and a cost may be

agreed between the Australasian 1. If the security company is unsure of

incurred when the fire brigade

Authorities Council (AFAC) and the

the legal/regulatory requirements for

attends a false alarm. Security

Australian Security Industry

the installation concerned, it should

companies should ensure their

Association Limited (ASIAL).They

request that the customer obtains

customers are aware that fire

are intended to assist a security

clarification from an appropriate fire

brigades in many states may charge

company to install, service and

professional before proceeding. If

either the security provider or their

monitor smoke detectors/sensors

the building to be protected is a

clients for callouts to false smoke

connected to security alarm

new or recently constructed

alarm activations.

systems in an appropriate manner,

building, the customer should obtain

without requiring detailed

a specification for the smoke

knowledge of fire alarm standards,

detection requirements before

connected to security systems

individual state regulations or

proceeding.

should only be supplementary

Fire and Emergency Service

systems and, as such, if large

building codes. Outside of installed fire safety

5. Smoke detectors/sensors

2. As a general rule, a security

numbers of detectors are required

systems engineered to the

company should never install smoke

(e.g. more than 5) or the number of

requirements of Australian/New

detectors/sensors if the installation

smoke detectors /sensors is greater

Zealand Standards, the purpose of a

is required by legislation, as the

than the number of security devices,

smoke detector is to detect the

installation by the security company

the client should obtain advice from

presence of smoke and alert persons

may not meet the requirements of

an appropriate fire professional.

on site only. It is important to note that

that legislation. If the customer

smoke detectors/sensors that are

advises that the detectors /sensors

connected to a burglar alarm have not

are required by legislation, they

used to control other functions as a

been designed to meet the specific

should be directed to an

result of the detection of smoke

technical requirements of a system

appropriate fire professional for

(e.g. activation of door closers,

intended to respond to the fire brigade.

advice before proceeding.

smoke exhaust or shut down of air conditioning). If this is required, the

These Guidelines are prepared on the basis that the intent of including

6. The security system should never be

3. A security alarm system should

customer should be advised to

smoke detectors / sensors in a

never be used as the primary

obtain advice from an appropriate

security system is to provide some

monitoring method for buildings that

fire professional.

additional protection in addition to any

are required under

mandatory fire safety requirements.

legislation/building codes to have a

Including smoke detectors in a

monitored smoke detection system.

26 //SECURITY INSIDER OCT/NOV 2012

customer they still wish to proceed with monitoring of the smoke

security system may not fulfill mandatory legislative requirements for

7. If after providing this advice to the

4. A request to call the fire brigade

detectors /sensors connected to a


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 27

SMOKE DETECTORS

security alarm system it is

use of the products they install as

test the whole system if

recommended that the security

listed below:

maintenance is not performed by

company should have the client

• There are various types of

sign an appropriate disclaimer.This

smoke detectors/sensors

disclaimer should contain the

available, from the battery-only

following as a minimum:

the security company. 11.All smoke detection/sensor cabling

version to the mains-powered

must be performed in compliance

7.1. The installation is not

type installed by electricians.

with Australian Communications

intended to meet any

• The security industry uses the

and Media Authority (ACMA)

requirements of any Act,

power from the alarm panel as

regulations.

Regulation or Building Code in

the primary source and must

regards to a fire detection

have a separate battery supply

system including any legal

onboard or on the system.

maintain a log of all smoke

requirement to have hard-wired

• The selection of the correct

detector work performed, as is

smoke alarms in the premises.

detector/sensor is based on the

required under AS/NZS

7.2. Security alarm monitoring

purpose of the installation.

2201.1:2007, Intruder alarm systems

centres are not approved fire

• The type of transmission path

– Part 1: Client’s premises –

alarm monitoring centres and,

used to monitor the alarm

Design, installation, commissioning

whilst they will carry out their

system, which may include

and maintenance.

instructions to the best of their

smoke detectors/sensors, should

ability, they cannot guarantee that

be based on the risk rating of the

the fire brigade will attend any

premises and, therefore, the

with the above service must be in

specific alarm.

Class from 1 to 5 (covered in

compliance with AS/ACIF

7.3. If the client requests

AS/NZS 2201.5:2008 – Alarm

S009:2006 (telecommunications

attendance of the fire brigade or

Transmission Systems).

cabling Wiring Rules) and all other

authorises the monitoring

• For fire monitoring systems, it

requirements of the Australian

company to request attendance

is important to know that

Communications and Media

of the fire brigade, any costs

constant monitoring is available.

Authority (ACMA) Cabling Provider

associated with this attendance

This is normally relevant to Class

Rules.

will be the responsibility of the

3, 4 and 5 in the above Standard.

client.

• Monitoring of smoke

Special note:

detectors/sensors in an intruder

In some circumstances the fire alarm

alarm system when coded for

panel may also be monitored by a

to service existing customers, or

regulatory or insurance reasons

security monitoring centre as a

customers at whose premises they

should be performed by a

failsafe feature. A fire technician

did not install detectors/ sensors,

monitoring centre independently

working on the system should notify

8. If the security company is required

12.The security company should

13. All customer cabling associated

they should obtain a similar waiver,

graded to AS 2201.2:2004,

the Facility Manager, isolate the Alarm

as per item 7 above, before

Monitoring Centres.

Signalling Equipment (ASE) and also

commencing work.

notify the security monitoring centre 10. Recommendation should be made

to avoid unnecessary false alarm

to the client to maintain the system

responses from the fire brigade.

recommended that heat detectors

to the manufacturer’s

Details of the security monitoring

not be connected to security alarm

recommendations, even if

centre should be kept on the front of

systems. However, if suitable for a

maintenance is not requested by

the fire panel log book.

semi-external environment, they may

the client. AS/NZS 2201.1:2007

be used in an attached garage.The

recommends maintenance be

security company needs to ensure

carried out but it is not mandatory.

Guide is available for download on

that their sales, installation and

Where smoke detectors/sensors

the ASIAL website or you can email

service staff have been

are installed the client should be

security@asial.com.au to request

appropriately trained in the correct

made aware of their responsibility to

your copy.

9. In normal circumstances, it is

A PDF version of the Installers

SECURITY INSIDER OCT/NOV 2012// 27


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 28

SMOKE DETECTORS

A joint initiative

Smoke Detectors/Alarms connected to Monitored Security Systems Information Guide for Residential Properties Purpose of a Smoke Detector/Sensor The purpose of any smoke detector sensor in your home is to detect the presence of smoke and sound an alarm which in turn provides early warning of a fire so that you and your family can get out safely. It is not designed to call the fire service.

Why have your Smoke Detectors/Sensors monitored by a security company? Some people prefer that their smoke detectors/sensors are connected to their security system and monitored by a security company.This allows the security company to call you or a nominated person if a problem arises in your home.You may also request that your security company calls the fire service for you. If you request this service the fire service may charge for attendance if it turns out that there is no fire.The fire service may also have to force entry into your home if they

installation of smoke alarms vary from

suspect a fire.

state to state.Your local fire service

For all consumer installation, monitoring and maintenance

and in some cases your local council

information, refer to the system

What you need to know:

can provide advice regarding the

manufacturer or your security service

Fire Services may charge a fee for

requirements. If you install a smoke

provider.

callouts initiated by security

detector/alarm connected to your

companies on your behalf if there has

security system, it must be in addition

been no sign of fire when they arrive.

to the smoke alarms required to be

the ASIAL website or you can email

In some states this fee is over $1000.

installed to meet mandatory legislative

security@asial.com.au to request

requirements in your state.

your copy.

The legislative requirements for the

28 //SECURITY INSIDER OCT/NOV 2012

A PDF version of the Consumer Guide is available for download on


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 29

ASIAL NEW MEMBERS

WELCOMETO OUR NEW MEMBERS ASIAL is pleased to welcome the following new members (including Corporate, Associate and Affiliate members) who have joined the Association over the past few months. CORPORATE MEMBERS

Blue Security Qld

Endura Security Pty Ltd

Admiral Security Services

BlueCorp Security

Evolution Traffic Control Pty Ltd

Advanced Communications Riverina

Bluestar Security Services

FalconCorp Security Services Pty Ltd

Agilient Pty Ltd

Britech Security Pty Ltd

Forebode

AIG Security Pty Ltd

Casa Security

Foresight Security Planning Pty Ltd

Alert Venue Services Pty Ltd

Cato Logistics Pty Ltd

Fortress Security Solutions

Alied Security Solutions Pty Ltd

CCTV Express Pty Ltd

Get Smart Gadgets

Allcorp Security Pty Ltd

CCTV Online Security

GROUP 3 SECURITY

Allied Security Australia Pty Ltd

CDIK Pty Ltd

Group Force Security Pty Ltd

All-Locks Master Locksmiths Pty Ltd

Celebrity Security Pty Ltd

Grouped Property Services Pty Ltd

APS - Ability Protection Services Pty Ltd

CG security

GTE Security Services

APSE Group

CMS Data & Electrical Engineering

Guard Dog Security Services

Arc Security Systems Pty Ltd

Pty Ltd

Guard19 Security Group

Archangel Security

Communicable Pty Ltd

Guardian Alarms

Aspect Group (WA) Pty Ltd

Comsecure Australia

Guardian Security Solutions

Ausi Security Solutions

Conceptual Technology Solutions

H & H Security Australia Pty Ltd

Australia Wide Security and Protection

Pty Limited

Haven Protection Services

AUSTRALIAN AIR HOLIDAYS

CounterThreat Security Services Pty Ltd

& Investigations

Australian Operational Security Service

Coupar Angus Security

Holler Security Services

Australian School of Security and

CPD Consulting

I Spy Security Services Pty Ltd

Investigations

Cross Link Security Pty Ltd

Insperata Integrated Systems Pty Ltd

Authorized Security Pty Ltd

CSI Security Australia

Integra Security Solutions PTY LTD

Base Security Pty Ltd

Customised Security Group Pty Ltd

Intellectual Synergy Pty Ltd

Basec Pty Limited

Digimax Security Pty Ltd

Intercept Security

Bens Data Communications &

E Tec Security

Intervid

Electrical Services

Empowered Learning

IWS Services Pty Ltd

SECURITY INSIDER OCT/NOV 2012// 29


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:05 PM

Page 30

ASIAL NEW MEMBERS

WELCOMETO OUR NEW MEMBERS JC Protech-tion Security

PSR Security

simPRO Software Pty Ltd

Justus Protective Services Pty Ltd

PTPERT Pty Ltd

Sonic Security Services Pty Ltd

Knight Security Group

QA ELECTRICAL PTY LTD

Specialized Infrastructure Security

Leader Security

Radiant

SSG Security

Lighting Art & Science Pty Ltd

RCZ Australia Pty Ltd

Stanthorpe Security

Link Enterprise Solutions Pty Ltd

Renown Security Group

Steel Security Group Pty Ltd

Lookup.Com

Rent-A-Cop Pty Ltd

Sunrise Security Services Pty Ltd

Lykos Protection Group Pty Ld

Resolution Security Services Pty Ltd

Tactical K-9 Group

Maja Security Services

Rhads Investment Pty Ltd

Tamtek Australia Pty Ltd

March Networks (Australia) Pty Ltd

Robust Services

Taylorm Security

Master Security Group (MSG) Pty Ltd

S.A.S. 1 PTY LTD

Technical Installations

Maxims Security Group Pty Ltd

Safe Sheild Security Services PTY. LTD.

Tempest Security Solutions

Maxus Security Services Pty Ltd

Safeline Security Service

That's All Protection

McAtamney Pty Ltd

Salcom

The Ultimate Protection Group Pty Ltd

Megabase Pty Ltd

Scope Protective & Data Solutions

Third Eye Surveillance Pty Ltd

Metro Communications

Pty Ltd

TJ Services NSW

Mounted Security and Asset Protection

Secu Corp

Trisquared Pty Ltd

MR Security Pty Ltd

Secure Az Pty Ltd

Trust Security Solutions

National Vetting Services Pty Ltd

Secure City

Twin Cities Security

Netcorp GPS Pty Limited

Secure Plus Asset Protection Pty Ltd

United Protocol Security Holdings Pty Ltd

North State Security

Securex Pty Ltd

United Risk Management Group Pty Ltd

NQ Security

Securezone Security Services

Urban Crowd Control Pty Ltd

On The Spot Cleaning and Security

( AUS) Pty Ltd

VCPG Security Services

Pty Ltd

Securimax

Vice Security Port Lincoln

Online Security Protection Pty Ltd

Security Advisers Australia Pty Ltd

Vodafone Hutchison Australia Pty Ltd

Paragon Risk Management Pty Ltd

Security Awards Pty Limited

Water Ratz Security Pty Ltd

Patrons Protective Services

Security Network Protection Group

Wayne L Hall Pty Ltd

Perth Security Services

Pty Ltd

Weslo Staff Pty Ltd

Platinum Protection Solutions

Security Risk Management Pty Ltd

Yates Electrical & Communications

Pop-A-Lock

Security2u Australia

Zone Advanced Protection Systems

ProCorp Security Services Pty Ltd

SERA Group Pty Ltd

Pronto Security Pty Ltd

Shanx Security

30 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 31

MEMBER RECOGNITION PROGRAM

ASIAL MEMBER RECOGNITION PROGRAM Between 1 May and 14 September

New Era Enterprises

Taylor's Property Services Pty Ltd

2012, the following ASIAL members

Pronet Security & Data

Armitage Alarms Pty Ltd

achieved recognition as either a

AEK Management Aust. Pty Ltd

silver or bronze member:

Technical Solutions International

ASIAL Member Recognition Levels

Nepean Regional Security Pty Ltd

• Platinum: 25 years + membership

P M Securities Pty Ltd

• Gold: 16-24 years membership

Silver (11-15 years membership)

• Silver: 11-15 years membership

Butlers Not Only Windscreens

• Bronze: 6-10 years membership

Mibyte Technology

Bronze (6-10 years membership)

Securacore Pty Ltd

Siga Consulting

Diplomatic Security Protection Services

G & M Honeyman Pty Ltd

Pty Ltd

Vladimir John Halaska

the ASIAL Member recognition

Lamson Concepts Pty Ltd

Into Security

program or would like to find out

Davlin Security Group

Eris McCarthy Pty Limited

more, visit

City Coast Security

E & K Richardson Family Trust

www.asial.com.au/Memberrecognitio

The Illawarra Business College

SIMS Security Systems Pty Ltd

nprogram.

Marbia Security Installations

Controlled Access Solution Pty Ltd

If you have not already signed up to

SECURITY INSIDER OCT/NOV 2012// 31


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 32

IR ADVICE & SUPPORT

SURVEILLANCE DEVICES–ARE EMPLOYERS LOOKING AT ALL OFTHE IMPLICATIONS? By Chris Delaney

Advances in technology have added new dimensions to employers' opportunities to monitor employee conduct. However, not all states and territories have in place legislation that cover surveillance in the work place. Other surveillance legislation both State and Federal may impact on an employer’s opportunity to gather and use the information. Surveillance devices usually cover optical, tracking, listening and data. Data surveillance devices are devices or programs capable of being used to record or monitor the input of information into, or the output of information from a computer. Global Positioning Satellite (GPS) systems, software for monitoring of email and internet use, CCTV surveillance and phone recording applications are all readily available for use by employers to ensure the health and safety of employees and to identify performance and conduct issues should they arise. The aim of this article is to provide some direction on what legislation exists and what the implications are for employers. It is not intended to be exhaustive or cover every scenario.

Tracking Devices In New South Wales the Workplace Surveillance Act 2005 (the Act) covers the use of surveillance systems in the

32 //SECURITY INSIDER OCT/NOV 2012

workplace.The Act regulates both the use of CCTV, computer and tracking surveillance devices. New South Wales also has the Surveillance Devices Act 2005, which defines a “tracking device” and how it may be used. In NSW, NT and the ACT a tracking device is one that is capable of being used to determine the location of a person or an object, whilst in Victoria (Surveillance Devices Act 1999 (Vic)) determining the location must be the primary purpose of the device. For example in a recent case , Fair Work Australia (FWA) found at the first instance that an electronic device which was capable of reporting the geographical position of a vehicle was not an 'electronic tracking device' for the purpose of the Surveillance Devices Act, as the 'primary purpose' of the system was to monitor the environment in which coldstored goods were being transported. For this reason, the employer was not required to notify the employee that it was installed. In Victoria, the Surveillance Devices Act 1999 also


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 33

IR ADVICE & SUPPORT

regulates the use of data surveillance devices. Western Australia is similar to NSW.Their legislation is the Surveillance Devices Act 1998 (WA). In South Australia tracking devices are defined, but nothing in the legislation prohibits or even regulates their private or commercial use. There is no state legislation dealing with tracking devices in either Queensland orTasmania.

Listening Devices Most states have legislation dealing with listening to and/or recording conversations, however there are subtle (yet extremely important) differences, most evident in the definition of “private conversations” and the rules relating to “consent”. In Victoria, a party with the consent of the other parties to a conversation may record the conversation or install the device to record the conversation. In a case run in he Federal Court the Court held that a secretly taped conversation was admissible as evidence as it did not contravene the Surveillance Devices Act, because one of the parties to the conversation had intended to tape the conversation.This meant that it did not fall within the definition of 'private conversation', which requires 'the parties' to the conversation to desire it to be private. Whilst the secret taping could be seen as an invasion of the privacy and as involving underhand tactics, it could not be said to have breach the Act. In New South Wales the laws are similar, however a party to a conversation may record it, without the consent of others to protect the own lawful interests if necessary at a later point in time. (Surveillance Devices Act 2005 (NSW)). Queensland is similar to NSW. A private conversation is defined as one where the principal parties could reasonably expect not to be overheard. If it is not a private conversation the use of a listening device may not be restricted. (Invasion of Privacy Act 1971 (QLD)). The ACT is similar, however there is not an exception for where the parties may expect to be overheard (Listening Devices Act 1992 (ACT)). Northern Territory prohibits the installation, use or maintenance of a listening device used to record or monitor a private conversation without the consent of the parties or where it is known that it will be without the consent of the parties (Surveillance Devices Act 2007 (NT)). In South Australia you may not use a listening device to overhear, record, monitor or listen to a private conversation without the consent of all the parties, unless it is in the course of your job, in the public interest or for the protection of your interests. (Listening and Surveillance Devices Act 1972 (SA)). Tasmanian legislation allows the recording of a conversation with the consent of one of the principal parties if

it is to protect the interests of the parties (Listening Devices Act 1991(TAS)).

Optical Surveillance Devices The common misconception is that these devices are cameras, CCTV or mobile phone cameras, however also included are binoculars, telescopes and the like as they allow observation – recording is not the only activity covered. In New South Wales you can only install an optical surveillance device in premises or motor vehicles with the consent of the owner or occupier. In a workplace you must give employees 14 days notice in writing of the use of overt devices. Covert devices require the approval of a magistrate (Surveillance Devices Act 2005 (NSW) and Workplace Surveillance Act 2005 (NSW)). In Victoria using an optical surveillance device to view or record a private activity, regardless of where it is taking place, SECURITY INSIDER OCT/NOV 2012// 33


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 34

IR ADVICE & SUPPORT

is prohibited (Surveillance Devices Act 1999 (VIC)). Queensland legislation proscribes the use of an optical surveillance device without the consent of the person where they are in a private place or could reasonably expect their actions to be private. Private acts are defined in the legislation (Criminal Code Act 1899 (QLD)). In South Australia and Tasmania and the ACT optical surveillance is not restricted by specific legislation however may come under listening devices legislation if it records sound. In Western Australia, optical surveillance devices cannot be used to view or record a private activity, regardless of where that activity takes place (Surveillance Devices Act 1998(WA). The Northern Territory is similar to WA.

Workplace surveillance may constitute adverse action It is possible that an employer's actions in carrying out workplace surveillance could invoke a breach of the expansive general protection provisions of the Fair Work Act 2009 (FW Act). The general protection provisions in the FW Act prohibit employers taking certain 'adverse action' against employees. The surveillance of an employee (either within or outside the workplace), even where compliant with any existing surveillance legislation, could potentially constitute 'adverse action', if it is held to 'alter the position of the employee to the employee's prejudice'. There is an argument that the invasive nature of surveillance, particularly where it might monitor personal conversations or emails, could be construed as adverse to an employee's right to privacy in the workplace.

Introducing workplace surveillance and Consultation Employers should be aware that the introduction of workplace surveillance may require it to be dealt with under a consultation clause in an applicable modern award or enterprise agreement. It is always better to consult with employees and develop policies that are acceptable to both parties and meet the operational and legislative needs of the workplace. Most modern awards and the Fair Work Act require consultation where a decision with have a significant impact on employees for example termination of employment. It is important that employers are aware of whether the

introduction of surveillance would set off the consultation. Failing to consult with employees may result in fines or penalties from a Court. Employers should ensure that when introducing the use of workplace surveillance devices, that they provide an explanation to employees of when and how any form of surveillance will work, how investigations or data audits will be conducted and the ramifications of any breaches.

Relying on Surveillance as Evidence Evidence obtained from surveillance devices will not always be accepted as evidence in litigation.This will depend in part upon the particular forum of the proceedings, and also whether the employer has notified employees that the surveillance is in place. Courts have the discretion to exclude evidence that was obtained 'improperly or in contravention of an Australian law', unless 'the desirability of admitting the evidence outweighs the undesirability of admitting evidence'. In NSW covert surveillance would not be admissible, if the relevant court authority had not been obtained under the Workplace Surveillance Act. Relying solely on surveillance without other supporting evidence can result in an unsuccessful outcome in unfair dismissal claims. In 2008 the AIRC ruled that the dismissal of two employees for misrepresenting the extent of their medical condition was unfair. The employees were both on restricted duties when they were both captured on video surveillance during a weekend camping trip undertaking activities that were allegedly inconsistent with their restrictions. Both employees had their employment terminated for misconduct. In the unfair dismissal claims, the Australian Industrial Relations Commission (AIRC) found that the video surveillance footage, in the absence of evidence from the treating doctor, was not enough to prove that either employee had misrepresented the extent of their injuries to the treating doctor.The failure to corroborate the evidence that both employees had misrepresented their medical conditions resulted in the dismissals being unjust and unreasonable. The content of this article is intended to provide a general guide to the subject matter. It is not, nor is it intended to be legal advice. Specialist advice should be sought about your specific circumstances before making any action.

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au

34 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss5_44pp

26/9/12

5:35 AM

Page 35

DESIGNING OUT CRIME

THE ROLE OF SECURITY IN DESIGNING OUT CRIME By Dr Lindsay Asquith*

We view the security industry as an untapped knowledge bank... The Designing Out Crime Research Centre (DOC) is internationally recognised as a leader in innovative, creative and socially responsive design. DOC is a joint initiative of the University of Technology, Sydney (UTS) and the NSW Department of Attorney General and Justice. Our ability to integrate crime risk, Safer by Design principles and crime research into the exploration and identification of crime problems and assessment of design recommendations is a rare attribute.We work with a breadth of clients, from government agencies to private companies, and apply a range of methods and skills that are unique to our multidisciplinary team. Central to our way of working is wherever possible to avoid taking a ‘countermeasures’ approach to reducing crime. Problem-solving in the area of safety and security often focuses on countermeasures – solutions that focus on constraining individual behaviour, manifest in interventions such as physical barriers, increased security, increased CCTV, and harsher punishments for offending.This approach can contribute to fear and the perception of fear, causing environments to feel, paradoxically, less safe than before and initiating a spiral of under-use that can eventually create environments that foster crime. At DOC our design team reframes the initial problem context with the aim of redefining a crime or security problem in terms of broader social and environmental issues.This process makes the problem more amenable to design interventions and allows designers to remain focused

on desired outcomes rather than fixating on the problem itself. One of the tools we use in the reframing process is stakeholder and duty holder mapping, where we aim to engage and empathise with the people and organisations connected with the situation in which the problem occurs. Our aim is to ascertain their stake and their current role within the problem context. The security industry is a common stakeholder in many of our place-based projects, yet the industry’s needs and experience are often under-represented in the design process.This is a lost opportunity.We view the security industry as an untapped knowledge bank, and believe that by engaging with security

expertise at the start, designers get a richer design process that results, ultimately, in better design solutions. An example of the importance of engaging the security industry in the design process is illustrated in some recent work we carried out for the City of Sydney in the Kings Cross area. Kings Cross, with its high proportion of bars and clubs, attracts about 30,000 people (most under 30 years of age) every Friday and Saturday night, and has a well-established reputation for problems such as drunkenness, fights, petty theft, drug dealing and sporadic violence. Over the years, law enforcement tactics such as increased police presence, restrictions on trading, and increased CCTV and security

SECURITY INSIDER OCT/NOV 2012// 35


INSIDER_Oct/Nov 2012 Iss5_44pp

26/9/12

5:35 AM

Page 36

DESIGNING OUT CRIME

personnel at clubs have been employed to solve these issues but they have persisted. In search of a more effective alternative to this ‘law-and-order’ approach, we turned our attention to the social and environmental context of Kings Cross to inform the design process.The revellers getting into trouble at Kings Cross are, overwhelmingly, young people looking for a good time in a precinct apparently made for the purpose. So what goes wrong? To answer this question we tried to reframe these (apparently) criminal issues using the analogy of a music festival. Events such as the various music festivals held in Sydney each year are comparable to Kings Cross in the number of revellers they attract; they are also at risk of many of the same alcohol and crowd-fuelled problems. Knowing that a single well-publicised disaster could signal the demise of all future events, festival organisers aim to anticipate the problems that get their patrons into trouble with others and the law and manage them in a positive, non-antagonistic way. In talking with the security industry as a key stakeholder we learned that the industry plays a big role in crowd management at these sorts of events, where specially trained and tasked personnel are integral to the smooth functioning of the event and the safety of patrons. Redefining Kings Cross at night as a major event and looking the problem from a crowd management and public safety point of view (rather than a law enforcement point of view) helped our designers come up with many new ideas. The current situation at Kings Cross is that buses and trains stop at 1am, around two hours before most partygoers are ready to go home.This leads to crowds of bored, frustrated and aggressive people queuing for indemand taxis in the early hours of the morning. Our designers proposed increased transport, as well as a

system of temporary signage to help partygoers find an alternative train station with a late-night service. In Kings Cross people congregate around a few big clubs and often the queues for each are long, causing congested footpaths and dissatisfaction among those waiting. Our designers proposed a smartphone app that would allow patrons to check the waiting time for the next club before leaving the one they are in. Another suggestion was to encourage pedestrian movement down the adjacent laneways by creating relaxed ‘chill-out’ spaces equipped with drinking water fountains to help combat intoxication. A significant amount of crowdrelated disorder at Kings Cross results from (often inebriated) patrons being unable to find their way around. At DOC we proposed a system of very visible,

approachable young guides in bright Tshirts who would help partygoers navigate the area and provide specific health and safety assistance if needed. This would also help security personnel concentrate on issues that require their specific knowledge and training. This example in Kings Cross provides insight into the value of drawing on stakeholder expertise and experience and why the security industry is an important partner. The first Design and Crime Conference and Exhibition is being held in Sydney on December 12-13th 2012 and real life problems like Kings Cross will be workshopped by internationally renowned academics and practitioners involved in this rapidly growing field. We’d love to involve security in this conversation.Visit www.designandcrime.com to find out more and register your attendance.

*Dr Lindsay Asquith is a Research Officer with the Designing Out Crime Research Centre, Faculty of Design, Architecture and Building, University of Technology Sydney.

36 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss5_44pp

26/9/12

11:26 AM

Page 37

SIG 2012

The 24th annual Security In Government conference was held at the National Convention Centre, Canberra from 3 – 5 September. ASIAL was a major sponsor of the event which attracted 400 conference delegates and over 95 exhibitors.

Paul Cave AM, Chairman and Founder, BridgeClimb

The Hon Nicola Roxon MP, Attorney-General

SIG 2013 bewill held Canberra from the 12th-14th August 2013 SIGwill 2013 beinheld in Canberra from 12 -14 August SECURITY INSIDER OCT/NOV 2012// 37


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 38

ASIAL Certified Security Monitoring Centres*

Current as at: 13 September 2012

Company (short form name)

Australian Security Industry Association Limited

State

Cert. No.

Grade

NSW

366

A1

09 Mar 2013

Allcare Monitoring Services

WA

379

A2

28 Feb 2014

ARM Security

WA

360

A1

10 Mar 2013

ART Security

VIC

392

A1

30 Sep 2014

Calamity Monitoring

NSW

383

A1

20 Mar 2014

Central Monitoring Services

NSW

380

B1

21 Mar 2014

Commonwealth Bank of Australia

NSW

389

A1

24 Sep 2014

Energize Australia

VIC

391

C2

18 Mar 2014

Golden Electronics

TAS

395

A1

17 Oct 2014

Grade One Monitoring

NSW

378

A1

13 Feb 2014

Grid Security Services

NSW

381

A1

18 Mar 2014

GSS Asset Management

QLD

385

C2

31 Oct 2012

Instant Security Alarms

QLD

365

A1

29 May 2013

Insurance Australia Limited (operating with Insurance Australia Data Centre)

NSW

377

C1

17 Jan 2014

ISS Security

NSW

373

B3

25 Nov 2013

VIC

393

A1

08 Aug 2014

NSS Group

NSW

384

A1

07 May 2014

Onwatch

NSW

375

B1

08 Oct 2012

Paul-Tec Australia

NSW

367

A1

28 Feb 2013

Protection Pacific Security

VIC

394

C2

9 Aug 2014

RAA Security Services

SA

358

A1

12 Dec 2012

Secom Australia

NSW

374

A1

14 Dec 2013

Sectrol Security

VIC

369

B2

19 Aug 2013

ADT Security

Linfox Armaguard

Securemonitoring

Expires

VIC

370

A1

23 Nov 2013

NSW

386

A1

04 May 2014

Security Alarm Monitoring Service

SA

387

A1

18 Jun 2014

Security Control Room

VIC

362

A1

06 May 2013

Sesco Security

WA

364

A1

03 Jun 2013

SMC Australia

QLD

372

A1

07 Dec 2013

SMC Australia

VIC

371

A1

16 Dec 2013

SNP Security (Newcastle)

NSW

368

A1

17 Aug 2013

SNP Security (Sydney)

NSW

390

A1

31 May 2013

Spectus

WA

376

A1

28 Dec 2013

State Government Protective Security Service

QLD

388

C1

22 May 2014

Westpac Banking Corporation

NSW

382

A1

19 Mar 2014

Woolworths Limited

NSW

351

C1

04 Nov 2012

Securenet Monitoring Services

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.

38 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:11 PM

Page 39

HOT PRODUCTS

Kenwei’s popular touch sense intercom is now available in a 2-wire model ■ Central Security Distribution > 1300 319 499 ■ Email > enquiries@centralsd.com.au ■ Web > www.centralsd.com.au Supporting up to two external door stations in addition to two standard CCTV cameras, the KW-S702C-T series can be easily operated yet provides an impressive list of features. Directly PAGE any one or all four room stations at the press of a button, view the front door camera and remotely unlock the door or gate. The Do Not Disturb feature allows a room station to be isolated and CCTV surveillance cameras can be added to improve security even further. Up to three extra monitors, available in black or white finishes are supported, and best of all... it’s a 2 wire product.

HF-1 Needle-Proof Kevlar Metal Detection Gloves ■ UniGuard Management & Security > 1300 133 366 ■ Email > sales@uniguard.com.au ■ Web > www.uniguard.com.au

NEW!

HF–1 gloves give the operator the ability to have hands free metal detection with the protection of Kevlar. This gives the wearer added protection from hypodermic needles, knives and razor blades. They are light weight and comfortable to wear as well as being easy to use with no adjustments necessary for use. Just switch on and they are ready to go. Available as a pair or singularly. Product Specifications: Sizes: L, XL, XXL, Weight: 149g (approx), Battery: Standard 9V Alkaline, Battery Life: 400 hours, Sensitivity: 0.5g, Warranty: 12 month manufacturer warranty.

New Video Analysis Tools For The MOBOTIX Q24M ■ Central Security Distribution > 1300 319 499 ■ Email > enquiries@centralsd.com.au ■ Web > www.centralsd.com.au MOBOTIX has enhanced image data processing inside the camera with the MxAnalytics video analysis tools thus offering new and valuable information sources. For example: How many people go in and out of a selected entrance during the day? Which shelves in the shop attracted the most customers this month? MxAnalytics makes it possible to track the movement of people and objects in the image and to collect statistical behaviour data. For this purpose heat maps, highlighting the most frequented areas, can be created and counting lines defined. All this added functionality is available as a free download for supported cameras.

NEW!

SECURITY INSIDER OCT/NOV 2012// 39


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:12 PM

Page 40

HOT PRODUCTS

Pelco Digital Sentry Network Video Recorder – DSSRV ■ Pelco by Schneider Electric > +612 9125 9310 ■ Email > pelcoaustralia@pelco.com ■ Web > www.pelco.com Flexible IP VMS for mainstream security applications The new Pelco Digital Sentry Network Video Recorder provides all the power you need to maximise HD recording and leverage existing analogue investments. With 280 Mbps bandwidth, support for up to 128 IP streams, increased storage options and built-in reliability, this powerful new platform delivers more HD capability than ever before.The new Pelco Digital Sentry can accommodate up to 64 analogue cameras at D1 resolution and full frame rate. Simplify and optimise your video security platform and choose the new Pelco Digital Sentry as your onestop solution for all the HD and analogue recording power you need.

NEW!

New Tamper Evident Chamber ■ Harcor Security Seals & Bags > +612 9454 4200 ■ Email > sales@harcor.com.au ■ Web > www.harcor.com.au The high level of security, environmental and cost benefits offered, are increasing the popularity of reusable tamper evident bags. Designed specifically to set a new standard in tamper evident security, Harcor has launched the Only Tamper Evident Chamber. We’ve created a range of different TEC chambers to suit the needs of our clients. These chambers all include Harcor’s newly patented “Fracture Safe” design. In addition to the increased security, the new robust chambers continue to provide reliable sealing and easy opening/closing of reusable security bags. For additional information on reusable tamper evident bags or to see a demo of the TEC Chamber please visit www.harcor.com.au

simPRO Field Mobility ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Your time is money and your hours are billable. Cut your travel and admin time down by at least 20% per day per person with simPRO Field Mobility. Our range of simPRO Field Mobility options let you and your staff stay connected and keep your entire system up-to-date with real-time overview of the labour, material and equipment costs incurred, the margin you have applied and the invoiced amount. Our SmartPhone version is optimised for phone sized devices such as Android, Windows Mobile, iPhone and devices such as the Datalogic Elf. Get out and about with simPRO Field Mobility and simplify your business processes so you can spend more time making money, not chasing it.

40 //SECURITY INSIDER OCT/NOV 2012


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:12 PM

Page 41

HOT PRODUCTS

Inner Range Rack Mount Enclosure ■ For more information contact: ■ Web > www.innerrange.com ■ Web > www.centralsd.com.au Inner Range has released a universal Rack Mount Enclosure designed for use with its Concept and Integriti system hardware. Featuring a truly universal design that allows virtually all Inner Range System Controllers or LAN modules to be installed into a 19” rack equipment cabinet without restricting critical access to cabling, termination of connections or access for commissioning and maintenance purposes. Flexible installation options allow the rack mounted drawer to be configured to meet a vast array of specifications, allowing mix & match installation of System Controllers, Universal Expanders, Relay Cards, Access Control Modules, Input Expanders, UniBus Expansion Cards, Multipath Communications Devices and up to 4 Doors of fully Intelligent Access Control. Inner Range Melbourne: www.innerrange.com.

NEW!

Award Winning PANOMERA ■ CR Kennedy > +613 9823 1555 ■ Email > pviggiano@crkennedy.com.au ■ Web > www.crkennedy.com.au/surveillance Dallmeier is famous for creating the world’s largest Casino surveillance systems in places such as Macau and Singapore. Panomera is Dallmeier’s completely new camera technology for surveillance of very large areas. It offers a panoramic overview with realtime HD recording, so can significantly reduce infrastructure requirements. Projects such as Airports, sporting arenas etc previously requiring huge numbers of cameras, can now be covered with Panomera. Unlike Megapixel systems, Panomera uses H.264 encoding to deliver up to 51 megapixels in real time. Panomera won the coveted “CCTV Camera Equipment of the Year” Award at IFSEC 2011.The first showing of Panomera in Australia was at the Security 2012 show.

Smartphone Control for Concept 3000/4000 Systems ■ For more information contact: ■ Web > www.innerrange.com ■ Web > www.centralsd.com.au Inner Range has released a WEB interface kit designed to provide convenient control of Concept Security Systems via any web browser. It is optimized for use on portable smart touchscreen devices such as iPhones, iPads, Android Mobile Devices and Tablet PC's, but can be used on any device with a WEB browser application. Smartphones can be used to remotely control Concept Security Systems from anywhere in the world.There are no additional apps to install or purchase – simply use your devices existing web browser.The user screens are intuitive and provide a simple user-friendly layout that is very easy to use. The Concept WEB interface provides Multi-User login, Arming & Disarming of Security Areas, Locking & Unlocking of Doors, Control of Home Automation Devices and viewing of system reviews events.

NEW!

SECURITY INSIDER OCT/NOV 2012// 41


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:12 PM

Page 42

ASIAL NATIONAL CALENDAR OF EVENTS 2012/2013

OCTOBER

NOVEMBER

QLD Industry Breakfast Briefing 7.30-9.00am, 10 October 2012 Niche Event Spaces, Stones Corner, Brisbane Speakers include: representatives from QLD Fire & Rescue Service and the Fair Work Ombudsman.

VIC Industry Breakfast Briefing 7.30-9.00am, 23rd November 2012 Quality Hotel Batman's Hill on Collins 623 Collins Street, Melbourne Speakers include: a representative from the Victorian Fire Service.

ACT Industry Breakfast Briefing 7.30-9.00am, 17th October 2012 Belconnen Premier Inn, Canberra Speakers include: representatives from ACT Fire Service and the Fair Work Ombudsman SA Industry Breakfast Briefing 7.30-9.00am, 18th October 2012 Sebel Playford Hotel, Adelaide Speakers include: representatives from SA Metropolitan Fire Service and the Fair Work Ombudsman.

NSW Industry Breakfast Briefing 7.30-9.30am, 28th November 2012 Mantra Hotel, Parramatta Speakers include: representatives from the Security Licensing & Enforcement Directorate (SLED) and the Fair Work Ombudsman. ASIAL 43rd Annual General Meeting 28th November 2012 8.45am, Mantra Hotel, Parramatta

WA Industry Breakfast Briefing 7.30-9.00am, 19 October 2012 Hotel Northbridge, Perth Speakers include: The Hon Liza Harvey MLA (pictured), Minister for Police and Emergency Services.

2013

TAS Industry Breakfast Briefing 7.30-9.00am, 19 October 2012 Hobart Function and Convention Centre Speakers include: a representative from the Tasmanian Fire Service.

MAY

SECURITY INDUSTRY LEADERSHIP PROGRAM 23-25 October 2012 Macquarie Graduate School of Management Conference Centre.

JULY

FEBRUARY Security Industry Leadership Program 19-21 February 2013 Melbourne Business School 200 Leicester Street, Carlton VIC 3053

2013 Australian Security Industry Awards for Excellence 2 May 2013 Park Hyatt Hotel, Melbourne.

Security 2013 Exhibition & Conference 24-26 July 2013, Sydney Convention & Exhibition Centre, Darling Harbour.

To find out more register online www.asial.com.au/eventscourses or email events@asial.com.au


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:12 PM

Page 43


INSIDER_Oct/Nov 2012 Iss4_52pp

25/9/12

7:12 PM

Page 44


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.