INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
SECURITY
Page 1
THE MAGAZINE FOR SECURITY PROFESSIONALS
PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION
[ M AG A Z I N E ] VOL.17 | ISSUE.5 | OCT/NOV 2012
Economic crime trends: the era of cybercrime
61 26
PP255003/02390
Smoke detector/sensor installation guidelines
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 2
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 3
INSIDER_Oct/Nov 2012 Iss5_44pp
25/9/12
7:28 PM
Page 4
CONTENTS VOL.17 | ISSUE.5 | OCT/NOV 2012
18 ECONOMIC CRIME TRENDS: THE ERA OF CYBERCRIME
26
32
SMOKE DETECTOR / SENSOR INSTALLATION GUIDELINES
SURVEILLANCE DEVICES - ARE EMPLOYERS LOOKING ATALL OF THE IMPLICATIONS?
06 | Editor’s message 08 | Private Robert Poate 10 | Security Industry Leadership Program 10 | QLD – Compliance Audits 12 | NSW – Cash in Transit NSW Firearms Registry Announcement
12 | New Police Minister for WA 12 | 43rd ASIAL AGM 14 | Professional Recognition for Security Technicians 16 | Using technology to simplify super 17 | UK – Survey of the Security
ASIAL Strategic Partners >
4 //SECURITY INSIDER OCT/NOV 2012
35 THE ROLE OF SECURITY IN DESIGNING OUT CRIME
29 | 37 | 38 | 39 | 42 |
Sector ASIAL New Member Listing SIG 2012 Monitoring Centres List Hot Products ASIAL Calendar of events
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 5
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 6
EDITOR’S MESSAGE
‘COMPLIANCE’ IS NOT A DIRTYWORD
T
THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by
he security industry is without
web sites and resources that can assist
doubt one of the more heavily
you in understanding and meeting your
regulated industry sectors in
compliance obligations.
Australia. Whilst compliance with legal
A case in point is a short fictional film
and regulatory requirements can often
called The Marker released recently by
seem a daunting and overwhelming
the Australian Competition and
task, failure to have in place compliance
Consumer Commission (ACCC).The film
systems and procedures will be to the
seeks to engage people at all levels of
detriment of your business.
business and educate them about the
As a business owner or manager, it can be all too easy to get caught up in the day-to-day running of the business,
make agreements to fix prices, rig bids,
high governance standards. In an
share markets or restrict outputs or
increasingly competitive business
supply. The film shows how cartel activity can
Clients expect faster turnaround times
ruin relationships, careers, reputations
and more innovative solutions. As a
and long term financial security, and may
result, pressure can be placed on
land guilty parties in jail. It also sheds
providers to make “quick fix" solutions in
light on the ACCC’s immunity program,
order to secure a client’s business.
which provides successful applicants
Often, such decisions can be made
with immunity from court proceedings in
without a full understanding of the
exchange for cooperation with ACCC
consequences on other areas of the
investigations.
As an operator of a security business it cannot be stated strongly enough how
Email: communications@asial.com.au Web: www.asial.com.au Publisher
Under Australian law, it is a criminal
time to plan strategically and maintain
compliance related.
Tel: 02 8425 4300 • Fax: 02 8425 4343
on participants.
at the expense of spending appropriate
business, both economic and
Association Limited PO Box 1338 Crows Nest, NSW 1585
devastating impact that cartels can have
offence for competing businesses to
environment expectations are changing.
The Australian Security Industry
Editor Bryan de Caires | security@asial.com.au Editorial Enquiries communications@asial.com.au Advertising Tania Laird | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 Digital | design@webfx2.com.au Editorial Contributors Malcolm Shackell, Andrea Perry, Chris Delaney, AusSuper and Dr Lindsay Asquith. Print + Distribution Nationwide Advertising Group
ASIAL encourages you to view this
Published bi-monthly
film (a link to the film can be found at www.asial.com.au). ‘Compliance’ is not a dirty word or
Estimated Readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising
important it is that you fully understand
something to be feared. Rather, it should
your compliance obligations and have in
be an integral part of how you run your
otherwise stated with permission. All contributions
place appropriate systems and
business to ensure that it operates in a
are welcomed, though the publisher reserves the
procedures. If you don’t, then you need
sustainable and successful manner.
to seek help immediately. Putting things off won’t make the problem go away! That said, often the hardest step is the first step. So what should you do?
If you find it all too overwhelming, you
does not imply endorsement by ASIAL, unless
right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases to: security@asial.com.au.
can always call us on 1300 1ASIAL to
Internet
seek advice and support on your
advertising were correct at the time of printing.
compliance obligations. Remember, advice and support is
references
in
articles, stories
and
ASIAL does not accept responsibility for misleading views. Copyright© 2012 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without
To help you navigate through the
never more than a phone call away for
permission is strictly prohibited. Security Insider is
compliance maze, ASIAL’s online resource
ASIAL members.
a subscription based publication, rates and further details can be found at www.asial.com.au.
centre – the Centre for Compliance [Next Issue] DEC/JAN 12/13
(www.asial.com.au/CentreforCompliance) will help direct you to relevant information and links.There are many valuable
Bryan de Caires
Federal/State and Territory government
Editor
6 //SECURITY INSIDER OCT/NOV 2012
ISSN 1442-1720
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 7
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:02 PM
Page 8
INDUSTRY NeWS
PRIVATE ROBERT POATE ASIAL has passed on its
was posted as a rifleman to 6
condolences to the Poate family
RAR. Private Poate was a highly
following the announcement by
qualified soldier, having
the Australian Defence Force of
completed specialist training as
the tragic death on 29 August
a Protected Mobility Vehicle
2012 of their son/brother, Private
Driver in 2010 and Protected
Robert Poate on operations in
Mobility Vehicle Commander in
Afghanistan.
2011.
Robert’s father, Hugh Poate
He was known for having
was a long time ASIAL member,
outstanding leadership potential,
Director and Chairman of the
which led to him completing a
Association’s ACT branch.
promotion course for Corporal in
Private Robert Poate was a
2011. Private Poate had a
member of the 3rd Battalion, the
reputation for creating mischief
Royal Australian Regiment Task
without getting caught, and was
Group and was from the 6th
proud of his family, his military
Battalion, Royal Australian
service, his Canberran origins,
Regiment (6 RAR), based in
and his red hair, which he
Brisbane, Queensland. He
vehemently defended as being
enlisted in the Army in 2009. On
‘strawberry blonde’.
completion of his basic and initial employment training, he
8 //SECURITY INSIDER OCT/NOV 2012
He is survived by his parents and sister.
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 9
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 10
INDUSTRY NeWS
SECURITY INDUSTRY LEADERSHIP PROGRAM Designed specifically for managers and business owners in the security industry, the program focuses on developing the skills of the industry’s future leaders. Featuring an exceptional teaching faculty, the three-day program provides practical and interactive insights into the key factors to successfully managing and growing a security business. • Day 1: Strategy & marketing • Day 2: Finance for managers • Day 3: Leading and managing people The program will focus on developing practical skills that you can apply at a personal, business and national industry level.These include an understanding of how to: • communicate effectively • develop high performance teams • drive change • brand and differentiate the product or service you offer
• manage conflict • identify the key elements that underpin the financial health of your business • use key principles of financial management to make effective business decisions Teaching faculty Chris Clark is a strategist, who teaches corporate strategy and strategic marketing at Macquarie University, including fifteen years teaching on the MBA program of the Macquarie Graduate School of Management, where he was until 2006 the Director of Corporate and Executive Education. From 20022004 he was director of the MBA program. He is also a consultant to some of Australia’s leading companies, across a wide range of industries, who draw on his problem solving and facilitation skills.
Graham Godbee has been a lecturer in finance at Macquarie University Graduate School of Management and remains Visiting Fellow in the Centre for Money, Banking and Finance at Macquarie University. He has held executive management positions in large corporates in the roles of business development, marketing and finance. Associate Professor Peter McGraw is Director of the LabourManagement Studies Foundation and a faculty member in the Department of Business, Faculty of Business and Economics at Macquarie University. The program will be held in Sydney (23-25 October 2012), Macquarie Graduate School of Management Executive Hotel and Conference Centre and Melbourne (19-21 February 2013), Melbourne Business School.
QLD – COMPLIANCE AUDITS Amendments to the Security Providers Act 1993 which came into effect in February 2011 provided a role for peak security industry bodies to take on a compliance role to assist the Office of FairTrading in its regulation of the private security industry in Queensland. As a condition of approval as an Approved Security Industry Association, ASIAL is required to assess compliance of its members to the Code of Conduct approved by the Chief Executive of the Office of Fair Trading at least once every 3 years. ASIAL has appointed a chartered accountancy firm to conduct compliance audits of its members.To assist members in preparing for these audits, ASIAL has prepared an Audit Compliance Guide which sets out the information which we require from you when requested.This includes:
10 //SECURITY INSIDER OCT/NOV 2012
• Compliance Audit Overview which outlines your obligations and those of ASIAL. • Compliance Audit Form which must be completed and returned by the date requested; supporting documentation (including certified copies of specified documentation); a declaration of Compliance; a signed reaffirmation of the ASIAL Code of Professional Conduct; and a signed Statutory Declaration stating that the information provided is true and accurate (this must be certified by a Justice of the Peace/Commissioner for Declarations). All information provided will be treated strictly in confidence. Members will be notified of the outcome within 3 months completion of their compliance audit. If unsuccessful, members will be
advised of the areas of noncompliance and will be provided with an opportunity to rectify them. Failure to rectify identified non-compliance issues as a result of the audit or failure to complete and return the audit form by the specified date, may result in your firm being deemed as noncompliant. ASIAL is required to report to the Office of FairTrading the findings of each audit. Should you have any queries about the compliance audit process contact us on 131 ASIAL or email security@asial.com.au.
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 11
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 12
INDUSTRY NeWS
NSW – CASH IN TRANSIT NSW FIREARMS REGISTRY ANNOUNCEMENT Following enquiries made by ASIAL concerning Firearms business licences and references to the Cash Transportation (Non-Armoured Vehicles) Interim Award No. 2 Cash limits, the Firearms Registry has advised that: “Armed Security Firms authorised to possess and use firearms whilst performing ‘Cash in Transit’ activities currently have the following condition endorsed on the business licence, ‘must comply with cash in transit (State) Award including cash limits.’
On 29 July 2011 the Cash Transportation (Non-Armoured Vehicles) Interim Award No. 2 was terminated consequently this requirement is no longer applicable. However compliance with the WorkCover Cash in Transit Code of Practice will continue to apply. It should be noted, item 3.3.6 within this document provides – ‘Cash limits for each CIT operation are to be determined in accordance with the safety and security risk assessment’. In this regard, all future Risk
AFAC / ASIAL SMOKE DETECTOR/SENSOR INSTALLATION GUIDELINES As a joint initiative, the Australasian Fire and Emergency Service Authorities Council (AFAC) and the Australian Security Industry Association Limited (ASIAL) have recently released smoke detector/sensor installation guidelines. The guidelines have been developed to assist security companies in installing, servicing and monitoring smoke detectors/sensors connected to security alarm systems in an appropriate manner, without requiring detailed knowledge of fire alarm standards, individual
state regulations or building codes. A PDF copy of the guidelines can be downloaded by visiting www.asial.com.au, alternatively you can turn to page 26 to view a copy. Representatives from the various state and territory fire services will provide an update on the guidelines at the coming series of ASIAL Industry Breakfast Briefings around the country.
ACT – SECURITY INDUSTRY WORKPLACE INFORMATION REQUIREMENT The Security Industry Amendment Act 2010 expanded the suitability criteria and prerequisites for individuals applying for a licence to work in the security industry.The amendments included the requirement for applicants to attend a face-to-face workplace information
12 //SECURITY INSIDER OCT/NOV 2012
session about their employment rights and obligations with representatives of a registered organisation (usually union officials). Following a recent review, the ACT Government has decided that the Security Industry Workplace Information requirement should continue.
Assessments undertaken for each Cash in Transit activity must address the cash limits.
43RD ASIAL ANNUAL GENERAL MEETING ASIAL’s 43rd Annual General Meeting will be held on Wednesday, 28 November 2012 from 8.45am at the Mantra Hotel (Cnr Parkes and Valentine St) Parramatta. A ballot for Directors of the Association will be conducted by the Australian Electoral Commission during October.
NEW POLICE MINISTER FOR WA The Hon Liza Fraser MLA (pictured) has been appointed as the new Minister for Police and Emergency Services in WA.The Minister will be ASIAL’s special guest at its upcoming industry breakfast briefing in Perth on the 19th October.
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 13
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 14
INDUSTRY NeWS
PROFESSIONAL RECOGNITION FOR SECURITY TECHNICIANS The SecurityTechnician Certification (STC) program is an ASIAL industry initiative to provide a training course that offers professional recognition and an industry recognised career pathway for technicians working in the security industry. The STC credential is a technical certification program that covers alarms, access control and CCTV. Through a combination of selfpaced study, face-to-face theory and practical assessments at approved assessment centres (located in Adelaide, Brisbane, Melbourne, Sydney and Perth), participants are required to demonstrate their theory and practical skills. Designed to provide a career pathway for security technicians, the program is also a proactive initiative to attract and retain appropriately skilled workers capable of meeting the future needs of the industry. Units associated with the program can be recognised as competency based units under the Australian Quality Training Framework.
The program incorporates 3 levels of recognition: - Certified SecurityTechnician - Advanced SecurityTechnician - Master SecurityTechnician Certification benefits for individuals • Professional development - The acquisition of knowledge and skills demonstrates your commitment to self improvement, which increases your career prospects in the security industry. • Demonstrates your industry readiness – Proves your capability and expertise to work within the security industry. • Career advancement – Supports career path development and opens doors. • Targets and builds upon the skills you have as an industry professional Certification benefits for employers • Competitive advantage – provides a mechanism to recognise staff
ACT – PORTABLE LONG SERVICE LEAVE SCHEME The ACT Minister for Industrial Relations has signed a Legislative
14 //SECURITY INSIDER OCT/NOV 2012
Instrument that sets the levy payable by employers, at 1.47% of ordinary salaries. The portable long service leave scheme will come into effect from 1 January 2013, with the first installments due in March 2013.The scheme will apply to all security manpower employees (by license category) in the ACT; contributions will be paid quarterly into the fund and the scheme pays for long service leave (pro rate) when taken.
expertise and maintain the currency of skills. • Recruiting standard – provides an industry skills threshold and an easy way to recognize skill qualifications gained by candidates. • Professional development – provides a pathway for the development and retention of valued employees. • Quality – provides a mechanism to improve operational efficiency and enhance customer satisfaction. For more information visit www.securitytechniciancertification. com.au
FWO UPDATE Representatives from the Fair Work Ombudsman will address the upcoming ASIAL Industry Briefings on FWO’s audit priorities and the outcomes of the recent security audit campaign. For more information on the upcoming ASIAL Industry Briefings around the country, turn to page 42.
2012 ASIAL Annual & Financial Report ASIAL's 2012 Annual and Financial Report can be viewed at www.asial.com.au/ar
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 15
INDUSTRY NeWS
VIC – PRIVATE SECURITY BUSINESS FORUM INVITATION The Licensing & Regulation
these risks.This invitation is
Concourse Meeting Room, Adjacent
Division is extending an invitation to
extended to all managers and
to Tower 4 lifts, World Trade Centre,
all Private Security Business
supervisors within your security
18 – 38 Siddeley Street, Docklands.
Licence & Registration holders to
business. An agenda for the Forum
attend a Private Security Business
will be listed on our website at
forum please provide your name
Forum.
www.police.vic.gov.au/Private
and mobile number via email to
Security/News and Publications.
karin.rethwisch@police.vic.gov.au by
The Forum will focus on risks that
If you would like to attend this
are currently impacting on security
The Forum will be held on
businesses and provide strategies
Thursday 25th October 2012
can be recorded for catering and
to assist businesses to minimise
(1:30pm to 4:30 pm) in the
communication purposes.
20 October 2012 so that numbers
2013 AUSTRALIAN SECURITY INDUSTRY AWARDS FOR EXCELLENCE Nominations will open shortly for the 2013 Australian Security Industry Awards for Excellence. Award categories include: Individual • Individual Achievement – General Security • Individual Achievement – Technical Security
• Security Student of the Year
• Special Security Event or Project
Organisational • Security Management • In-House SecurityTeam • Training • Integrated Security Solution (projects above $250,000) • Technical Security Solution (projects below $250,000)
The awards will be presented at the Park Hyatt Hotel Melbourne on the 2nd May 2013. Further details on the awards are available at www.asial.com.au/awardsforexcellence or by emailing marketing@asial.com.au
SECURITY INSIDER OCT/NOV 2012// 15
INSIDER_Oct/Nov 2012 Iss5_44pp
26/9/12
11:15 AM
Page 16
AUSTRALIAN SUPER
USING TECHNOLOGY TO SIMPLIFY SUPER Stronger Super – part of the Government’s super reforms – aims to make the super system easier to administer and focuses on technology to drive efficiencies. The reforms will start to roll out over the coming 12 months. But with our secure online solutions, you can save time now and get ready before Stronger Super starts. To get the most out of an online solution you first need to ask two questions. How many employees do I pay for? And do I pay super to more than one fund? Using AustralianSuper’s online options to make single payments For all your employees in AustralianSuper, you can use our easy and secure online solutions to manage your super obligations. AustralianSuper has two online systems that participating employers can use to send contribution details:
• EmployerOnline Who? Good if you have less than 30 employees. How?You enter employee details once and then just update the contribution amount for each payment period. • Super FileManager Who? For any size business that uses an electronic payroll system. How?You upload a payroll file so you never need to re-key contribution information.
employer number. Or call us on 1300 300 273 and we can help.
These online options both work well with paying electronically – BPAY®, Electronic Funds Transfer, direct debit and Postbillpay® – and will save you from possible future penalties for paying contributions by cheque under the new reforms.
To use QuickSuper free-of-charge: • you must be a participating employer of AustralianSuper • AustralianSuper must be your default fund, and • at least half of the total number of your employees must be members of AustralianSuper.
To get started online go to www.australiansuper.com/PaySupe r and sign up.This only takes a minute or two and you’ll need your
Using a clearing house to pay super to other funds To help make paying super to other funds easier, we offer you access to a free clearing house facility. QuickSuper – provided and managed by Westpac – is a simple and secure way to pay and manage the super contributions for your employees who aren’t members of AustralianSuper.
For more details or to register go to www.australiansuper.com/ClearingHo use or call us on 1300 300 273.
BPAY is registered to BPAY Pty Ltd ABN 69 079 137 518. Postbillpay is registered to the Australian Postal Corporation ABN 28 864 970 579.
16 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 17
INDUSTRY NeWS
SURVEY OF THE SECURITY SECTOR Every year Perpetuity Research in the UK undertakes a research project for the Security Research Initiative (SRI). This year's report is based on the findings of three groups: corporate security specialists who buy security, contract security company managers, and security operatives (particularly guards). Findings from the survey of corporate security specialists: • Over two fifths of the 209 specialists surveyed admitted they felt that security was viewed as a 'grudge purchase' and most accepted that security was a low priority. • They felt that in house services were of a higher quality but that contract services were better value for money. • The research suggests the need for the contract security sector to provide more evidence of its effectiveness and value against a background where those buying security need to be persuaded. Findings from contract security company managers: • Managers were concerned about how security was perceived. Almost two thirds felt 'low margins change the focus of contract security directors/managers from security to cost control'. • Over two thirds of 509
directors/managers cited the need to cut costs as a reason for severing contracts or changing suppliers. • When asked about reasons for staff leaving contract security work managers /directors cited poor pay, limited development opportunities, and lack of appreciation as the main push factors. Findings from security operatives: • Most security guards have their licensing fee paid for by their employers.
• A quarter of security guards work more than 60 hours a week. • Over half of the 504 operatives surveyed agreed that 'most of my colleagues are totally committed to providing a quality service'. As Professor Martin Gill who led the study noted: "Security is facing a challenging time...The security sector needs to respond in a more coordinated way in highlighting with evidence what you get from a good security company that you don't get from a bad one".
This report is available and can be requested via prci@perpetuitygroup.com or visit www.perpetuityresearch.com/sri.html.
SECURITY INSIDER OCT/NOV 2012// 17
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:03 PM
Page 18
CYBERCRIME
ECONOMIC CRIME TRENDS: THE ERA OF CYBERCRIME By Malcolm Shackell and Andrea Perry
Just under half (47%) of Australian organisations have experienced at least one economic crime incident over the past 12 months. This is up from 40% in the last PwC survey in 2009 and above the global average of 34%. More than 50% of the Australian organisations experiencing fraud had more than 10 incidents of fraud, and 16% suffered combined losses of more than $5 million. The raises the question: is there more fraud in Australia or are we better at detecting fraud? The answer is a bit of both.
CYBERC 18 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 19
CYBERCRIME
RCRIME SECURITY INSIDER OCT/NOV 2012// 19
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 20
W
CYBERCRIME
hat is particularly interesting is the rapid rise in cybercrime – defined as any economic crime where a computer or the internet plays a central role in the crime. Cybercrime is now globally ranked the fourth most common form of economic crime. In Australia it is ranked the second with 63% of respondents perceiving the risk of cybercrime to have increased over the last 12 months.
our clients about why there is this apparent shift. Our experience tells us that people are experiencing a higher level of financial hardship in the current environment (the “need” factor) and as always, greed remains a factor. Regardless of the reasons, employees are taking advantage of control weaknesses in organisations to commitment fraud. We can build a profile of an internal fraudster based on the survey responses we received.The average fraudster (55%) is
The survey
usually young (in their 30s), but with enough experience to
The PwC Global Economic Crime Survey has been
understand the systems and controls in an organisation.They
conducted every two years since 1999 and in Australia since
are typically in some sort of management role (90%), or at
2001. It is one of the largest and most comprehensive surveys
least in a position where they can influence the way money or
of its kind surveying just under 3,900 organisations in 78
assets leave an organisation.They are usually male (75%),
countries.The global and Australian surveys were last
though not exclusively so. Recent major frauds we have seen
released in 2009.
have been committed by both sexes, and the male to female
Respondents were asked about the types of economic
ratio may mirror the gender ratio in many organisations.
crimes they had suffered during 2011.The top four economic crimes experienced in Australia were asset misappropriation,
Hotspot 1: Asset misappropriation
accounting fraud, bribery and corruption and cybercrime.
Asset misappropriation includes theft of funds, cash and
Asset misappropriation was the most common crime,
assets and this type of economic crime is one of the
experienced by 86% of respondents.This has been the case
The increase of internal fraudsters has elicited queries from our clients about why there is this apparent shift. Our experience tells us that people are experiencing a higher level of financial hardship in the current environment (the “need” factor) and as always, greed remains a factor. throughout the history of the survey with this category
consistent crimes we see every day in our business. Over the
increasing from 64% in 2003.
last year there is no doubt that we have seen a rise in
The survey has identified trends in economic crime with
corporate theft of one form or another, but there are three
global reports of cybercrime and bribery and corruption on
types of fraud we are seeing most often: (1) Employee
the rise.This is due to a combination of factors including
expense fraud – we have seen a significant increase in this
increased publicity of these issues and changes in legislation
type of fraud, potentially because of the ease in which it can
such as the UK Bribery Act.
be committed when controls are not enforced.The size of some of these frauds is surprising, with organisational losses
Who is committing fraud?
running into the $100,000s in many cases. (2) Fraudulent
A significant feature of the latest survey results is the apparent
invoicing / suppliers – this method of economic crime
shift towards internal fraud, as opposed to external fraud. In
remains the most common way for employees to
Australia 54% of reported economic crimes were committed
misappropriate funds.This type of fraud usually involves
by internal fraudsters, increasing from 33% in the last survey
conflicts of interest and fraudulent invoice approvals. Recently
in 2009.These statistics mirror what we are seeing in our
there has also been increasing evidence of manipulation of
work, particularly regarding asset misappropriation where we
electronic records such as payment files. (3) Asset write down
find the majority of this economic crime is commitment by
and theft – we have seen an increase in the occurrence of
internal fraudsters.The exception to this trend is financial
high value assets being fraudulently written down to zero and
services, telecommunications and retail industries, where
then on sold for scrap or on auction sites by employees.This
external fraud remains the main concern.
is a particularly problem in the construction, mining and
The increase of internal fraudsters has elicited queries from
20 //SECURITY INSIDER OCT/NOV 2012
telecommunications industries. It is important for
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 21
CYBERCRIME
organisations to review the way they mitigate the risks associated with the write down and disposal of assets.
Hotspot 2: Cybercrime One of the more remarkable insights from the survey was the increase in cybercrime, and respondents are seeing this risk predominantly as an external risk.The vast majority of what we are seeing in cybercrime relates to improper access to and/or theft of electronic information that has value (monetary, competitive advantage, reputation).There are 5 different “motives” for this. 1. Insiders (employees or contractors) who have authorised access to systems, and abuse this access for personal gain (usually employee fraud).This form of cybercrime is closely linked to asset misappropriation, with the increased use of technology creating new avenues for this traditional fraud. 2. Competitors seeking unfair advantage through theft of or access to confidential information.This has occurred in Australia, however to a much lesser extent than in some
cybercrime techniques used are often extremely sophisticated and difficult to detect. 4. Trans-national criminal enterprises stealing and / or extorting information to generate income.This is arguably the most common type of external cybercrime and is the focus of many IT Security professionals.There have been many high profile examples of this type of crime.These incidents are usually associated with major financial and reputational damage to the targeted organisation. Customer information is a highly commoditised item on the information black-market with credit card details selling for approximately $25 and higher prices for matching email addresses and passwords. 5. Hactivists protesting against organisational actions or policies.This type of motivation has been on the rise, with the most notable example being the ‘Anonymous’ hackivist attack on Visa.com and Mastercard.com as part of “Operation Payback” in response to Matercard,Visa, Paypal and a number of other payment processing companies stopping donation transactions to the WikiLeaks group.
other countries. Most of what occurs in this category is in relation to disgruntled employees. 3. Foreign governments committing espionage for political or economic gain. Similar to the previous category this has occurred, by is primarily focussed in countries where the line between government and businesses is “blurred”. The
Our experience is that most organisations treat cybercrime as an “IT issue”, when really it is a whole of business issue. Often when we are called in to manage a cybercrime incident we find it is more extensive than originally believed, with victims often being targeted over a lengthy period. When an
SECURITY INSIDER OCT/NOV 2012// 21
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 22
CYBERCRIME
incident occurs we recommend that organisations “assume a
government officials overseas (by the organisation or their
position of compromise” rather than assuming their ITsecurity
agents). Most of the incidents we see involve bribery through
procedures are adequate. Having a three step strategy for
local agents or through sales staff expenses. In these cases is it
protecting against and responding to cybercrime is effective.
rare that Australian executives or the Board are aware of the
1. Have an incident response plan ready to go as soon as an
bribery, although this does not mitigate reputational risk.
incident is suspected.This should include when and which specialists to involve. 2. Ensure there is cyber security awareness in the organisation
Organisations should be aware that changes to anti-bribery legislation are looming.The UK Bribery Act is now law and this legislation is much more rigorous than the current Australian
as this goes a long way to delaying or stopping threats.
or United States bribery legislation.There is a strong belief that
Regular training and well resourced security goes a long way.
the Australian and United States governments are under
Many organisations continue to remain very reactive – either because they just hope a problem won’t occur or because they don’t have the resources or understanding to implement preventative techniques and detective controls. 3. Involve senior level leadership such as the Board and CEO.
pressure to strengthen their anti-bribery laws, potentially to
This will encourage the “tone from the top” that is so vital for
bring them into line with the UK. There are 4 key differences
any type of risk awareness.
between our laws and the UK legislation: 1. There are no exemptions for“facilitation payments” – this will
Hotspot 3: Bribery and corruption
have significant impact on companies operating in
Recent media has highlighted the risks that Australian
Indonesia, for example, where minor value facilitation
businesses face when operating in countries where the risk of bribery is high.Whilst it could be said that the actual risk of bribery has not changed, the consequences of being exposed to bribery and corruption have been heightened. Under current Australian legislation, the risk for Australian organisations is in relation to the payment of bribes to
22 //SECURITY INSIDER OCT/NOV 2012
payments are commonly paid. 2. “Private to private” bribery is covered – this is as opposed to Australian and United States legislation which is focussed on bribery of foreign officials. 3. A new offence of “failure to prevent” – this means that executives and boards cannot just blame rogue
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 23
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 24
CYBERCRIME
employees. Organisations have a duty to have “adequate
Summary
procedures”, and there is official guidance on what
The PwC Global Economic Crime Survey has shown the ever
prevention means.
increasing impact of fraud from both a value and volume
4. The legislation casts a “wide net’ – which means
perspective. Most significantly the survey brought to focus the
organisations do not have to have significant operations
emergence of cybercrime. Incidents of cybercrime have rapidly
within the UK to be covered by the UK Bribery Act in every
risen in Australia and many organisations are struggling to stay
other operational location.
one step ahead. Particularly in the current environment, all Australian
Prevention and detection
organisations should consider the economic crime risks within
We are regularly asked to advise clients on steps to avoid
their operations and their capabilities to proactively mitigate
being an economic crime statistic.The key is establishing
these risks.
a fraud control framework which broadly covers three components: prevention, detection and incident management.The framework should include sound policies and training, due diligence procedures to ensure you know more about those you do with business with (prevention), having a robust control environment with detective controls and avenues for whistleblowing (detection) and lastly, understand what you have to do quickly should a problem occur (incident management). Many organisations continue to remain very reactive – either because they just hope a problem won’t occur or because they don’t have the resources or understanding to implement preventative techniques and detective controls.There have been some positive trends emerging regarding our ability to detect fraud, with the majority of survey respondents stating they had performed a fraud risk assessment (which is in our view a vital tool in fraud control). Interestingly, whistleblower techniques and suspicious transactions analysis (or fraud focused data analytics) are being employed more often. In our work we are seeing increasing demand in these areas.
Andrea Perry is a Senior Consultant in the PwC Forensic Services practice specialising in forensic accounting, investigations and corporate intelligence.
Malcolm Shackell is a partner in PwC’s forensics practice with over 20 years experience in the prevention,detection and investigation of economic crime.
24 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 25
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 26
SMOKE DETECTORS
A joint initiative
Guidelines for the installation and servicing of smoke detectors/sensors connected to residential and commercial security systems. The following Guidelines have been
hard wired smoke alarms in premises.
should always be at the discretion of the customer and a cost may be
agreed between the Australasian 1. If the security company is unsure of
incurred when the fire brigade
Authorities Council (AFAC) and the
the legal/regulatory requirements for
attends a false alarm. Security
Australian Security Industry
the installation concerned, it should
companies should ensure their
Association Limited (ASIAL).They
request that the customer obtains
customers are aware that fire
are intended to assist a security
clarification from an appropriate fire
brigades in many states may charge
company to install, service and
professional before proceeding. If
either the security provider or their
monitor smoke detectors/sensors
the building to be protected is a
clients for callouts to false smoke
connected to security alarm
new or recently constructed
alarm activations.
systems in an appropriate manner,
building, the customer should obtain
without requiring detailed
a specification for the smoke
knowledge of fire alarm standards,
detection requirements before
connected to security systems
individual state regulations or
proceeding.
should only be supplementary
Fire and Emergency Service
systems and, as such, if large
building codes. Outside of installed fire safety
5. Smoke detectors/sensors
2. As a general rule, a security
numbers of detectors are required
systems engineered to the
company should never install smoke
(e.g. more than 5) or the number of
requirements of Australian/New
detectors/sensors if the installation
smoke detectors /sensors is greater
Zealand Standards, the purpose of a
is required by legislation, as the
than the number of security devices,
smoke detector is to detect the
installation by the security company
the client should obtain advice from
presence of smoke and alert persons
may not meet the requirements of
an appropriate fire professional.
on site only. It is important to note that
that legislation. If the customer
smoke detectors/sensors that are
advises that the detectors /sensors
connected to a burglar alarm have not
are required by legislation, they
used to control other functions as a
been designed to meet the specific
should be directed to an
result of the detection of smoke
technical requirements of a system
appropriate fire professional for
(e.g. activation of door closers,
intended to respond to the fire brigade.
advice before proceeding.
smoke exhaust or shut down of air conditioning). If this is required, the
These Guidelines are prepared on the basis that the intent of including
6. The security system should never be
3. A security alarm system should
customer should be advised to
smoke detectors / sensors in a
never be used as the primary
obtain advice from an appropriate
security system is to provide some
monitoring method for buildings that
fire professional.
additional protection in addition to any
are required under
mandatory fire safety requirements.
legislation/building codes to have a
Including smoke detectors in a
monitored smoke detection system.
26 //SECURITY INSIDER OCT/NOV 2012
customer they still wish to proceed with monitoring of the smoke
security system may not fulfill mandatory legislative requirements for
7. If after providing this advice to the
4. A request to call the fire brigade
detectors /sensors connected to a
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 27
SMOKE DETECTORS
security alarm system it is
use of the products they install as
test the whole system if
recommended that the security
listed below:
maintenance is not performed by
company should have the client
• There are various types of
sign an appropriate disclaimer.This
smoke detectors/sensors
disclaimer should contain the
available, from the battery-only
following as a minimum:
the security company. 11.All smoke detection/sensor cabling
version to the mains-powered
must be performed in compliance
7.1. The installation is not
type installed by electricians.
with Australian Communications
intended to meet any
• The security industry uses the
and Media Authority (ACMA)
requirements of any Act,
power from the alarm panel as
regulations.
Regulation or Building Code in
the primary source and must
regards to a fire detection
have a separate battery supply
system including any legal
onboard or on the system.
maintain a log of all smoke
requirement to have hard-wired
• The selection of the correct
detector work performed, as is
smoke alarms in the premises.
detector/sensor is based on the
required under AS/NZS
7.2. Security alarm monitoring
purpose of the installation.
2201.1:2007, Intruder alarm systems
centres are not approved fire
• The type of transmission path
– Part 1: Client’s premises –
alarm monitoring centres and,
used to monitor the alarm
Design, installation, commissioning
whilst they will carry out their
system, which may include
and maintenance.
instructions to the best of their
smoke detectors/sensors, should
ability, they cannot guarantee that
be based on the risk rating of the
the fire brigade will attend any
premises and, therefore, the
with the above service must be in
specific alarm.
Class from 1 to 5 (covered in
compliance with AS/ACIF
7.3. If the client requests
AS/NZS 2201.5:2008 – Alarm
S009:2006 (telecommunications
attendance of the fire brigade or
Transmission Systems).
cabling Wiring Rules) and all other
authorises the monitoring
• For fire monitoring systems, it
requirements of the Australian
company to request attendance
is important to know that
Communications and Media
of the fire brigade, any costs
constant monitoring is available.
Authority (ACMA) Cabling Provider
associated with this attendance
This is normally relevant to Class
Rules.
will be the responsibility of the
3, 4 and 5 in the above Standard.
client.
• Monitoring of smoke
Special note:
detectors/sensors in an intruder
In some circumstances the fire alarm
alarm system when coded for
panel may also be monitored by a
to service existing customers, or
regulatory or insurance reasons
security monitoring centre as a
customers at whose premises they
should be performed by a
failsafe feature. A fire technician
did not install detectors/ sensors,
monitoring centre independently
working on the system should notify
8. If the security company is required
12.The security company should
13. All customer cabling associated
they should obtain a similar waiver,
graded to AS 2201.2:2004,
the Facility Manager, isolate the Alarm
as per item 7 above, before
Monitoring Centres.
Signalling Equipment (ASE) and also
commencing work.
notify the security monitoring centre 10. Recommendation should be made
to avoid unnecessary false alarm
to the client to maintain the system
responses from the fire brigade.
recommended that heat detectors
to the manufacturer’s
Details of the security monitoring
not be connected to security alarm
recommendations, even if
centre should be kept on the front of
systems. However, if suitable for a
maintenance is not requested by
the fire panel log book.
semi-external environment, they may
the client. AS/NZS 2201.1:2007
be used in an attached garage.The
recommends maintenance be
security company needs to ensure
carried out but it is not mandatory.
Guide is available for download on
that their sales, installation and
Where smoke detectors/sensors
the ASIAL website or you can email
service staff have been
are installed the client should be
security@asial.com.au to request
appropriately trained in the correct
made aware of their responsibility to
your copy.
9. In normal circumstances, it is
A PDF version of the Installers
SECURITY INSIDER OCT/NOV 2012// 27
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 28
SMOKE DETECTORS
A joint initiative
Smoke Detectors/Alarms connected to Monitored Security Systems Information Guide for Residential Properties Purpose of a Smoke Detector/Sensor The purpose of any smoke detector sensor in your home is to detect the presence of smoke and sound an alarm which in turn provides early warning of a fire so that you and your family can get out safely. It is not designed to call the fire service.
Why have your Smoke Detectors/Sensors monitored by a security company? Some people prefer that their smoke detectors/sensors are connected to their security system and monitored by a security company.This allows the security company to call you or a nominated person if a problem arises in your home.You may also request that your security company calls the fire service for you. If you request this service the fire service may charge for attendance if it turns out that there is no fire.The fire service may also have to force entry into your home if they
installation of smoke alarms vary from
suspect a fire.
state to state.Your local fire service
For all consumer installation, monitoring and maintenance
and in some cases your local council
information, refer to the system
What you need to know:
can provide advice regarding the
manufacturer or your security service
Fire Services may charge a fee for
requirements. If you install a smoke
provider.
callouts initiated by security
detector/alarm connected to your
companies on your behalf if there has
security system, it must be in addition
been no sign of fire when they arrive.
to the smoke alarms required to be
the ASIAL website or you can email
In some states this fee is over $1000.
installed to meet mandatory legislative
security@asial.com.au to request
requirements in your state.
your copy.
The legislative requirements for the
28 //SECURITY INSIDER OCT/NOV 2012
A PDF version of the Consumer Guide is available for download on
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 29
ASIAL NEW MEMBERS
WELCOMETO OUR NEW MEMBERS ASIAL is pleased to welcome the following new members (including Corporate, Associate and Affiliate members) who have joined the Association over the past few months. CORPORATE MEMBERS
Blue Security Qld
Endura Security Pty Ltd
Admiral Security Services
BlueCorp Security
Evolution Traffic Control Pty Ltd
Advanced Communications Riverina
Bluestar Security Services
FalconCorp Security Services Pty Ltd
Agilient Pty Ltd
Britech Security Pty Ltd
Forebode
AIG Security Pty Ltd
Casa Security
Foresight Security Planning Pty Ltd
Alert Venue Services Pty Ltd
Cato Logistics Pty Ltd
Fortress Security Solutions
Alied Security Solutions Pty Ltd
CCTV Express Pty Ltd
Get Smart Gadgets
Allcorp Security Pty Ltd
CCTV Online Security
GROUP 3 SECURITY
Allied Security Australia Pty Ltd
CDIK Pty Ltd
Group Force Security Pty Ltd
All-Locks Master Locksmiths Pty Ltd
Celebrity Security Pty Ltd
Grouped Property Services Pty Ltd
APS - Ability Protection Services Pty Ltd
CG security
GTE Security Services
APSE Group
CMS Data & Electrical Engineering
Guard Dog Security Services
Arc Security Systems Pty Ltd
Pty Ltd
Guard19 Security Group
Archangel Security
Communicable Pty Ltd
Guardian Alarms
Aspect Group (WA) Pty Ltd
Comsecure Australia
Guardian Security Solutions
Ausi Security Solutions
Conceptual Technology Solutions
H & H Security Australia Pty Ltd
Australia Wide Security and Protection
Pty Limited
Haven Protection Services
AUSTRALIAN AIR HOLIDAYS
CounterThreat Security Services Pty Ltd
& Investigations
Australian Operational Security Service
Coupar Angus Security
Holler Security Services
Australian School of Security and
CPD Consulting
I Spy Security Services Pty Ltd
Investigations
Cross Link Security Pty Ltd
Insperata Integrated Systems Pty Ltd
Authorized Security Pty Ltd
CSI Security Australia
Integra Security Solutions PTY LTD
Base Security Pty Ltd
Customised Security Group Pty Ltd
Intellectual Synergy Pty Ltd
Basec Pty Limited
Digimax Security Pty Ltd
Intercept Security
Bens Data Communications &
E Tec Security
Intervid
Electrical Services
Empowered Learning
IWS Services Pty Ltd
SECURITY INSIDER OCT/NOV 2012// 29
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:05 PM
Page 30
ASIAL NEW MEMBERS
WELCOMETO OUR NEW MEMBERS JC Protech-tion Security
PSR Security
simPRO Software Pty Ltd
Justus Protective Services Pty Ltd
PTPERT Pty Ltd
Sonic Security Services Pty Ltd
Knight Security Group
QA ELECTRICAL PTY LTD
Specialized Infrastructure Security
Leader Security
Radiant
SSG Security
Lighting Art & Science Pty Ltd
RCZ Australia Pty Ltd
Stanthorpe Security
Link Enterprise Solutions Pty Ltd
Renown Security Group
Steel Security Group Pty Ltd
Lookup.Com
Rent-A-Cop Pty Ltd
Sunrise Security Services Pty Ltd
Lykos Protection Group Pty Ld
Resolution Security Services Pty Ltd
Tactical K-9 Group
Maja Security Services
Rhads Investment Pty Ltd
Tamtek Australia Pty Ltd
March Networks (Australia) Pty Ltd
Robust Services
Taylorm Security
Master Security Group (MSG) Pty Ltd
S.A.S. 1 PTY LTD
Technical Installations
Maxims Security Group Pty Ltd
Safe Sheild Security Services PTY. LTD.
Tempest Security Solutions
Maxus Security Services Pty Ltd
Safeline Security Service
That's All Protection
McAtamney Pty Ltd
Salcom
The Ultimate Protection Group Pty Ltd
Megabase Pty Ltd
Scope Protective & Data Solutions
Third Eye Surveillance Pty Ltd
Metro Communications
Pty Ltd
TJ Services NSW
Mounted Security and Asset Protection
Secu Corp
Trisquared Pty Ltd
MR Security Pty Ltd
Secure Az Pty Ltd
Trust Security Solutions
National Vetting Services Pty Ltd
Secure City
Twin Cities Security
Netcorp GPS Pty Limited
Secure Plus Asset Protection Pty Ltd
United Protocol Security Holdings Pty Ltd
North State Security
Securex Pty Ltd
United Risk Management Group Pty Ltd
NQ Security
Securezone Security Services
Urban Crowd Control Pty Ltd
On The Spot Cleaning and Security
( AUS) Pty Ltd
VCPG Security Services
Pty Ltd
Securimax
Vice Security Port Lincoln
Online Security Protection Pty Ltd
Security Advisers Australia Pty Ltd
Vodafone Hutchison Australia Pty Ltd
Paragon Risk Management Pty Ltd
Security Awards Pty Limited
Water Ratz Security Pty Ltd
Patrons Protective Services
Security Network Protection Group
Wayne L Hall Pty Ltd
Perth Security Services
Pty Ltd
Weslo Staff Pty Ltd
Platinum Protection Solutions
Security Risk Management Pty Ltd
Yates Electrical & Communications
Pop-A-Lock
Security2u Australia
Zone Advanced Protection Systems
ProCorp Security Services Pty Ltd
SERA Group Pty Ltd
Pronto Security Pty Ltd
Shanx Security
30 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 31
MEMBER RECOGNITION PROGRAM
ASIAL MEMBER RECOGNITION PROGRAM Between 1 May and 14 September
New Era Enterprises
Taylor's Property Services Pty Ltd
2012, the following ASIAL members
Pronet Security & Data
Armitage Alarms Pty Ltd
achieved recognition as either a
AEK Management Aust. Pty Ltd
silver or bronze member:
Technical Solutions International
ASIAL Member Recognition Levels
Nepean Regional Security Pty Ltd
• Platinum: 25 years + membership
P M Securities Pty Ltd
• Gold: 16-24 years membership
Silver (11-15 years membership)
• Silver: 11-15 years membership
Butlers Not Only Windscreens
• Bronze: 6-10 years membership
Mibyte Technology
Bronze (6-10 years membership)
Securacore Pty Ltd
Siga Consulting
Diplomatic Security Protection Services
G & M Honeyman Pty Ltd
Pty Ltd
Vladimir John Halaska
the ASIAL Member recognition
Lamson Concepts Pty Ltd
Into Security
program or would like to find out
Davlin Security Group
Eris McCarthy Pty Limited
more, visit
City Coast Security
E & K Richardson Family Trust
www.asial.com.au/Memberrecognitio
The Illawarra Business College
SIMS Security Systems Pty Ltd
nprogram.
Marbia Security Installations
Controlled Access Solution Pty Ltd
If you have not already signed up to
SECURITY INSIDER OCT/NOV 2012// 31
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 32
IR ADVICE & SUPPORT
SURVEILLANCE DEVICES–ARE EMPLOYERS LOOKING AT ALL OFTHE IMPLICATIONS? By Chris Delaney
Advances in technology have added new dimensions to employers' opportunities to monitor employee conduct. However, not all states and territories have in place legislation that cover surveillance in the work place. Other surveillance legislation both State and Federal may impact on an employer’s opportunity to gather and use the information. Surveillance devices usually cover optical, tracking, listening and data. Data surveillance devices are devices or programs capable of being used to record or monitor the input of information into, or the output of information from a computer. Global Positioning Satellite (GPS) systems, software for monitoring of email and internet use, CCTV surveillance and phone recording applications are all readily available for use by employers to ensure the health and safety of employees and to identify performance and conduct issues should they arise. The aim of this article is to provide some direction on what legislation exists and what the implications are for employers. It is not intended to be exhaustive or cover every scenario.
Tracking Devices In New South Wales the Workplace Surveillance Act 2005 (the Act) covers the use of surveillance systems in the
32 //SECURITY INSIDER OCT/NOV 2012
workplace.The Act regulates both the use of CCTV, computer and tracking surveillance devices. New South Wales also has the Surveillance Devices Act 2005, which defines a “tracking device” and how it may be used. In NSW, NT and the ACT a tracking device is one that is capable of being used to determine the location of a person or an object, whilst in Victoria (Surveillance Devices Act 1999 (Vic)) determining the location must be the primary purpose of the device. For example in a recent case , Fair Work Australia (FWA) found at the first instance that an electronic device which was capable of reporting the geographical position of a vehicle was not an 'electronic tracking device' for the purpose of the Surveillance Devices Act, as the 'primary purpose' of the system was to monitor the environment in which coldstored goods were being transported. For this reason, the employer was not required to notify the employee that it was installed. In Victoria, the Surveillance Devices Act 1999 also
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 33
IR ADVICE & SUPPORT
regulates the use of data surveillance devices. Western Australia is similar to NSW.Their legislation is the Surveillance Devices Act 1998 (WA). In South Australia tracking devices are defined, but nothing in the legislation prohibits or even regulates their private or commercial use. There is no state legislation dealing with tracking devices in either Queensland orTasmania.
Listening Devices Most states have legislation dealing with listening to and/or recording conversations, however there are subtle (yet extremely important) differences, most evident in the definition of “private conversations” and the rules relating to “consent”. In Victoria, a party with the consent of the other parties to a conversation may record the conversation or install the device to record the conversation. In a case run in he Federal Court the Court held that a secretly taped conversation was admissible as evidence as it did not contravene the Surveillance Devices Act, because one of the parties to the conversation had intended to tape the conversation.This meant that it did not fall within the definition of 'private conversation', which requires 'the parties' to the conversation to desire it to be private. Whilst the secret taping could be seen as an invasion of the privacy and as involving underhand tactics, it could not be said to have breach the Act. In New South Wales the laws are similar, however a party to a conversation may record it, without the consent of others to protect the own lawful interests if necessary at a later point in time. (Surveillance Devices Act 2005 (NSW)). Queensland is similar to NSW. A private conversation is defined as one where the principal parties could reasonably expect not to be overheard. If it is not a private conversation the use of a listening device may not be restricted. (Invasion of Privacy Act 1971 (QLD)). The ACT is similar, however there is not an exception for where the parties may expect to be overheard (Listening Devices Act 1992 (ACT)). Northern Territory prohibits the installation, use or maintenance of a listening device used to record or monitor a private conversation without the consent of the parties or where it is known that it will be without the consent of the parties (Surveillance Devices Act 2007 (NT)). In South Australia you may not use a listening device to overhear, record, monitor or listen to a private conversation without the consent of all the parties, unless it is in the course of your job, in the public interest or for the protection of your interests. (Listening and Surveillance Devices Act 1972 (SA)). Tasmanian legislation allows the recording of a conversation with the consent of one of the principal parties if
it is to protect the interests of the parties (Listening Devices Act 1991(TAS)).
Optical Surveillance Devices The common misconception is that these devices are cameras, CCTV or mobile phone cameras, however also included are binoculars, telescopes and the like as they allow observation – recording is not the only activity covered. In New South Wales you can only install an optical surveillance device in premises or motor vehicles with the consent of the owner or occupier. In a workplace you must give employees 14 days notice in writing of the use of overt devices. Covert devices require the approval of a magistrate (Surveillance Devices Act 2005 (NSW) and Workplace Surveillance Act 2005 (NSW)). In Victoria using an optical surveillance device to view or record a private activity, regardless of where it is taking place, SECURITY INSIDER OCT/NOV 2012// 33
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 34
IR ADVICE & SUPPORT
is prohibited (Surveillance Devices Act 1999 (VIC)). Queensland legislation proscribes the use of an optical surveillance device without the consent of the person where they are in a private place or could reasonably expect their actions to be private. Private acts are defined in the legislation (Criminal Code Act 1899 (QLD)). In South Australia and Tasmania and the ACT optical surveillance is not restricted by specific legislation however may come under listening devices legislation if it records sound. In Western Australia, optical surveillance devices cannot be used to view or record a private activity, regardless of where that activity takes place (Surveillance Devices Act 1998(WA). The Northern Territory is similar to WA.
Workplace surveillance may constitute adverse action It is possible that an employer's actions in carrying out workplace surveillance could invoke a breach of the expansive general protection provisions of the Fair Work Act 2009 (FW Act). The general protection provisions in the FW Act prohibit employers taking certain 'adverse action' against employees. The surveillance of an employee (either within or outside the workplace), even where compliant with any existing surveillance legislation, could potentially constitute 'adverse action', if it is held to 'alter the position of the employee to the employee's prejudice'. There is an argument that the invasive nature of surveillance, particularly where it might monitor personal conversations or emails, could be construed as adverse to an employee's right to privacy in the workplace.
Introducing workplace surveillance and Consultation Employers should be aware that the introduction of workplace surveillance may require it to be dealt with under a consultation clause in an applicable modern award or enterprise agreement. It is always better to consult with employees and develop policies that are acceptable to both parties and meet the operational and legislative needs of the workplace. Most modern awards and the Fair Work Act require consultation where a decision with have a significant impact on employees for example termination of employment. It is important that employers are aware of whether the
introduction of surveillance would set off the consultation. Failing to consult with employees may result in fines or penalties from a Court. Employers should ensure that when introducing the use of workplace surveillance devices, that they provide an explanation to employees of when and how any form of surveillance will work, how investigations or data audits will be conducted and the ramifications of any breaches.
Relying on Surveillance as Evidence Evidence obtained from surveillance devices will not always be accepted as evidence in litigation.This will depend in part upon the particular forum of the proceedings, and also whether the employer has notified employees that the surveillance is in place. Courts have the discretion to exclude evidence that was obtained 'improperly or in contravention of an Australian law', unless 'the desirability of admitting the evidence outweighs the undesirability of admitting evidence'. In NSW covert surveillance would not be admissible, if the relevant court authority had not been obtained under the Workplace Surveillance Act. Relying solely on surveillance without other supporting evidence can result in an unsuccessful outcome in unfair dismissal claims. In 2008 the AIRC ruled that the dismissal of two employees for misrepresenting the extent of their medical condition was unfair. The employees were both on restricted duties when they were both captured on video surveillance during a weekend camping trip undertaking activities that were allegedly inconsistent with their restrictions. Both employees had their employment terminated for misconduct. In the unfair dismissal claims, the Australian Industrial Relations Commission (AIRC) found that the video surveillance footage, in the absence of evidence from the treating doctor, was not enough to prove that either employee had misrepresented the extent of their injuries to the treating doctor.The failure to corroborate the evidence that both employees had misrepresented their medical conditions resulted in the dismissals being unjust and unreasonable. The content of this article is intended to provide a general guide to the subject matter. It is not, nor is it intended to be legal advice. Specialist advice should be sought about your specific circumstances before making any action.
Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au
34 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss5_44pp
26/9/12
5:35 AM
Page 35
DESIGNING OUT CRIME
THE ROLE OF SECURITY IN DESIGNING OUT CRIME By Dr Lindsay Asquith*
We view the security industry as an untapped knowledge bank... The Designing Out Crime Research Centre (DOC) is internationally recognised as a leader in innovative, creative and socially responsive design. DOC is a joint initiative of the University of Technology, Sydney (UTS) and the NSW Department of Attorney General and Justice. Our ability to integrate crime risk, Safer by Design principles and crime research into the exploration and identification of crime problems and assessment of design recommendations is a rare attribute.We work with a breadth of clients, from government agencies to private companies, and apply a range of methods and skills that are unique to our multidisciplinary team. Central to our way of working is wherever possible to avoid taking a ‘countermeasures’ approach to reducing crime. Problem-solving in the area of safety and security often focuses on countermeasures – solutions that focus on constraining individual behaviour, manifest in interventions such as physical barriers, increased security, increased CCTV, and harsher punishments for offending.This approach can contribute to fear and the perception of fear, causing environments to feel, paradoxically, less safe than before and initiating a spiral of under-use that can eventually create environments that foster crime. At DOC our design team reframes the initial problem context with the aim of redefining a crime or security problem in terms of broader social and environmental issues.This process makes the problem more amenable to design interventions and allows designers to remain focused
on desired outcomes rather than fixating on the problem itself. One of the tools we use in the reframing process is stakeholder and duty holder mapping, where we aim to engage and empathise with the people and organisations connected with the situation in which the problem occurs. Our aim is to ascertain their stake and their current role within the problem context. The security industry is a common stakeholder in many of our place-based projects, yet the industry’s needs and experience are often under-represented in the design process.This is a lost opportunity.We view the security industry as an untapped knowledge bank, and believe that by engaging with security
expertise at the start, designers get a richer design process that results, ultimately, in better design solutions. An example of the importance of engaging the security industry in the design process is illustrated in some recent work we carried out for the City of Sydney in the Kings Cross area. Kings Cross, with its high proportion of bars and clubs, attracts about 30,000 people (most under 30 years of age) every Friday and Saturday night, and has a well-established reputation for problems such as drunkenness, fights, petty theft, drug dealing and sporadic violence. Over the years, law enforcement tactics such as increased police presence, restrictions on trading, and increased CCTV and security
SECURITY INSIDER OCT/NOV 2012// 35
INSIDER_Oct/Nov 2012 Iss5_44pp
26/9/12
5:35 AM
Page 36
DESIGNING OUT CRIME
personnel at clubs have been employed to solve these issues but they have persisted. In search of a more effective alternative to this ‘law-and-order’ approach, we turned our attention to the social and environmental context of Kings Cross to inform the design process.The revellers getting into trouble at Kings Cross are, overwhelmingly, young people looking for a good time in a precinct apparently made for the purpose. So what goes wrong? To answer this question we tried to reframe these (apparently) criminal issues using the analogy of a music festival. Events such as the various music festivals held in Sydney each year are comparable to Kings Cross in the number of revellers they attract; they are also at risk of many of the same alcohol and crowd-fuelled problems. Knowing that a single well-publicised disaster could signal the demise of all future events, festival organisers aim to anticipate the problems that get their patrons into trouble with others and the law and manage them in a positive, non-antagonistic way. In talking with the security industry as a key stakeholder we learned that the industry plays a big role in crowd management at these sorts of events, where specially trained and tasked personnel are integral to the smooth functioning of the event and the safety of patrons. Redefining Kings Cross at night as a major event and looking the problem from a crowd management and public safety point of view (rather than a law enforcement point of view) helped our designers come up with many new ideas. The current situation at Kings Cross is that buses and trains stop at 1am, around two hours before most partygoers are ready to go home.This leads to crowds of bored, frustrated and aggressive people queuing for indemand taxis in the early hours of the morning. Our designers proposed increased transport, as well as a
system of temporary signage to help partygoers find an alternative train station with a late-night service. In Kings Cross people congregate around a few big clubs and often the queues for each are long, causing congested footpaths and dissatisfaction among those waiting. Our designers proposed a smartphone app that would allow patrons to check the waiting time for the next club before leaving the one they are in. Another suggestion was to encourage pedestrian movement down the adjacent laneways by creating relaxed ‘chill-out’ spaces equipped with drinking water fountains to help combat intoxication. A significant amount of crowdrelated disorder at Kings Cross results from (often inebriated) patrons being unable to find their way around. At DOC we proposed a system of very visible,
approachable young guides in bright Tshirts who would help partygoers navigate the area and provide specific health and safety assistance if needed. This would also help security personnel concentrate on issues that require their specific knowledge and training. This example in Kings Cross provides insight into the value of drawing on stakeholder expertise and experience and why the security industry is an important partner. The first Design and Crime Conference and Exhibition is being held in Sydney on December 12-13th 2012 and real life problems like Kings Cross will be workshopped by internationally renowned academics and practitioners involved in this rapidly growing field. We’d love to involve security in this conversation.Visit www.designandcrime.com to find out more and register your attendance.
*Dr Lindsay Asquith is a Research Officer with the Designing Out Crime Research Centre, Faculty of Design, Architecture and Building, University of Technology Sydney.
36 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss5_44pp
26/9/12
11:26 AM
Page 37
SIG 2012
The 24th annual Security In Government conference was held at the National Convention Centre, Canberra from 3 – 5 September. ASIAL was a major sponsor of the event which attracted 400 conference delegates and over 95 exhibitors.
Paul Cave AM, Chairman and Founder, BridgeClimb
The Hon Nicola Roxon MP, Attorney-General
SIG 2013 bewill held Canberra from the 12th-14th August 2013 SIGwill 2013 beinheld in Canberra from 12 -14 August SECURITY INSIDER OCT/NOV 2012// 37
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 38
ASIAL Certified Security Monitoring Centres*
Current as at: 13 September 2012
Company (short form name)
Australian Security Industry Association Limited
State
Cert. No.
Grade
NSW
366
A1
09 Mar 2013
Allcare Monitoring Services
WA
379
A2
28 Feb 2014
ARM Security
WA
360
A1
10 Mar 2013
ART Security
VIC
392
A1
30 Sep 2014
Calamity Monitoring
NSW
383
A1
20 Mar 2014
Central Monitoring Services
NSW
380
B1
21 Mar 2014
Commonwealth Bank of Australia
NSW
389
A1
24 Sep 2014
Energize Australia
VIC
391
C2
18 Mar 2014
Golden Electronics
TAS
395
A1
17 Oct 2014
Grade One Monitoring
NSW
378
A1
13 Feb 2014
Grid Security Services
NSW
381
A1
18 Mar 2014
GSS Asset Management
QLD
385
C2
31 Oct 2012
Instant Security Alarms
QLD
365
A1
29 May 2013
Insurance Australia Limited (operating with Insurance Australia Data Centre)
NSW
377
C1
17 Jan 2014
ISS Security
NSW
373
B3
25 Nov 2013
VIC
393
A1
08 Aug 2014
NSS Group
NSW
384
A1
07 May 2014
Onwatch
NSW
375
B1
08 Oct 2012
Paul-Tec Australia
NSW
367
A1
28 Feb 2013
Protection Pacific Security
VIC
394
C2
9 Aug 2014
RAA Security Services
SA
358
A1
12 Dec 2012
Secom Australia
NSW
374
A1
14 Dec 2013
Sectrol Security
VIC
369
B2
19 Aug 2013
ADT Security
Linfox Armaguard
Securemonitoring
Expires
VIC
370
A1
23 Nov 2013
NSW
386
A1
04 May 2014
Security Alarm Monitoring Service
SA
387
A1
18 Jun 2014
Security Control Room
VIC
362
A1
06 May 2013
Sesco Security
WA
364
A1
03 Jun 2013
SMC Australia
QLD
372
A1
07 Dec 2013
SMC Australia
VIC
371
A1
16 Dec 2013
SNP Security (Newcastle)
NSW
368
A1
17 Aug 2013
SNP Security (Sydney)
NSW
390
A1
31 May 2013
Spectus
WA
376
A1
28 Dec 2013
State Government Protective Security Service
QLD
388
C1
22 May 2014
Westpac Banking Corporation
NSW
382
A1
19 Mar 2014
Woolworths Limited
NSW
351
C1
04 Nov 2012
Securenet Monitoring Services
*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.
38 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:11 PM
Page 39
HOT PRODUCTS
Kenwei’s popular touch sense intercom is now available in a 2-wire model ■ Central Security Distribution > 1300 319 499 ■ Email > enquiries@centralsd.com.au ■ Web > www.centralsd.com.au Supporting up to two external door stations in addition to two standard CCTV cameras, the KW-S702C-T series can be easily operated yet provides an impressive list of features. Directly PAGE any one or all four room stations at the press of a button, view the front door camera and remotely unlock the door or gate. The Do Not Disturb feature allows a room station to be isolated and CCTV surveillance cameras can be added to improve security even further. Up to three extra monitors, available in black or white finishes are supported, and best of all... it’s a 2 wire product.
HF-1 Needle-Proof Kevlar Metal Detection Gloves ■ UniGuard Management & Security > 1300 133 366 ■ Email > sales@uniguard.com.au ■ Web > www.uniguard.com.au
NEW!
HF–1 gloves give the operator the ability to have hands free metal detection with the protection of Kevlar. This gives the wearer added protection from hypodermic needles, knives and razor blades. They are light weight and comfortable to wear as well as being easy to use with no adjustments necessary for use. Just switch on and they are ready to go. Available as a pair or singularly. Product Specifications: Sizes: L, XL, XXL, Weight: 149g (approx), Battery: Standard 9V Alkaline, Battery Life: 400 hours, Sensitivity: 0.5g, Warranty: 12 month manufacturer warranty.
New Video Analysis Tools For The MOBOTIX Q24M ■ Central Security Distribution > 1300 319 499 ■ Email > enquiries@centralsd.com.au ■ Web > www.centralsd.com.au MOBOTIX has enhanced image data processing inside the camera with the MxAnalytics video analysis tools thus offering new and valuable information sources. For example: How many people go in and out of a selected entrance during the day? Which shelves in the shop attracted the most customers this month? MxAnalytics makes it possible to track the movement of people and objects in the image and to collect statistical behaviour data. For this purpose heat maps, highlighting the most frequented areas, can be created and counting lines defined. All this added functionality is available as a free download for supported cameras.
NEW!
SECURITY INSIDER OCT/NOV 2012// 39
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:12 PM
Page 40
HOT PRODUCTS
Pelco Digital Sentry Network Video Recorder – DSSRV ■ Pelco by Schneider Electric > +612 9125 9310 ■ Email > pelcoaustralia@pelco.com ■ Web > www.pelco.com Flexible IP VMS for mainstream security applications The new Pelco Digital Sentry Network Video Recorder provides all the power you need to maximise HD recording and leverage existing analogue investments. With 280 Mbps bandwidth, support for up to 128 IP streams, increased storage options and built-in reliability, this powerful new platform delivers more HD capability than ever before.The new Pelco Digital Sentry can accommodate up to 64 analogue cameras at D1 resolution and full frame rate. Simplify and optimise your video security platform and choose the new Pelco Digital Sentry as your onestop solution for all the HD and analogue recording power you need.
NEW!
New Tamper Evident Chamber ■ Harcor Security Seals & Bags > +612 9454 4200 ■ Email > sales@harcor.com.au ■ Web > www.harcor.com.au The high level of security, environmental and cost benefits offered, are increasing the popularity of reusable tamper evident bags. Designed specifically to set a new standard in tamper evident security, Harcor has launched the Only Tamper Evident Chamber. We’ve created a range of different TEC chambers to suit the needs of our clients. These chambers all include Harcor’s newly patented “Fracture Safe” design. In addition to the increased security, the new robust chambers continue to provide reliable sealing and easy opening/closing of reusable security bags. For additional information on reusable tamper evident bags or to see a demo of the TEC Chamber please visit www.harcor.com.au
simPRO Field Mobility ■ simPro > 1300 139 467 ■ Email > sales@simpro.com.au ■ Web > www.simpro.com.au Your time is money and your hours are billable. Cut your travel and admin time down by at least 20% per day per person with simPRO Field Mobility. Our range of simPRO Field Mobility options let you and your staff stay connected and keep your entire system up-to-date with real-time overview of the labour, material and equipment costs incurred, the margin you have applied and the invoiced amount. Our SmartPhone version is optimised for phone sized devices such as Android, Windows Mobile, iPhone and devices such as the Datalogic Elf. Get out and about with simPRO Field Mobility and simplify your business processes so you can spend more time making money, not chasing it.
40 //SECURITY INSIDER OCT/NOV 2012
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:12 PM
Page 41
HOT PRODUCTS
Inner Range Rack Mount Enclosure ■ For more information contact: ■ Web > www.innerrange.com ■ Web > www.centralsd.com.au Inner Range has released a universal Rack Mount Enclosure designed for use with its Concept and Integriti system hardware. Featuring a truly universal design that allows virtually all Inner Range System Controllers or LAN modules to be installed into a 19” rack equipment cabinet without restricting critical access to cabling, termination of connections or access for commissioning and maintenance purposes. Flexible installation options allow the rack mounted drawer to be configured to meet a vast array of specifications, allowing mix & match installation of System Controllers, Universal Expanders, Relay Cards, Access Control Modules, Input Expanders, UniBus Expansion Cards, Multipath Communications Devices and up to 4 Doors of fully Intelligent Access Control. Inner Range Melbourne: www.innerrange.com.
NEW!
Award Winning PANOMERA ■ CR Kennedy > +613 9823 1555 ■ Email > pviggiano@crkennedy.com.au ■ Web > www.crkennedy.com.au/surveillance Dallmeier is famous for creating the world’s largest Casino surveillance systems in places such as Macau and Singapore. Panomera is Dallmeier’s completely new camera technology for surveillance of very large areas. It offers a panoramic overview with realtime HD recording, so can significantly reduce infrastructure requirements. Projects such as Airports, sporting arenas etc previously requiring huge numbers of cameras, can now be covered with Panomera. Unlike Megapixel systems, Panomera uses H.264 encoding to deliver up to 51 megapixels in real time. Panomera won the coveted “CCTV Camera Equipment of the Year” Award at IFSEC 2011.The first showing of Panomera in Australia was at the Security 2012 show.
Smartphone Control for Concept 3000/4000 Systems ■ For more information contact: ■ Web > www.innerrange.com ■ Web > www.centralsd.com.au Inner Range has released a WEB interface kit designed to provide convenient control of Concept Security Systems via any web browser. It is optimized for use on portable smart touchscreen devices such as iPhones, iPads, Android Mobile Devices and Tablet PC's, but can be used on any device with a WEB browser application. Smartphones can be used to remotely control Concept Security Systems from anywhere in the world.There are no additional apps to install or purchase – simply use your devices existing web browser.The user screens are intuitive and provide a simple user-friendly layout that is very easy to use. The Concept WEB interface provides Multi-User login, Arming & Disarming of Security Areas, Locking & Unlocking of Doors, Control of Home Automation Devices and viewing of system reviews events.
NEW!
SECURITY INSIDER OCT/NOV 2012// 41
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:12 PM
Page 42
ASIAL NATIONAL CALENDAR OF EVENTS 2012/2013
OCTOBER
NOVEMBER
QLD Industry Breakfast Briefing 7.30-9.00am, 10 October 2012 Niche Event Spaces, Stones Corner, Brisbane Speakers include: representatives from QLD Fire & Rescue Service and the Fair Work Ombudsman.
VIC Industry Breakfast Briefing 7.30-9.00am, 23rd November 2012 Quality Hotel Batman's Hill on Collins 623 Collins Street, Melbourne Speakers include: a representative from the Victorian Fire Service.
ACT Industry Breakfast Briefing 7.30-9.00am, 17th October 2012 Belconnen Premier Inn, Canberra Speakers include: representatives from ACT Fire Service and the Fair Work Ombudsman SA Industry Breakfast Briefing 7.30-9.00am, 18th October 2012 Sebel Playford Hotel, Adelaide Speakers include: representatives from SA Metropolitan Fire Service and the Fair Work Ombudsman.
NSW Industry Breakfast Briefing 7.30-9.30am, 28th November 2012 Mantra Hotel, Parramatta Speakers include: representatives from the Security Licensing & Enforcement Directorate (SLED) and the Fair Work Ombudsman. ASIAL 43rd Annual General Meeting 28th November 2012 8.45am, Mantra Hotel, Parramatta
WA Industry Breakfast Briefing 7.30-9.00am, 19 October 2012 Hotel Northbridge, Perth Speakers include: The Hon Liza Harvey MLA (pictured), Minister for Police and Emergency Services.
2013
TAS Industry Breakfast Briefing 7.30-9.00am, 19 October 2012 Hobart Function and Convention Centre Speakers include: a representative from the Tasmanian Fire Service.
MAY
SECURITY INDUSTRY LEADERSHIP PROGRAM 23-25 October 2012 Macquarie Graduate School of Management Conference Centre.
JULY
FEBRUARY Security Industry Leadership Program 19-21 February 2013 Melbourne Business School 200 Leicester Street, Carlton VIC 3053
2013 Australian Security Industry Awards for Excellence 2 May 2013 Park Hyatt Hotel, Melbourne.
Security 2013 Exhibition & Conference 24-26 July 2013, Sydney Convention & Exhibition Centre, Darling Harbour.
To find out more register online www.asial.com.au/eventscourses or email events@asial.com.au
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:12 PM
Page 43
INSIDER_Oct/Nov 2012 Iss4_52pp
25/9/12
7:12 PM
Page 44