Security Insider Oct/Nov 2012
description
Transcript of Security Insider Oct/Nov 2012
VOL.17 | ISSUE.5 | OCT/NOV 2012
PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ M AG A Z I N E ]
THE MAGAZINE FOR SECURITY PROFESSIONALSS E C U R I T Y
PP255003/02390
2661 Smoke detector/sensorinstallation guidelines
Economiccrime trends: the era ofcybercrime
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 1
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 2
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 3
4 //SECURITY INSIDER OCT/NOV 2012
CONTENTSVOL.17 | ISSUE.5 | OCT/NOV 2012
SMOKE DETECTOR /SENSORINSTALLATIONGUIDELINES
ASIAL StrategicPartners >
26SURVEILLANCEDEVICES - AREEMPLOYERSLOOKING ATALL OFTHE IMPLICATIONS?
32 35
06 | Editor’s message 08 | Private Robert Poate 10 | Security Industry Leadership
Program10 | QLD – Compliance Audits12 | NSW – Cash in Transit NSW
Firearms Registry Announcement
12 | New Police Minister forWA12 | 43rd ASIAL AGM14 | Professional Recognition for
SecurityTechnicians16 | Using technology to simplify
super17 | UK – Survey of the Security
Sector29 | ASIAL New Member Listing 37 | SIG 201238 | Monitoring Centres List39 | Hot Products42 | ASIAL Calendar of events
ECONOMICCRIME TRENDS:THE ERA OFCYBERCRIME
18
THE ROLE OFSECURITYINDESIGNING OUTCRIME
INSIDER_Oct/Nov 2012 Iss5_44pp 25/9/12 7:28 PM Page 4
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 5
6 //SECURITY INSIDER OCT/NOV 2012
The security industry is withoutdoubt one of the more heavilyregulated industry sectors in
Australia.Whilst compliance with legaland regulatory requirements can oftenseem a daunting and overwhelmingtask, failure to have in place compliancesystems and procedures will be to thedetriment of your business.
As a business owner or manager, itcan be all too easy to get caught up inthe day-to-day running of the business,at the expense of spending appropriatetime to plan strategically and maintainhigh governance standards. In anincreasingly competitive businessenvironment expectations are changing.Clients expect faster turnaround timesand more innovative solutions. As aresult, pressure can be placed onproviders to make “quick fix" solutions inorder to secure a client’s business.Often, such decisions can be madewithout a full understanding of theconsequences on other areas of thebusiness, both economic andcompliance related.
As an operator of a security businessit cannot be stated strongly enough howimportant it is that you fully understandyour compliance obligations and have inplace appropriate systems andprocedures. If you don’t, then you needto seek help immediately. Putting thingsoff won’t make the problem go away!
That said, often the hardest step isthe first step. So what should you do?To help you navigate through thecompliance maze, ASIAL’s online resourcecentre – the Centre for Compliance(www.asial.com.au/CentreforCompliance)will help direct you to relevant informationand links.There are many valuableFederal/State and Territory government
web sites and resources that can assistyou in understanding and meeting yourcompliance obligations.
A case in point is a short fictional filmcalled The Marker released recently bythe Australian Competition andConsumer Commission (ACCC).The filmseeks to engage people at all levels ofbusiness and educate them about thedevastating impact that cartels can haveon participants.
Under Australian law, it is a criminaloffence for competing businesses tomake agreements to fix prices, rig bids,share markets or restrict outputs orsupply.
The film shows how cartel activity canruin relationships, careers, reputationsand long term financial security, and mayland guilty parties in jail. It also shedslight on the ACCC’s immunity program,which provides successful applicantswith immunity from court proceedings inexchange for cooperation with ACCCinvestigations.
ASIAL encourages you to view thisfilm (a link to the film can be found atwww.asial.com.au).
‘Compliance’ is not a dirty word orsomething to be feared. Rather, it shouldbe an integral part of how you run yourbusiness to ensure that it operates in asustainable and successful manner.
If you find it all too overwhelming, youcan always call us on 1300 1ASIAL toseek advice and support on yourcompliance obligations.
Remember, advice and support isnever more than a phone call away forASIAL members.
Bryan de CairesEditor
EEDDIITTOORR’’SS MMEESSSSAAGGEE
‘COMPLIANCE’ ISNOT A DIRTY WORD THE MAGAZINE FOR
SECURITY PROFESSIONALS
Editorial and Advertising
Security Insider is published by
The Australian Security Industry
Association Limited
PO Box 1338 Crows Nest, NSW 1585
Tel: 02 8425 4300 • Fax: 02 8425 4343
Email: [email protected]
Web: www.asial.com.au
Publisher
Editor
Bryan de Caires | [email protected]
Editorial Enquiries
Advertising
Tania Laird | [email protected]
Creative Director
Martin Costanzo | [email protected]
Graphic Design + Prepress
Webfx2 Digital | [email protected]
Editorial Contributors
Malcolm Shackell, Andrea Perry, Chris Delaney,
AusSuper and Dr Lindsay Asquith.
Print + Distribution
Nationwide Advertising Group
Published bi-monthly
Estimated Readership of 10,000
Views expressed in Security Insider do not
necessarily reflect the opinion of ASIAL.Advertising
does not imply endorsement by ASIAL, unless
otherwise stated with permission. All contributions
are welcomed, though the publisher reserves the
right to decline to publish or to edit for style,
grammar, length and legal reasons. Press Releases
to: [email protected].
Internet references in articles, stories and
advertising were correct at the time of printing.
ASIAL does not accept responsibility for misleading
views. Copyright© 2012 (ASIAL) All rights reserved.
Reproduction of Security Insider magazine without
permission is strictly prohibited. Security Insider is
a subscription based publication, rates and further
details can be found at www.asial.com.au.
[Next Issue] DEC/JAN 12/13
ISSN 1442-1720
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 6
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 7
8 //SECURITY INSIDER OCT/NOV 2012
IINNDDUUSSTTRRYY NNeWWSS
PRIVATE ROBERT POATEASIAL has passed on itscondolences to the Poate familyfollowing the announcement bythe Australian Defence Force ofthe tragic death on 29 August2012 of their son/brother, PrivateRobert Poate on operations inAfghanistan.
Robert’s father, Hugh Poatewas a long time ASIAL member,Director and Chairman of theAssociation’s ACT branch.
Private Robert Poate was amember of the 3rd Battalion, theRoyal Australian Regiment TaskGroup and was from the 6thBattalion, Royal AustralianRegiment (6 RAR), based inBrisbane, Queensland. Heenlisted in the Army in 2009. Oncompletion of his basic andinitial employment training, he
was posted as a rifleman to 6RAR. Private Poate was a highlyqualified soldier, havingcompleted specialist training asa Protected Mobility VehicleDriver in 2010 and ProtectedMobility Vehicle Commander in2011.
He was known for havingoutstanding leadership potential,which led to him completing apromotion course for Corporal in2011. Private Poate had areputation for creating mischiefwithout getting caught, and wasproud of his family, his militaryservice, his Canberran origins,and his red hair, which hevehemently defended as being‘strawberry blonde’.
He is survived by his parentsand sister.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:02 PM Page 8
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 9
10 //SECURITY INSIDER OCT/NOV 2012
IINNDDUUSSTTRRYY NNeWWSS
Designed specifically for managersand business owners in the securityindustry, the program focuses ondeveloping the skills of the industry’sfuture leaders. Featuring anexceptional teaching faculty, thethree-day program provides practicaland interactive insights into the keyfactors to successfully managing andgrowing a security business.• Day 1: Strategy & marketing• Day 2: Finance for managers• Day 3: Leading and managing
peopleThe program will focus on
developing practical skills that youcan apply at a personal, business andnational industry level.These includean understanding of how to:• communicate effectively• develop high performance teams• drive change• brand and differentiate the product
or service you offer
• manage conflict• identify the key elements that
underpin the financial health ofyour business
• use key principles of financialmanagement to make effectivebusiness decisions
Teaching facultyChris Clark is a strategist, whoteaches corporate strategy andstrategic marketing at MacquarieUniversity, including fifteen yearsteaching on the MBA program of theMacquarie Graduate School ofManagement, where he was until2006 the Director of Corporate andExecutive Education. From 2002-2004 he was director of the MBAprogram. He is also a consultant tosome of Australia’s leadingcompanies, across a wide range ofindustries, who draw on his problemsolving and facilitation skills.
Graham Godbee has been alecturer in finance at MacquarieUniversity Graduate School ofManagement and remains VisitingFellow in the Centre for Money,Banking and Finance at MacquarieUniversity. He has held executivemanagement positions in largecorporates in the roles of businessdevelopment, marketing and finance.
Associate Professor PeterMcGraw is Director of the Labour-Management Studies Foundation anda faculty member in the Departmentof Business, Faculty of Business andEconomics at Macquarie University.
The program will be held in Sydney(23-25 October 2012), MacquarieGraduate School of ManagementExecutive Hotel and ConferenceCentre and Melbourne (19-21February 2013), Melbourne BusinessSchool.
SECURITY INDUSTRY LEADERSHIP PROGRAM
Amendments to the SecurityProviders Act 1993 which came intoeffect in February 2011 provided a rolefor peak security industry bodies totake on a compliance role to assistthe Office of FairTrading in itsregulation of the private securityindustry in Queensland.
As a condition of approval as anApproved Security IndustryAssociation, ASIAL is required toassess compliance of its members tothe Code of Conduct approved by theChief Executive of the Office of FairTrading at least once every 3 years.
ASIAL has appointed a charteredaccountancy firm to conductcompliance audits of its members.Toassist members in preparing for theseaudits, ASIAL has prepared an AuditCompliance Guide which sets out theinformation which we require from youwhen requested.This includes:
• Compliance Audit Overview whichoutlines your obligations and thoseof ASIAL.
• Compliance Audit Form which mustbe completed and returned by thedate requested; supportingdocumentation (including certifiedcopies of specified documentation);a declaration of Compliance; asigned reaffirmation of the ASIALCode of Professional Conduct; anda signed Statutory Declarationstating that the information providedis true and accurate (this must becertified by a Justice of thePeace/Commissioner forDeclarations).All information provided will be
treated strictly in confidence.Members will be notified of the
outcome within 3 months completionof their compliance audit. Ifunsuccessful, members will be
advised of the areas of non-compliance and will be provided withan opportunity to rectify them. Failureto rectify identified non-complianceissues as a result of the audit or failureto complete and return the audit formby the specified date, may result inyour firm being deemed as non-compliant. ASIAL is required to reportto the Office of FairTrading the findingsof each audit.
Should you have any queries aboutthe compliance audit process contactus on 131 ASIAL or [email protected].
QLD – COMPLIANCE AUDITS
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 10
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 11
12 //SECURITY INSIDER OCT/NOV 2012
IINNDDUUSSTTRRYY NNeWWSS
Following enquiries made by ASIALconcerning Firearms businesslicences and references to the CashTransportation (Non-ArmouredVehicles) Interim Award No. 2 Cashlimits, the Firearms Registry hasadvised that:
“Armed Security Firms authorisedto possess and use firearms whilstperforming ‘Cash in Transit’ activitiescurrently have the followingcondition endorsed on the businesslicence, ‘must comply with cash intransit (State) Award including cashlimits.’
On 29 July 2011 the CashTransportation (Non-ArmouredVehicles) Interim Award No. 2 wasterminated consequently thisrequirement is no longer applicable.
However compliance with theWorkCover Cash in Transit Code ofPractice will continue to apply. Itshould be noted, item 3.3.6 withinthis document provides – ‘Cashlimits for each CIT operation are tobe determined in accordance withthe safety and security riskassessment’.
In this regard, all future Risk
Assessments undertaken for eachCash in Transit activity must addressthe cash limits.
NSW – CASH IN TRANSIT NSW FIREARMS REGISTRYANNOUNCEMENT
The Hon Liza Fraser MLA(pictured) has been appointed asthe new Minister for Police andEmergency Services in WA.TheMinister will be ASIAL’s specialguest at its upcoming industrybreakfast briefing in Perth on the19th October.
NEW POLICEMINISTER FOR WA
ASIAL’s 43rd Annual GeneralMeeting will be held on Wednesday,28 November 2012 from 8.45am atthe Mantra Hotel (Cnr Parkes andValentine St) Parramatta.
A ballot for Directors of theAssociation will be conducted bythe Australian Electoral Commissionduring October.
43RD ASIAL ANNUALGENERAL MEETING
As a joint initiative, the AustralasianFire and Emergency ServiceAuthorities Council (AFAC) and theAustralian Security IndustryAssociation Limited (ASIAL) haverecently released smokedetector/sensor installation guidelines.The guidelines have been developedto assist security companies ininstalling, servicing and monitoringsmoke detectors/sensors connectedto security alarm systems in anappropriate manner, withoutrequiring detailed knowledge offire alarm standards, individual
state regulations or building codes. APDF copy of the guidelines can bedownloaded by visitingwww.asial.com.au, alternatively youcan turn to page 26 to view a copy.
Representatives from the variousstate and territory fire services willprovide an update on the guidelinesat the coming series of ASIALIndustry Breakfast Briefings aroundthe country.
AFAC / ASIAL SMOKEDETECTOR/SENSOR INSTALLATIONGUIDELINES
The Security Industry AmendmentAct 2010 expanded the suitabilitycriteria and prerequisitesfor individuals applying for a licenceto work in the security industry.Theamendments included therequirement for applicants to attenda face-to-face workplace information
session about their employmentrights and obligations withrepresentatives of a registeredorganisation (usually union officials).
Following a recent review, the ACTGovernment has decided that theSecurity IndustryWorkplace Informationrequirement should continue.
ACT – SECURITY INDUSTRY WORKPLACEINFORMATION REQUIREMENT
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 12
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 13
Representatives from the FairWork Ombudsman will addressthe upcoming ASIAL IndustryBriefings on FWO’s audit prioritiesand the outcomes of the recentsecurity audit campaign.For more information on theupcoming ASIAL IndustryBriefings around the country, turnto page 42.
2012 ASIAL Annual &Financial ReportASIAL's 2012 Annual andFinancial Report can be viewed atwww.asial.com.au/ar
14 //SECURITY INSIDER OCT/NOV 2012
IINNDDUUSSTTRRYY NNeWWSS
The SecurityTechnicianCertification (STC) program is anASIAL industry initiative to provide atraining course that offersprofessional recognition and anindustry recognised career pathwayfor technicians working in the securityindustry.
The STC credential is a technicalcertification program that coversalarms, access control and CCTV.Through a combination of self-paced study, face-to-face theory andpractical assessments at approvedassessment centres (located inAdelaide, Brisbane, Melbourne,Sydney and Perth), participants arerequired to demonstrate their theoryand practical skills.
Designed to provide a careerpathway for security technicians,the program is also a proactiveinitiative to attract and retainappropriately skilled workerscapable of meeting the futureneeds of the industry. Unitsassociated with the program canbe recognised as competencybased units under the AustralianQualityTraining Framework.
The program incorporates3 levels of recognition:
- Certified SecurityTechnician- Advanced SecurityTechnician- Master SecurityTechnician
Certification benefits for individuals• Professional development - The
acquisition of knowledge and skillsdemonstrates your commitment toself improvement, which increasesyour career prospects in thesecurity industry.
• Demonstrates your industryreadiness – Proves your capabilityand expertise to work within thesecurity industry.
• Career advancement – Supportscareer path development andopens doors.
• Targets and builds upon the skillsyou have as an industryprofessional
Certification benefits for employers• Competitive advantage – provides
a mechanism to recognise staff
expertise and maintain thecurrency of skills.
• Recruiting standard – provides anindustry skills threshold and aneasy way to recognize skillqualifications gained bycandidates.
• Professional development –provides a pathway for thedevelopment and retention ofvalued employees.
• Quality – provides a mechanism toimprove operational efficiency andenhance customer satisfaction.For more information visit
www.securitytechniciancertification.com.au
PROFESSIONAL RECOGNITION FORSECURITY TECHNICIANS
FWO UPDATE
The ACTMinister for IndustrialRelations has signed a Legislative
Instrument that sets the levypayable by employers, at 1.47% ofordinary salaries.
The portable long service leavescheme will come into effect from 1January 2013, with the firstinstallments due in March 2013.Thescheme will apply to all securitymanpower employees (by licensecategory) in the ACT; contributionswill be paid quarterly into the fundand the scheme pays for longservice leave (pro rate) when taken.
ACT – PORTABLE LONG SERVICELEAVE SCHEME
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 14
IINNDDUUSSTTRRYY NNeWWSS
The Licensing & RegulationDivision is extending an invitation toall Private Security BusinessLicence & Registration holders toattend a Private Security BusinessForum.
The Forum will focus on risks thatare currently impacting on securitybusinesses and provide strategiesto assist businesses to minimise
these risks.This invitation isextended to all managers andsupervisors within your securitybusiness. An agenda for the Forumwill be listed on our website atwww.police.vic.gov.au/PrivateSecurity/News and Publications.
The Forum will be held onThursday 25th October 2012(1:30pm to 4:30 pm) in the
Concourse Meeting Room, Adjacentto Tower 4 lifts, World Trade Centre,18 – 38 Siddeley Street, Docklands.
If you would like to attend thisforum please provide your nameand mobile number via email [email protected] by20 October 2012 so that numberscan be recorded for catering andcommunication purposes.
SECURITY INSIDER OCT/NOV 2012// 15
VIC – PRIVATE SECURITY BUSINESSFORUM INVITATION
Nominations will open shortly forthe 2013 Australian Security IndustryAwards for Excellence. Awardcategories include:
Individual• Individual Achievement – General
Security• Individual Achievement – Technical
Security
• Security Student of the Year
Organisational• Security Management• In-House SecurityTeam• Training• Integrated Security Solution
(projects above $250,000)• Technical Security Solution
(projects below $250,000)
• Special Security Event or Project
The awards will be presented atthe Park Hyatt Hotel Melbourne onthe 2nd May 2013.
Further details on the awards areavailable atwww.asial.com.au/awardsforexcellenceor by [email protected]
2013 AUSTRALIAN SECURITY INDUSTRYAWARDS FOR EXCELLENCE
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 15
16 //SECURITY INSIDER OCT/NOV 2012
AUSTRALIAN SUPER
Stronger Super – part of theGovernment’s super reforms – aimsto make the super system easier toadminister and focuses ontechnology to drive efficiencies.
The reforms will start to roll out overthe coming 12 months. But with oursecure online solutions, you can savetime now and get ready beforeStronger Super starts.
To get the most out of an onlinesolution you first need to ask twoquestions. How many employees do Ipay for? And do I pay super to morethan one fund?
Using AustralianSuper’s onlineoptions to make single paymentsFor all your employees inAustralianSuper, you can use our easyand secure online solutions tomanage your super obligations.
AustralianSuper has two onlinesystems that participating employerscan use to send contribution details:
• EmployerOnline Who? Good if you have less than30 employees.How?You enter employee detailsonce and then just update thecontribution amount for eachpayment period.
• Super FileManagerWho? For any size business thatuses an electronic payroll system.How?You upload a payroll file soyou never need to re-keycontribution information.
These online options both work wellwith paying electronically – BPAY®,Electronic Funds Transfer, direct debitand Postbillpay® – and will save youfrom possible future penalties forpaying contributions by cheque underthe new reforms.
To get started online go towww.australiansuper.com/PaySuper and sign up.This only takes aminute or two and you’ll need your
employer number. Or call us on1300 300 273 and we can help.
Using a clearing house to pay superto other fundsTo help make paying super to otherfunds easier, we offer you access to afree clearing house facility.QuickSuper – provided and managedby Westpac – is a simple and secureway to pay and manage the supercontributions for your employees whoaren’t members of AustralianSuper.
To use QuickSuper free-of-charge:• you must be a participating
employer of AustralianSuper• AustralianSuper must be your
default fund, and• at least half of the total number of
your employees must be membersof AustralianSuper.
For more details or to register go towww.australiansuper.com/ClearingHouse or call us on 1300 300 273.
BPAYis registered to BPAYPty Ltd ABN 69 079 137 518. Postbillpay is registered to the Australian Postal Corporation ABN 28 864 970 579.
USING TECHNOLOGY TO SIMPLIFY SUPER
INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 11:15 AM Page 16
SECURITY INSIDER OCT/NOV 2012// 17
IINNDDUUSSTTRRYY NNeWWSS
Findings from the survey ofcorporate security specialists:• Over two fifths of the 209 specialists
surveyed admitted they felt thatsecurity was viewed as a 'grudgepurchase' and most accepted thatsecurity was a low priority.
• They felt that in house serviceswere of a higher quality but thatcontract services were better valuefor money.
• The research suggests the needfor the contract security sector toprovide more evidence of itseffectiveness and value against abackground where those buyingsecurity need to be persuaded.
Findings from contract securitycompany managers:• Managers were concerned about
how security was perceived.Almost two thirds felt 'low marginschange the focus of contractsecurity directors/managers fromsecurity to cost control'.
• Over two thirds of 509
directors/managers cited the needto cut costs as a reason forsevering contracts or changingsuppliers.
• When asked about reasons forstaff leaving contract security workmanagers /directors cited poor pay,limited development opportunities,and lack of appreciation as themain push factors.Findings from security operatives:
• Most security guards have theirlicensing fee paid for by theiremployers.
• A quarter of security guards workmore than 60 hours a week.
• Over half of the 504 operativessurveyed agreed that 'most of mycolleagues are totally committed toproviding a quality service'.As Professor Martin Gill who led
the study noted: "Security is facing achallenging time...The security sectorneeds to respond in a more co-ordinated way in highlighting withevidence what you get from a goodsecurity company that you don't getfrom a bad one".
This report is available and can be requested via [email protected] or visit www.perpetuityresearch.com/sri.html.
SURVEY OF THESECURITY SECTOR Every year Perpetuity Research in the UK undertakes a researchproject for the Security Research Initiative (SRI). This year'sreport is based on the findings of three groups: corporatesecurity specialists who buy security, contract security companymanagers, and security operatives (particularly guards).
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 17
CYBERCRIME18 //SECURITY INSIDER OCT/NOV 2012
CCYYBBEERRCCRRIIMMEE
ECONOMIC CRIMETRENDS: THE ERAOF CYBERCRIMEJust under half (47%) of Australian organisations haveexperienced at least one economic crime incident over the past 12months. This is up from 40% in the last PwC survey in 2009 andabove the global average of 34%. More than 50% of the Australianorganisations experiencing fraud had more than 10 incidents offraud, and 16% suffered combined losses of more than $5 million.The raises the question: is there more fraud in Australia or arewe better at detecting fraud? The answer is a bit of both.
By Malcolm Shackell and Andrea Perry
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:03 PM Page 18
ERCRIMESECURITY INSIDER OCT/NOV 2012// 19
CCYYBBEERRCCRRIIMMEE
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 19
W hat is particularly interesting is the rapid rise incybercrime – defined as any economic crime wherea computer or the internet plays a central role in the
crime. Cybercrime is now globally ranked the fourth mostcommon form of economic crime. In Australia it is ranked thesecond with 63% of respondents perceiving the risk ofcybercrime to have increased over the last 12 months.
The surveyThe PwC Global Economic Crime Survey has beenconducted every two years since 1999 and in Australia since2001. It is one of the largest and most comprehensive surveysof its kind surveying just under 3,900 organisations in 78countries.The global and Australian surveys were lastreleased in 2009.
Respondents were asked about the types of economiccrimes they had suffered during 2011.The top four economiccrimes experienced in Australia were asset misappropriation,accounting fraud, bribery and corruption and cybercrime.Asset misappropriation was the most common crime,experienced by 86% of respondents.This has been the case
throughout the history of the survey with this categoryincreasing from 64% in 2003.
The survey has identified trends in economic crime withglobal reports of cybercrime and bribery and corruption onthe rise.This is due to a combination of factors includingincreased publicity of these issues and changes in legislationsuch as the UK Bribery Act.
Who is committing fraud? A significant feature of the latest survey results is the apparentshift towards internal fraud, as opposed to external fraud. InAustralia 54% of reported economic crimes were committedby internal fraudsters, increasing from 33% in the last surveyin 2009.These statistics mirror what we are seeing in ourwork, particularly regarding asset misappropriation where wefind the majority of this economic crime is commitment byinternal fraudsters.The exception to this trend is financialservices, telecommunications and retail industries, whereexternal fraud remains the main concern.
The increase of internal fraudsters has elicited queries from
our clients about why there is this apparent shift. Ourexperience tells us that people are experiencing a higher levelof financial hardship in the current environment (the “need”factor) and as always, greed remains a factor. Regardless ofthe reasons, employees are taking advantage of controlweaknesses in organisations to commitment fraud.
We can build a profile of an internal fraudster based on thesurvey responses we received.The average fraudster (55%) isusually young (in their 30s), but with enough experience tounderstand the systems and controls in an organisation.Theyare typically in some sort of management role (90%), or atleast in a position where they can influence the way money orassets leave an organisation.They are usually male (75%),though not exclusively so. Recent major frauds we have seenhave been committed by both sexes, and the male to femaleratio may mirror the gender ratio in many organisations.
Hotspot 1: Asset misappropriationAsset misappropriation includes theft of funds, cash andassets and this type of economic crime is one of the
consistent crimes we see every day in our business. Over thelast year there is no doubt that we have seen a rise incorporate theft of one form or another, but there are threetypes of fraud we are seeing most often: (1) Employeeexpense fraud – we have seen a significant increase in thistype of fraud, potentially because of the ease in which it canbe committed when controls are not enforced.The size ofsome of these frauds is surprising, with organisational lossesrunning into the $100,000s in many cases. (2) Fraudulentinvoicing / suppliers – this method of economic crimeremains the most common way for employees tomisappropriate funds.This type of fraud usually involvesconflicts of interest and fraudulent invoice approvals. Recentlythere has also been increasing evidence of manipulation ofelectronic records such as payment files. (3) Asset write downand theft – we have seen an increase in the occurrence ofhigh value assets being fraudulently written down to zero andthen on sold for scrap or on auction sites by employees.Thisis a particularly problem in the construction, mining andtelecommunications industries. It is important for
20 //SECURITY INSIDER OCT/NOV 2012
CCYYBBEERRCCRRIIMMEE
The increase of internal fraudsters has elicited queries fromour clients about why there is this apparent shift. Ourexperience tells us that people are experiencing a higher levelof financial hardship in the current environment (the “need”factor) and as always, greed remains a factor.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 20
organisations to review the way they mitigate the risksassociated with the write down and disposal of assets.
Hotspot 2: CybercrimeOne of the more remarkable insights from the survey was theincrease in cybercrime, and respondents are seeing this riskpredominantly as an external risk.The vast majority of whatwe are seeing in cybercrime relates to improper access toand/or theft of electronic information that has value (monetary,competitive advantage, reputation).There are 5 different“motives” for this.1. Insiders (employees or contractors) who have authorised
access to systems, and abuse this access for personalgain (usually employee fraud).This form of cybercrime isclosely linked to asset misappropriation, with the increaseduse of technology creating new avenues for this traditionalfraud.
2. Competitors seeking unfair advantage through theft of oraccess to confidential information.This has occurred inAustralia, however to a much lesser extent than in someother countries. Most of what occurs in this category is inrelation to disgruntled employees.
3. Foreign governments committing espionage for political oreconomic gain. Similar to the previous category this hasoccurred, by is primarily focussed in countries where theline between government and businesses is “blurred”.The
cybercrime techniques used are often extremelysophisticated and difficult to detect.
4. Trans-national criminal enterprises stealing and / orextorting information to generate income.This is arguablythe most common type of external cybercrime and is thefocus of many ITSecurity professionals.There have beenmany high profile examples of this type of crime.Theseincidents are usually associated with major financial andreputational damage to the targeted organisation.Customer information is a highly commoditised item on theinformation black-market with credit card details selling forapproximately $25 and higher prices for matching emailaddresses and passwords.
5. Hactivists protesting against organisational actions orpolicies.This type of motivation has been on the rise, withthe most notable example being the ‘Anonymous’ hackivistattack on Visa.com and Mastercard.com as part of“Operation Payback” in response to Matercard,Visa, Paypaland a number of other payment processing companiesstopping donation transactions to the WikiLeaks group.
Our experience is that most organisations treat cybercrimeas an “IT issue”, when really it is a whole of business issue.Often when we are called in to manage a cybercrime incidentwe find it is more extensive than originally believed, withvictims often being targeted over a lengthy period.When an
SECURITY INSIDER OCT/NOV 2012// 21
CCYYBBEERRCCRRIIMMEE
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 21
incident occurs we recommend that organisations “assume aposition of compromise” rather than assuming their ITsecurityprocedures are adequate. Having a three step strategy forprotecting against and responding to cybercrime is effective.1. Have an incident response plan ready to go as soon as an
incident is suspected.This should include when and whichspecialists to involve.
2. Ensure there is cyber security awareness in the organisationas this goes a long way to delaying or stopping threats.Regular training and well resourced security goes a long way.
3. Involve senior level leadership such as the Board and CEO.This will encourage the “tone from the top” that is so vital forany type of risk awareness.
Hotspot 3: Bribery and corruptionRecent media has highlighted the risks that Australianbusinesses face when operating in countries where the risk ofbribery is high.Whilst it could be said that the actual risk ofbribery has not changed, the consequences of being exposedto bribery and corruption have been heightened.
Under current Australian legislation, the risk forAustralianorganisations is in relation to the payment of bribes to
government officials overseas (by the organisation or theiragents). Most of the incidents we see involve bribery throughlocal agents or through sales staff expenses. In these cases is itrare that Australian executives or the Board are aware of thebribery, although this does not mitigate reputational risk.
Organisations should be aware that changes to anti-briberylegislation are looming.The UK Bribery Act is now law and thislegislation is much more rigorous than the current Australianor United States bribery legislation.There is a strong belief thatthe Australian and United States governments are under
pressure to strengthen their anti-bribery laws, potentially tobring them into line with the UK. There are 4 key differencesbetween our laws and the UK legislation:1. There are no exemptions for“facilitation payments” – this will
have significant impact on companies operating inIndonesia, for example, where minor value facilitationpayments are commonly paid.
2. “Private to private”bribery is covered – this is as opposed toAustralian and United States legislation which is focussedon bribery of foreign officials.
3. A new offence of “failure to prevent” – this means thatexecutives and boards cannot just blame rogue
22 //SECURITY INSIDER OCT/NOV 2012
CCYYBBEERRCCRRIIMMEE
Many organisations continue to remain very reactive – eitherbecause they just hope a problem won’t occur or because theydon’t have the resources or understanding to implementpreventative techniques and detective controls.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 22
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 23
employees. Organisations have a duty to have “adequateprocedures”, and there is official guidance on whatprevention means.
4. The legislation casts a “wide net’ – which meansorganisations do not have to have significant operationswithin the UK to be covered by the UK Bribery Act in everyother operational location.
Prevention and detection We are regularly asked to advise clients on steps to avoidbeing an economic crime statistic.The key is establishinga fraud control framework which broadly covers threecomponents: prevention, detection and incidentmanagement.The framework should include soundpolicies and training, due diligence procedures to ensureyou know more about those you do with business with(prevention), having a robust control environment withdetective controls and avenues for whistleblowing(detection) and lastly, understand what you have to doquickly should a problem occur (incident management).
Many organisations continue to remain very reactive –either because they just hope a problem won’t occur orbecause they don’t have the resources or understandingto implement preventative techniques and detectivecontrols.There have been some positive trends emergingregarding our ability to detect fraud, with the majority ofsurvey respondents stating they had performed a fraudrisk assessment (which is in our view a vital tool in fraudcontrol). Interestingly, whistleblower techniques andsuspicious transactions analysis (or fraud focused dataanalytics) are being employed more often. In our work weare seeing increasing demand in these areas.
SummaryThe PwC Global Economic Crime Survey has shown the everincreasing impact of fraud from both a value and volumeperspective. Most significantly the survey brought to focus theemergence of cybercrime. Incidents of cybercrime have rapidlyrisen in Australia and many organisations are struggling to stayone step ahead.
Particularly in the current environment, all Australianorganisations should consider the economic crime risks withintheir operations and their capabilities to proactively mitigatethese risks.
24 //SECURITY INSIDER OCT/NOV 2012
CCYYBBEERRCCRRIIMMEE
Andrea Perry is a Senior Consultantin the PwC Forensic Servicespractice specialising in forensicaccounting, investigations andcorporate intelligence.
Malcolm Shackell is a partner in PwC’sforensics practice with over 20 yearsexperience in the prevention,detection andinvestigation of economic crime.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 24
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 25
The following Guidelines have beenagreed between the AustralasianFire and Emergency ServiceAuthorities Council (AFAC) and theAustralian Security IndustryAssociation Limited (ASIAL).Theyare intended to assist a securitycompany to install, service andmonitor smoke detectors/sensorsconnected to security alarmsystems in an appropriate manner,without requiring detailedknowledge of fire alarm standards,individual state regulations orbuilding codes.
Outside of installed fire safetysystems engineered to therequirements of Australian/NewZealand Standards, the purpose of asmoke detector is to detect thepresence of smoke and alert personson site only. It is important to note thatsmoke detectors/sensors that areconnected to a burglar alarm have notbeen designed to meet the specifictechnical requirements of a systemintended to respond to the fire brigade.
These Guidelines are prepared onthe basis that the intent of includingsmoke detectors / sensors in asecurity system is to provide someadditional protection in addition to anymandatory fire safety requirements.Including smoke detectors in asecurity system may not fulfillmandatory legislative requirements for
hard wired smoke alarms in premises.
1. If the security company is unsure ofthe legal/regulatory requirements forthe installation concerned, it shouldrequest that the customer obtainsclarification from an appropriate fireprofessional before proceeding. Ifthe building to be protected is anew or recently constructedbuilding, the customer should obtaina specification for the smokedetection requirements beforeproceeding.
2. As a general rule, a securitycompany should never install smokedetectors/sensors if the installationis required by legislation, as theinstallation by the security companymay not meet the requirements ofthat legislation. If the customeradvises that the detectors /sensorsare required by legislation, theyshould be directed to anappropriate fire professional foradvice before proceeding.
3. A security alarm system shouldnever be used as the primarymonitoring method for buildings thatare required underlegislation/building codes to have amonitored smoke detection system.
4. A request to call the fire brigade
should always be at the discretionof the customer and a cost may beincurred when the fire brigadeattends a false alarm. Securitycompanies should ensure theircustomers are aware that firebrigades in many states may chargeeither the security provider or theirclients for callouts to false smokealarm activations.
5. Smoke detectors/sensorsconnected to security systemsshould only be supplementarysystems and, as such, if largenumbers of detectors are required(e.g. more than 5) or the number ofsmoke detectors /sensors is greaterthan the number of security devices,the client should obtain advice froman appropriate fire professional.
6. The security system should never beused to control other functions as aresult of the detection of smoke(e.g. activation of door closers,smoke exhaust or shut down of airconditioning). If this is required, thecustomer should be advised toobtain advice from an appropriatefire professional.
7. If after providing this advice to thecustomer they still wish to proceedwith monitoring of the smokedetectors /sensors connected to a
26 //SECURITY INSIDER OCT/NOV 2012
SSMMOOKKEE DDEETTEECCTTOORRSS
Guidelines for the installation and servicing ofsmoke detectors/sensors connected toresidential and commercial security systems.
A joint initiative
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 26
security alarm system it isrecommended that the securitycompany should have the clientsign an appropriate disclaimer.Thisdisclaimer should contain thefollowing as a minimum:
7.1. The installation is notintended to meet anyrequirements of any Act,Regulation or Building Code inregards to a fire detectionsystem including any legalrequirement to have hard-wiredsmoke alarms in the premises.7.2. Security alarm monitoringcentres are not approved firealarm monitoring centres and,whilst they will carry out theirinstructions to the best of theirability, they cannot guarantee thatthe fire brigade will attend anyspecific alarm.7.3. If the client requestsattendance of the fire brigade orauthorises the monitoringcompany to request attendanceof the fire brigade, any costsassociated with this attendancewill be the responsibility of theclient.
8. If the security company is requiredto service existing customers, orcustomers at whose premises theydid not install detectors/ sensors,they should obtain a similar waiver,as per item 7 above, beforecommencing work.
9. In normal circumstances, it isrecommended that heat detectorsnot be connected to security alarmsystems. However, if suitable for asemi-external environment, they maybe used in an attached garage.Thesecurity company needs to ensurethat their sales, installation andservice staff have beenappropriately trained in the correct
use of the products they install aslisted below:
• There are various types ofsmoke detectors/sensorsavailable, from the battery-onlyversion to the mains-poweredtype installed by electricians.• The security industry uses thepower from the alarm panel asthe primary source and musthave a separate battery supplyonboard or on the system.• The selection of the correctdetector/sensor is based on thepurpose of the installation.• The type of transmission pathused to monitor the alarmsystem, which may includesmoke detectors/sensors, shouldbe based on the risk rating of thepremises and, therefore, theClass from 1 to 5 (covered inAS/NZS 2201.5:2008 – AlarmTransmission Systems).• For fire monitoring systems, itis important to know thatconstant monitoring is available.This is normally relevant to Class3, 4 and 5 in the above Standard.• Monitoring of smokedetectors/sensors in an intruderalarm system when coded forregulatory or insurance reasonsshould be performed by amonitoring centre independentlygraded to AS 2201.2:2004,Monitoring Centres.
10. Recommendation should be madeto the client to maintain the systemto the manufacturer’srecommendations, even ifmaintenance is not requested bythe client. AS/NZS 2201.1:2007recommends maintenance becarried out but it is not mandatory.Where smoke detectors/sensorsare installed the client should bemade aware of their responsibility to
test the whole system ifmaintenance is not performed bythe security company.
11.All smoke detection/sensor cablingmust be performed in compliancewith Australian Communicationsand Media Authority (ACMA)regulations.
12.The security company shouldmaintain a log of all smokedetector work performed, as isrequired under AS/NZS2201.1:2007, Intruder alarm systems– Part 1: Client’s premises –Design, installation, commissioningand maintenance.
13. All customer cabling associatedwith the above service must be incompliance with AS/ACIFS009:2006 (telecommunicationscabling Wiring Rules) and all otherrequirements of the AustralianCommunications and MediaAuthority (ACMA) Cabling ProviderRules.
Special note:In some circumstances the fire alarmpanel may also be monitored by asecurity monitoring centre as afailsafe feature. A fire technicianworking on the system should notifythe Facility Manager, isolate the AlarmSignalling Equipment (ASE) and alsonotify the security monitoring centreto avoid unnecessary false alarmresponses from the fire brigade.Details of the security monitoringcentre should be kept on the front ofthe fire panel log book.
A PDF version of the InstallersGuide is available for download onthe ASIAL website or you can [email protected] to requestyour copy.
SECURITY INSIDER OCT/NOV 2012// 27
SSMMOOKKEE DDEETTEECCTTOORRSS
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 27
28 //SECURITY INSIDER OCT/NOV 2012
SSMMOOKKEE DDEETTEECCTTOORRSS
A joint initiative
Purpose of a SmokeDetector/SensorThe purpose of any smoke detectorsensor in your home is to detect thepresence of smoke and sound analarm which in turn provides earlywarning of a fire so that you and yourfamily can get out safely. It is notdesigned to call the fire service.
Why have your SmokeDetectors/Sensors monitoredby a security company?Some people prefer that their smokedetectors/sensors are connected totheir security system and monitoredby a security company.This allows thesecurity company to call you or anominated person if a problem arisesin your home.You may also requestthat your security company calls thefire service for you. If you request thisservice the fire service may charge forattendance if it turns out that there isno fire.The fire service may also haveto force entry into your home if theysuspect a fire.
What you need to know:Fire Services may charge a fee forcallouts initiated by securitycompanies on your behalf if there hasbeen no sign of fire when they arrive.In some states this fee is over $1000.
The legislative requirements for the
installation of smoke alarms vary fromstate to state.Your local fire serviceand in some cases your local councilcan provide advice regarding therequirements. If you install a smokedetector/alarm connected to yoursecurity system, it must be in additionto the smoke alarms required to beinstalled to meet mandatory legislativerequirements in your state.
For all consumer installation,monitoring and maintenanceinformation, refer to the systemmanufacturer or your security serviceprovider.
A PDF version of the ConsumerGuide is available for download onthe ASIAL website or you can [email protected] to requestyour copy.
Smoke Detectors/Alarms connected toMonitored Security Systems InformationGuide for Residential Properties
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 28
CORPORATE MEMBERSAdmiral Security Services
Advanced Communications Riverina
Agilient Pty Ltd
AIG Security Pty Ltd
Alert Venue Services Pty Ltd
Alied Security Solutions Pty Ltd
Allcorp Security Pty Ltd
Allied Security Australia Pty Ltd
All-Locks Master Locksmiths Pty Ltd
APS - Ability Protection Services Pty Ltd
APSE Group
Arc Security Systems Pty Ltd
Archangel Security
Aspect Group (WA) Pty Ltd
Ausi Security Solutions
Australia Wide Security and Protection
AUSTRALIAN AIR HOLIDAYS
Australian Operational Security Service
Australian School of Security and
Investigations
Authorized Security Pty Ltd
Base Security Pty Ltd
Basec Pty Limited
Bens Data Communications &
Electrical Services
Blue Security Qld
BlueCorp Security
Bluestar Security Services
Britech Security Pty Ltd
Casa Security
Cato Logistics Pty Ltd
CCTV Express Pty Ltd
CCTV Online Security
CDIK Pty Ltd
Celebrity Security Pty Ltd
CG security
CMS Data & Electrical Engineering
Pty Ltd
Communicable Pty Ltd
Comsecure Australia
Conceptual Technology Solutions
Pty Limited
CounterThreat Security Services Pty Ltd
Coupar Angus Security
CPD Consulting
Cross Link Security Pty Ltd
CSI Security Australia
Customised Security Group Pty Ltd
Digimax Security Pty Ltd
E Tec Security
Empowered Learning
Endura Security Pty Ltd
Evolution Traffic Control Pty Ltd
FalconCorp Security Services Pty Ltd
Forebode
Foresight Security Planning Pty Ltd
Fortress Security Solutions
Get Smart Gadgets
GROUP 3 SECURITY
Group Force Security Pty Ltd
Grouped Property Services Pty Ltd
GTE Security Services
Guard Dog Security Services
Guard19 Security Group
Guardian Alarms
Guardian Security Solutions
H & H Security Australia Pty Ltd
Haven Protection Services
& Investigations
Holler Security Services
I Spy Security Services Pty Ltd
Insperata Integrated Systems Pty Ltd
Integra Security Solutions PTYLTD
Intellectual Synergy Pty Ltd
Intercept Security
Intervid
IWS Services Pty Ltd
AASSIIAALL NNEEWW MMEEMMBBEERRSS
ASIAL is pleased to welcome the following new members(including Corporate, Associate and Affiliate members) who havejoined the Association over the past few months.
WELCOMETO OURNEW MEMBERS
SECURITY INSIDER OCT/NOV 2012// 29
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 29
JC Protech-tion Security
Justus Protective Services Pty Ltd
Knight Security Group
Leader Security
Lighting Art & Science Pty Ltd
Link Enterprise Solutions Pty Ltd
Lookup.Com
Lykos Protection Group Pty Ld
Maja Security Services
March Networks (Australia) Pty Ltd
Master Security Group (MSG) Pty Ltd
Maxims Security Group Pty Ltd
Maxus Security Services Pty Ltd
McAtamney Pty Ltd
Megabase Pty Ltd
Metro Communications
Mounted Security and Asset Protection
MR Security Pty Ltd
National Vetting Services Pty Ltd
Netcorp GPS Pty Limited
North State Security
NQ Security
On The Spot Cleaning and Security
Pty Ltd
Online Security Protection Pty Ltd
Paragon Risk Management Pty Ltd
Patrons Protective Services
Perth Security Services
Platinum Protection Solutions
Pop-A-Lock
ProCorp Security Services Pty Ltd
Pronto Security Pty Ltd
PSR Security
PTPERTPty Ltd
QA ELECTRICAL PTYLTD
Radiant
RCZ Australia Pty Ltd
Renown Security Group
Rent-A-Cop Pty Ltd
Resolution Security Services Pty Ltd
Rhads Investment Pty Ltd
Robust Services
S.A.S. 1 PTYLTD
Safe Sheild Security Services PTY. LTD.
Safeline Security Service
Salcom
Scope Protective & Data Solutions
Pty Ltd
Secu Corp
Secure Az Pty Ltd
Secure City
Secure Plus Asset Protection Pty Ltd
Securex Pty Ltd
Securezone Security Services
( AUS) Pty Ltd
Securimax
Security Advisers Australia Pty Ltd
Security Awards Pty Limited
Security Network Protection Group
Pty Ltd
Security Risk Management Pty Ltd
Security2u Australia
SERA Group Pty Ltd
Shanx Security
simPRO Software Pty Ltd
Sonic Security Services Pty Ltd
Specialized Infrastructure Security
SSG Security
Stanthorpe Security
Steel Security Group Pty Ltd
Sunrise Security Services Pty Ltd
Tactical K-9 Group
Tamtek Australia Pty Ltd
Taylorm Security
Technical Installations
Tempest Security Solutions
That's All Protection
The Ultimate Protection Group Pty Ltd
Third Eye Surveillance Pty Ltd
TJ Services NSW
Trisquared Pty Ltd
Trust Security Solutions
Twin Cities Security
United Protocol Security Holdings Pty Ltd
United Risk Management Group Pty Ltd
Urban Crowd Control Pty Ltd
VCPG Security Services
Vice Security Port Lincoln
Vodafone Hutchison Australia Pty Ltd
Water Ratz Security Pty Ltd
Wayne L Hall Pty Ltd
Weslo Staff Pty Ltd
Yates Electrical & Communications
Zone Advanced Protection Systems
WELCOMETO OURNEW MEMBERS
30 //SECURITY INSIDER OCT/NOV 2012
AASSIIAALL NNEEWW MMEEMMBBEERRSS
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:05 PM Page 30
Between 1 May and 14 September
2012, the following ASIAL members
achieved recognition as either a
silver or bronze member:
Silver (11-15 years membership)
Butlers Not Only Windscreens
Mibyte Technology
Securacore Pty Ltd
Diplomatic Security Protection Services
Pty Ltd
Lamson Concepts Pty Ltd
Davlin Security Group
City Coast Security
The Illawarra Business College
Marbia Security Installations
New Era Enterprises
Pronet Security & Data
AEK Management Aust. Pty Ltd
Technical Solutions International
Nepean Regional Security Pty Ltd
P M Securities Pty Ltd
Bronze (6-10 years membership)
Siga Consulting
G & M Honeyman Pty Ltd
Vladimir John Halaska
Into Security
Eris McCarthy Pty Limited
E & K Richardson FamilyTrust
SIMS Security Systems Pty Ltd
Controlled Access Solution Pty Ltd
Taylor's Property Services Pty Ltd
Armitage Alarms Pty Ltd
ASIAL Member Recognition Levels
• Platinum: 25 years + membership
• Gold: 16-24 years membership
• Silver: 11-15 years membership
• Bronze: 6-10 years membership
If you have not already signed up to
the ASIAL Member recognition
program or would like to find out
more, visit
www.asial.com.au/Memberrecognitio
nprogram.
ASIAL MEMBER RECOGNITIONPROGRAM
MMEEMMBBEERR RREECCOOGGNNIITTIIOONN PPRROOGGRRAAMM
SECURITY INSIDER OCT/NOV 2012// 31
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 31
Surveillance devices usually cover optical, tracking, listeningand data. Data surveillance devices are devices or programscapable of being used to record or monitor the input ofinformation into, or the output of information from a computer.
Global Positioning Satellite (GPS) systems, software formonitoring of email and internet use, CCTV surveillance andphone recording applications are all readily available for useby employers to ensure the health and safety of employeesand to identify performance and conduct issues should theyarise.
The aim of this article is to provide some direction on whatlegislation exists and what the implications are for employers.It is not intended to be exhaustive or cover every scenario.
Tracking DevicesIn New South Wales the Workplace Surveillance Act 2005(the Act) covers the use of surveillance systems in the
workplace.The Act regulates both the use of CCTV, computerand tracking surveillance devices.
New South Wales also has the Surveillance Devices Act2005, which defines a “tracking device” and how it may beused. In NSW, NTand the ACTa tracking device is one that iscapable of being used to determine the location of a personor an object, whilst in Victoria (Surveillance Devices Act 1999(Vic)) determining the location must be the primary purpose ofthe device. For example in a recent case , FairWork Australia(FWA) found at the first instance that an electronic devicewhich was capable of reporting the geographical position of avehicle was not an 'electronic tracking device' for the purposeof the Surveillance Devices Act, as the 'primary purpose' ofthe system was to monitor the environment in which cold-stored goods were being transported. For this reason, theemployer was not required to notify the employee that it wasinstalled. In Victoria, the Surveillance Devices Act 1999 also
32 //SECURITY INSIDER OCT/NOV 2012
IIRR AADDVVIICCEE && SSUUPPPPOORRTT
SURVEILLANCEDEVICES–AREEMPLOYERS LOOKINGAT ALL OF THEIMPLICATIONS?By Chris Delaney
Advances in technology have added new dimensions toemployers' opportunities to monitor employee conduct.However, not all states and territories have in place legislationthat cover surveillance in the work place. Other surveillancelegislation both State and Federal may impact on an employer’sopportunity to gather and use the information.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 32
regulates the use of data surveillance devices.Western Australia is similar to NSW.Their legislation is the
Surveillance Devices Act 1998 (WA). In South Australiatracking devices are defined, but nothing in the legislationprohibits or even regulates their private or commercial use.
There is no state legislation dealing with tracking devices ineither Queensland orTasmania.
Listening DevicesMost states have legislation dealing with listening to and/orrecording conversations, however there are subtle (yetextremely important) differences, most evident in thedefinition of “private conversations” and the rules relating to“consent”.
In Victoria, a party with the consent of the other parties toa conversation may record the conversation or install thedevice to record the conversation. In a case run in heFederal Court the Court held that a secretly tapedconversation was admissible as evidence as it did notcontravene the Surveillance Devices Act, because one of theparties to the conversation had intended to tape theconversation.This meant that it did not fall within thedefinition of 'private conversation', which requires 'theparties' to the conversation to desire it to be private.Whilstthe secret taping could be seen as an invasion of theprivacy and as involving underhand tactics, it could not besaid to have breach the Act.
In New South Wales the laws are similar, however a party toa conversation may record it, without the consent of others toprotect the own lawful interests if necessary at a later point intime. (Surveillance Devices Act 2005 (NSW)).
Queensland is similar to NSW. A private conversation isdefined as one where the principal parties could reasonablyexpect not to be overheard. If it is not a private conversationthe use of a listening device may not be restricted. (Invasionof Privacy Act 1971 (QLD)).
The ACTis similar, however there is not an exception forwhere the parties may expect to be overheard (ListeningDevices Act 1992 (ACT)).
Northern Territory prohibits the installation, use ormaintenance of a listening device used to record or monitor aprivate conversation without the consent of the parties orwhere it is known that it will be without the consent of theparties (Surveillance Devices Act 2007 (NT)).
In South Australia you may not use a listening device tooverhear, record, monitor or listen to a private conversationwithout the consent of all the parties, unless it is in the courseof your job, in the public interest or for the protection of yourinterests. (Listening and Surveillance Devices Act 1972 (SA)).
Tasmanian legislation allows the recording of aconversation with the consent of one of the principal parties if
it is to protect the interests of the parties (Listening DevicesAct 1991(TAS)).
Optical Surveillance DevicesThe common misconception is that these devices arecameras, CCTV or mobile phone cameras, however alsoincluded are binoculars, telescopes and the like as they allowobservation – recording is not the only activity covered.
In New South Wales you can only install an opticalsurveillance device in premises or motor vehicles with theconsent of the owner or occupier. In a workplace you mustgive employees 14 days notice in writing of the use of overtdevices. Covert devices require the approval of a magistrate(Surveillance Devices Act 2005 (NSW) and WorkplaceSurveillance Act 2005 (NSW)).
In Victoria using an optical surveillance device to view orrecord a private activity, regardless of where it is taking place,
SECURITY INSIDER OCT/NOV 2012// 33
IIRR AADDVVIICCEE && SSUUPPPPOORRTT
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 33
is prohibited (Surveillance Devices Act 1999 (VIC)).Queensland legislation proscribes the use of an optical
surveillance device without the consent of the person wherethey are in a private place or could reasonably expect theiractions to be private. Private acts are defined in the legislation(Criminal Code Act 1899 (QLD)).
In South Australia and Tasmania and the ACTopticalsurveillance is not restricted by specific legislation howevermay come under listening devices legislation if it recordssound.
In Western Australia, optical surveillance devices cannot beused to view or record a private activity, regardless of wherethat activity takes place (Surveillance Devices Act 1998(WA).
The Northern Territory is similar to WA.
Workplace surveillance may constituteadverse actionIt is possible that an employer's actions in carrying outworkplace surveillance could invoke a breach of theexpansive general protection provisions of the FairWork Act2009 (FW Act).
The general protection provisions in the FW Act prohibitemployers taking certain 'adverse action' against employees.The surveillance of an employee (either within or outside theworkplace), even where compliant with any existingsurveillance legislation, could potentially constitute 'adverseaction', if it is held to 'alter the position of the employee to theemployee's prejudice'. There is an argument that the invasivenature of surveillance, particularly where it might monitorpersonal conversations or emails, could be construed asadverse to an employee's right to privacy in the workplace.
Introducing workplace surveillanceand ConsultationEmployers should be aware that the introduction of workplacesurveillance may require it to be dealt with under aconsultation clause in an applicable modern award orenterprise agreement. It is always better to consult withemployees and develop policies that are acceptable to bothparties and meet the operational and legislative needs of theworkplace.
Most modern awards and the FairWork Act requireconsultation where a decision with have a significant impacton employees for example termination of employment. It isimportant that employers are aware of whether the
introduction of surveillance would set off the consultation.Failing to consult with employees may result in fines orpenalties from a Court.
Employers should ensure that when introducing the use ofworkplace surveillance devices, that they provide anexplanation to employees of when and how any form ofsurveillance will work, how investigations or data audits will beconducted and the ramifications of any breaches.
Relying on Surveillance as EvidenceEvidence obtained from surveillance devices will not alwaysbe accepted as evidence in litigation.This will depend in partupon the particular forum of the proceedings, and alsowhether the employer has notified employees that thesurveillance is in place.
Courts have the discretion to exclude evidence that wasobtained 'improperly or in contravention of an Australianlaw', unless 'the desirability of admitting the evidenceoutweighs the undesirability of admitting evidence'. In NSWcovert surveillance would not be admissible, if the relevantcourt authority had not been obtained under the WorkplaceSurveillance Act.
Relying solely on surveillance without other supportingevidence can result in an unsuccessful outcome in unfairdismissal claims. In 2008 the AIRC ruled that the dismissal oftwo employees for misrepresenting the extent of their medicalcondition was unfair.
The employees were both on restricted duties when theywere both captured on video surveillance during a weekendcamping trip undertaking activities that were allegedlyinconsistent with their restrictions. Both employees had theiremployment terminated for misconduct.
In the unfair dismissal claims, the Australian IndustrialRelations Commission (AIRC) found that the videosurveillance footage, in the absence of evidence from thetreating doctor, was not enough to prove that either employeehad misrepresented the extent of their injuries to the treatingdoctor.The failure to corroborate the evidence that bothemployees had misrepresented their medical conditionsresulted in the dismissals being unjust and unreasonable.
The content of this article is intended to provide a generalguide to the subject matter. It is not, nor is it intended to belegal advice. Specialist advice should be sought about yourspecific circumstances before making any action.
Note:The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this
information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific.
Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to
an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing [email protected]
34 //SECURITY INSIDER OCT/NOV 2012
IIRR AADDVVIICCEE && SSUUPPPPOORRTT
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 34
SECURITY INSIDER OCT/NOV 2012// 35
DDEESSIIGGNNIINNGG OOUUTT CCRRIIMMEE
THE ROLE OF SECURITYIN DESIGNING OUT CRIMEBy Dr Lindsay Asquith*
The Designing Out Crime ResearchCentre (DOC) is internationally recognisedas a leader in innovative,creative andsocially responsive design.DOC is a jointinitiative of the University of Technology,Sydney (UTS) and the NSW Department ofAttorney General and Justice.Ourability tointegrate crime risk,Saferby Designprinciples and crime research into theexploration and identification of crimeproblems and assessment of designrecommendations is a rare attribute.Wework with a breadth of clients, fromgovernment agencies to privatecompanies,and apply a range of methodsand skills that are unique to ourmulti-disciplinary team.
Central to ourway of working iswhereverpossible to avoid taking a‘countermeasures’approach to reducingcrime.Problem-solving in the area of safetyand security often focuses oncountermeasures – solutions that focus onconstraining individual behaviour,manifestin interventions such as physical barriers,increased security, increased CCTV,andharsherpunishments foroffending.Thisapproach can contribute to fearand theperception of fear,causing environments tofeel,paradoxically, less safe than beforeand initiating a spiral of under-use that caneventually create environments that fostercrime.
At DOC ourdesign team reframes theinitial problem context with the aim ofredefining a crime orsecurity problem interms of broadersocial and environmentalissues.This process makes the problemmore amenable to design interventionsand allows designers to remain focused
on desired outcomes rather than fixatingon the problem itself.
One of the tools we use in thereframing process is stakeholderand dutyholdermapping,where we aim to engageand empathise with the people andorganisations connected with the situationin which the problem occurs.Ouraim is toascertain their stake and theircurrent rolewithin the problem context.
The security industry is a commonstakeholder in many of ourplace-basedprojects, yet the industry’s needs andexperience are often under-represented inthe design process.This is a lostopportunity.We view the security industryas an untapped knowledge bank,andbelieve that by engaging with security
expertise at the start,designers get aricherdesign process that results,ultimately, in betterdesign solutions.
An example of the importance ofengaging the security industry in thedesign process is illustrated in somerecent work we carried out for the City ofSydney in the Kings Cross area.KingsCross,with its high proportion of bars andclubs,attracts about 30,000 people (mostunder30 years of age) every Friday andSaturday night,and has a well-establishedreputation forproblems such asdrunkenness, fights,petty theft,drugdealing and sporadic violence.Over theyears, law enforcement tactics such asincreased police presence, restrictions ontrading,and increased CCTVand security
We view the security industry as an untapped knowledge bank...
INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 5:35 AM Page 35
personnel at clubs have been employed tosolve these issues but they have persisted.
In search of a more effective alternativeto this ‘law-and-order’approach,we turnedourattention to the social andenvironmental context of Kings Cross toinform the design process.The revellersgetting into trouble at Kings Cross are,overwhelmingly, young people looking foragood time in a precinct apparently madefor the purpose.So what goes wrong?
To answer this question we tried toreframe these (apparently) criminal issuesusing the analogy of a music festival.Events such as the various musicfestivals held in Sydney each year arecomparable to Kings Cross in thenumber of revellers they attract; they arealso at risk of many of the same alcoholand crowd-fuelled problems. Knowingthat a single well-publicised disastercould signal the demise of all futureevents, festival organisers aim toanticipate the problems that get theirpatrons into trouble with others and thelaw and manage them in a positive,non-antagonistic way.
In talking with the security industryas a key stakeholder we learned thatthe industry plays a big role in crowdmanagement at these sorts of events,where specially trained and taskedpersonnel are integral to the smoothfunctioning of the event and the safetyof patrons. Redefining Kings Cross atnight as a major event and looking theproblem from a crowd managementand public safety point of view (ratherthan a law enforcement point of view)helped our designers come up withmany new ideas.
The current situation at Kings Crossis that buses and trains stop at 1am,around two hours before mostpartygoers are ready to go home.Thisleads to crowds of bored, frustratedand aggressive people queuing for in-demand taxis in the early hours of themorning. Our designers proposedincreased transport, as well as a
system of temporary signage to helppartygoers find an alternative trainstation with a late-night service.
In Kings Cross people congregatearound a few big clubs and often thequeues for each are long, causingcongested footpaths anddissatisfaction among those waiting.Our designers proposed a smartphoneapp that would allow patrons to checkthe waiting time for the next club beforeleaving the one they are in. Anothersuggestion was to encouragepedestrian movement down theadjacent laneways by creating relaxed‘chill-out’ spaces equipped withdrinking water fountains to help combatintoxication.
A significant amount of crowd-related disorder at Kings Cross resultsfrom (often inebriated) patrons beingunable to find their way around. At DOCwe proposed a system of very visible,
approachable young guides in bright T-shirts who would help partygoersnavigate the area and provide specifichealth and safety assistance if needed.This would also help security personnelconcentrate on issues that require theirspecific knowledge and training.
This example in Kings Crossprovides insight into the value ofdrawing on stakeholder expertise andexperience and why the securityindustry is an important partner.
The first Design and CrimeConference and Exhibition is beingheld in Sydney on December 12-13th2012 and real life problems like KingsCross will be workshopped byinternationally renowned academicsand practitioners involved in this rapidlygrowing field.We’d love to involvesecurity in this conversation.Visitwww.designandcrime.com to find outmore and register your attendance.
*Dr Lindsay Asquith is a Research Officer with the Designing Out Crime Research Centre, Faculty of Design, Architecture and Building,University of Technology Sydney.
36 //SECURITY INSIDER OCT/NOV 2012
DDEESSIIGGNNIINNGG OOUUTT CCRRIIMMEE
INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 5:35 AM Page 36
SIG 2012
The 24th annual Security In Governmentconference was held at the National ConventionCentre, Canberra from 3 – 5 September. ASIALwas a major sponsor of the event which attracted400 conference delegates and over 95 exhibitors.
SIG 2013 will be held in Canberra from the 12th-14th August 2013SIG 2013 will be held in Canberra from 12 -14 August
The Hon Nicola Roxon MP, Attorney-GeneralPaul Cave AM, Chairman and Founder, BridgeClimb
SECURITY INSIDER OCT/NOV 2012// 37
INSIDER_Oct/Nov 2012 Iss5_44pp 26/9/12 11:26 AM Page 37
38 //SECURITY INSIDER OCT/NOV 2012
ADT Security NSW 366 A1 09 Mar 2013
Allcare Monitoring Services WA 379 A2 28 Feb 2014
ARM Security WA 360 A1 10 Mar 2013
ART Security VIC 392 A1 30 Sep 2014
Calamity Monitoring NSW 383 A1 20 Mar 2014
Central Monitoring Services NSW 380 B1 21 Mar 2014
Commonwealth Bank of Australia NSW 389 A1 24 Sep 2014
Energize Australia VIC 391 C2 18 Mar 2014
Golden Electronics TAS 395 A1 17 Oct 2014
Grade One Monitoring NSW 378 A1 13 Feb 2014
Grid Security Services NSW 381 A1 18 Mar 2014
GSS Asset Management QLD 385 C2 31 Oct 2012
Instant Security Alarms QLD 365 A1 29 May 2013
Insurance Australia Limited (operating with Insurance Australia Data Centre) NSW 377 C1 17 Jan 2014
ISS Security NSW 373 B3 25 Nov 2013
Linfox Armaguard VIC 393 A1 08 Aug 2014
NSS Group NSW 384 A1 07 May 2014
Onwatch NSW 375 B1 08 Oct 2012
Paul-Tec Australia NSW 367 A1 28 Feb 2013
Protection Pacific Security VIC 394 C2 9 Aug 2014
RAA Security Services SA 358 A1 12 Dec 2012
Secom Australia NSW 374 A1 14 Dec 2013
Sectrol Security VIC 369 B2 19 Aug 2013
Securemonitoring VIC 370 A1 23 Nov 2013
Securenet Monitoring Services NSW 386 A1 04 May 2014
Security Alarm Monitoring Service SA 387 A1 18 Jun 2014
Security Control Room VIC 362 A1 06 May 2013
Sesco Security WA 364 A1 03 Jun 2013
SMC Australia QLD 372 A1 07 Dec 2013
SMC Australia VIC 371 A1 16 Dec 2013
SNP Security (Newcastle) NSW 368 A1 17 Aug 2013
SNP Security (Sydney) NSW 390 A1 31 May 2013
Spectus WA 376 A1 28 Dec 2013
State Government Protective Security Service QLD 388 C1 22 May 2014
Westpac Banking Corporation NSW 382 A1 19 Mar 2014
Woolworths Limited NSW 351 C1 04 Nov 2012
Company (short form name) State Cert. No. Grade Expires
ASIAL Certified Security Monitoring Centres*
Current as at: 13 September 2012
*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded forcompliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listedcompanies which may change the nature of their operations subsequent to Certification.
Australian Security IndustryAssociation Limited
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 38
HHOOTT PPRROODDUUCCTTSS
HF-1 Needle-Proof KevlarMetal Detection Glovesn UniGuard Management & Security > 1300 133 366n Email > [email protected] Web > www.uniguard.com.au
New Video Analysis ToolsFor The MOBOTIX Q24Mn Central Security Distribution > 1300 319 499n Email > [email protected] Web > www.centralsd.com.au
MOBOTIX has enhanced image data processing inside the camera withthe MxAnalytics video analysis tools thus offering new and valuableinformation sources. For example: How many people go in and out of aselected entrance during the day? Which shelves in the shop attracted themost customers this month?
MxAnalytics makes it possible to track the movement of people andobjects in the image and to collect statistical behaviour data. For thispurpose heat maps, highlighting the most frequented areas, can be createdand counting lines defined. All this added functionality is available as a freedownload for supported cameras.
Kenwei’s popular touch sense intercomis now available in a 2-wire modeln Central Security Distribution > 1300 319 499n Email > [email protected] Web > www.centralsd.com.au
Supporting up to two external door stations in addition to twostandard CCTV cameras, the KW-S702C-T series can be easilyoperated yet provides an impressive list of features.
Directly PAGE any one or all four room stations at the press of abutton, view the front door camera and remotely unlock the door orgate. The Do Not Disturb feature allows a room station to be isolatedand CCTV surveillance cameras can be added to improve securityeven further.
Up to three extra monitors, available in black or white finishes aresupported, and best of all... it’s a 2 wire product.
HF–1 gloves give the operator the ability to have hands free metal detectionwith the protection of Kevlar. This gives the wearer added protection fromhypodermic needles, knives and razor blades.
They are light weight and comfortable to wear as well as being easy to usewith no adjustments necessary for use. Just switch on and they are ready togo. Available as a pair or singularly.Product Specifications:Sizes: L, XL, XXL, Weight: 149g (approx), Battery: Standard 9V Alkaline, BatteryLife: 400 hours, Sensitivity: 0.5g,Warranty: 12 month manufacturer warranty.
NEW!
SECURITY INSIDER OCT/NOV 2012// 39
NEW!
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:11 PM Page 39
HHOOTT PPRROODDUUCCTTSS
New Tamper Evident Chambern Harcor Security Seals & Bags > +612 9454 4200n Email > [email protected] Web > www.harcor.com.au
simPRO Field Mobilityn simPro > 1300 139 467n Email > [email protected] Web > www.simpro.com.au
Your time is money and your hours are billable. Cut your travel and admin timedown by at least 20% per day per person with simPRO Field Mobility.
Our range of simPRO Field Mobility options let you and your staff stayconnected and keep your entire system up-to-date with real-time overview ofthe labour, material and equipment costs incurred, the margin you haveapplied and the invoiced amount.
Our SmartPhone version is optimised for phone sized devices such asAndroid, Windows Mobile, iPhone and devices such as the Datalogic Elf.
Get out and about with simPRO Field Mobility and simplify your businessprocesses so you can spend more time making money, not chasing it.
Pelco Digital Sentry Network VideoRecorder – DSSRVn Pelco by Schneider Electric > +612 9125 9310n Email > [email protected] Web > www.pelco.com
40 //SECURITY INSIDER OCT/NOV 2012
Flexible IP VMS for mainstream security applicationsThe new Pelco Digital Sentry Network Video Recorder provides allthe power you need to maximise HD recording and leverage existinganalogue investments. With 280 Mbps bandwidth, support for up to 128IP streams, increased storage options and built-in reliability, thispowerful new platform delivers more HD capability than ever before.Thenew Pelco Digital Sentry can accommodate up to 64 analogue camerasat D1 resolution and full frame rate. Simplify and optimise your videosecurity platform and choose the new Pelco Digital Sentry as your one-stop solution for all the HD and analogue recording power you need.
The high level of security, environmental and cost benefits offered, areincreasing the popularity of reusable tamper evident bags. Designedspecifically to set a new standard in tamper evident security, Harcor haslaunched the Only Tamper Evident Chamber.
We’ve created a range of different TEC chambers to suit the needs ofour clients. These chambers all include Harcor’s newly patented“Fracture Safe” design.
In addition to the increased security, the new robust chamberscontinue to provide reliable sealing and easy opening/closing of reusablesecurity bags.
For additional information on reusable tamper evident bags or to see ademo of the TEC Chamber please visit www.harcor.com.au
NEW!
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 40
HHOOTT PPRROODDUUCCTTSS
Award Winning PANOMERAn CR Kennedy > +613 9823 1555n Email > [email protected] Web > www.crkennedy.com.au/surveillance
Smartphone Control for Concept3000/4000 Systemsn For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au
Inner Range has released a WEB interface kit designed to provide convenientcontrol of Concept Security Systems via any web browser. It is optimized for use onportable smart touchscreen devices such as iPhones, iPads,Android Mobile Devicesand Tablet PC's, but can be used on any device with a WEB browser application.
Smartphones can be used to remotely control Concept Security Systems fromanywhere in the world.There are no additional apps to install orpurchase – simply useyourdevices existing web browser.The userscreens are intuitive and provide a simpleuser-friendly layout that is very easy to use. The Concept WEB interface providesMulti-User login,Arming & Disarming of SecurityAreas,Locking & Unlocking of Doors,Control of Home Automation Devices and viewing of system reviews events.
Inner Range Rack Mount Enclosuren For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au
Inner Range has released a universal Rack Mount Enclosure designed foruse with its Concept and Integriti system hardware. Featuring a trulyuniversal design that allows virtually all Inner Range System Controllers orLAN modules to be installed into a 19” rack equipment cabinet withoutrestricting critical access to cabling, termination of connections or accessfor commissioning and maintenance purposes. Flexible installation optionsallow the rack mounted drawer to be configured to meet a vast array ofspecifications, allowing mix & match installation of System Controllers,Universal Expanders, Relay Cards, Access Control Modules, InputExpanders, UniBus Expansion Cards, Multipath Communications Devicesand up to 4 Doors of fully Intelligent Access Control.Inner Range Melbourne: www.innerrange.com.
Dallmeier is famous for creating the world’s largest Casinosurveillance systems in places such as Macau and Singapore.Panomera is Dallmeier’s completely new camera technology forsurveillance of very large areas. It offers a panoramic overview with real-time HD recording, so can significantly reduce infrastructurerequirements. Projects such as Airports, sporting arenas etc previouslyrequiring huge numbers of cameras, can now be covered withPanomera. Unlike Megapixel systems, Panomera uses H.264 encodingto deliver up to 51 megapixels in real time.
Panomera won the coveted “CCTV Camera Equipment of the Year”Award at IFSEC 2011.The first showing of Panomera in Australia was atthe Security 2012 show.
NEW!
SECURITY INSIDER OCT/NOV 2012// 41
NEW!
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 41
ASIAL NATIONALCALENDAR OF EVENTS 2012/2013
To find out more register online www.asial.com.au/eventscourses or email [email protected]
OCTOBERQLD Industry Breakfast Briefing7.30-9.00am, 10 October 2012Niche Event Spaces, Stones Corner, BrisbaneSpeakers include: representatives from QLD Fire& Rescue Service and the Fair Work Ombudsman.
ACT Industry Breakfast Briefing7.30-9.00am, 17th October 2012Belconnen Premier Inn, CanberraSpeakers include: representatives from ACT FireService and the Fair Work Ombudsman
SA Industry Breakfast Briefing7.30-9.00am, 18th October 2012Sebel Playford Hotel, AdelaideSpeakers include: representatives from SAMetropolitan Fire Service and the Fair WorkOmbudsman.
WA Industry Breakfast Briefing7.30-9.00am, 19 October 2012Hotel Northbridge, PerthSpeakers include: The Hon LizaHarvey MLA (pictured), Minister forPolice and Emergency Services.
TAS Industry Breakfast Briefing7.30-9.00am, 19 October 2012Hobart Function and Convention CentreSpeakers include: a representative from theTasmanian Fire Service.
SECURITY INDUSTRY LEADERSHIP PROGRAM23-25 October 2012Macquarie Graduate School of ManagementConference Centre.
NOVEMBERVIC Industry Breakfast Briefing7.30-9.00am, 23rd November 2012Quality Hotel Batman's Hill on Collins623 Collins Street, Melbourne Speakers include: a representative from theVictorian Fire Service.
NSW Industry Breakfast Briefing7.30-9.30am, 28th November 2012Mantra Hotel, ParramattaSpeakers include: representatives from theSecurity Licensing & Enforcement Directorate(SLED) and the Fair Work Ombudsman.
ASIAL 43rd Annual General Meeting28th November 20128.45am, Mantra Hotel, Parramatta
2013FEBRUARYSecurity Industry Leadership Program19-21 February 2013Melbourne Business School200 Leicester Street, Carlton VIC 3053
MAY2013 Australian Security IndustryAwards for Excellence2 May 2013Park Hyatt Hotel, Melbourne.
JULYSecurity 2013 Exhibition& Conference24-26 July 2013, Sydney Convention & ExhibitionCentre, Darling Harbour.
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 42
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 43
INSIDER_Oct/Nov 2012 Iss4_52pp 25/9/12 7:12 PM Page 44