Security Insider Magazine Show Issue 2010

Page 1

INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:05 PM

SECURITY

Page 1

THE MAGAZINE FOR SECURITY PROFESSIONALS

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION

[MAG AZINE] VOL.15 | ISSUE.4 | AUG/SEP 2010

OFFICIAL EVENT GUIDE

Security2010 EXHIBITION AND CONFERENCE 1 – 3 SEPTEMBER 2010 SYDNEY CONVENTION & EXHIBITION CENTRE

47 25

PP255003/02390

The Peak National Body for the Australian Security Industry


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:05 PM

Page 2


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:05 PM

Page 3


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:05 PM

Page 4


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:05 PM

Page 5


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 6

CONTENTS VOL.15 | ISSUE.4 | AUG/SEP 2010

22

Security in Government heads in the right direction

34

26

Official Security 2010 Conference & Exhibition Show Guide 08 10 12 14 17 20

21

| President’s Message | Reform of the NSW regulatory

34

| Australian Security Medal Announced

One small step for common sense: A giant leap for security policy

| Official Security 2010 Conference & Exhibition Show

model – back to the future?

Guide

| Helping women avoid pregnancy discrimination | Personal medical/security alert devices using 000

67 68

| ASIAL Certified Security Monitoring Centres | Adverse Action (Unfair Dismissal) “All inclusive” rates

| Government moves to fight against Phoenix tax fraud | Security Officer Survey – Speaking Up for Safety

71 74

and paid parental leave | Hot Products

64

Trends in commercial armed robbery

| Frank Sales

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Editor Bryan de Caires | security@asial.com.au Editorial Enquiries Angela Maan communications@asial.com.au Advertising

6 //SECURITY INSIDER AUG/SEP 2010

Aleisha Rees | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Prepress Webfx2 digital | design@webfx2.com.au Editorial Contributors Lance Smith and Erin Louise, Rod Cowan, Chris Delaney. Print + Distribution Nationwide Published bi-monthly Estimated Readership of 10,000

[Next Issue]: Oct/Nov 2010

Publisher

Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases to: security@asial.com.au. Internet references in articles, stories and advertising were correct at the time of printing. ASIAL does not accept responsibility for misleading views. Copyright© 2010 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at www.asial.com.au.

ISSN 1442-1720


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 7


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 8

PRESIDENT’S MESSAGE

THE END OF THE ROAD FOR CO-REGULATION? New South Wales has long led the way

increased licence fees to fund a larger

mandatory membership, the major risk is

nationally in promoting higher standards

bureaucracy will result in any meaningful

that it will encourage smaller and less

and compliance within the security

improvement in compliance levels across

scrupulous providers to operate under

industry through the co-regulatory

the industry (particularly among smaller

the radar and beyond the control of

partnership between industry and

operators).

industry associations.

Government.The improvements have

The ICAC report also noted that

been in the areas of promoting national

proper processes to assess and monitor

Where to now?

consistency in licensing, improved

the performance of Approved Security

ASIAL’s concern is that these changes

standards and professionalism.

Industry Associations were not in place.

will effectively signal the end of co-

The Government’s recent

ASIAL has for many years advocated to

regulation and the implementation of the

announcement to abandon the co-

the NSW Government that it needed to

agreed COAG reforms on developing a

regulatory partnership may well place

strengthen the requirements for these

uniform and consistent approach to

many of these improvements at

associations to ensure greater

industry licensing.

significant risk and take the industry

accountability and performance. A well

backwards.

functioning co-regulatory framework

there is a compelling case for greater

Rather than disengaging with industry,

would have delivered the additional

industry engagement in framing

Industry Regulator (SIR) will perform a

compliance and auditing services being

compliance and enforcement

greater regulatory and enforcement role

sought by Government within its current

approaches to address issues such as

and will become part of the NSW Police

cost structure and the fees being paid

rates of pay, sham contracting and

Force State Crime Command and be

by industry.

phoenixing.

As part of the changes the Security

renamed the Security Licensing &

It is unfortunate however that ASIAL’s

Meaningful and long lasting

Enforcement Directorate (SLED). Industry

advice was not acted upon and that now

improvements in the industry will only be

will bear the full brunt of funding the

the Government is introducing wholesale

achieved through a genuine co-

additional 33 personnel within SLED at

change which risks reversing the positive

regulatory partnership between

an initial cost of $4.7 million per year.

outcomes achieved together under the

government and ‘recognised’ quality

co-regulatory framework.

industry associations.

Diverting the blame

It is widely acknowledged that of the

It is an inherent right of any industry

The changes are in response to the

ten approved associations, only ASIAL

to have a say in shaping its own destiny.

Independent Commission against

undertook the necessary investment to

The proposed changes take away this

Corruption (ICAC) report into Corruption

fulfil its obligations including expending

right and hands over industry control to

in the Provision of Security Industry Training. The report identified that the SIR and the Vocational Education and Training Accreditation Board (VETAB) mismanaged the 2007 licence upgrade process and increased the risk of corruption in relation to security training. Industry now appears to have been penalised and blamed for the NSW Government’s failure to correct internal faults within the SIR (in dealing with the 2007 license issues) and with VETAB (in the ongoing accrediting and proper auditing of training providers). Furthermore, no evidence has been provided to show that imposing

over $500,000 to promote to consumers

Government bureaucrats.This is not in

the need to use licensed security

the interests of the industry, and more

providers.

importantly the community as a whole.

8 //SECURITY INSIDER AUG/SEP 2010

From the very outset, ASIAL’s position on co-regulation was that it was about improving standards and the level of professionalism within the industry through a partnership between industry and Government. In accepting this responsibility ASIAL chose not to increase membership fees (70% of ASIAL members pay less than $275 per annum), rather it focused on providing additional benefits and services. Whilst ASIAL accepts the Government’s right to terminate

Ged Byrnes ASIAL President


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 9

With Australia’s best surveillance solutions, life’s good. In hotels, homes, corporations, retail chains, airports and casinos, LG provides just the right surveillance solution – and C.R.Kennedy can tailor them to your needs. LG is one of the world’s great electronics companies, creating leading-edge security technology, including DVR’s, cameras and accessories. And C.R.Kennedy matches this quality with total surveillance solutions and a dedicated local support network right across Australia. We bring you the right LG surveillance product at the right price. You are supported by dedicated technical advice from any of our state offices or authorised resellers around Australia and New Zealand. C.R.Kennedy’s fast and efficient service is recognised as the best in the business. Combined with LG’s world-leading technology, life’s good.

Victoria 9823 1533 viccctv@crkennedy.com.au New South Wales 9552 8350 nswcctv@crkennedy.com.au Queensland 3862 6222 qldcctv@crkennedy.com.au South Australia 8410 0533 sacctv@crkennedy.com.au Western Ausralia 9381 7144 wacctv@crkennedy.com.au New Zealand 09 276 3271 cctv@crknz.co.nz Australia www.lgcctv.com.au New Zealand www.lgcctv.co.nz CRK26213IN


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 10

INDUSTRY NeWS

REFORM OF THE NSW REGULATORY MODEL BACK TO THE FUTURE? The Independent Commission Against Corruption’s (ICAC) December 2009 report on the findings of Operation Columba demonstrated that more work needs to be done to ensure ongoing compliance with the regulatory regime for the NSW security industry. On its release in December 2009, ASIAL welcomed the findings of the ICAC Report. Among the ICAC report’s key findings included that the Security Industry Registry and Vocational Education Training Advisory Board mismanaged the September 2007 licence upgrade process. “Despite their concerns about the competence of security officers and the quality and integrity of security training, and their knowledge of past corruption in the industry, the SIR and VETAB did not apply this knowledge to the security licence upgrade process. They did not identify all the corruption opportunities or have in place successful strategies to minimise them or detect corrupt activity.The upgrade process increased the risk of corruption by increasing the opportunities and instead of solving the problems in relation to security training, it magnified them.” (ICAC Report on the Provision and Certification of Security Industry Training) The report also found that “… not all Approved Security Industry Associations (ASIAs) are currently capable of effectively carrying out their role in ensuring master licensee compliance with the legislation and the industry Code of Practice and their performance has not, to date, been well-monitored by the body tasked to do so: the Security Industry Council” ASIAL has for many years advocated to the NSW Government that it needed to strengthen the requirements for these associations to ensure greater accountability and performance. A well functioning coregulatory framework would have

10 //SECURITY INSIDER AUG/SEP 2010

delivered the additional compliance and auditing services being sought by Government within its current cost structure and the fees being paid by industry. While the ICAC’s findings and recommendations related to security industry training issues, the NSW Government decided that they had broader relevance to the industry as a whole. Accordingly, it chose to abandon the co-regulatory partnership with industry and provide additional resources to the NSW Police Force’s Security Industry Registry’s (SIR), which will be renamed the Security Licensing and Enforcement Directorate. SLED will report to the Commissioner of Police via State Crime Command (an operational policing command). It will assume responsibility for all integrity-related functions and compliance and will recruit an additional 33 personnel.To fund the additional personnel at SLED, an additional $4.7m annually will be levied on the security industry.The Government has sought industry input on how this charge should be applied. The Government has advised Master licensees that they may choose to minimise the impact of increases to their licence fees by either negotiating reductions in their industry association fees, or by choosing to no longer be

members of associations. Legislation will be introduced to the NSW Parliament in September to: • Make sure all powers provided for under the Security Industry Act 1997 that are necessary for the effective conduct of compliance auditing, may be exercised by civilian employees of the NSW Police Force. • Remove the industry monitoring role of the Security Industry Council and instead focus on the Council’s role as an advisory body to the Minister for Police. • Remove the current mandatory requirement placed on security industry Master licensees to retain financial membership of one of ten approved industry associations. • Specify the increases to licence fees to fund the expanded functions of the SIR. The SIR will undertake to communicate with industry to educate members and to communicate industry suggestions and concerns back to the NSW Police Force and the NSW Government more generally. The Government has advised that it will take time to fully implement the changes due to the need to recruit additional staff, however it is expected this process will be completed by the end of the 2010/11 financial year.


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 11


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 12

INDUSTRY NeWS

HELPING WOMEN AVOID PREGNANCY DISCRIMINATION The Fair Work Ombudsman has launched a national campaign designed to inform women of their workplace rights while pregnant. About 100,000 information packs are being sent to hospitals, GPs and other health service providers in metropolitan and regional areas throughout Australia. Pregnant women will receive the packs when they register with their preferred health professional after becoming pregnant. The packs contain magazines and pamphlets detailing the workplace rights of pregnant women, what constitutes pregnancy discrimination, the harm pregnancy discrimination can cause and how the Fair Work Ombudsman can help women who experience it. Acting Fair Work Ombudsman Leigh Johns says the Agency received more than 70 pregnancy discrimination complaints last financial year. The Fair Work Ombudsman has had the power to investigate discrimination in the workplace since July 1, 2009. Fair Work inspectors can also investigate allegations of discrimination on the grounds of race, colour, sex,

sexual preference, age, physical or mental disability, marital status, family or carer responsibilities, religion, political opinion, national extraction or social origin. Mr Johns says maternity discrimination has been one of the most common complaints, prompting the new national awareness campaign. “We want women to be aware of their rights so they can identify when they are being subjected to pregnancy discrimination and know they can turn to the Fair Work Ombudsman for help. The news of impending parenthood should be met with delight, not discrimination,” he says. Mr Johns says pregnancy discrimination can include a range of employer behaviours, such as: • failing to let an employee take parental leave, • declining to keep a job open, • demotion during pregnancy or on return from parental leave, or • refusing to promote an employee because they are pregnant. “Threatening to engage in any of these discriminatory acts also constitutes

ASIAL BOARD ELECTIONS The Australian Electoral Commission (AEC) advised that the Nomination Roll for ASIAL’s upcoming Board Election closed Friday, 16 July 2010. Only Financial Corporate members of the Association are included in the roll.The Australian Electoral Commission has provided the timetable for ASIAL’s Board election. A nomination form can be found in the Members area of the ASIAL website. The timetable for the ASIAL Board election is as follows: Voter Roll closed:

2 July 2010

Nominations open:

2 August 2010

Nominations close:

23 August 2010 at 12:00noon

Ballot opens:

1 October 2010

Ballot closes:

22 October 2010 at 5:00pm

12 //SECURITY INSIDER AUG/SEP 2010

discrimination,” Mr Johns says. The Fair Work Ombudsman has information about maternity discrimination available at its website at www.fairwork.gov.au or on the Fair Work Infoline on 13 13 94 8am-6pm weekdays.


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 13

Access Professional Edition Challenging your concepts of access control 1. Easy to Install Complete IP based system allows you to use the existing IP network. Plug’n’play IP device detection reduces installation time. Compact modular design features DIN rail mounted swap and go controllers. Backed by a Bosch 3 year warranty.

2. Easy to Program 3UH GHȻQHG GRRU FRQȻJXUDWLRQV DOORZ WKH VLPSOH choice of a door type from a list of templates. Assign these to the controllers and you’re done. Door controllers feature an LCD display with EXLOW LQ GLDJQRVWLFV IRU HDV\ IDXOW ȻQGLQJ

3. Easy to Use Using the secure operator client, add up to 3 cards per user and assign doors. The system supports up to 5 card formats simultaneously. Integrated card photo ID and card creation software as standard makes it easy to design and manage cards. 6WDQGDUG SUHGHȻQHG UHSRUWV IRU WKH LQVWDOOHU DQG HQG XVHU including Muster Reports to check who is on site at any time. 7R ȼQG RXW PRUH RU WR DUUDQJH D GHPRQVWUDWLRQ RI Access Professional Edition, FRQWDFW RXU RIȼFHV RQ WKH QXPEHUV EHORZ RU YLVLW XV RQ WKH ZHE DW ZZZ ERVFKVHFXULW\ FRP DX

Sydney (02) 9672 1777

Adelaide (04) 00 488 415

Perth (08) 9240 5455

Melbourne (03) 9558 8088

Brisbane (07) 3267 0442

Email: stsales@au.bosch.com

Bosch APE ad_0710.indd 1

VISIT US AT

STAND D30 6HFXULW\ 0DVWHU /LFHQVH 1R

27/07/2010 1:05:22 PM


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 14

INDUSTRY NeWS

PERSONAL MEDICAL/SECURITY ALERT DEVICES USING 000 Following up on ASIAL’s call for consumers to carefully question providers of personal activation devices and to be wary of the claims being made relating to the devices’ ability to elicit a response by Police, Fire or Ambulance, Victoria Police have taken a position. Victoria Police has recently reviewed the use of personal medical/security alert devices that have an automatic dial up function for pre-programmed telephone numbers, some of these specifically recommend including the emergency 000 number as a preprogrammed number. Some retailers of personal medical/security alert devices or“auto dialers” have made claims that the use of the emergency 000 number has been approved by emergency service providers when this is not the case. These claims are misleading and

14 //SECURITY INSIDER AUG/SEP 2010

expose the user to a number of risks, including an activation not being responded to by emergency services or possible prosecution if activations are not emergency situations.

The Victoria Police Alarm Policy reflects that these devices, which are not monitored, where the emergency 000 number is pre-programmed, will not receive a police response.


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 15

INTELLIGENT SENSORS JUST GOT EVEN SMARTER!

C

M

Y

CM

MY

CY

CMY

Fence Detection System

Buried Cable Detection System

Digital Microwave Link

K

PROVEN PERIMETER PROTECTION. NEW SINGLE-PLATFORM SIMPLICITY. Southwest Microwave is rolling out exciting changes to our INTREPID™ family of perimeter detection systems, with performance enhancements to field-proven sensor technologies and the simplicity of new, single-platform networking. Universal set-up software, scalable system controllers to suit any site parameters and integrated I/O modules align with a common, open-architecture communications protocol for easy deployment of any combination of INTREPID™ sensors and auxiliary devices on one network platform - letting you protect each portion of your perimeter with the optimal sensor for that location. Finally, high performance perimeter protection meets true systems convergence. To learn more, visit www.southwestmicrowave.com/intrepid

Perimeter Systems

Australia Pty Ltd

PERIMETER DETECTION SOLUTIONS SINCE 1987 Palmgrove Business Park, Unit E8 13-15 Forrester St., Kingsgrove, NSW 2208 Australia | Ph: +61 2 9150 0651 info@perimetersystems.com.au | www.perimetersystems.com.au

SEE US ON STAND E39


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 16

Construction and Property Services Industry Skills Council CPSISC Resource Database CPSISC has developed a comprehensive and searchable Resource Database which lists all existing resources against individual qualifications and units of competency within the Construction and Property Services industries. The Resource Database includes CPSISC resources, industry-developed resources, sector-specific, unit-specific, generic and WELL resources. The database not only provides a summary of resources but also information about the format and content of the resources, and how they can be accessed. The Resource Database will initially contain the major resources available and be slowly built up as more resources become available. There are currently 120 resources available. To access the Resource Database, go to: http://www.cpsisc.com.au and click on the Resource Database button. CPSISC has resources for Certificates II and III in Security Operations. For more information go to: http://www.cpsisc.com.au/portal/products/StockInformation.asp?stockNo=165 CPSISC Resource Centre CPSISC has also developed a Resource Centre. This is where you’ll find a variety of information, tools and support resources to help you to implement Construction and Property Services Training Packages. The Resource Centre contains a range of flexible, highly visual and interactive resources to meet your delivery and assessment needs - whether you are looking for specific sector tools, professional development, or wish to link up with other RTOs to share resources and best practice. Follow the links to find the support you need for your training and assessment activities. The Security Sector Guide will assists with the use and understanding of the Security Sector qualifications and units of competency within CPP07. Whether you are an employee, a job seeker, an employer, a trainer or assessor, or another person interested in security skills, this guide will be of use. It contains advice on: An introduction to the Security Sector Career and learning pathways Licensing requirements Process for implementing training Broader human resource applications

Careers in Electronic Security Information on careers in the electronic security industry is available on the CPSISC website now! Electronic Security keeps people safe and helps prevent physical violence. It protects premises and information. It is the most effective tool in detecting crime and bringing perpetrators to justice. The website includes detailed information about Working in the Electronic Security Industry and what kind of jobs are available. Jobs fit into the following four main categories: 1 – Technician 2 – Operation 3 – Sales 4 – Management To find out more go to: www.cpsisc.com.au

For more information on the CPSISC Resource Database, the Resource Centre or Careers in Electronic Security, go to www.cpsisc.com.au or email: info@cpsisc.com.au


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:06 PM

Page 17

INDUSTRY NeWS

GOVERNMENT MOVES TO FIGHT AGAINST PHOENIX TAX FRAUD The federal government has passed legislation to strengthening laws against Phoenix activity.The legislation is designed to stop unscrupulous operators who deliberately liquidate a company to avoid paying liabilities including workers wages, superannuation and other debts owed to business creditors and also the ATO. The Assistant Treasurer, Senator Nick Sherry, has highlighted a significant strengthening of laws to fight fraudulent 'phoenix' activity which has been passed by Parliament. Phoenix activity involves the deliberate liquidation of a company to avoid paying liabilities - including workers' wages and superannuation, debts owed to other business creditors and also taxes. The business then 'rises' and continues operations through another corporate entity, controlled by the

same person or group of individuals, often with a very similar name and free of the debts. "This new legislation will make it much harder for unscrupulous

operators to engage in phoenix activity and stops them from cheating workers and other business people of what they are rightfully owed," the Assistant Treasurer said.

Fully licensed and insured - SCEC Endorsed staff

Reviews and Audits

Security risk assessments Technology reviews Maintenance audits Procedure reviews

Design

CCTV Access control & biometrics Physical security Security alarms (incl Type 1)

Management

Project management Security management

Level 5, 520 Collins Street, Melbourne, Vic. 3000 Email: administration@connleywalker.com.au Web: www.connleywalker.com.au Phone: (03) 9621 1077

SECURITY INSIDER AUG/SEP 2010// 17


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:07 PM

Page 18

INDUSTRY NeWS

PHOENIX TAX FRAUD (CONT) “It does this by expanding the use of 'security deposits' and significantly increasing penalties." The reforms are contained in the Tax Laws Amendment (Transfer of Provisions) Bill 2010. "Security deposits act like a bond, which the Tax Commissioner can direct a taxpayer to make in relation to an existing or future tax liability," the Assistant Treasurer said.

"The Commissioner can also accept security in another form, such as a mortgage over property or a guarantee." The new provisions expand the scope of security deposits from applying only to income tax to applying to all taxes that the Tax Commissioner administers. The penalties for non-compliance increase for individuals from 20 penalty units ($2,200) to 100 penalty units ($11,000). For companies, they increase

from 100 penalty units ($11,000) to 500 penalty units ($55,000). The legislation also contains important new procedural safeguards that will govern how the Tax Commissioner uses the security deposit mechanism, including requiring the Commissioner to write to the taxpayer clearly identifying the reasons why the deposit has been requested and outlining the taxpayer's review rights.

GET YOUR FREE COMPANY WEB PAGE ON THE ASIAL WEBSITE

ASIAL MEMBER FLYERS AVAILABLE FOR PURCHASE

A growing number of members are utilizing their FREE new ASIAL member benefit – a company webpage on the ASIAL website.The webpage allows ASIAL members to upload their own logo, images, video and product/service information into a web page with a dedicated URL. The new web page will be available in two different templates and four colour schemes. If you haven't already done so, sign up at www.asial.com.au now to get started today.

ASIAL’s member flyers are now available for purchase from the ASIAL online store.These promotional flyers set out the benefits of using an ASIAL member company and can be distributed to potential commercial clients and domestic clients. The flyers include a space for you to attach your business card on the reverse.

18 //SECURITY INSIDER AUG/SEP 2010


Grade A1 ASIAL Certified Monitoring Centre Bureau Specialist Monitoring ISO 9001 Quality Certified 24/7 Line Commissioning Flexible Tailored Security Services

1300 723 185 www.grade1.com.au Multiple GPRS Reporting Platforms Guardcell

PERmaconn™ leaders in GPRS security technology

GPRS Monitoring from $4.00 + GST per week TM

“ Your Grade A1 Monitoring Centre ” Grade One Monitoring Pty Ltd A.B.N.: 76 119 807 644 Phone: 1300 723 185 Fax: 1300 723 195 Email: info@grade1.com.au Web: www.grade1,com.au Master Licence #: 409 475 562 ASIAL Member #: 031080

Secure


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:10 PM

Page 20

INDUSTRY NeWS

SECURITY OFFICER SURVEY - SPEAKING UP FOR SAFETY As part of the 3-year benchmark study of the security industry in Australia funded principally by the Australian Research Council, ASIAL in conjunction with the University of South Australia and Griffith University, is conducting a study into how practices can be developed to ensure security officer and public safety. Feedback is being sought from individual licence holders about their experiences and views on how to improve safety for security officers and the people they work with. ALL responses will remain anonymous. The survey can be completed by visiting www.asial.com.au

Security System Programming Data Ownership and Transferability Guidelines ASIAL has prepared draft guidelines have been prepared for member comment. For more information visit www.asial.com.au

DEDICATED MICROS WINS IFSEC AWARD FOR CLOSED IP TV

category at the IFSEC 2010 Security

Dedicated Micros has taken out the

security of a traditional CCTV system to

Integrated Security Product of the Year

the IP environment.

20 //SECURITY INSIDER AUG/SEP 2010

Industry Awards for its Closed IP TV system, a plug & play IP video product solution which offers all the physical

AS4421: Guards and patrols standard Following a review initiated and chaired by ASIAL, the Guards and Patrol standard has now been updated.The draft is now available for public comment. Comments close on the 16th September 2010.


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 21

INDUSTRY NeWS

AUSTRALIAN SECURITY MEDAL ANNOUNCED A group of major security buyers has formed the Australian Security Medal Foundation (ASMF). ASMF’s key aims are to publically recognise outstanding security operatives and security professionals and to promote ‘Security’ as a profession. It is proposed that two categories of medal be struck: 1. The Australian Security Valour Medal (ASVM), recognising security operatives for an outstanding act or acts of valour; an action(s) demonstrating valour, courage and decisiveness above and beyond the call of duty.The ASMF guideline is to award between one and a maximum of ten ASVM’s per annum. 2. The Australian Security Medal (ASM), recognising the outstanding career and character of the security professional receiving it.The ASMF

guideline is to award between one and a maximum of three ASM’s per annum. “ASM recipients will be those who have demonstrated a consistent, highlevel contribution to the wider community, possibly via innovative non-core business activities and projects, or via extraordinary performance in their professional role,” says Craig Millar, Chairman of this year’s Awards panel.“A citation for non-award nominees will also be considered based on the number and quality of nominations received.” For more information about the Australian Security Medals Foundation and the nomination criteria, visit www.australiansecuritymedal.com

BUREAU ALARM MONITORING GUIDELINES ASIAL has prepared draft guidelines to assist members in helping to: • Help ensure high standards of service and ethics are maintained by ASIAL members. • Clearly outline the responsibilities of monitoring providers and bureaux to ensure fairness to both parties. • Address areas of potential contention between bureaux and monitoring providers. The draft guidelines are available on the ASIAL web site for comment – www.asial.com.au

SECURITY INSIDER AUG/SEP 2010// 21


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 22

SIG

SECURITY IN GOVERNMENT HEADS IN THE RIGHT DIRECTION After a year hiatus and new organisers, the Security in Government conference was back on again this year. Rod Cowan* was there to watch proceedings. The Security in Government conference (SIG), this year, was all about…well…security in government. To find that remarkable, you would have to know that in the past few years — let’s face it, since 9/11 “changed everything” — the SIG agenda has been hijacked by terrorism, turning it into something of a national security gabfest. Of course, you can’t talk publicly about really interesting aspects of terrorism and counter-terrorism, the upshot being a string of speakers offering less — often far less — information than you’d find with a decent search engine. As a result, the core audience — agency security advisers, policy wonks, bureaucrats, information technology security advisers and private security contractors to Government —were

Security in Government Conference delegates

fast losing interest. After all, their daily concerns are more about things like preventing walk-in theft, loss of information,

speakers.To be sure, there were government representatives,

or illegal computer use, rather then watching out for Osama

such as the Federal Attorney-General, Robert McClelland,

and his crew.The reality is if there were a terrorist attack, it

and the National Security Adviser, Duncan Lewis, among

would quickly become the business of first responders and

others. But, there were also speakers from the private sector,

then investigative agencies.The point is, yes terrorism is an

such as Paul Maihi, Head of Crisis & Security Management,

important issue, but probably as relevant on a day-to-day basis

Group Operations Westpac, and Michael Julian, General

to this crowd as design tips on security for kittens.

Manager, Westfield Security. Now, what’s that all about? Well,

SIG’s decline as a source of information and networking

amid the SIG rethink was the need to reflect the significant

opportunities was highlighted by the fact that this was the

policy shifts that have been taking place.You see, behind the

22nd SIG conference in 23 years — hardly anyone noticed

scenes it hasn’t all been about the War On Terror.There has

2009 slip by without one.

been a distinct broadening of the security agenda —

This year’s turnaround came about mostly because the

population, climate, organised crime and so on — and a

National Security Resilience Policy Division, part of the

realisation that Government is not the font of all knowledge.

Federal Attorney-General’s Department, picked up organising

Sure, if you want to know about the likes of locking stuff away,

the conference and decided to rethink the SIG concept with

go to a Government organisation. In the past, after all, it was

the aim of getting it back on track as the key Government

all about the “need to know”. Today, however, is about need to

security event on the conference calendar.

share. As such, building security systems around information

The first sign of difference in this year’s SIG — with the theme Securing Our Business — was the choice of

22 //SECURITY INSIDER AUG/SEP 2010

sharing is best found in private sector practices. SIG, therefore, is an excellent forum for building much-needed

>


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 23

SECURITY INSIDER

SECURITY INSIDER AUG/SEP 2010// 23


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 24

SIG

conduits between the public and private sector. Another sign of change was that the Federal Attorney-General had something more to say than a turgid Google search on the history of terrorism. Apart from A-G’s Department dumping speechwriters — with staff in the know writing the material now — there have been some significant changes in policies, approaches, and activities, perhaps best reflected in McClelland’s launch at SIG of the Government’s new Protective Security Policy Framework (PSPF). Okay, the policy wasn’t actually available on the day — having failed to emerge in time from the quagmire of what was then the Rudd administration — and the press release in point of fact ended: “More information about the new Protective Security Policy Framework is available at.”

See anything missing? In Government terms protective security comprises the physical, personnel, information and procedural measures that are put in place to safeguard Australia’s national security interests. “The new policy creates a more effective protective security framework by streamlining practices in order to achieve better security outcomes as well as reduce red tape, increase efficiency, eliminate duplication and reduce costs,” McClelland said. “The current framework was developed when the business of Government wasn’t as diverse as it is currently. In today’s security climate, Government and private sector partnership is essential and we need a system that can be tailored to the nature of the task, the identity of the parties and the relevant security issues considered.” The Protective Security Manual (PSM) had grown to over 250 pages, containing more than 400 different mandatory requirements. “The new framework contains just 33 with a tiered framework consisting of a range of core standards, policies and guidelines – some to apply across the board, and others to be developed by and apply to specific agencies, taking into account their individual work and function,” said McClelland. In short, anyone in the business of providing security to government had better get their head around the PSPF quick smart. (The information is now available at www.ag.gov.au/pspf.) So, was SIG an overall success? In addition to relevant and interesting content being on the money, all the numbers also headed in the right direction: Conference attendance was up by 20 per cent to 747 people; exhibition sales up by

CONFERENCE ATTENDANCE WAS UP BY 20 PER CENT TO 747 PEOPLE; EXHIBITION SALES UP BY 45 PER CENT TO 122 BOOTHS; AND SALES OF CONFERENCE TICKETS, BOOTH, SPONSORSHIP AND SOCIAL EVENTS PULLED IN $437,000.

White House rity Staff,The National Secu bersecurity, Cy for tor r Direc Painter, Senio Christopher

45 per cent to 122 booths; and sales of conference tickets, booth, sponsorship and social events pulled in $437,000, with a somewhat embarrassing — since the aim is not to make money — profit of somewhere between $120,000 to $150,000, which the organisers say will be ploughed back into next year’s SIG. There were a couple of minor downsides. A few people grumbled that the material did not go deep enough for their liking. Speakers, however, rarely win over such a large and diverse crowd, by lecturing at Masters level. Also, the conference dinner speaker from the US, Christopher Painter, Senior Director for Cybersecurity, National Security Staff,The White House, deserved better than chinking glasses, chatting, face-pulling and general hub-bub from a boorish segment of the crowd — mostly security providers, it has to be said. In fairness, Painter’s discussion was too interesting and too important for a dinner gig and should have been part of the conference proper. Next year’s organisers might want to think about a dinner speaker who is inspirational or funny — or even better, inspirational and funny. All of which is pretty much nitpicking. The only real downside, then, is it is tough to write a review — especially with any sense of wit or irony — about an event that goes well. And, this was one extremely tough review to write.

* Rod Cowan is an independent Contributing Editor. He can be contacted at rodcowan@securityisyourbusiness.com

24 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 25


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 26

MIKE ROTHERY: SECURITY POLICY

Mike Rothery, head of the Federal Attorney General’s National Security Resilience Policy Division. 26 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 27

MIKE ROTHERY: SECURITY POLICY

ONE SMALL STEP FOR

COMMON SENSE:

A GIANT LEAP FOR SECURITY POLICY By Rod Cowan*. Arriving at the Attorney-General’s Department’s glass and marble hotel style offices, complete with atrium and trendy coffee shop, the female voice on the other end of the reception desk phone tells me the man I have come to see, Mike Rothery, head of the Federal Attorney General’s National Security Resilience Policy Division, has just popped out to Gabyz to get a bite to eat. A short while later, Rothery greets me at the front entrance — dark suit trousers, pale grey shirt and regulation dark tie — holding a cardboard cup of hot chips in his hand.“Comfort food,” he says. He’s recovering from a bout of flu, courtesy of his kids. We make our way upstairs — via a drinks machine to buy a diet cola — to his corner office. But there are no downtown metropolitan views here. Instead, it looks over a sand-covered children’s play area with shade cloths, bouncy balls and buckets. Beyond that, a car park with Gabyz, a café a demountable building with plastic tables and chairs outside. The office is steel and blond wood

furniture, white wall, ash coloured carpet, and a plasma TV suspended from the ceiling. Next to the flat screen computer on the desk sits a large Macquarie dictionary, behind the desk chair, a traditional safe. Along the window shelf are stress balls, except they are in the shape of yellow rubber ducks with Govcert stamped on the side, save one shaped like a red heart. As we sit at a round meeting table with four chairs, Rothery slides a partially frosted glass wall with a white tyre track pattern across the middle, shutting his office from the open plan area. It is quiet. So quiet, you can hear the low hum of the air-conditioning. The 26-year veteran of Government bureaucracy speaks as someone who has confidence in his ability and is comfortable in his position… Security Insider: Thanks for your time. I wonder, in 2007 there was a change in leadership, what has happened in that time? Mike Rothery: Well, we in the Attorney-

General’s Department restructured at the end of 2008 to reflect a number of changes in the approach to homeland security with the change of government. One of those was to move to the allhazards approach, which is to try and make sure that the programs that we run and the effort that government makes to minimise risk to the community, that if we are going to spend time and effort on a capability, that we try and make that capability deal with the broadest number of hazards. Whether it is about command and control, or communications systems, or policy, it is about saying, rather than have, you know, a sort of stove-piped approach to dealing with terrorism, natural disasters, manmade hazards, such as infrastructure failure, it is to say, well can we actually develop capabilities that help mitigate all of those, or more than one? And, that’s an important commitment that the Government has made.The other is that the Prime Minister [Rudd] delivered a national security statement to Parliament in the end of 2008 broadening what we would normally call national security for it continued page 28 >

SECURITY INSIDER AUG/SEP 2010// 27


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 28

MIKE ROTHERY: SECURITY POLICY

to cover threats such as serious organised crime, major natural disasters, and what that has done is that it has sort of said that the way that government has organised itself, particularly the way that the Federal Government has organised itself, to deal with these threats of national significance is that we are now going to use that approach and the resources that have traditionally been assigned to dealing with those high end national security matter are now going to be applied to a broader range of threats.That, of course…. SI: The phone rings. It’s the boss. Rothery returns after a short conversation. MR: So, the Department’s restructure was in a good part to position the Department to achieve those outcomes; that is the all-hazards approach and to apply the approach that had been applied to serious matters of national security, to a broader range of threats, including things like serious and organised crime and major natural disasters. And, the consequence of that is that of that restructure is that we have invested in a more strategic approach to our emergency management work, through the creation of a new strategic policy area that is working with the States and Territories on a resilience-based approach, which was signed off by COAG in December 2009. We are also pursuing a resilience-based approach with our work for critical infrastructure, working on implementing recommendations from a review of cyber security that has part of that arrangement as well, and also looking at the other areas in the Department with regard to our operational co-ordination and crisis management arrangements and our capability development arrangements. So, it has been quite a comprehensive rethink about the way that the Department orders it outcomes. SI: What is it then that you see as your current mandate? MR: Well, the Division that I look after is the National Security Resilience Policy Division has it’s goal is to help prevent or mitigate the effects of hazards on the community, be it from natural disasters, be

28 //SECURITY INSIDER AUG/SEP 2010

it from infrastructure failure, or attacks on infrastructure, issues around cyber security from organised crime, or issues relating to things like terrorist accessing chemicals to make home-made explosives, or things around identity theft and identity fraud. So, the Division’s responsibilities are quite broad and they relate both to the way that we protect government from a security point of view, including cyber security, but also what do we do with the private sector? So, our partnerships with the private sector around things like critical infrastructure, cyber identity security, those things are all within the scope for the Division. So, it is a reasonably large slice of the domestic security policy. SI: That are of private partnership was obviously a big part of Security in Government [SIG conference] this year. There seemed to be a lot more talk about this working together with business, but what are the practical outcomes of that? MR: SIG is an interesting example.The Security in Government conference — traditionally a place for the security practitioners in government to come together, hear about changes in policy, learn about best practice — has in the more recent past been used to talk about national security issues, particularly terrorism issues more broadly, but we have made a conscious effort this year to bring it back to a practitioner’s forum. Now, one of the things that we thought about is about, well where is best practice? There had been perhaps a small degree of arrogance that government was the source of best practice in protective security and in some areas it clearly is. I think in terms of some the best capabilities in protective security being in cyber security, some of the best approaches to the prevention of surreptitious access to information, what government does is best practice and we probably have some things…lessons that can be passed on and shared with the private sector. But, I other areas of protective security, it certainly was my view that we were failing to exploit what I saw as a great deal of knowledge and competence that was in the private

sector, not only in terms of the security industry but in the way that security is done in business more generally.You know, if you want to know about best practice in CCTV, you would probably go and talk to a casino. If you want to talk about the protection of staff in high-risk areas, it is probably much more likely to be in the private sector than government. In some respects, we are lucky that we don’t have that — we do have in parts — but where do government agencies go to when that is an issue for them? When it is not something that is a common problem across agencies but is a common problem in many other industries and the private sector. So, one of the steps that we took was to try and invite some private sector speakers on to the SIG program. And, also to allow more industry delegates to actually attend SIG. Really, in part, to start to work with security professionals and get the networking across security professionals, be they in the private sector, be they in government, or be they in the security industry.The idea that we are just going to have a community that is only for security practitioners within government agencies seem to be cutting your nose off to spite your face. SI: There are limits, though, isn’t there? If you open it up too much, then you end up getting invaded by sales people, don’t you? MR: There is this sort of balance between having the conversation dominated by product placements or having a conversation where you actually find that the security practitioner in government have a lot in common with their counterparts in business.That’s not to say that there is not interest in finding out what is on the market or the capabilities that companies have in terms of services or products.There is an interest in that but it is not the only interest. It is not the only show. It is an issue about finding a balance. We also have to sort of push back on this sort of instinctive negative reaction that security sales people are just out to sell you a product and aren’t interested in what is good practice in the industry or what are the emerging problems or what are the

>


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 29


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:15 PM

Page 30

MIKE ROTHERY: SECURITY POLICY

emerging markets. We all want to be in a situation….[The same phone rings again.]…Sorry. Rothery goes to his desk and returns after another short phone conversation. SI: So, you were saying the interaction with sales people… MR: Yeah, so there has also got to be a maturing of this with the industry, as well. I mean, if the industry is going to be invited in to participate in strategising or to talk about the future and to talk about emerging issues, there has got to be a bit of maturity about that, in terms of maybe occasionally setting aside the immediate sales pitch for an opportunity to talk about the future.You know, when we engage with many of the big defence industry companies on things like cyber security, they are able to walk and chew gum at the same time; they are able to come in and talk strategically and then come in a week later and tell you about their latest product offering. IT would be good to have that relationship with the security industry more broadly. SI: At SIG there was an announcement of a new security policy — but the policy wasn’t actually available — what are the outcomes of that policy? MR: Well, that policy went live on the following Friday, so you can get it from www.ag.gov.au/pspf. The Protective Security Policy Framework [PSPF] is our first element of a new protective security policy for the Commonwealth. It replaces the governance section of the old Protective Security Manual [PSM]. At the moment, practitioners are using the two documents: the new PSPF for policy, and the old PSM for the practical elements of physical security, personnel security, information security etc. What is different about the new Protective Security Policy Framework is that it tries to separate policy from process. So, what it is asking CEOs to do is to guarantee certain security outcomes, but give them a degree of flexibility about how they achieve those outcomes, by taking what we would regard as a more conventional approach to risk. Previously, the PSM was very much driven by an understanding of

30 //SECURITY INSIDER AUG/SEP 2010

harm, that is classified material that would have a lot of damage to government is protected in almost absolute ways. And, other material that seemed to have less harm, then it has a lower regime of physical security in procedural security measures. So, it wasn’t really risk based, it was driven by impact not taking into account things like opportunity or likelihood of a particular attempt to steal or misuse information. What we have introduced is a more mainstream concept in accordance with the new ISO standard. But, you know, importantly, we have stated right up front that the purpose of having a protective security policy is not only to ensure the protection of information, but is actually also to ensure and enable information sharing. Now, the old policy never said that and what that meant was that whenever there was a need to interpret the policy, it was always interpreted in a way of, well, you default to protect and default to not disclose. Now, what we have made clear is that the purpose of having a policy — a standardised approach across agencies — is to actually enable the sharing of information across agencies.The security policy itself should not become the barrier to effective information sharing.Those things are conceptually fairly easy — they don’t take many pages to write — but they are a significant shift in terms of both the approach but also the outcome that the policy is trying to achieve. SI: Isn’t that a bit like rewriting the Bible? I mean have you had much resistance to these ideas? MR: I have to say that the reactions fall in to sort of two camps.There are those that are really excited by the idea of a riskbased approach, which will allow people to find more innovative ways of achieving the security outcome but also delivering services, particularly online.There are also some critics out there who sort of say you are moving us away from a compliance regime and a compliance regime is easy; you know what you have got to do, you don’t have to argue with people, you don’t have to make any calculations to risk, you just follow the rules… SI: …tick the boxes?...

MR: Yeah, and we are taking that safety net away. SI: Are you providing counselling for these people? MR: Well, we are certainly allowing a reasonably sober introduction period. We are releasing the policy framework, now. It will be another nine to twelve months before all of the other procedural parts of the policy are reviewed and published. We are working with the training centre here in the Attorney-General’s Department that provides training to Agency Security Advisors and Government. We are also working with people like the Audit Office to see how future audits of agency security will be done in accordance with the new policy framework. And, of course, that approach is going to permeate the more procedural parts of the framework, relating to things like IT security, physical security. It will start to take in things like aggregation, so should a single document or piece of information get the same protection as a million pieces of information? At the moment the rules say exactly the same. Common sense would say, if you have got a single place which is a rich source of data, you might need to defend that a bit harder than a single desk draw with one piece of information. That sort of approach is common sense. So, yes, we are asking people to change, but we are actually asking to change to something that is a little bit more intuitive, a little bit more real world, and takes into account the fact that most of the information we now store and create and send to each other is electronic, rather than bits of paper, and the old policy really was paper based. SI: What does this mean for business? If I was providing products or services to the Government, is this something I would need to get my head around? MR: Oh, I think so. I think, if you are a contractor for Government, some of those contractors at the moment have half a dozen security clearances in different agencies. As of 1st October, this year, the vast majority of contractors will only need to have one clearance at the highest level for the highest customer, which will then count for all of the other customers. I’m

>


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 31

QFG0184/Tails. Qantas Airways Limited ABN 16 009 661 901.

The Spirit of Australia ≥

No one knows Australia better than Qantas. That’s why more people choose to fly to and around Australia with us. That’s the spirit. The Spirit of Australia. qantas.com


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 32

MIKE ROTHERY: SECURITY POLICY

quite often told people have got four, five, six different security clearances, each of which they have to pay for as part of their contracts. So, for example, it is going to tidy that up, because we are going to have a new Australian Government security vetting agency, located in the Department of Defence, which will be doing the vast majority of security clearances. We are also going to be moving to portability of clearances.That is, when someone moves from agency to agency, those clearances will be recognised until they need to be re-validated. People won’t have to fill out the forms again.They won’t have to go through another process. Obviously, there is going to be, because of the risk-based approach, there is going to be the opportunity to introduce new and innovative security solutions, probably outside of, or broader than, the range of security treatments that government agencies have used in the past. And, I understand from my colleagues in the Defence Signals Directorate [DSD] that they are thinking of a similar approach around the security of the Internet connected IT, which is going to mean the possibility of some consideration of some new and different sorts of security products and services. SI: Looking at COAG for the moment. How far away is some sort of national framework within COAG, say, for guarding? MR: Well, there is an agreement for a national framework on the guarding services part of the security industry. Obviously, we are waiting for the implementation to be completed by the States and Territories and we are very keen that that happens.There has obviously been a little bit of slippage in some of the dates, but we are still working with the States and Territories to see whatever obstacles there are for them to implement the agreement. More broadly, one of the things that we have been approached on is around a greater recognition of proper, professional competencies and things like the consulting end of the market.That is not fully regulated across all the States and Territories, so some regulate, some don’t.

There are some differences there in terms of the professional standards that have to be met to achieve licensing or registration in different States. Obviously, for the Federal Government to assist, it would be our strong preference not to be sort of picking a winner; not to be saying it is going to be this part of the industry or that industry association and not that other peak body. Our preference would be that the industry itself comes to some sort of agreement on what does a security professional look like? And, [with] people with different qualifications, what does it mean that they are capable of doing? Because, a security consultant could be everything from visiting your home, telling you where your movement sensitive lights and door locks should be, through to someone that is working with a large multi-national corporation, looking at their arrangements for potential hostage taking of executives, when they are travelling overseas, or issues relating to difficult equations of mixing safety and security around things like oil refineries an gas plants.The types of competencies that are required, the type of experience you would expect someone to have, have to really be tailored to the particular task that you are giving them. So it is a complex sort of matrix of skills, qualifications, certifications, competencies, as well as all those issues about character, good reputation, sound business financials, and so forth. Our strong preference is that industry sort itself out and bring to Government a model that has got strong consensus across the industry.Then, we can have a look at talking to the State and Territory Governments about seeing that reflected in the licensing regime. At the moment it is so balkanised that there really is not an elegant alternative to what the State and Territories have already done. One can hardly blame the State regulators fore the approaches that have been taken, because no one has made it any easier for them. So, the body that has just been created [the Australasian Security Professionals Council], which we strongly support, which is doing this work of working with the peak bodies, working with the

industry associations, and building that consensus, which will then, hopefully, turn into some more detailed discussions about professional competencies and practitioner accreditation, that’s the way forward. If industry gets behind that and makes it work, then it becomes much, much easier for government regulators to link licensing requirements to these independent professional competencies. SI: Finally, what is your ambition for the future? MR: There is going to be some announcements in the next few weeks about our move from critical infrastructure protection to critical infrastructure resilience.This is our commitment to what we see as the benefits of a resilience-based approach for business and that is going to mean an entirely fresh approach to the relationship we have had with the critical infrastructure owners. We will be ramping up the services that CERT Australia delivers to the business community. It commenced operating at the beginning of the year, inheriting the work from Govcert.au, but we have got a while new range of activities and products that will be coming online for business in the second half, some of those interweaved with the new ISP security code of practice that has just been released. We are working with the States and Territories on a disaster resilience strategy for the whole of the country, around our ability to deal with both manmade and natural disasters. We have got to bring that back to leaders at the end of 2010.The core of a lot of this is our relationship with business. It is about the role that business has in things like identity security, cyber security, security of chemicals; our relationship with the security industry and the consultants around the security of the Australian Government systems and agencies; and, of course, our work with CERT Australia and critical infrastructure. So, we live and die on the strength of our relationship with the Australian business community. SI: Thanks again for your time. MR: Thank you.

* Rod Cowan is an independent Contributing Editor. He can be contacted at rodcowan@securityisyourbusiness.com

32 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 33


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 34


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 35


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 36


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 37

SECURITY 2010 CONFERENCE PROGRAM

3.40 pm – 4.30 pm

PLANNING FOR THE ‘UNTHINKABLE’: MANAGING RISK FROM ALL POTENTIAL HAZARDS f Gillies Crichton, Head of Assurance, Glasgow Airport Gillies Crichton explains how a well prepared and practiced crisis management plan can get a business back to operation after any disruptive event, whether a fire, storm or a terrorist attack. Having just such a plan worked for Glasgow Airport — up and running in just 23 hours and 59 minutes after a terrorist attack brought operations to a standstill.

4.30 pm – 5.15 pm

SPECIALIST PANEL - A DISCUSSION ON TACTICS FOR SAFER SPACES Places of mass gathering present attractive targets for crime of all levels as well as challenges for public safety. An expert panel with frontline experience and responsibility examines world best practice, tactics and technology for keeping the public safe in airports, shopping centres, and city precincts. Facilitator: Peter Davies, ACPO Lead on Security Industry Liaison and ACC (Protective Services) Lincolnshire Panellists include: P Gillies Crichton, Head of Assurance, Glasgow Airport P Steve Jackson, Head of Security, Qantas Airways Limited P Stacey Kirmos, Security Advisor/Safe City Operations, City of Ipswich

Thursday 2 September 9.00 am – 9.45 am

LEADERSHIP AMONG DIFFERING AGENDAS : GETTING THE BEST OUT OF PEOPLE WORKING IN A MULTI-AGENCY ENVIRONMENT f Nick Kaldas APM, Deputy Commissioner Specialist Operations, NSW Police Force Without leadership, different points of view can quickly develop into competing agendas which have the potential to hamper successful operations, no matter how worthwhile. Nick Kaldas — drawing on his international experience — explains how leadership can keep people on track.

9.45 am – 10.30 am

THE REALITY OF SUPPLY CHAIN SECURITY: UNDERSTANDING KEY DIMENSIONS TO MITIGATE LOSS f Graeme Mayne, Country Security Manager, DHL Supply Chain Australia No matter how effective your security may be, your weakest link may be somewhere beyond your immediate control. Graeme Mayne talks about how he manages supply chain security — from cooperation with others to working with standards — to mitigate risk to his business

10.30 am – 10.45 am

BREAK

10.45 am – 11.15 am

THE FUTURE OF SECURITY: A US PERSPECTIVE f Julie Stansfield Cabus, Diplomatic Security Special Agent / Regional Security Officer, US Mission, Australia

11.15 am – 12.00 pm

GOVERNMENT AND BUSINESS : WORKING TOGETHER TO PROTECT AUSTRALIANS f Paul Retter, Executive Director, Office of Transport Security, Department of Infrastructure, Transport, Regional Development and Local Government Public expectations and political responsibility means many businesses face regulatory controls when it comes to security. Paul Retter explains what happens behind the scenes in formulating Government policy in relation to transport security and what businesses can do to be part of the process.

12.00 pm – 12.45 pm

SPECIALIST PANEL - UNDERSTANDING THE ROLE OF PROFILING AND POLICY IN SECURITY MANAGEMENT Profiling is comparing the characteristics of a person thought to be a security risk to the available data on those known to have threatened, approached or attacked. The validity of profiling has been strongly criticised as the ‘profile’ is often little more than a shopping list of general traits which provide limited opportunities for intervening. This panel discussion examines the practicalities of profiling and the required shifts in policy to help security operatives move beyond rote questions to methods of identifying the behaviours that increase risk and the strategies that derail criminal intent. Facilitator: Steve Jackson, Head of Security, Qantas Airways Limited Panellists include: P Professor Martin Gill, Director, Perpetuity Research and Consultancy International P Dr Lisa Warren, Managing Director, Code Black Threat Management P Kim Langton, Director and Managing Partner, Asia Pacific, Chameleon Associates P Lizz Corbett, Managing Director, Training Group International

6HFXULW\ ,QVLGHU SS LQGG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 38

Security 2010 Floor Plan

Floor plan subject to change without notification, for an updated floor plan visit www.securityexpo.com.au

SHOW HOURS

Exclusive Exhibition Sponsor

Wednesday

1 September

9.30am - 5.00pm

Thursday

2 September

9.30am - 5.00pm

Friday

3 September

9.30am - 2.30pm

6HFXULW\ ,QVLGHU SS LQGG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 39

Think security

…THINK ASIAL … Consumers do! ASIAL invests heavily in promoting its members to business, government and domestic users of security, by providing direct links to those security providers who are bound by the ASIAL code of conduct and are committed to providing the highest standards. Join Australia’s peak national security body and access the strength, knowledge, benefits and resources exclusive to ASIAL members. To find out more visit www.asial.com.au/apply today.

The Peak National Body for the Australian Security Industry corporate design: ©2010 www.webfx2.com.au


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 40

SECURITY 2010 CONFERENCE PROGRAM

12.45 pm – 2.00 pm

LUNCH - PARKSIDE FOYER

2.00 pm – 2.45 pm

SECURITY STRATEGY FROM THE GROUND UP: PRACTICAL APPROACHES TO TARGET HARDENING Gary Heward, Director of Blast and Protective Design, MFD International Limited (UK) Beginning with determining how and for what purpose premises are used, Gary Heward examines the physical and operational vulnerabilities for a range of threat scenarios and some of the solutions, including protected building design, “Secure by Design” approaches, perimeter security, hostile vehicle mitigation, bomb shelters, safe rooms, and control room design.

2.45 pm – 3.30 pm

SURVIVE , SUSTAIN AND PROSPER : HOW STANDARDS HELP RESILIENCE f Jason Brown, National Security Director, Thales Australia Making the link between applying security standards and everyday business activity is not always easy. But, as Jason Brown explains, making the link can result in improved performance in people, asset and supply chain management while delivering better business resilience — and a higher profile for security departments.

3.30 pm – 3.45 pm

BREAK

3.45 pm – 4.30 pm

SPECIALIST PANEL - PUTTING SECURITY ON THE MAP : WILL IT EVER BE SEEN AS A PROFESSION ? Developing the security industry into a profession has long been the holy grail of some individuals and organisations. The Security 2010 Conference chairmen form a panel to face the audience — and the tough questions — about what it would take for a security profession to become a reality. Facilitator: Lizz Corbett, Managing Director, Training Group International Panellists include: P Prof. Martin Gill, Director, Perpetuity Research and Consultancy International P Steve Jackson, Head of Security, Qantas Airways Limited P Peter Davies, ACPO Lead on Security Industry Liaison and ACC (Protective Services) Lincolnshire P Rod Cowan, Writer/Director, Cowan Communications

4.30 pm

CONFERENCE CLOSE

Executive Briefings and Workshop

SECURITY STRATEGY AND MANAGEMENT Monday 30 August, 9.30 am – 4.00 pm f Presenter: Professor Martin Gill, Director, Perpetuity Research and Consultancy International UNDERSTANDING CRIME AND CRIME PREVENTION Tuesday 31 August, 9.30 am – 4.00 pm f Presenter: Professor Martin Gill, Director, Perpetuity Research and Consultancy International MEDIA MANAGEMENT WORKSHOP Tuesday 31 August, 10.00 am – 2.00 pm f Presenter: Rod Cowan, Writer/Director, Cowan Communications

For conference, executive briefings and workshop bookings visit www.securityexpo.com.au/conference and enter code INS

6HFXULW\ ,QVLGHU SS LQGG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:16 PM

Page 41

The Challenger evolution continues… TM

Improved Firmware: Extended alarm groups, door groups, floor groups, and time zones Software IUM: Up to 2,000 users with no hardware IUM module required

Enhanced IP Interface: Improved and lower cost IP connection to management software Kone IP lift interface: Next generation destination control lift management system Challenger Hi-O Gateway: Integration to ASSA ABLOY’s Hi-O (Highly Intelligent Opening) door technology TITAN 2.0: Windows 7 support, auto-backup & restore and self-registration

Challenger IP LAN Adaptor: Run Challenger RS-485 LAN over IP networks

What’s Next? Multi-operator, SQL based Windows management software Integration to ASSA ABLOY’s Aperio wireless door technology Forcefield Commend IP-Intercom support Forcefield off-site redundancy 3rd party GPRS alarm reporting support Plus much, much, more…

Witness the evolution at Security 2010 Australian Distributor NSW

VIC (02) 9897 7722

Rowville

(03) 9755 6922

Torrensville

Rosebery

(02) 9698 9698

Coburg

(03) 9383 2066

WA

Chatswood

(02) 8467 1467

QLD

ACT

www.das.com.au

SA

Granville

Fyshwick

(02) 6280 9630

Balcatta

Molendinar

(07) 5597 7203

TAS

Bowen Hills

(07) 3252 5512

Hobart

(08) 8150 9400 (08) 9241 3100 (03) 6272 0211


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 42


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 43

SECURITY 2010 A- Z LISTINGS

Company Name

6

Stand

Company Name

Stand

3 Dimensional Consulting ....................................iS15

Commend Australia ............................................. B30

Access Communications ......................................F13

Covetek Biometric Security.................................. G17

Western Digital .....................................................F40

Craig International Ballistics Pty Ltd ...................... J30

ADI Global Distribution............................................A8

Craig International Ballistics Pty Ltd ...................... J26

AGP Door Systems ..............................................E10

CSM Filing & Storage Solutions ........................... H33

AISA ....................................................................iS17

Dedicated Micros .................................................. D2

Alarmcorp...............................................................E2

Electro-Com (Aust) .............................................. C35

AlarmIP Australia ................................................. B21

Electronic Development Sales (Australia) Pty Ltd.. D44

Altech Computers................................................ G44

Electronic Keying Australia................................... B29

AME System Pty Ltd ........................................... G18

Emizon .................................................................A42

Anixter Pty Ltd..................................................... H24

E-Nose Pty Ltd.................................................... C42

Assa Abloy ............................................................ B8

Eos Australia Pty Ltd ........................................... D10

AusScott Guardian Systems .................................A22

EQL Networks & Security .................................... C13

Australian Security Industry Association (ASIAL)....F34

ETM Pacific Pty Ltd ............................................. D46

Australian Security Magazine (ASM)..................... K22

FAAC Australia......................................................E40

Australian Security Technology .............................F12

FSH Fire & Security Hardware Pty.Ltd. .................. B38

Avigilon................................................................ H22

Gated Solutions Australia..................................... D43

Axis Communications Pty Ltd .............................. D14

Geutebruck Pty Ltd ..............................................F30

Bens Wholesale Monitoring ..................................F18

Golf Cart Group .................................................... J36

BFT Automation Australia Pty Ltd ........................ G22

Gryffin Pty Ltd...................................................... D40

Biometric Access Systems Pty. Ltd...................... K32

GSS Global Security Services...............................E33

Biometric Innovations Pty Ltd ...............................F10

Guizhou New Era Union I.&E. Corp...................... C15

Bosch Security Systems...................................... D30

Gunnebo Australia Pty Ltd ....................................A27

BREON Enterprises Pty Ltd ................................. K38

Harcor Security Seals ..........................................F15

Brickcom Corporation ......................................... C31

HID Global........................................................... D33

Briell Marketing.....................................................E18

Hills Industries ....................................................... C2

B-Sealed ............................................................ H25

Hirsch Electronics.................................................A11

Building Services Recruitment ............................. G40

ICU Intercoms ..................................................... H18

C R Kennedy Total Surveillance Solutions ............ C40

Id Supplies ...........................................................F17

Centaman Entrance Control ...................................F3

ID Warehouse...................................................... C22

Central Security Distribution................................. D22

Infratherm Pty. Ltd. .............................................. K40

Chase Security Solutions..................................... B32

Ingersoll Rand Security Technologies ....................A38

CIC Secure...........................................................A24

Jacques .............................................................. C17

COE Limited .........................................................A15

Joinlink .................................................................A31

Colemans Group Australia Pty Ltd ....................... C44

Kaba Australia Pty Ltd ..........................................F22

LW ,

LG

L GG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 44

SECURITY 2010 A- Z LISTINGS

Company Name

Stand

Company Name

Stand

Kenwood Electronics .......................................... H50

RhinoCo Technology............................................ C16

Kobra Shredders Australia ................................... B18

Salto Systems Australia Pty Ltd ........................... G30

Kyodensha Technologies (M) SDN BHD............... H39

SAY Security Pl.................................................... K34

Lan 1....................................................................E13

scates Pty Ltd ..................................................... H36

LawMate Australia & eWitness............................. G35

Seadan Security .....................................................A2

Leda Security .........................................................F2

Secupro .............................................................. D41

Lockit Systems Pty.Ltd ........................................ C33

Security Distributors Australia .............................. B23

LSC Electronic Security ....................................... C30

Security Electronics & Networks Magazine .............A9

Magnetic Automation ...........................................E30

Security Merchants Australia Pty Ltd ..................... B2

Mega Fortris Australia Pty Ltd .............................. K36

Security Solutions Magazine ...................................F6

Merit Lilin Pacific P/L ........................................... G29

SecuSafe Pty ltd...................................................A17

Milestone Systems Australia Pty Ltd .......................E6

Shyh Ru Metallic Industrial Corp. ......................... B34

Mobotix AG ......................................................... B22

Sigma CCTV.........................................................A23

Motorola Australia Pty Ltd.....................................E14

simPRO............................................................... G15

Multicard ..............................................................A13

Sony Australia Limited ..........................................E22

National Communications.....................................F38

Sprint Intercom.......................................................A2

Natural Power Solutions Pty Ltd .......................... B36

Sprintquip Security Pty Ltd ...................................E36

Nuvico Australia......................................................A4

Suretek.................................................................A14

Omega Power Equipment Pty Ltd ........................F39

Syscan Technology Shenzhen ............................. H21

Oztime Technologies ........................................... G34

Takex America Inc ............................................... D29

Pacen Corp .........................................................iS18

Tecsec Training.....................................................A36

Paper Handling Equipment ...................................E34

TeleEye Holdings Limited ..................................... B14

Perimeter Systems Australia Pty Ltd .....................E39

Texolabs ...............................................................E45

Pitlok Security.......................................................A35

TouchStar............................................................ H30

POE Solutions / CCTV Hire...................................A30

Training Group International ................................. G36

Powdersafe Pty Ltd ..............................................A24

Videofied ............................................................. B26

PPC - Plastic Card Solutions ..................................F8

Virdi ..................................................................... B33

Rapiscan Systems .............................................. B44

Western Digital .....................................................F40

Listings subject to change without notification, for an updated list visit www.securityexpo.com.au

6

LW ,

LG

L GG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 45


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 46

SECURITY 2010 PRODUCT CATEGORIES

Access Control ........................................ Stand ADI Global Distribution.................................................. A8 AGP Door Systems .................................................... E10 Alarmcorp..................................................................... E2 AlarmIP Australia ........................................................ B21 Assa Abloy ................................................................... B8 BFT Automation Australia Pty Ltd ...............................G22 Biometric Access Systems Pty. Ltd............................. K32 Biometric Innovations Pty Ltd ......................................F10 Bosch Security Systems............................................. D30 Briell Marketing........................................................... E18 Centaman Entrance Control .........................................F3 Central Security Distribution ....................................... D22 Chase Security Solutions............................................ B32 Colemans Group Australia Pty Ltd .............................. C44 Covetek Biometric Security.........................................G17 Electro-Com (Aust) ..................................................... C35 Electronic Development Sales (Australia) Pty Ltd .......... D44 Electronic Keying Australia ......................................... B29 Eos Australia Pty Ltd .................................................. D10 FAAC Australia............................................................ E40 FSH Fire & Security Hardware Pty Ltd......................... B38 Harcor Security Seals ..................................................F15 HID Global ................................................................ D33 Hills Industries ............................................................. C2 Hirsch Electronics....................................................... A11 Id Supplies .................................................................F17 ID Warehouse............................................................. C22 Ingersoll Rand Security Technologies ......................... A38 Kaba Australia Pty Ltd .................................................F22 Kyodensha Technologies (M) Sdn Bhd........................ H39 Lan 1.......................................................................... E13 Lockit Systems Pty.Ltd ............................................... C33 LSC Electronic Security .............................................. C30 Magnetic Automation ................................................. E30 Mobotix AG ................................................................ B22 Multicard .................................................................... A13 National Communications............................................F38 Natural Power Solutions Pty Ltd ................................. B36 Pitlok Security............................................................. A35 PPC - Plastic Card Solutions .........................................F8 RhinoCo Technology................................................... C16 Salto Systems Australia Pty Ltd ..................................G30 Security Distributors Australia ..................................... B23 Security Merchants Australia Pty Ltd............................. B2 Virdi ............................................................................ B33 Alarms...................................................... Stand ADI Global Distribution.................................................. A8 Alarmcorp..................................................................... E2 AlarmIP Australia ........................................................ B21 AusScott Guardian Systems ....................................... A22 Bosch Security Systems............................................. D30 Central Security Distribution ....................................... D22 Colemans Group Australia Pty Ltd .............................. C44

6

LW ,

LG

L GG

E-Nose Pty Ltd........................................................... C42 GSS Global Security Services .................................... E33 Hills Industries ............................................................. C2 Hirsch Electronics....................................................... A11 Kyodensha Technologies (M) Sdn Bhd........................ H39 LSC Electronic Security .............................................. C30 Mobotix AG ................................................................ B22 RhinoCo Technology................................................... C16 Seadan Security ........................................................... A2 Security Distributors Australia ..................................... B23 Security Merchants Australia Pty Ltd............................. B2 Shyh Ru Metallic Industrial Corp. ................................ B34 Sprint Intercom............................................................. A2 Suretek....................................................................... A14 TeleEye Holdings Limited ............................................ B14 Videofied .................................................................... B26 Associations / Publications....................... Stand AISA ..........................................................................iS17 Australian Security Industry Association (ASIAL)...........F34 Australian Security Magazine (ASM)............................ K22 Security Electronics & Networks Magazine ................... A9 Security Solutions Magazine ..........................................F6 Barrier Protection/Bollards ....................... Stand AGP Door Systems .................................................... E10 BFT Automation Australia Pty Ltd ...............................G22 Colemans Group Australia Pty Ltd .............................. C44 FAAC Australia............................................................ E40 Gryffin Pty Ltd............................................................. D40 Gunnebo Australia Pty Ltd.......................................... A27 Harcor Security Seals .................................................F15 Kaba Australia Pty Ltd .................................................F22 Leda Security ................................................................F2 Lockit Systems Pty.Ltd ............................................... C33 Magnetic Automation ................................................. E30 Oztime Technologies ..................................................G34 Biometrics................................................ Stand Biometric Access Systems Pty. Ltd............................. K32 Biometric Innovations Pty Ltd ......................................F10 Chase Security Solutions............................................ B32 Covetek Biometric Security.........................................G17 Electronic Development Sales (Australia) Pty Ltd......... D44 HID Global.................................................................. D33 ID Warehouse............................................................. C22 Ingersoll Rand Security Technologies ......................... A38 Pacen Corp ................................................................iS18 Sigma CCTV............................................................... A23 Syscan Technology Shenzhen .................................... H21 Texolabs ..................................................................... E45 Virdi ............................................................................ B33 Cash Management .................................. Stand Mega Fortris Australia Pty Ltd ..................................... K36 Sprintquip Security Pty Ltd ......................................... E36 CCTV........................................................ Stand ADI Global Distribution.................................................. A8

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:31 PM

Page 47


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 48

SECURITY PROGRAM GUIDE

‘The AustralianSuper website is great for all sorts of superannuation information

Michael Bottomley, member.

AustralianSuper looks after more than $32 billion, for over 1.5 million everyday Australians.

and it’s easy to use.‘ Put us to work for you. Call 1300 300 273 or go to www.australiansuper.com

Run only to benefit members

This information is of a general nature and does not take into account your personal objectives, situation or needs. Before making a decision about AustralianSuper, consider your financial requirements and read our Product Disclosure Statement, which is available on our website or by calling us. Statements made by members have been reproduced with their consent and this consent has not been withdrawn at the date of publication. ‘Industry SuperFund’ logo used with permission of Industry Fund Services (IFS) and this consent has not been withdrawn at the date of publication. AustralianSuper Pty Ltd ABN 94 006 457 987 AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898.

48 //SECURITY INSIDER AUG/SEP 2010

AUSS 31006

16 investment choices Low fees


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 49

SECURITY 2010 PRODUCT CATEGORIES

Alarmcorp..................................................................... E2 Altech Computers.......................................................G44 AME System Pty Ltd ..................................................G18 Avigilon....................................................................... H22 Axis Communications Pty Ltd ..................................... D14 Bosch Security Systems............................................. D30 Brickcom Corporation ................................................ C31 C R Kennedy Total Surveillance Solutions .................. C40 Central Security Distribution ....................................... D22 Colemans Group Australia Pty Ltd .............................. C44 Dedicated Micros ......................................................... D2 Eos Australia Pty Ltd .................................................. D10 EQL Networks & Security .......................................... C13 Geutebruck Pty Ltd ....................................................F30 Hills Industries ............................................................. C2 Kyodensha Technologies (M) Sdn Bhd........................ H39 Lan 1.......................................................................... E13 LSC Electronic Security .............................................. C30 Merit Lilin Pacific P/L ..................................................G29 Milestone Systems Australia Pty Ltd ............................. E6 Mobotix AG ................................................................ B22 National Communications............................................F38 Natural Power Solutions Pty Ltd ................................. B36 Nuvico Australia............................................................ A4 POE Solutions / CCTV Hire......................................... A30 RhinoCo Technology................................................... C16 SAY Security Pl........................................................... K34 Scates Pty Ltd............................................................ H36 Seadan Security ........................................................... A2 Secupro ..................................................................... D41 Security Merchants Australia Pty Ltd............................. B2 SecuSafe Pty Ltd........................................................ A17 Sigma CCTV............................................................... A23 Sprint Intercom............................................................. A2 Suretek....................................................................... A14 TeleEye Holdings Limited ............................................ B14 Texolabs ..................................................................... E45 Clothing, Equipment & Accessories ......... Stand Craig International Ballistics Pty Ltd ...................J26 & J30 GSS Global Security Services .................................... E33 Guizhou New Era Union I.&E. CORP. .......................... C15 Id Supplies .................................................................F17 Computer (IT) & Communications Security .................................................... Stand Access Communications .............................................F13 Anixter Pty Ltd............................................................ H24 Brickcom Corporation ................................................ C31 C R Kennedy Total Surveillance Solutions .................. C40 Commend Australia ................................................... B30 EQL Networks & Security .......................................... C13 HID Global.................................................................. D33 Hirsch Electronics....................................................... A11 ICU Intercoms ............................................................ H18 Kenwood Electronics ................................................. H50

6HFXULW\ ,QVLGHU SS LQGG

Kobra Shredders Australia ......................................... B18 Motorola Australia Pty Ltd........................................... E14 National Communications............................................F38 Natural Power Solutions Pty Ltd ................................. B36 Pacen Corp ................................................................iS18 Paper Handling Equipment ......................................... E34 POE Solutions / CCTV Hire......................................... A30 Scates Pty Ltd............................................................ H36 Sony Australia Limited ................................................ E22 Suretek....................................................................... A14 Syscan Technology Shenzhen .................................... H21 TouchStar................................................................... H30 Critical Infrastructure Security Services ......... Stand Biometric Innovations Pty Ltd ......................................F10 Central Security Distribution ....................................... D22 Commend Australia ................................................... B30 Dedicated Micros ......................................................... D2 Emizon ...................................................................... A42 E-Nose Pty Ltd........................................................... C42 Geutebruck Pty Ltd ....................................................F30 GSS Global Security Services .................................... E33 Infratherm Pty. Ltd. ..................................................... K40 Lockit Systems Pty.Ltd ............................................... C33 Pitlok Security............................................................. A35 POE Solutions / CCTV Hire......................................... A30 Powdersafe Pty Ltd .................................................... A24 SAY Security Pl........................................................... K34 Sigma CCTV............................................................... A23 Takex America Inc ...................................................... D29 Data Security............................................ Stand Biometric Access Systems Pty. Ltd............................. K32 Chase Security Solutions............................................ B32 Covetek Biometric Security.........................................G17 Emizon ...................................................................... A42 Kobra Shredders Australia ......................................... B18 Lan 1.......................................................................... E13 Mega Fortris Australia Pty Ltd ..................................... K36 Natural Power Solutions Pty Ltd ................................. B36 Pacen Corp ................................................................iS18 Paper Handling Equipment ......................................... E34 Shyh Ru Metallic Industrial Corp. ................................ B34 Syscan Technology Shenzhen .................................... H21 Detection Control/Devices ....................... Stand Alarmcorp..................................................................... E2 AlarmIP Australia ........................................................ B21 Brickcom Corporation ................................................ C31 E-Nose Pty Ltd........................................................... C42 Gryffin Pty Ltd............................................................. D40 Gunnebo Australia Pty Ltd.......................................... A27 Infratherm Pty. Ltd. ..................................................... K40 SAY Security Pl........................................................... K34 Takex America Inc ...................................................... D29 Fencing / Perimeter Security/Grills ........... Stand Alarmcorp..................................................................... E2

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 50

SECURITY 2010 PRODUCT CATEGORIES

Colemans Group Australia Pty Ltd .............................. C44 Craig International Ballistics Pty Ltd ...................J26 & J30 FAAC Australia............................................................ E40 Geutebruck Pty Ltd ....................................................F30 Gryffin Pty Ltd............................................................. D40 Infratherm Pty. Ltd. ..................................................... K40 Leda Security ................................................................F2 Lockit Systems Pty.Ltd ............................................... C33 Magnetic Automation ................................................. E30 Oztime Technologies ..................................................G34 Takex America Inc ...................................................... D29 Videofied .................................................................... B26 Fire Protection/Safety............................... Stand ADI Global Distribution.................................................. A8 Dedicated Micros ......................................................... D2 FSH Fire & Security Hardware Pty Ltd......................... B38 Seadan Security ........................................................... A2 Sprint Intercom............................................................. A2 Home Automation.................................... Stand Access Communications .............................................F13 BFT Automation Australia Pty Ltd ...............................G22 Biometric Access Systems Pty. Ltd............................. K32 FAAC Australia............................................................ E40 Ingersoll Rand Security Technologies ......................... A38 Kyodensha Technologies (M) Sdn Bhd........................ H39 Magnetic Automation ................................................. E30 Mobotix AG ................................................................ B22 Takex America Inc ...................................................... D29 ID Systems/Supplies................................. Stand Briell Marketing........................................................... E18 Harcor Security Seals .................................................F15 HID Global.................................................................. D33 Id Supplies .................................................................F17 ID Warehouse............................................................. C22 Mega Fortris Australia Pty Ltd ..................................... K36 Multicard .................................................................... A13 PPC - Plastic Card Solutions .........................................F8 Syscan Technology Shenzhen .................................... H21 IP Technology........................................... Stand ADI Global Distribution.................................................. A8 AlarmIP Australia ........................................................ B21 Altech Computers.......................................................G44 Anixter Pty Ltd............................................................ H24 Bosch Security Systems............................................. D30 Brickcom Corporation ................................................ C31 C R Kennedy Total Surveillance Solutions .................. C40 Chase Security Solutions............................................ B32 Commend Australia ................................................... B30 Dedicated Micros ......................................................... D2 Emizon ...................................................................... A42 Eos Australia Pty Ltd .................................................. D10 EQL Networks & Security .......................................... C13 Hills Industries ............................................................. C2 Hirsch Electronics....................................................... A11

6HFXULW\ ,QVLGHU SS LQGG

ICU Intercoms ............................................................ H18 Jacques ..................................................................... C14 Kenwood Electronics ................................................. H50 Lan 1.......................................................................... E13 Merit Lilin Pacific P/L ..................................................G29 Milestone Systems Australia Pty Ltd ............................. E6 Mobotix AG ................................................................ B22 POE Solutions / CCTV Hire......................................... A30 RhinoCo Technology................................................... C16 Security Distributors Australia ..................................... B23 SecuSafe Pty Ltd........................................................ A17 Sigma CCTV............................................................... A23 Sony Australia Limited ................................................ E22 Suretek....................................................................... A14 TeleEye Holdings Limited ............................................ B14 Locks/Hardware ...................................... Stand Assa Abloy ................................................................... B8 Biometric Access Systems Pty. Ltd............................. K32 Central Security Distribution ....................................... D22 Covetek Biometric Security.........................................G17 CSM Filing & Storage Solutions ................................. H33 Electro-Com (Aust) ..................................................... C35 Electronic Keying Australia ......................................... B29 Harcor Security Seals .................................................F15 Ingersoll Rand Security Technologies ......................... A38 Kaba Australia Pty Ltd .................................................F22 Kyodensha Technologies (M) Sdn Bhd........................ H39 Lockit Systems Pty.Ltd ............................................... C33 LSC Electronic Security .............................................. C30 Mega Fortris Australia Pty Ltd ..................................... K36 National Communications............................................F38 Pacen Corp ................................................................iS18 Pitlok Security............................................................. A35 Salto Systems Australia Pty Ltd ..................................G30 Seadan Security ........................................................... A2 Security Merchants Australia Pty Ltd............................. B2 Sprint Intercom............................................................. A2 Virdi ............................................................................ B33 Mobile Video & Surveillance ..................... Stand LawMate Australia & eWitness....................................G35 SAY Security Pl........................................................... K34 Monitoring Equip. Systems/Servic es ....... Stand AlarmIP Australia ........................................................ B21 AME System Pty Ltd ..................................................G18 Anixter Pty Ltd............................................................ H24 Axis Communications Pty Ltd ..................................... D14 Bens Wholesale monitoring .........................................F18 Biometric Innovations Pty Ltd ......................................F10 CIC Secure ................................................................ A24 Emizon ...................................................................... A42 GSS Global Security Services .................................... E33 E-Nose Pty Ltd........................................................... C42 EQL Networks & Security .......................................... C13 Geutebruck Pty Ltd ....................................................F30

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 51

Beyond Expectations

DVTel Latitude NVMS V6 offers an enhanced visual experience, combined with the dynamic workspace, giving you more options, more control and superior ease of use. Latitude NVMS offers:

Supports Windows 7 & Server 2008

Enhanced Web Client

SNMP traps support

Background Mass Export

Web publishing – integration with common streaming servers s (MMS and VLC)

Advanced Alarm A Management

Google maps TM mapping service integration module

H.264 integration H

Added features of Latitudee NVMS N V6 include: - Award winning features (Scenetracker; Casebuilder; Mentor) - Discreet sites to installations of 4000 cameras - Open architecture - Kalagate certification - Analytics - Access control certification (including Forcefield, Cardax, SiPass, Lenel, Andover) Exclusive suppliers of DVTel, Pacific Communications, offers an unmatched sales and product support of the DVTel V6 system.

DVTel is a Proven Product with Proven Support.

DVT e Proj l won the Y ec t of IFSE ear at C 20 10!


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 52

SECURITY 2010 PRODUCT CATEGORIES

Hills Industries ............................................................. C2 Natural Power Solutions Pty Ltd ................................. B36 Sony Australia Limited ................................................ E22 Suretek....................................................................... A14 TeleEye Holdings Limited ............................................ B14 Recruitment ............................................. Stand Building Services Recruitment ....................................G40 Safes/Record Protection .......................... Stand B-Sealed .................................................................... H25 CSM Filing & Storage Solutions ................................. H33 Gunnebo Australia Pty Ltd.......................................... A27 Kobra Shredders Australia .......................................... B18 Mega Fortris Australia Pty Ltd ..................................... K36 Natural Power Solutions Pty Ltd ................................. B36 Pacen Corp ................................................................iS18 Shyh Ru Metallic Industrial Corp. ................................ B34 Sprintquip Security Pty Ltd ......................................... E36 Virdi ............................................................................ B33 Security Consulting .................................. Stand 3 Dimensional Consulting ...........................................iS15 Smart Cards............................................. Stand Assa Abloy ................................................................... B8 Briell Marketing........................................................... E18 B-Sealed .................................................................... H25 Chase Security Solutions............................................ B32 Electro-Com (Aust) .................................................... C35 Electronic Development Sales (Australia) Pty Ltd......... D44 Eos Australia Pty Ltd .................................................. D10 HID Global.................................................................. D33 Hirsch Electronics....................................................... A11 Id Supplies .................................................................F17 Kaba Australia Pty Ltd .................................................F22 Multicard .................................................................... A13 PPC – Plastic Card Solutions.........................................F8 Salto Systems Australia Pty Ltd ..................................G30 Virdi ............................................................................ B33 System Integrators................................... Stand Altech Computers.......................................................G44 Anixter Pty Ltd............................................................ H24 Biometric Innovations Pty Ltd ......................................F10 C R Kennedy Total Surveillance Solutions .................. C40 Dedicated Micros ......................................................... D2 Kaba Australia Pty Ltd .................................................F22 POE Solutions / CCTV Hire......................................... A30 Sony Australia Limited ................................................ E22 Syscan Technology Shenzhen .................................... H21 TouchStar................................................................... H30 Tamper Evident Security Products ........... Stand Altech Computers.......................................................G44 B-Sealed .................................................................... H25 Mega Fortris Australia Pty Ltd ..................................... K36 Harcor Security Seals .................................................F15 Telecommunications ................................ Stand Commend Australia ................................................... B30

6HFXULW\ ,QVLGHU SS LQGG

Emizon ...................................................................... A42 EQL Networks & Security .......................................... C13 Time and Attendance ............................... Stand Biometric Innovations Pty Ltd ......................................F10 Covetek Biometric Security.........................................G17 Commend Australia ................................................... B30 Emizon ...................................................................... A42 EQL Networks & Security .......................................... C13 National Communications............................................F38 Pitlok Security............................................................. A35 Texolabs ..................................................................... E45 Training & Education ................................ Stand Powdersafe Pty Ltd .................................................... A24 Tecsec Training........................................................... A36 Training Group International ........................................G36 Vehicles.................................................... Stand Craig International Ballistics Pty Ltd ...................J26 & J30 Golf Cart Group ...........................................................J36 Video Intercoms....................................... Stand Bosch Security Systems............................................. D30 Commend Australia ................................................... B30 Eos Australia Pty Ltd .................................................. D10 ICU Intercoms ............................................................ H18 Jacques ..................................................................... C14 Seadan Security ........................................................... A2 Security Merchants Australia Pty Ltd............................. B2 SecuSafe Pty Ltd........................................................ A17 Sprint Intercom............................................................. A2 Texolabs ..................................................................... E45 Wireless Applications ............................... Stand Altech Computers.......................................................G44 Anixter Pty Ltd............................................................ H24 Assa Abloy ................................................................... B8 AusScott Guardian Systems ....................................... A22 BFT Automation Australia Pty Ltd ...............................G22 Brickcom Corporation ................................................ C31 Ingersoll Rand Security Technologies ......................... A38 Kenwood Electronics ................................................. H50 Lan 1.......................................................................... E13 LSC Electronic Security .............................................. C30 Motorola Australia Pty Ltd........................................... E14 RhinoCo Technology................................................... C16 Salto Systems Australia Pty Ltd ..................................G30 simPRO......................................................................G15 TeleEye Holdings Limited ............................................ B14 Texolabs ..................................................................... E45 TouchStar................................................................... H30 Videofied .................................................................... B26 X-ray Equipment/Technology ................... Stand BREON Enterprises Pty Ltd ........................................ K38 GSS Global Security Services .................................... E33 Kobra Shredders Australia ......................................... B18 Rapiscan Systems ..................................................... B44

30


Introducing the 700 Series Hybrid-Network DVR Easy to set up, use and expand.

Bosch Image Quality recorded in genuine 4CIF images

H.264 for reduced storage requirements

Larger Hard Drive (Up to 8TB internal plus external storage), ATM/POS Integration and Backward Compatibility

Hybrid (analogue & IP cameras) options with keyboard accessory for PTZ*

The high quality 700 series hybrid-network DVR provides powerful and flexible solutions for IP camera surveillance and growing security needs. These solutions can be applied to a wide range of applications and can be supported in multiple locations. *Keyboard accessory sold separately

live and playback images with no change to image quality

Experience

Purchase the new 700 Series Hybrid-Network DVR and receive a Flexidome 2X FREE! FREE!

*Minimum of one week’s notice to be provided for travel arrangements. Some areas may be excluded.

Call your nearest Bosch office for more information: Sydney (02) 9672 1777 Melbourne (03) 9558 8088

700 Series ad.indd 1

Adelaide (04) 00 488 415 Brisbane (07) 3267 0442

Bosch challenge any competing camera brand to a ‘head-to-head shoot-out’ in your most challenging situations, onsite. Anywhere. Anytime* - Day or Night. This provides the end-user and system integrator with the opportunity to make a truly informed decision, by providing a real life comparison. Contact your Bosch branch for further details.

Perth (08) 9240 5455

SPECIAL OFFER AVAILABLE FROM 1 JULY 2010 TO 30 SEPTEMBER 2010 Place your order via email at stsales@au.bosch.com 27/07/2010 1:07:38 PM Security Master License No: 409 400 739


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 54

SECURITY 2010 SEMINAR PROGRAMS

FREE SEMINAR PROGRAM - HALL 5 Wednesday 1 September Time

Title

Speaker

Company

11.00 am IP MONITORING FOR ALARM SYSTEMS

Ian Tredinnick

Chiron

12.00 pm H.264 WITH THE LOT PLEASE!

Sean Borg

Bosch Security Systems

1.00 pm

UNIFIED ACCESS CONTROL

Ross Head

Hirsch Electronics

2.00 pm

RemoteGUARD

Mark Timmins

Suretek

3.00 pm

ACCESS CONTROL WITH OPEN ARCHITECTURE SOLUTIONS

David Giannetti

HID Global

4.00 pm

SECUROS - VIDEO MANAGEMENT AND VIDEO ANALYTICS FRAMEWORK Ross Melene

Sigma International (Australia) Pty Ltd

Thursday 2 September Time

Title

Speaker

Company

10.00 am HOSTILE VEHICLE MITIGATION

Heng Cheng

Leda Security

11.00 am ARE YOU READY FOR THE HD CCTV ERA?

Joseph Mah

TeleEye Holdings Limited

12.00 pm BEYOND THE NETWORK VIDEO RECORDER (NVR)

Phillip Brewer

Bosch Security Systems

2.00 pm

EASY SWITCH FROM ANALOGUE TO IP

Sonny Lee

EQL Networks & Security

3.00 pm

CHAOS IN AN ENVELOPE

Tim Roberts

Powdersafe

4.00 pm

OPEN PLATFORM VIDEO MANAGEMENT

Angelo Salvatore Milestone Systems Australia

Friday 3 September Time

Title

11.00 pm FACIAL VS FINGERPRINT - A COMMERCIAL PERSPECTIVE

Speaker

Company

Kevin Mackay

Covetek Australasia Pty Ltd

12.00 pm WIRELESS NETWORKS FOR PUBLIC SAFETY AND BUSINESS GROWTH Andrew Findlay

Vertel

1.00 pm

Axis Communications Pty Ltd

NETWORK VIDEO – THE FUTURE TECHNOLOGY IN SECURITY

Sharon Chong

Program subject to change without notification, for an updated program visit www.securityexpo.com.au

6HFXULW\ ,QVLGHU SS LQGG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 55

SECURITY 2010 INFORMATION SECURITY ZONE SEMINARS

INFORMATION SECURITY ZONE SEMINARS Wednesday 1 September

Time

Title

Speaker

Company

10.00 - 11.00am

WEB IS THE BATTLEGROUND, AND SOCIAL NETWORKS LEAD THE CHARGE

Rob Collins

Watchguard Technologies

11.30 - 12.30pm

CASE STUDY: MANAGING MOBILE SECURITY THREATS WITHIN YOUR BUSINESS

Lisa Leal

Sybase

2.00 - 3.00pm

PENETRATION TESTING AS A FORM OF SECURITY VALIDATION

Declan Ingram

Securus Global

3.30 - 4.30pm

CASE STUDY: THE COMPLEXITIES OF PAYMENT INDUSTRY IT SECURITY COMPLIANCE

Nick Ellsmore

StratSec

Thursday 2 September

10.00 - 11.00am

LEARNING FROM THE BAD GUYS IS LEARNING FROM THE BEST Andreas Baumhof Trust Defender

11.30 - 12.30pm

DETECTING THE ENEMY FROM WITHIN - INTERNAL FRAUD

Blare Sutton

Ernst & Young

2.00 - 3.00pm

WEB APPLICATION SECURITY - CYBER CRIMINALS ARE HIRING

Branko Ninkovic

Dragonfly Technologies

3.30 - 4.30pm

INFORMATION SECURITY GOVERNANCE MODELS: LOCAL VS. INTERNATIONAL ISSUES

Stephen Frede

Sydney Water

Friday 3 September

10.00 - 11.00am

EMERGING TECHNOLOGIES: THERE’S ALWAYS A CATCH

Mark Dowd

Azimuth Security

11.30 - 12.30pm

THE MYTHS AROUND CLOUD COMPUTING SECURITY

Keith Price

AISA

Program subject to change without notification, for an updated program visit www.securityexpo.com.au

Entry is FREE, however limited seats are available for the Information Security Zone Seminars. Secure your free expo ticket and Information Security Zone Seminar sessions online at www.securityexpo.com.au/register. Simply enter code INS

6HFXULW\ ,QVLGHU SS LQGG

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 56

SECURITY 2010 EXHIBITOR PROFILE LISTING

3 Dimensional Consulting STAND iS15 peter.civitarese@3dc.com.au (61) 03 8844 7550 www.simtrack.com

AusScott Guardian Systems STAND A22 john.scott@ausscott.com.au (61) 08 9451 9806 www.ausscott.com.au

Bosch Security Systems STAND D30 stsales@au.bosch.com (61) 02 9672 1233 www.boschsecurity.com.au

Access Communications STAND F13 websales@accesscomms.com.au (61) 02 9414 8888 www.accesscomms.com.au

Australian Security Industry Association (ASIAL) STAND F34 security@asial.com.au (61) 02 8425 4300 www.asial.com.au

BREON Enterprises Pty Ltd STAND K38 danny.liston@breon.com.au (61) 03 8336 3333 www.breon.com.au

ADI Global Distribution STAND A8 aus.sales@adiglobal.com 1300 ADI ADI www.adiglobal.com/au AGP Door Systems STAND E10 alastair_russell@agpgroup.com.au (61) 02 9671 0000 www.agpgroup.com.au AISA STAND iS17 www.aisa.org.au Alarmcorp STAND E2 sales@alarmcorp.net.au 1300 894 088 www.alarmcorp.net.au AlarmIP Australia STAND B21 sales@alarmip.com.au 1300 767 347 www.alarmip.com.au Altech Computers STAND G44 chantelle@mktg-pro.com (61) 02 8831 9973 www.altech.com.au AME System Pty Ltd STAND G18 sales@amesystem.cpm.au (61) 03 9574 8044 www.amesystem.com.au Anixter Pty Ltd STAND H24 info.sp@anixter.com (61) 02 9333 0800 www.anixter.com Assa Abloy STAND B8 info@assaabloy.com.au (61) 03 8574 3888 www.assaabloy.com.au

6HFXULW\ ,QVLGHU SS LQGG

Australian Security Magazine (ASM) STAND K22 judyhinz@yaffa.com.au (61) 07 3348 6966 www.securityaccess.com.au

Brickcom Corporation STAND C31 info@brickcom.com (886) 3 598 2022 www.brickcom.com

Australian Security Technology STAND F12 www.astpl.com.au

Briell Marketing STAND E18 sam@briell.com.au (61) 02 9986 3911 www.briell.com.au

Avigilon STAND H22 admin@avigilonap.com (61) 07 3853 5393 www.avigilon.com

B-Sealed STAND H25 sales@bsealed.com.au (61) 02 9260 5988 www.bsealed.com.au

Axis Communications Pty Ltd STAND D14 waiking.wong@axis.com (61) 03 9221 6133 www.axis.com

Building Services Recruitment STAND G40 dontulley@bsra.com.au (61) 03 9077 1271 www.bsra.com.au

Bens Wholesale Monitoring STAND F18 crm@bensecurity.com.au 1300 130 515 www.bensecurity.com.au

C R Kennedy Total Surveillance Solutions STAND C40 viccctv@crkennedy.com.au (61) 03 9823 1555 www.crkennedy.com.au

BFT Automation Australia Pty Ltd STAND G22 daniele.dalcengio@bftaustralia.com.au (61) 02 9757 0677 www.bftaustralia.com.au

Centaman Entrance Control STAND F3 turnstile@centaman.com.au (61) 02 9906 7522 www.entrancecontrol.com.au

Biometric Access Systems Pty. Ltd STAND K32 info@bioaccsys.net (61) 07 55717426 www.bioaccsys.net

Central Security Distribution STAND D22 enquiries@centralsd.com.au (61) 03 9946 3200 www.centralsd.com.au

Biometric Innovations Pty Ltd STAND F10 sales@biometricinnovations.com (61) 07 3243 6000 www.biometricinnovations.com

Chase Security Solutions STAND B32 info@ChaseSecurity.com.au 1300 793 316 www.ChaseSecurity.com.au

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 57


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 58


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 59

SECURITY 2010 EXHIBITOR PROFILE LISTING

CIC Secure STAND A24 iain.macleod@cicgroup.com.au (61) 02 6239 3355 www.cicsecure.com.au

Electronic Keying Australia STAND B29 sales@ekasecurity.com.au 1300 722 311 www.ekasecurity.com.au

Gryffin Pty Ltd STAND D40 salesgryffin.com.au (61) 03 9761 4522 www.gryffin.com.au

COE Limited STAND A15 www.coe.co.uk

Emizon STAND A42 info@emizon.com 1300 307 403 www.emizon.com.au

GSS Global Security Services STAND E33 john@safetcard 1300 SafeTcard www.safetcard.com.au

E-Nose Pty Ltd STAND C42 info@e-nose.info 02 9209 4083 www.enose.info

Guizhou New Era Union I.&E. Corp STAND C15 maomiooo@hotmail.com 0086 574 87784793

Eos Australia Pty Ltd STAND D10 nsw@eos.com.au (61) 02 9749 5888 www.eos.com.au

Gunnebo Australia Pty Ltd STAND A27 laurie.mugridge@gunnebo.com (61) 02 9852 0700 www.gunnebo.com.au

EQL Networks & Security STAND C13 sales@eql.com.au (61) 02 9824 5680 www.eql.com.au

Harcor Security Seals STAND F15 sales@harcor.com.au (61) 02 9454 4200 www.harcor.com.au

ETM Pacific Pty Ltd STAND D46 www.etmpacific.com.au

HID Global STAND D33 sylvialee@hidglobal.com (852) 3160 9800 www.hidglobal.com

Colemans Group Australia Pty Ltd STAND C44 email@colemansgroup.com.au (61) 02 9280 0615 www.colemansgroup.com.au Commend Australia STAND B30 g.ross@commend.com.au (61) 02 4655 5738 www.commend.com Covetek Biometric Security STAND G17 info@covetek.com.au (61) 02 9404 8777 www.covetek.com.au Craig International Ballistics Pty Ltd STAND J26 & J30 info@ballistics.com.au (61) 07 5528 5088 www.ballistics.com.au CSM Filing & Storage Solutions STAND H33 sales@csm-office.com.au (61) 02 9540 2111 www.csm-office.com.au Dedicated Micros STAND D2 dmaustralia@dmicros.com (61) 02 9634 4211 www.dedicatedmicros.com Electro-Com (Aust) STAND C35 sales@electrocom.com.au (61) 03 9535 0700 www.electrocom.com.au Electronic Development Sales (Australia) Pty Ltd STAND D44 indala@edsales.com.au (61) 02 9496 0500 www.edsales.com.au

6HFXULW\ ,QVLGHU SS LQGG

FAAC Australia STAND E40 sales@faac.cm.au (61) 02 8756 5644 www.faac.com.au FSH Fire & Security Hardware Pty Ltd STAND B38 marc@fshlocking.com.au (61) 02 9700 1050 www.fshlocking.com.au Gated Solutions Australia STAND D43 Josh.R@gatedsolutions.com.au (61) 07 3622 6400 www.geutebruck.com.au Geutebruck Pty Ltd STAND F30 info@geutebruck.com.au (61) 1300 796 425 www.gatedsolutions.com.au Golf Cart Group STAND J36 info@golfcartgroup.com.au 1800 680 088 www.getmobile.com.au

Hills Industries STAND C2 info@das.com.au (61) 02 9717 5222 www.das.com.au, www.pacom.com.au, www.hills.com.au Hirsch Electronics STAND A11 rosshead@hirschelectronics.com (61) 07 3472 1346 www.hirschelectronics.com ICU Intercoms STAND H18 icuintercoms@yahoo.com (61) 02 9450 1260 www.icuintercoms.net Id Supplies STAND F17 sales@idsupplies.com.au (61) 02 9485 0455 www.idsupplies.com.au

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:32 PM

Page 60

SECURITY 2010 EXHIBITOR PROFILE LISTING

ID Warehouse STAND C22 sales@idwarehouse.com.au 1300 301 748 www.idwarehouse.com.au Infratherm Pty. Ltd. STAND K40 info@infratherm.com.au (61) 02 4579 7334 www.infratherm.com.au

LawMate Australia & eWitness STAND G35 info@ewitness.com.au 1300 887 656 www.lawmate.com.au, www.ewitness.com.au Leda Security STAND F2 lvsales@ledasecurity.com.au (61) 02 8413 3410 www.ledasecurity.com.au

Ingersoll Rand Security Technologies STAND A38 suzannecarroll@irco.com (61) 03 9312 2822 www.ingersollrand.com.au

Lockit Systems Pty.Ltd STAND C33 richard@lockit.com.au (61) 02 9648 4188 www.lockit.com.au

Jacques STAND C17 sales@jacques.com.au (61) 07 3844 1103 www.jacques.com.au

LSC Electronic Security STAND C30 iross@lsc.com.au (61) 02 96478111 www.lsc.com.au

Joinlink Pty Ltd STAND A31 www.ntcs.com.au

Magnetic Automation STAND E30 info@magnetic-oz.com (61) 03 9339 2900 www.ac-magnetic.com

Kaba Australia Pty Ltd STAND F22 info@kaba.com.au (61) 02 8787 4777 www.kaba.com.au Kenwood Electronics STAND H50 commsales@kenwood.com.au (61) 02 8879 2222 www.kenwood.com.au Kobra Shredders Australia STAND B18 michael@kobrashredders.com.au (61) 03 98236268 www.kobrashredders.com.au Kyodensha Technologies (M) Sdn Bhd STAND H39 sales@elock2u.com (60) 03 8061 4589 www.elock2u.com Lan 1 STAND E13 enquiry@Lan1.com.au (61) 02 9318 4200 www.Lan1.com.au

6HFXULW\ ,QVLGHU SS LQGG

Mega Fortris Australia Pty Ltd STAND K36 mattv@sealsaustralia.com.au (61) 02 9984 7720 www.megafortris.com.au Merit Lilin Pacific P/L STAND G29 sales@meritlilinpacific.com.au (61) 02 9646 4878 www.meritlilinpacific.com.au Milestone Systems Australia Pty Ltd STAND E6 asal@milestonesys,com (61) 03 9466 7806 www.milestonesys.com Mobotix AG STAND B22 au-info@mobotix.com (61) 02 8507 2000 www.mobotix.com Motorola Australia Pty Ltd STAND E14 (61) 03 9847 7500 www.motorola.com.au

Multicard STAND A13 sales@multicard.com.au 1300 666 910 www.multicard.com.au National Communications STAND F38 sales@natcomm.com.au (61) 07 5596 5128 www.natcomm.com.au Natural Power Solutions Pty Ltd STAND B36 sales@nps.com.au (61) 02 9906 6696 www.nps.com.au Nuvico Australia STAND A4 mitch.s@nuvico.com (61) 07 5527 9939 www.nuvico.com Omega Power Equipment Pty Ltd STAND F39 www.omegapower.com.au Oztime Technologies STAND G34 sales@oztime.com.au (61) 02 62805200 www.oztime.com.au Pacen Corp STAND iS18 sales@pacen.com.au (61) 02 9955 3595 www.pacen.com.au Paper Handling Equipment STAND E34 garry@phe.com.au (61) 07 3899 9811 www.phe.com.au Perimeter Systems Australia Pty Ltd STAND E39 www.perimetersystems.com.au Pitlok Security STAND A35 tony@pitlok.com.au (61) 08 9248 4200 www.pitlok.com.au POE Solutions / CCTV Hire STAND A30 cust@poes.com.au (61) 02 9618 0444 www.poes.com.au

30


3/8/10

8:39 PM

Page 61

Protect your business with Aon Aon is the leading insurance broker to the security industry, and the broker preferred by the Australian Security Industry Association (ASIAL). We are pleased to offer you a tailored product, SecurAcover, that provides a simple and competitive insurance solution to protect your business. This product is exclusive to ASIAL Members and covers public and products liability with an extension for errors and omissions coverage. If you need to protect your business, talk to Australia’s leading insurance provider today. Call

1800 806 584 or email asial@aon.com.au

Š 2010 Aon Risk Services Australia Pty Limited ABN 17 000 434 720 AFSL No. 241141

RRIS1595 0410

INSIDER_Aug_Sept10 Iss4_76pp


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 62

SECURITY 2010 EXHIBITOR PROFILE LISTING

Powdersafe Pty Ltd STAND A24 (61) 02 6281 6111 www.powdersafe.com.au PPC - Plastic Card Solutions STAND F8 sales@ppc.com.au 1300 651 277 www.ppc.com.au Rapiscan Systems STAND B44 rhamilton@rapiscansystems.com (61) 03 9929 4600 www.rapiscansystems.com RhinoCo Technology STAND C16 sales@rhino.com.au (61) 02 4577 4708 www.rhino.com.au Salto Systems Australia Pty Ltd STAND G30 info.sydney@saltosystems.com (61) 02 9890 4600 www.saltosystems.com SAY Security Pl STAND K34 michael@saysecurity.net (61) 02 9680 8844 www.saysecurity.net scates Pty Ltd STAND H36 enquiries@scates.com.au (61) 07 3173 1640 www.scates.com.au Seadan Security STAND A2 seadan@seadan.com.au (61) 02 9633 9222 www.seadan.com.au Secupro STAND D41 stan6688@hotmail.com (61) 0468 747 862 www.secupro.com.au Security Distributors Australia STAND B23 wayne@securitydistributors.com.au (61) 08 92406281 www.securitydistributors.com.au

6HFXULW\ ,QVLGHU SS LQGG

Security Electronics & Networks Magazine STAND A9 info@bridgepublishing.com.au (61) 02 9280 4425 www.securityelectronicsandnetworks.com.au Security Merchants Australia Pty Ltd STAND B2 websupport.sma@assaabloy.com 1300 663 904 www.security-merchants.com Security Solutions Magazine STAND F6 nmangion@australianmediagroup.com (61) 03 9845 1520 www.securitysolutionsmagazine.com SecuSafe Pty Ltd STAND A17 andylee@secusafe.com.au (61) 02 9649 4477 www.secusafe.com.au SHYH RU METALLIC INDUSTRIAL CORP. STAND B34 shyh.ru@msa.hinet.net (886) 2 2906 5816 www.shyhru.com.tw Sigma CCTV STAND A23 sales@sigmacctv.com.au (61) 07 5591 9559 www.sigmacctv.com.au simPRO STAND G15 sales@acornsoftware.com.au 1300 139 467 www.simpro.com.au Sony Australia Limited STAND E22 mark.franklin@ap.sony.com (61) 02 9887 6666 www.sony.com.au Sprint Intercom STAND A2 sales@sprintintercom.com.au (61) 02 9427 2677 www.sprintintercom.com.au Sprintquip Security Pty Ltd STAND E36 d_waugh@aapt.net.au (61) 02 9772 4377 www.sprintquip.com.au

Suretek STAND A14 contact@suretek.net 1300 654 433 www.suretek.com.au Syscan Technology Shenzhen STAND H21 info@syscan.com.au (61) 02 8211 0441 www.syscan.com.au Takex America Inc STAND D29 oz_sales@takex.com (61) 03 9546 0533 www.takex.com Tecsec Training STAND A36 sales@tecsectraining.com.au 1300 798 106 www.tecsectraining.com.au TeleEye Holdings Limited STAND B14 info@TeleEye.com (852) 2995 5996 www.TeleEye.com Texolabs STAND E45 Richard@texolabs.com (61) 0407 080 290 www.texolabs.com TouchStar STAND H30 sales.au@touchstar.com.au (61) 02 9739 9000 www.touchstargroup.com Training Group International STAND G36 info@traininggroup.com.au 1300 855 618 www.traininggroup.com.au Videofied STAND B26 info@videofied.com.au 1300 464 455 www.videofied.com.au Virdi STAND B33 eun@virditech.com (82) 02 6488 3049 www.virditech.com Western Digital STAND F40 www.achieva.com.au

30


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 63

HELP CONSUMERS FIND YOUR BUSINESS! The ASIAL website attracts 10,000 visitors a month, with the most popular page being the ‘Find a Security Provider’ Search. ASIAL members can now create and manage a FREE web page on the ASIAL website to complement their existing ASIAL member search listing. · Receive a dedicated URL that can appear on external search engine listings · Upload images and a description of the products and/or services offered · Choose from two templates and four colours to complement your promotional material No experience required!

Just four easy steps to get your ASIAL web page up and running!

1

2

3

4

STEP

STEP

STEP

STEP

VISIT: www.asial.com.au and login to the Member area.

SELECT the Member Profile Link and Click

Follow the prompts to begin populating your web page.

When you are ready for the page to be published, hit

Create webpage

Submit

Would you like some further information or assistance? Email websupport@asial.com.au or complete the information below and fax to 02 8425 4343. Company name: Contact name: Phone:

Position: Email:

Your mark of distinction

ASIAL ©2009 www.mynetbuilder.com.au

Register your interest today!


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 64

AIC: ARMED ROBBERY TRENDS

TRENDS IN COMMERCIAL ARMED ROBBERY By Lance Smith & Erin Louis*

64 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 65

AIC: ARMED ROBERY TRENDS

Overall trends The Australian Institute of Criminology’s National Armed Robbery Monitoring Program data (NARMP) has shown no consistent patterns in overall trends for armed robbery in Australia since incident data was first collected (2004) to 2007. While data indicates that from 2004 to 2006 there was a 20 percent increase in the number of armed robbery incidents in Australia, in 2007 there was an eight percent decrease in the number of incidents.Thus, although it is interesting to examine overall trends for armed robbery, it is more useful to focus on understanding trends in specific locations where armed robbery incidents occurred. For example, the data shows that street armed robbery to bank armed robbery have distinctly different characteristics.This article will examine some of the reasons for why trends in different types of armed robbery may vary in different ways at different times.

Commercial locations There have been changes in the nature and frequency of armed robberies committed in the five commercial locations discussed in this article over the life of the NARMP. Some have experienced consistent increases, while others have seen decreases and others have seen fluctuations from year to year. Some commercial locations have seen changes in the characteristics of their victimisation, such as an increase in the number of firearms used by offenders. Generally, the data highlights that different commercial industries experienced armed robbery in different forms and that this can change over time.

Banking and financial institutions ‘Bank’ armed robberies have some key features worth highlighting. First, the number of armed robberies at this type of location remained at just below 100 incidents per year from 2004 to 2007. However, in 2006 numbers dropped considerably to 76 recorded incidents - an 18 percent decrease from 2005. Another change in the characteristics of armed robbery at banks involved the use of firearms. In 2004, firearms were used in 41 percent of armed robberies at banks and by 2007 this had increased to 49 percent - an overall increase of eight percent. A third shift in the trends for banking and financial armed robbery involved a slight decrease in the average age of offenders and this may be important.There are three main

typologies of armed robbery offenders: amateurs, intermediates and professionals. Professional armed robbers are more likely to use firearms; plan their offences with much more detail; are more motivated; are more likely to use violence; and are more likely to commit armed robbery as a means of making a living. Offender age is one of several key characteristics that helps define an armed robbery offender as potentially being a ‘professional’. In 2004, offenders targeting banking and financial institutions had an average age of 30 years, making them the oldest of all armed robbery offenders. By 2007 the average age for these offenders had decreased to 28 years. Whether this decreasing age trend will continue remains unknown, but it requires monitoring.

Service stations Over the four year period examined there have been complex shifts in service station armed robbery. Most notable was the substantial decrease in the number of incidents between 2006 and 2007 (a 34 percent decrease), following a gradual increase in incidents between 2004 and 2006. An identified decrease in incidents in 2007 also reflected a change in trends regarding weapon use in service station armed robbery. There were two main shifts in trends regarding weapons used in service station armed robbery. First, there was an increase in the number of firearms used by offenders.This increase was unexpected as the profile of an offender targeting service stations is generally one who is less professional. Historically, offenders targeting this type of location act alone and use easy to obtain weapons such as knives rather than firearms. In 2004, firearms only constituted 9 percent of weapons used in service station armed robbery but this has increased gradually each year since then. In 2007 firearms accounted for almost a quarter (24%) of all weapons used in armed robberies targeting service stations. Second, this change helps explain the gradual decrease in the use of knives in service station armed robbery. In 2004 knives accounted for 65 percent of weapons used in service station armed robbery compared with 47 percent in 2007. These changes in service station armed robbery need to be considered by the industry and analysed to help determine why there has been a drop in the number of incidents, but the use of potentially more dangerous weapons is increasing.

>

SECURITY INSIDER AUG/SEP 2010// 65


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 66

AIC: ARMED ROBERY TRENDS

The next shift in trends for service station armed robbery worthy of highlighting is the number of offenders involved in an incident. Generally, the typical armed robbery offender for service stations is considered amateurish and opportunistic. Amateur armed robbers tend to have short-sighted intentions, little understanding of what to expect from the experience and/or of how much money they are likely to obtain. As a result, the majority of incidents involve a lone offender. However, in recent years there has been an increased likelihood of two or more offenders being involved. In 2004, 82 percent of incidents involved lone offenders and 14 percent involved two offenders. Whereas in 2007 only 74 percent of incidents involved lone offenders, with dual offenders now constituted 21 percent of service station armed robberies. So, while the typical service station armed robbery offender still acts alone, there is an increased likelihood of a co-offender now being involved.

Licensed premises Licensed premises are one industry that has seen considerable shifts in armed robbery trends. For instance, there was a 22 percent increase in the number of armed robbery incidents involving licensed premises between 2004 and 2007. There have also been shifts in specific characteristics of licensed premises armed robbery. The use of firearms has fluctuated considerably at various times between 2004 and 2007; however in 2004 and 2007 44 percent of armed robberies at licensed premises involved a firearm. While the use of firearms in 2007 reflects the rate of use in 2004, it is the fluctuations over these years that are worth analysing in order to determine the reasons they occur, as it has a direct impact on those affected by armed robbery at these locations, and may inform crime reduction strategies. Like banking and financial armed robbery, the average age for licensed premises armed robbery offenders also decreased between 2004 and 2007. Although not considered as professional and generally not as experienced as their bank armed robbery counterparts, offenders targeting licensed premises are still considered as intermediate offenders rather than amateur or opportunistic offenders.That is, they are more organised and more experienced than amateurs, are likely to engage in some planning and are prepared to use weapons if required. In 2004 the average age of an offender was 27 years old; this decreased to only 24 years old in 2007. Similar to banking and financial armed robbery offenders this trend will be monitored closely over the coming years as it may signify a shift in the profile of offenders now targeting these commercial businesses. Another changing offender characteristic involves the increased presence of multiple offenders. While the involvement of three offenders in an incident has remained constant (7%), incidents with dual offenders increased each year between 2004 and 2007 from 12 percent to 27 percent in

2007. Incidents of licensed premise armed robbery involving lone offenders have decreased every year from 2004 (79%) to 2007 (61%).

Post offices and newsagents Commercial armed robberies of post offices and newsagents (this is a combined location category employed by NARMP) are not targeted as often as some other locations, however they still deserve consideration. One reason for this is the decrease in the number of incidents experienced. Bearing in mind the smaller numbers (in 2004 111 incidents of armed robbery occurred at these locations across Australia), from 2004 to 2007 there has been an overall 15 percent decrease in the number of incidents. One characteristic that separates armed robberies at newsagents and post offices from other locations is the tendency to be targeted in the early morning pre-business hours (6am-9am).This factor has become even more prominent with a recent sharp increase in the number of incidents. In 2004, 18 percent of incidents at these locations occurred between 6am and 9am which increased to 35 percent in 2007.This clearly indentifies the increased risk to these businesses in the early hours of the morning as they are setting up for the day. It is important to monitor this characteristic as it continues to be a factor that distinguishes armed robbery at this particular location category from other commercial premises.

Corner stores, supermarkets and takeaways Corner stores, supermarkets and takeaways (another NARMP location category) has not experienced as many shifts in armed robbery patterns in recent times, but there are still some changes worth highlighting.The first of these is the 20 percent decrease in the number of incidents between 2004 and 2007. The other notable shift was the increased presence of multiple offenders. In the period from 2004 to 2007, the involvement of two or more offenders in an incident increased from 19 percent to 31 percent. Similar to other commercial locations this increase in multiple offenders coincided with a decline in the number of incidents involving lone offenders from 81 percent in 2004 to 69 percent in 2007.

Future trends The continuing examination of shifting trends in commercial armed robbery is important as a means of identifying changing patterns in armed robberies over time. Further, monitoring can help explain any displacement (when characteristics of crime change to counter crime prevention strategies) in particular armed robberies or other crimes that might occur and can assist in identifying opportunities for implementing important crime prevention strategies with the best chance of remaining effective in future years.

Source: AIC, NARMP Collection 2004-2007 [Computer file]. *Lance Smith is a research analyst and Erin Louis is a former research officer with the National Armed Robbery Monitoring Program at the Australian Institute of Criminology.

66 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 67

ASIAL Certified Security Monitoring Centres*

Current as at: 28 July 2010 Company (short form name)

State

Cert. No.

Grade

NSW

317

A1

09 Mar 2011

Allcare Monitoring Services

WA

334

A2

28 Feb 2012

ARM Security

WA

318

A1

10 Mar 2011

ART Security

VIC

339

A1

08 Sep 2010

NSW

343

B1

21 Mar 2012

VIC

315

C3

11 Dec 2010

NSW

306

A1

24 Sep 2010

Energize Australia

VIC

345

C2

18 Mar 2011

Golden Electronics

TAS

310

A1

17 Oct 2010

Grade One Monitoring

NSW

333

A1

13 Feb 2012

Grid Security Services

NSW

336

A1

18 Mar 2012

IAG (operating with IAG Data Centre)

NSW

329

C1

27 Nov 2011

Instant Security Alarms

QLD

320

A1

09 Jun 2011

ISS Security Services (Manpower Response)

NSW

335

C3

30 Nov 2011

VIC

346

A1

08 Aug 2012

NSS Group

NSW

341

A1

07 May 2012

Paul-Tec Australia

NSW

342

A2

13 May 2012

Protection Pacific Security

VIC

304

C2

03 Aug 2010

RAA Security Services

SA

314

A1

12 Dec 2010

Secom Australia

NSW

327

A1

14 Dec 2011

Sectrol Security

VIC

322

B2

02 Jul 2011

Securemonitoring

VIC

328

A1

23 Nov 2011

Security Alarm Monitoring Service

SA

344

A1

18 Jun 2012

Sesco Security Co

WA

319

A1

03 Mar 2011

Signature Security

NSW

307

A1

03 Oct 2010

Signature Security

WA

308

A1

03 Oct 2010

SMC (Chubb)

QLD

330

A1

07 Dec 2011

SMC (Chubb)

VIC

332

A1

16 Dec 2011

SNP Security (Newcastle)

NSW

321

A1

17 Aug 2011

SNP Security (Sydney)

NSW

347

A1

13 Aug 2012

Spectus

WA

325

A1

02 Sep 2011

State Govt Protective Security Service

QLD

340

C1

22 May 2012

Summerland Security Services

NSW

331

C2

30 Nov 2011

Westpac Banking Corporation

NSW

338

A1

19 Mar 2012

Woolworths Limited

NSW

311

C1

04 Nov 2010

ADT Security

Central Monitoring Services ClubLINKS Security Commonwealth Bank of Australia

Linfox Armaguard

Expires

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to Certification.

SECURITY INSIDER AUG/SEP 2010// 67


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 68

INDUSTRIAL ReLATIONS

ADVERSE ACTION (UNFAIR DISMISSAL) “ALL INCLUSIVE RATES” AND PAID PARENTAL LEAVE By Chris Delaney*

enforce those entitlements, are also protected against adverse action A person has a workplace right if the person: • is entitled to the benefit of or has a role or responsibility under a workplace law, a workplace instrument or an order made by an industrial body, • is able to initiate or participate in a process or proceeding under a workplace law including a conference or hearing at FWA or a court, or • is able to make a complaint under a workplace law to seek compliance with a law or industrial instrument or if that person is an employee, in relation to his or her employment, such as an internal grievance for a bullying complaint.

The new industrial relations system has brought with it a great deal of confusion. The Fair Work Ombudsman and Fair Work Australia have clarified some matters. In this article we consider three matters which have a significant impact on business. Adverse action (the alternative unfair dismissal claim?) Section 342 of the Fair Work Act sets out the type of conduct which will be adverse action. Adverse action can be taken by: 1. an employee against his or her employer 2. an employer against an employee (or prospective employee)

3. an independent contractor against a principal 4. a principal against an independent contractor 5. a person against an industrial association. However most adverse action claims will be made by employees in relation to the alleged adverse actions taken by employers which include termination of employment; or injuries to the employee in their employment; or changing the position of the employee to their detriment; or discriminating between the employee and other employees of the employer. “Workplace Rights”, employment entitlements and the freedom to exercise and

Two recent decisions have clarified the treatment of adverse action claims: Automotive Food Metals Engineering Printing and Kindred Industries Union v Philips Engineering Australia Pty (Philips) [2010] FCA 611 (15 June 2010) In this case Philips terminated an employee on the grounds of redundancy. The matter went to the Federal Court where the employee’s Union put that he be reinstated to his position. The Union claimed that Philips had engaged in adverse action by terminating the affected employee's employment because of the employee's union activities and not for the reason that his position was redundant. The Court agreed to make the order to reinstate the employee until the substantive continued page 69 >

68 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 69

INDUSTRIAL ReLATIONS

claim could be heard on the basis that the evidence indicated that the redundancy was a "smokescreen" for the real reasons for termination, which were the employee's union activities. This case shows that in adverse action claims the Courts are willing to order reinstatement or make orders to stop a termination of employment occurring until the substantive application can be heard. Employers need to be thorough in terminations of employment, disciplinary matters, transfers, demotions and changes in terms and conditions of employment to ensure that these are undertaken with fairness and equity, and not on the basis that the employee exercised a workplace right. Construction Forestry Mining and Energy Union v BHP Coal Pty Ltd [2010] FCA 590 (11 June 2010) In the BHP Coal case the Union claimed that BHP Coal breached an enterprise agreement provision and the Fair Work Act's adverse action provisions. The Union's adverse action claim was that BHP Coal breached the provisions an industrial agreement relating to how disciplinary meeting should be conducted. The Union further claimed that BHP Coal engaged in adverse action by threatening to dismiss the employee if he did not participate in the disciplinary meeting with the presence of a BHP Coal HR representative present. The employee and the Union representative walked out of the meeting and refused to attend subsequent meetings. BHP Coal subsequently terminated the employee for serious misconduct arising from the issues which were the subject of the disciplinary meetings. On the adverse action argument, the Court found that nothing the employer or its managers had done constituted an injury or a threat to injure the employee because he exercised his workplace rights. The Court particularly looked at the comments made by the manager about getting alternative representation and found that this did not constitute adverse action.

Suggestion for employers Adverse action claims are increasing. They are being used as an alternative to unfair dismissal claims, compensation is not capped and claims can be made up to 60 days after termination of employment.

To limit the effect of an adverse action claim employers should: • make sure decisions are unambiguous, fair and valid and not for some other reason related to the employee's workplace rights or industrial activities • ensure that managers understand the new general protection provisions and this is reflected in training and procedures • action claims that are not in relation to termination of employment can be commenced within six years of the incident, it is therefore vital to document everything throughout employment • develop a system to identify high risk issues or employees, so that grievances can be dealt with internally rather than employees making claims to external tribunals and courts.

would have received under an award for hours worked, employers can use set-off clauses to pay their employees an allinclusive rate. Paying a higher wage rate than the award minimum will offset penalties or loadings in the award where it is clear that the parties intended to do so (and in fact, the amount satisfies the entitlements that would otherwise be payable to the employee). Some awards include clauses which expressly allow an employer pay an annualised salary in satisfaction of certain monetary entitlements (provided that certain conditions are met), others do not have such clauses. Provided that an all inclusive rate is higher than the amounts the employee would have received under an award for the hours worked, employers covered by awards

The employer is only obliged to pay parental leave if the employee has been with that employer for at least 12 months.

Employers should not be reticent to take disciplinary action where warranted, provided that that action is taken on bona fide grounds using procedural fairness and in line with policies and/or the requirements of the workplace instrument. All Inclusive Rates and Absorbing Over Award payments The Fair Work Ombudsman has confirmed that it considers off-set clauses as a valid means of making payments to satisfy minimum monetary award entitlements. As long as an "all-inclusive wage rate" is higher than the amounts the employee

without annualised salary clauses can use clauses to pay their employees an allinclusive hourly wage or annual salary in satisfaction of minimum award entitlements such as minimum wages, allowances, leave loading, penalty rates, overtime, and weekend and public holiday rates. It is important that such agreements with employees are: • By genuine agreement free from any coercion, • Committed to writing and kept as time and wages records, • Clear as to what penalties, loadings etc continued page 70 >

SECURITY INSIDER AUG/SEP 2010// 69


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 70

INDUSTRIAL ReLATIONS

are off-set by the over award payment, and • is higher than the amounts the employee would have received under an award for the hours worked The Fair Work Ombudsman’s Guidance Note #7 includes the following:

Absorption and offsetting of over-award payments The model transitional provisions provide that: “The monetary obligations imposed on employers by this award may be absorbed into over-award payments. Nothing in this award requires an employer to maintain or increase any over-award payment.” This means that if an employer was paying $2 more per hour than the minimum wage before 1 July 2010 and the minimum wage was increased by $1 per hour from 1 July 2010, the modern award does not require the employer to pay $2 more than the new minimum wage; they can continue paying the same amount per hour (which would be $1 more than the employee’s minimum entitlement). This provision applies in conjunction with well established Court authority concerning how employers can offset over-award payments against other award entitlements. As a general principle, over-award payments can only satisfy entitlements to which the payment is directed. This means, for example, that paying a higher wage rate than the award minimum does not offset penalties or loadings in the award unless it is clear that the parties intended to do so (and in fact, the amount satisfies the entitlements that would otherwise be payable to the employee). If an employer has properly entered into an offsetting arrangement that makes it clear that over-award payments are in satisfaction of all penalties, wages etc due under the award, that arrangement can continue to be relied upon to satisfy increases that arise as a result of the commencement of modern awards. In addition, employers can agree with their employees to enter into such an arrangement with respect to future payments.

Paid Parental Leave

Employer’s Responsibilities

From 1 January 2011, the mother of a new born child, or the primary care giver of a newly adopted child will be provided with paid leave for a maximum of 18 weeks at the minimum wage of $569.90 per week.

After 1 July 2011 an employer who is notified by the Family Assistance Office that they are required to make parental leave payments will have to pay the parental leave via normal payroll practices, including withholding the usual PAYG tax. The Family Assistance Office will pay the employer in advance of the parental leave being paid to the employee. The employer is only obliged to pay parental leave if the employee has been with that employer for at least 12 months. Otherwise, the Family Assistance Office will pay the parental leave directly to the employee. From 1 January 2011 to 30 June 2011, will be regarded as a transitional period during which time employers can choose to administer the paid parental leave themselves, otherwise the Family Assistance Office will pay the parental leave direct to the employee. After July 2011, time for employers to understand their obligations to pay parental leave will have expired as the transitional period will have passed. From that time the Fair Work Ombudsman will have parental leave payments to add to the lengthy list of employer obligations it enforces.

Eligibility To be eligible for the leave the employee must: • Be the primary care giver of a new born child, or newly adopted child; • Have an income of not more than $150,000 per annum; • Have worked at least 330 hours in the preceding 392 days (13 months) with permissible breaks. Many part-time and casual employees will satisfy this work test; and • Be an Australian Citizen or permanent resident. Eligibility will be assessed by the Family Assistance Office (a Government agency) upon receiving an application direct from an employee seeking paid parental leave. An employee may also satisfy the work test if they have had multiple employers, or worked as an independent contractor over the qualifying period, however, in such circumstances payment would be received from the Family Assistance Office direct, not any employer.

Paid parental leave and other paid leave An employee’s entitlement to 18 weeks paid parental leave under this legislation is in addition to any other entitlement to paid parental leave that may exist in an employment contract or an enterprise agreement and other statutory entitlements to leave.

Payments from the Family Assistance Office The Family Assistance Office will assess the application and, if approved, it will notify the employer that they are required to make the payments.

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing ir@asial.com.au

70 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:39 PM

Page 71

HOT PRODUCTS

INTREPID™ Sensors Now Even SMARTER! n Perimeter Systems Australia Pty Ltd > (02) 9150 0651 n Email > info@perimetersystems.com.au n Web > www.southwestmicrowave.com

In protecting a facility’s perimeter, two distinct challenges arise. Selecting the appropriate sensor to address site requirements, and finding cost-effective, compatible solutions when site characteristics or security level dictate layered protection. Combining 40 years of perimeter detection experience with the latest in integrated systems engineering, Southwest Microwave addresses these challenges with its new-generation INTREPID™ Intelligent Sensors. Deploy any combination of fence, buried and digital microwave solutions on a single network platform to protect each portion of your perimeter with the optimal sensor for that location. For unparalleled configuration and operating convenience, INTREPID™ employs a common communications protocol, universal set-up software, scalable system controllers and a broad input voltage range.

NEW!

Vigitron’s Next Generation IP extenders n Pacom Communications > (03) 9676 0222 n Email > info@pacom.com.au n Web > www.pacom.com.au

Pacific Communications is pleased to release the latest Super Ethernet transmission technology from Vigitron. Vigitron's Vi2401 (S78625) is a revolutionary data transmission device that extends full-duplex High-Speed Ethernet over existing UTP infrastructures. It employs an innovative and unique Super Ethernet scheme instead of traditionally used DSL technology. DSL technology is designed for data transmission over low grade wires and the inherent redundant data transmission scheme for error correction significantly reduces effective data rate as distance increases. Product features include: New Super Ethernet transmission technology • Up to 1,600m coaxial cable for 10Base T • Up to 700m coaxial cable for 100Base T • ast to install, no IP setup • Small footprint and lots more... Available from your Pacific Communications and Direct Alarm Supplies branch.

Videofied XL totally wireless security n Video Alarm Technologies > 1300 46 44 55 n Email > office@videofied.com.au n Web > www.videofied.com.au

The new Videofied XL wireless video alarm system is completely UNPLUGGED and has two way voice built in, also accommodating up to 20 wireless devices including Videofied indoor and outdoor MotionViewers. The VIDEOFIED™ MotionViewer combines a PIR, camera and illuminators into a self-powered device that can be instantly mounted anywhere security is needed. The panel communicates alarms to the Central Monitoring Station over the cell network using GSM (2-way voice) and GPRS (10 second video of the intrusion). Video verification and Voice Verification on a single system — all for a similar price as a blind burglar alarm makes the XL the next generation alarm system for the domestic to commercial markets. The VIDEOFIED™ XL literally needs no wires or cables, not even power to the panel. Contact us for more information.

NEW!

SECURITY INSIDER AUG/SEP 2010// 71


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:40 PM

Page 72

HOT PRODUCTS

Inner Range – Aperio Module n Inner Range > (03) 9753 3488

n Web > www.centralsd.com.au n Web > www.innerrange.com

The new Aperio module from Inner Range positions itself as the most flexible Aperio Interface available. As a true 2 door controller the Concept 4000 module features onboard interfaces for two Aperio hubs and delivers a high level of redundancy via its onboard card caching capacity. Designed with installation ease in mind the Aperio modules simply connect directly to the Concept 4000 RS485 LAN and are sized to install into very small enclosures or into existing equipment housings. Set-up and commissioning is also straight forward. Aperio is a wireless access control technology that radically reduces the installation time and cost of installing traditional electronic access control devices. Aperio cylinders replace traditional mechanical cylinders and contain a wireless transceiver and a card reader. See it at Security 2010 Exhibition – Central Security Distribution Stand D22.

NEW!

NEW!

UTC Fire and Security release Challenger™ IP LAN Adaptor n Direct Alarm Supplies > (02) 9717 5222 n Email > info@das.com.au n Web > www.das.com.au

Save time and money installing Challenger™ with the newTS0098 Challenger IP LAN Adaptor. TS0098 modules allow Challenger RS-485 LAN data to be carried over an IP network.This provides an IP connection between a Challenger panel and its LAN devices such as Remote Arming Stations (RAS) and Data Gathering Panels (including Intelligent Access Controllers) reducing the need for dedicated wiring of expensive two-pair twisted, shielded data cable (Belden 8723). The TS0098 also enables physically separate segments of the Challenger RS485 LAN to be linked together over an IP network, either to extend distance or inexpensively utilise existing IT infrastructure. TS0098 modules provide securelyencrypted IP communications via a unique 128-bit encryption key. For more information, please visit www.utcfs.com.au/IPLAN

RoboCam R1 body-worn chest camera system n ValuTronics Pty Ltd > (02) 9671 7777 n Email > info@valutronics.com.au n Web > www.valutronics.com.au

RoboCam is a totally mobile security system comprising of a portable hard drive and camera unit which can be worn on the head, the shoulder or the chest. RoboCam is an essential asset for any professional security operative that wants to protect their livelihood. A false allegation could cost an operative their hard earned license and consequently their means to earn a living. RoboCam can ensure that this never happens to you. Every RoboCam unit provides multi-level password protection and frame counters to guarantee that your data tamperproof.The hands free unit enables the user to have an instant record of everything they hear and see.

NEW!

72 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:40 PM

Page 73

HOT PRODUCTS

Inner Range – Insight V5 n Inner Range > (03) 9753 3488

n Web > www.centralsd.com.au n Web > www.innerrange.com

The Industries' leading integrated security and access control management software is now a whole lot more powerful! Insight V5 has a host of exciting new features: Tagboard User Location Display - The new user location module displays the location of specific users, or displays all users in specific locations. It delivers real-time user location status and is designed for both public displays and private workstations. User Credit System - Insight V5 introduces a brand new user credit feature. Users are given credit points, by operator entry or dynamically from a 3rd party application. User access events then decrement these credits, with access permissions expiring when their credit points equal zero. Plus Qualification/Certification Management • New user friendly, User Management Screens • Updates to the Schematic Floor Plan Module

NEW!

NEW!

The MITT Hands-Free Adams Metal Detector n ValuTronics Pty Ltd > (02) 9671 7777 n Email > info@valutronics.com.au n Web > www.valutronics.com.au

The MITT hands-free Adams Metal Detectors have become a serious choice for professionals involved in the pat down search of personnel.The operator can detect standard weapons (small knives, guns etc) yet the MITThas extra sensitivity to detect metal objects as small as a book staple, or even smaller.The MITT is ergonomic and comfortable enough to be worn continuously throughout a shift and is a flexible fit. Due to the unit’s hands free operation and covert abilities (silent vibrating alarm). The MITT makes screening simple, fast, safe and more efficient. With the special flexible search head, operators can bend their hands or clench a fist comfortably while using the MITT, leaving hands and fingers completely free to simultaneously perform other tasks.

Inner Range – Intelligent Two Door Access Module n Inner Range > (03) 9753 3488

n Web > www.centralsd.com.au n Web > www.innerrange.com

The Inner Range Concept 4000 Intelligent 2 Door Controller is now available. Building upon the highly successful Intelligent 4 Door Access Module, the modular architecture of the Intelligent 2 Door Access Module has been specifically designed to meet the highest levels of system integrity and redundancy planning. The Intelligent 2 Door Access module effectively combines offline stand-alone operation with enhanced feature design. Full support of the advanced Concept access control features (soft/hard/timed anti-passback, dual user, card + PIN, free access via time-zones etc) is provided. Added advantages include more flexible modular design allowing for door and reader expansion up to 4 doors and 8 readers all in smaller chassis housing. See it at Security 2010 Exhibition - Central Security Distribution Stand D22.

NEW!

SECURITY INSIDER AUG/SEP 2010// 73


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:40 PM

Page 74

HUMOUR ME

Frank Sales

“Pennsylvania police charged a 55-year-old man with public drunkenness, after neighbors spotted him giving — as he late“r described it — mouthto-mouth resuscitation to a road-kill possum.”

R

frank sales

esearchers have found that the world's strongest insect, relative to body weight, is the male dung beetle, able to lift more than 1,100 times its weight in dung. Since the beetles mate inside dung patties, their every move is a struggle against the resistance posed by the feces.They also found some weaker dung beetles mated just fine, helped not by their strength but their unusually large testicles. Either way, it all sounds a bit like the life of the average security manager. Police in Edinburgh, Scotland, issued two men disorderly-conduct citations, after witnesses reported that the inebriated pair had placed their genitals on a supermarket’s vegetable weighing scale.They were acquitted, however, after the only witness admitted that she only saw the men zipping up after claiming to have weighed themselves. Pennsylvania police charged a 55-year-old man with public drunkenness, after neighbors spotted him giving — as he later described it — mouth-tomouth resuscitation to a road-kill possum. A 62-year-old Michigan man suffered second-degree burns after launching himself on a makeshift, rocket-powered sled. Witnesses say he put on a helmet, strapped a contraption consisting of a motorcycle muffler, a pipe, gunpowder, match heads, and gasoline on his back, and had someone light the wick. Alcohol may have been involved. Lucky he didn’t send a New Jersey burglar to get his painkillers, who was arrested having made off with packets of Oxybutynin. Police figure he may have been after Oxycontin.The difference? The latter is a powerful pain killer, his haul treats overactive bladders. Mind you, a 43-year-old Virginia man might have found that helpful, after he was caught straight away for robbing a mini-mart, because he had to stop in a nearby ally to relieve himself. A 51-year-old Florida woman who walked into a Bank of America branch, handed over a robbery note, and walked out with money, was quickly identified and arrested. She said: “There was no plan, no nothing, just impulse. I think everyone should have a list of things they want to do before they die.” Wonder if that was what on the mind of a 39-year-old San Diego man who he died when he crashed his motorcycle while fleeing from sheriff's deputies after allegedly stealing a pack of cigarettes from a mini-mart? Three middle-aged Detroit men were also killed going the wrong way on a freeway after stealing $US45 worth of beauty products from a convenience store. This time, however, police said they were not chasing them but that men were merely in a hurry to get away. Police in St. Louis, Missouri, were called to a man roaming the halls of an upscale office block with a gun. On arrival, officers found workers hiding under desks and in closets, while others had fled the building. Investigations revealed that two lawyers were, once again, playing a game in the hallways, stalking each other with BB guns and occasionally firing. None of the occupants knew it was a game, apart from one, because she had been shot in the finger and shoulder after walking into a previous battle. Police filed gun charges, and one senior officer said the men would be “tried as adults”, despite their juvenile behaviour. A 41-year-old Michigan woman suffering an increasingly painful shoulder injury was repeatedly turned away from emergency rooms, because her condition was not life threatening. Finally, she took a gun and shot herself in the shoulder, hoping for ER treatment. Having missed major arteries and bones, she was patched up and again sent home. Except, of course, this time in even more pain. A 33-year-old British actor who had, among other things,“water-boarded” his girlfriend by pulling her shirt over her head and held her under a shower during a two-hour rampage, was acquitted of domestic assault, not because water-boarding isn’t torture — it is, it is — but because the actor convinced the judge that an anti-smoking drug made him unable to control himself, or even to remember the events of that evening. So, water-boarding is okay, but not, apparently the use of the Mosquito device, which emits an irritating, pulsating, very-high-pitched noise, marketed to shopkeepers to drive away loitering children and teenagers, since the pitch is audible to them but rarely to anyone older than their mid-20s (audio range contracts with age). The Council of Europe, which oversees the European Court of Human Rights, declared the Mosquito a “human rights violation” in that the sounds it emits constitutes “torture”. Whereas kids and their racket are just really, really annoying, right? Check out the July/August issue of The Atlantic, where Daniel Byman and Christine Fair, present evidence that jihadists blow themselves up by mistake, botch airline shoe- and underwear-bombing, buy the wrong fertilizer for urban car bombs, brag too much, and watch far too much Internet pornography. (Is that really possible?) The authors conclude, that there has not been a truly competent jihadist terrorist since Mohammad Atta led the September 11, 2001, missions, and suggest that the US and its allies treat jihadists as “nitwits”, rather than as “savvy and sophisticated killers” (the latter being an attractive recruiting image). Kind of hard, though, to drum up big budgets on that basis, isn’t it? We could say more and probably will do so next issue…

74 //SECURITY INSIDER AUG/SEP 2010


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:40 PM

Page 75


INSIDER_Aug_Sept10 Iss4_76pp

3/8/10

8:40 PM

Page 76


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.