52
VOL.17 | ISSUE.4 | AUG/SEP 2012 PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ MAGAZINE ] THE MAGAZINE FOR SECURITY PROFESSIONALS SECURITY PP255003/02390 60 Security Technician Certification Professional recognition for security technicians

Security Insider Aug/Sep 2012

  • Upload
    asial

  • View
    223

  • Download
    2

Embed Size (px)

DESCRIPTION

ASIAL's August and September edition of Security Insider

Citation preview

Page 1: Security Insider Aug/Sep 2012

VOL.17 | ISSUE.4 | AUG/SEP 2012

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ M AG A Z I N E ]

THE MAGAZINE FOR SECURITY PROFESSIONALSS E C U R I T Y

PP255003/02390

2660

Security TechnicianCertification

Professional recognition for security technicians

INSIDER_Aug/Sep 2012 Iss3_52pp 7/8/12 7:25 PM Page 1

Page 2: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 2

Page 3: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 3

Page 4: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 4

Page 5: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 5

Page 6: Security Insider Aug/Sep 2012

6 //SECURITY INSIDER AUG/SEP 2012

CONTENTSVOL.17 | ISSUE.4 | AUG/SEP 2012

SECURITY 2012IN PICTURES

ASIAL StrategicPartners >

24BIG LIFT INCOMPLIANCE, BUTSECURITYFIRMSREPORT WAGEPRESSURES

28 38

08 | President’s message 10 | Security in Government10 | Guidelines for the installation

and servicing of smokedetectors/sensors

11 | Award weekly wage increase 2012

12 | QLD – Compliance Audits

12 | 2013 Australian SecurityIndustry Awards for Excellence

14 | Crowd control training with a difference

16 | NSW Security IndustryAmendment Bill

32 | Diversity – the changing face of risk

38 | Putting the PSPF puzzle together

42 | Sham contracting – Employers need to ensurebona fide relationships

47 | Hot Products49 | Monitoring Centres List50 | ASIAL Calendar of events

SECURITYTECHNICIANCERTIFICATION

Professional recognition for security technicians

20

PUTTING THE PSPFPUZZLE TOGETHER

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:20 PM Page 6

Page 7: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 7

Page 8: Security Insider Aug/Sep 2012

8 //SECURITY INSIDER AUG/SEP 2012

Over the past decade ASIAL hasconsolidated its position as thepeak national body for the

security industry and as a result hasbeen able to forge stronger relationshipswith federal, state and territorygovernment agencies.The developmentof stronger partnerships is important forthe industry’s future growth anddevelopment.

As acknowledged byThe Hon NicolaRoxon, Federal Attorney General in heraddress to the ASIAL conference, theprivate security industry performs avaluable role in helping boost ournational security and the majority ofcompanies and individuals working inthe industry provide a great service tothe Australian community.The AttorneyGeneral also indicated that the FederalGovernment is looking at options for anational licensing scheme for theindustry, one that simplifies licensing,while maintaining the improvementsalready achieved through the COAGreforms. ASIAL’s long held position is thatnational licensing is the way forward toenable the mobility of security personnelto work interstate. It is important as anindustry that we work together to ensurethat this becomes a reality.

I am pleased to advise of animportant initiative with the SouthAustralian Police that the Association willbe involved in later this year. As part ofthe induction program for SA Policerecruits an ASIAL representative willprovide an address on the evolving roleof the private security industry and thepartnership approach to communitysafety which will become a regularcomponent of the induction program. Itis hoped that this important initiative inbuilding a stronger partnership betweenpolice and the private security industrycan be emulated by police in other

states and territories.As we celebrate the success of the

27th annual Security 2012 Exhibition andConference in Sydney last month, I washeartened by the tremendous responseto the SecurityTechnician Certificationprogram launched at the event. It isimportant for the future of our industrythat this initiative succeeds, so it wasvery encouraging to hear such positivefeedback from visitors to the show.

Finally, I would like to reassert ASIAL’sdesire for a professional securityindustry, one based on sound ethicalbusiness practices that benefit both thecommunity and business. ASIAL has,and will continue to ensure that itsmembers are held accountable for theiractions and behaviour throughenforcement of the Association’sProfessional Code of Conduct.

Ged Byrnes

ASIAL President

PPRREESSIIDDEENNTT’’SS MMEESSSSAAGGEE

BUILDINGPARTNERSHIPS THE MAGAZINE FOR

SECURITY PROFESSIONALS

Editorial and Advertising

Security Insider is published by

The Australian Security Industry

Association Limited

PO Box 1338 Crows Nest, NSW 1585

Tel: 02 8425 4300 • Fax: 02 8425 4343

Email: [email protected]

Web: www.asial.com.au

Publisher

Editor

Bryan de Caires | [email protected]

Editorial Enquiries

[email protected]

Advertising

Tania Laird | [email protected]

Creative Director

Martin Costanzo | [email protected]

Graphic Design + Prepress

Webfx2 Digital | [email protected]

Editorial Contributors

Chris Delaney, AusSuper, AON, Steve Ronson,

Mark Bezzina, Konrad Buczynski and

Dr Georgia Lysaght.

Print + Distribution

Cirque

Published bi-monthly

Estimated Readership of 10,000

Views expressed in Security Insider do not

necessarily reflect the opinion of ASIAL.Advertising

does not imply endorsement by ASIAL, unless

otherwise stated with permission. All contributions

are welcomed, though the publisher reserves the

right to decline to publish or to edit for style,

grammar, length and legal reasons. Press Releases

to: [email protected].

Internet references in articles, stories and

advertising were correct at the time of printing.

ASIAL does not accept responsibility for misleading

views. Copyright© 2012 (ASIAL) All rights reserved.

Reproduction of Security Insider magazine without

permission is strictly prohibited. Security Insider is

a subscription based publication, rates and further

details can be found at www.asial.com.au.

[Next Issue] OCT/NOV 2012

ISSN 1442-1720

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 8

Page 9: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 9

Page 10: Security Insider Aug/Sep 2012

10 //SECURITY INSIDER AUG/SEP 2012

IINNDDUUSSTTRRYY NNeWWSS

At Security 2012, the SecurityTechnician

Certification program was launched. An ASIAL

industry initiative, the professional recognition

program covers alarms, access control and

CCTV. For more information turn to page 20 or

visit www.securitytechnicancertification.com.au

SECURITYTECHNICIANCERTIFICATION PROGRAM

As a joint initiative between theAustralasian Fire and EmergencyService Authorities Council (AFAC) andASIAL, Guidelines have been releasedfor the installation and servicing ofsmoke detectors/sensors connected toresidential and commercial systems.

A guide has been prepared forinstallers and another for residentialproperties. Further details can be foundon the ASIAL website –www.asial.com.au

GUIDELINES FOR THE INSTALLATION ANDSERVICING OF SMOKE DETECTORS/SENSORS

The Security in Government (SIG)Conference 2012 is scheduled from 3 –5 September at the NationalConvention Centre, Canberra. Hostedby the Attorney-General’s Department,the SIG Conference and Exhibition isconsidered one of the premier securityconferences on the annual calendar.

The theme for SIG 2012 is Buildinga Security Culture. The program willlook at the Government’s securityarrangements; explore policies,plans, procedures and better practiceto enhance a security culture thatprotects business outcomes forindustry and government.Theprogram will also cover key threatsposed to national security, includingcyber espionage and the trusted

insider threat.The Hon Nicola Roxon MP will give

the opening address at the SIG 2012Conference on Tuesday 4 September.Mr David Irvine AO, Director-General ofSecurity, Australian SecurityIntelligence Organisation will providean analysis on Australia’s currentsecurity and intelligence operatingenvironment.

On Wednesday 5 September theSIG 2012 program will offer a cyber-

security stream and a physical andpersonnel security stream to delegates.

The SIG 2012 Gala dinner isscheduled to be held at ParliamentHouse on Tuesday 4 September. MrPaul Cave AM, Chairman and Founderof BridgeClimb is the keynote dinnerspeaker. Mr Cave’s address will lookat the security challenges heovercame to achieve success.

To register for the SIG 2012Conference visit www.ag.gov.au/sig

SECURITYIN GOVERNMENT2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 10

Page 11: Security Insider Aug/Sep 2012

IINNDDUUSSTTRRYY NNeWWSS

Arising from the Annual Wagereview FairWork Australia has madedeterminations increasing rates of payin Modern Awards of 2.9% wageincrease. Expense related allowanceshave also been increased. Otherallowances will increase relative to theprovisions in the applicable award.

These increases will commencefrom the first full pay period on or after1 July 2012.

All modern awards coveringemployee classifications in thesecurity industry are affected.Theseinclude:• Security Services Industry Award

2010 – security officers andmonitoring centre operators

• Electrical Electronic andCommunications ContractingIndustry Award 2010 – Alarm,CCTV and Cabling

• Transport Industry Cash in Transit

Award 2010 – Armoured Caremployees

• Commercial Sales Award 2010 –Sales representatives, BDMs,Account Managers etc

• Clerks Private Sector Award 2010– Administration and Support staff

• Manufacturing and AssociatedIndustries and Occupations Award2010 – making, assembling and orinstalling security equipment e.g.screens, bollards, gates and grills

ASIAL Members requiring informationor advice on any award or employeerelations matter can contact ChrisDelaney, ASIAL’s industrial RelationsAdvisor on (02) 8425 4318 or [email protected]

Members covered by the SecurityServices Industry Award 2010 canaccess rate schedules that have beenchecked and verified by the FairWork

Ombudsman which containtransitional increases to the base rateof pay where applicable for each stateand territory.

To request a copy of the pay ratesschedule email [email protected].

For some employers, thetransitional provisions will lead to achange in percentage pay ratesparticularly relating to shiftworkpenalties. Members wishing todetermine shift rates for span loadingscan visit www.fwo.gov.au/pay orcontact ASIAL on (02) 8425 4318 orFWA on 131394.

SECURITY INSIDER AUG/SEP 2012// 11

AWARD WEEKLY WAGE INCREASE 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 11

Page 12: Security Insider Aug/Sep 2012

12 //SECURITY INSIDER AUG/SEP 2012

IINNDDUUSSTTRRYY NNeWWSS

Amendments to the SecurityProviders Act 1993, which cameinto effect in February 2011, provideda role for peak security industrybodies to take on a compliance roleto assist the Office of FairTrading inits regulation of the private securityindustry in Queensland.

Over the coming month ASIAL willwrite to all members operating inQLD to explain how it will operateand manage its audit process. As acondition of approval as anApproved Security IndustryAssociation, ASIAL must assesscompliance by members of theCode at least once every 3 years.

Nominations will open shortly for the2013 Australian Security IndustryAwards for Excellence. Awardcategories include:

Individual• Individual Achievement – General

Security• Individual Achievement – Technical

Security• Security Student of the Year

Organisational• Security Management • In-House SecurityTeam • Training • Integrated Security Solution

(projects above $250,000) • Technical Security Solution

(projects below $250,000)To request a copy of the nominationguidelines please [email protected]

QLD – COMPLIANCE AUDITS

2013 AUSTRALIAN SECURITYINDUSTRY AWARDS FOREXCELLENCE

ISS has announced a newpartnership with Barclays Bankthat will see it oversee and deliverfacilities management services tothe bank’s operations in the UK,Europe, the Americas, Asia Pacificand the Middle East.This newpartnership will deliver anintegrated facilities managementplatform across Barclays’ locationsin these key regions.

Barclays will become one of thelargest global customers of ISS.

ISS AND BARCLAYSANNOUNCE NEWGLOBAL FACILITYMANAGEMENTPARTNERSHIP

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 12

Page 13: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 13

Page 14: Security Insider Aug/Sep 2012

14 //SECURITY INSIDER AUG/SEP 2012

IINNDDUUSSTTRRYY NNeWWSS

Mounted security is an integralpart of the Australian Turf Club’s(ATC) security planning for eventsand race days.The horses andlicensed riders play an activefunction in crowd control andoffender management.To enhancethis operational function the ATCdelivered a combined trainingsession with key personnel from theirsecurity manpower provider,Australian Concert & EntertainmentSecurity (ACES).This was the firsttime that the majority of the ACESpersonnel had ever been ‘up closeand personal’ with the securityhorses and although there was sometrepidation initially, the training wasextremely effective and well received

by the participants.ACES Security Operations Manager,

Chris Kocovski said:“The experienceand hands-on approach of the ATCinstructors made the training aresounding success and operationallyvery beneficial for our staff”.

The training included:• Demonstration of equine crowd

control techniques• Equine familiarisation and

behaviours• Safety awareness when operating

with mounted staff• Introduction to physical interaction

with Mounted Security• Equine crowd control / offender

management

• Scenario based offendermanagement Mounted security are deployed

during race days at the four ATCSydney racecourses and at majorevents such as the Future MusicFestival and most recently at theByron Bay based Splendor in theGrass, where the mounted securityoperated in conjunction with the I-SEC Group.

The ATC Mounted Security wasawarded the Highly Commendedaccolade in the category of SpecialSecurity Event or Project at theASIAL 2012 National Awards forExcellence that was held on held inMelbourne on the 3rd May 2012.

CROWD CONTROL TRAININGWITH A DIFFERENCE

The ACTLegislative Assembly haspassed legislation requiring employersto contribute to a portable long serviceleave for security employees.The newscheme will come into effect on 1January 2013 with the first installmentsto be paid into the fund in March 2013.

In brief:• Applies to all security manpower

employees (by license category) inACT.

• Paid quarterly into fund• Scheme pays for LSL (pro rata)

when taken

ACT–PORTABLE LONG SERVICE LEAVE SCHEME

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 14

Page 15: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 9:55 PM Page 15

Page 16: Security Insider Aug/Sep 2012

16 //SECURITY INSIDER AUG/SEP 2012

IINNDDUUSSTTRRYY NNeWWSS

The Security Amendment Bill was Assented by the Governor on Monday 25th June 2012, but most of thechanges, including the abolition of provisional licensing and mandatory association membership, do notcome into effect until 1 November 2012.

Primary References Commencement date

Restore the Commissioner of Police’s powers toregulate security industry training.

Page 5 (s.6A) Page 4 31

Introduce new subclasses of Master licences. Page 6 (s.10) Page 5 3

Change the authority of Master licences to theprovision of licensed persons (i.e. employees andsubcontractors) to carry on security activities.

Multiple Page 5 3

Abolish Class 1G licences (retail loss preventionactivities to be authorised by Class 1A licences)

Page 7 (s.11) Page 6 3

Abolish Class 2E and 2F licences andincorporate related security activities within theauthority of Class 2C licences.

Page 7 (s.12) Page 6 3

Abolish Provisional licences. Page 7 (s.12A) Page 3 3

Abolish the requirement for licence applicantsto provide written references.

Page 7 (s.14) - – 3

Introduce licence renewals. Page 9 (s.17) - Page 4 3

Introduce a requirement that Class 1 and Class 2licensees must, if so directed,satisfactorily completetraining,assessment and/or instruction to ensuretheir continued knowledge and competency.

Page 12 (s.21A) Page 7 3

Introduce conditional Class 1 licences for new orreturning entrants to the manpower sector.

Page 13 (s.23E) Page 3 3

Introduce incentives for licensees to apply for areplacement licence within 14 days of reportingtheir licence lost, damaged, etc.

Page 16(s.35 and s.36)

Page 7 3

Introduce subcontracting restrictions anddisclosure requirements.

Page 16 (s.38A) Page 5 3

Provide necessary powers to NSW Police Forceenforcement officers.

Pages 19 - 22 Page 3 3

Introduce permits for Master licensees needingto temporarily provide more persons than areauthorised by their licence.

Page 23(s.40A)

Page 5 3

Abolish the Security Industry Council Page 23 (s.43A) Page 7 3

Convert licences impacted by changes tolicence classes.

Pages 24 - 26 – 3

Major Changes to the Security Industry Act AmendmentBill

ExplanatoryNote

25 June 2012 1 Nov 2012

NSW SECURITY INDUSTRYAMENDMENT BILL

The Security Industry Amendment Bill 2012 also makes changes to the Firearms Act 1996 (see pages 28 - 31 of the Amendment Billand page 8 of the Explanatory Note). 1Retrospective to 1 July 2011.Source: Security Licensing and Enforcement Directorate.

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 16

Page 17: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 17

Page 18: Security Insider Aug/Sep 2012

Prepared in October 2011 by AustralianSuper Pty Ltd ABN 94 006 457 987 AFSL 233788 the Trustee of AustralianSuper ABN 65 714 394 898. Consider whether AustralianSuper is appropriate for you. Read our Product Disclosure Statement, available at www.australiansuper.com/FormsPublications or by calling 1300 300 273, before making a decision about AustralianSuper. Statements made by AustralianSuper members in this brochure have been reproduced with the members’ consent, which has not been withdrawn at the date of this publication. Investment returns are not guaranteed as all investments carry some risk. Past performance gives no indication of future returns. ‘Industry Superfund’ logo used with permission of Industry Fund Services (IFS). This consent has not been withdrawn as at the date of this publication. AUSS 32976

To join, call 1300 300 273 or go towww.australiansuper.comIt’s Australian. And it’s super.

Our fees are low to help you retire on a high.

AustralianSuper looks after more than $42 billion, for over 1.8 million everyday Australians.

‘I don’t want to see my retirement savings eaten away by high fees.’

Michael, AustralianSuper member.

18 //SECURITY INSIDER AUG/SEP 2012

IINNDDUUSSTTRRYY NNeWWSS

According to the ADTSecuritySecure Homes report whichsurveyed 2000 homeowners andrenters in both metropolitan andregional Australia, 67% of Australianresidents feel thatsecurity cameras are aneffective crime deterrentin the community.

Of those surveyed,23% believe that crime isa problem in their localarea with 30% reportingthat they had been thevictim of a break-in.

Michael Bates, NationalSales Manager, Residential and SmallBusiness, with ADTSecurity said:“Crime remains a major concern forAustralian residents who want tomake sure every measure possible istaken to increase their safety.

Community and public surveillancehas received much attention recentlywith critics debating whether publicvideo surveillance is an imposition onprivacy. However, our research shows

that most residents are infavour of communitysurveillance with manyciting they would like localcouncils to increasesecurity in public areassuch as parks, shoppingareas and othercommunity facilities.”

In recent years, lawenforcement agencies in

the US and many Europeancountries have been turning to CCTVsurveillance to enhance publicsecurity. It is also an emerging toolfor law enforcement and securityagencies in Australia.

67% OF AUSTRALIAN RESIDENTSSUPPORT COMMUNITY SURVEILLANCE

The Licensing EnforcementDivision of Firearms, Security,Secondhand Dealers andPawnbrokers has moved to theMason Bird Building, 303Sevenoaks Street, Cannington6107 (Postal Address: Locked Bag9 East Perth 6892).

The contact telephone numberis 1300 171 011.

WA–CHANGE OFADDRESS FOR WAREGULATOR

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 18

Page 19: Security Insider Aug/Sep 2012

SECURITY INSIDER AUG/SEP 2012// 19

SSUUPPEERRAANNNNUUAATTIIOONN

To help you work your way throughyour super obligations,AustralianSuper has a number of helpoptions.This is especially important inthe next 12 months as theGovernment’s proposed StrongerSuper reforms will affect the way youmanage super in your workplace.• AustralianSuper has an experienced

account management team thatcovers all states and territories.Depending on how manyAustralianSuper employees youhave, you may be assigned anAustralianSuper contact to help youwith your super administration.

• If you’re a new employer, or youneed to check your processes, visitour website atwww.australiansuper.com/employersfor a step-by-step look at your

super obligations and entitlements.Look for ourYour super obligationsfact sheet which can help youcalculate your SG obligations.

• We make superannuationadministration as simple aspossible by offering you electronicpayment options.Visitwww.australiansuper.com/EmployerOnline for details on how you canstreamline your monthlycontributions process by payingonline.You can register to payonline atwww.australiansuper.com/EmployerRegister

• For eligible employers, we offer afree clearing house service(conditions apply).The clearinghouse allows you to make onepayment for your non-

AustralianSuper members.The restof the work of distributing themoney and details to the correctsuper fund is done by the clearinghouse, saving you time and money.You can register for this service atwww.australiansuper.com/QuickSuper.

AustralianSuper provides you with the support and the tools you need to help manage your workplace super. See how wecan help make a difference to your business by visiting www.australiansuper.com/employers or call us on 1300 300 273weekdays 8am to 8pm (AEST).

HELPINGYOUMANAGEYOURSUPERMany employers find superannuation a tricky part of theirbusiness. Fortunately, AustralianSuper has a number of superhelp options for participating employers.

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 19

Page 20: Security Insider Aug/Sep 2012

In a similar vein, when asked the question ‘How would yourate the current availability of qualified security technicians’ theoverwhelmingly responses were either satisfactory or poor -ACT(83.4%); NSW (69.2%); NT(90.9%); SA (61.6%); QLD(75.9%);TAS (69.2%);VIC (63.7%) and WA (73.3%).

Encouragingly, responses by employers to the survey alsorevealed a clear commitment to support initiatives to addressthe skills shortage in the industry.The majority of employers(87.7%) indicated that they would support enrolling new andexisting staff onto an industry recognised security techniciancertification program covering electrical principles, security,access control, IP networks, CCTV and structured cabling. Afurther 89% would like to see the role performed by securitytechnicians recognised as a formal trade.

The need for industry recognised training was a strongtheme to emerge from the survey, best characterised by thefollowing response - “A professional security technician courseis critically needed. As security related technologies grow, thiswill become even more critical.”

The survey responses back up the groundswell of

feedback received by ASIAL from the industry over recentyears calling for action to address the shortfall in qualifiedsecurity technicians.

Following several years of discussion and development, thelaunch of the SecurityTechnician Certification (STC) programat Security 2012, finally means that security technicians nowhave access to a professional recognition program tailored tomeet their needs.

An ASIAL initiative, the STC program provides professionalrecognition and an industry recognised career pathway for alltechnicians working in the security industry.The online trainingresources, face-to-face theory and practical assessments areprovided by Integracom Management Group Pty Ltd, anationally recognised Registered Training Organisation.

The STC credential is a three-level technical certificationprogram for the electronic security industry that coversalarms, access control, CCTV and IP networks.Through amixture of self-paced learning, face-to-face theory andpractical assessments at approved assessment centres(based in Adelaide, Brisbane, Melbourne, Sydney and Perth),

20 //SECURITY INSIDER AUG/SEP 2012

SSEECCUURRIITTYY TTEECCHHNNIICCIIAANN CCEERRTTIIFFIICCAATTIIOONN

PROFESSIONALRECOGNITIONFOR SECURITYTECHNICIANSThe interim findings of a recent industry survey conducted bythe Australian Security Industry Association Ltd (ASIAL) hasfound that 71.2% of employers believe that the quality oftraining available for security technicians is either satisfactoryor in need of improvement.

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 20

Page 21: Security Insider Aug/Sep 2012

participants will be required to demonstrate their knowledgeof theory and practical skills.

About the programDesigned to provide a career pathway for securitytechnicians, the program is also a proactive initiative toattract and retain skilled workers capable of meeting thefuture needs of the security industry. Units associatedwith the program can be recognised as competencybased units under the Australian QualityTrainingFramework.

The program incorporates 3 levels ofrecognition:• Certified SecurityTechnician• Advanced SecurityTechnician• Master SecurityTechnician

Starting with the ‘Certified SecurityTechnician’ level, participants willneed to complete eachcertification level beforeprogressing to the next. Onsuccessful completion,participants receive:• Certification for a period of 3

years• Listing on a searchable online

database to enable customersand employers to validate thecurrency of their certification

• Complimentary badges reflecting thelevel of certification attained that can be sewnon to work wear

• A complimentary subscription to the electronicedition of Security Insider magazine

How the program worksEnrolmentTo enrol, participants are required to provideevidence that they meet the program’s eligibilitycriteria.This includes:• Name/contact information• Date of birth• Security licence or registration details • Where a licence is not held, a National Police

Clearance Certificate is required• Copy of current cabling registration and any

SECURITY INSIDER AUG/SEP 2012// 21

SSEECCUURRIITTYY TTEECCHHNNIICCIIAANN CCEERRTTIIFFIICCAATTIIOONN

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 11:12 PM Page 21

Page 22: Security Insider Aug/Sep 2012

endorsements• 2 passport style photos• Current National Work Health and Safety“white” card• Agreement to the Code of Practice

A one-off non-refundable fee of $95.00+ GST is payableon enrolment.

Certified SecurityTechnicianRequirements include the successfulcompletion of the online training andface-to-face theory and/or practicalassessments covering:• Cabling installation practices• Intruder alarm installation• CCTV fundamentals• Telecommunications transmission pathways

The cost of $760.00 includes: study book/onlinetraining; face-to-face theory assessments / practicalassessments (a maximum of 2 attempts per assessment is

permitted, after which the participant will have to pay forand complete the training again) and on successfulcompletion certification is provided for 3 years.

To retain the Certified SecurityTechnician credential,recertification is required every three years. Participantsneed to complete a skills maintenance program andassessment at a fee of $175.00 + GST (which includes afurther 3 years certification).

Advanced SecurityTechnicianRequirements include the successfulcompletion of the online training andface-to-face theory covering:• IP Networks• CCTV Advanced• Access Control• Optical Fibre• Structured Cabling

The cost of $650.00 +GST includes: study book/onlinetraining; face-to-face theory assessments (a maximum of2 attempts per assessment is permitted, after which the

participant will have to pay for and complete the trainingagain), and on successful completion certification isprovided for 3 years.

To retain the Advanced SecurityTechnician credential,recertification is required every three years. Participantsneed to complete a skills maintenance program andassessment at a fee of $175.00 + GST (which includes afurther 3 years certification).

Master SecurityTechnicianRequirements include; successfulcompletion of an online assessment,demonstrated evidence of a minimum10 years practical technical security experience, evidenceof currency of vendor/manufacturer training/certification,membership of a recognised professional industry bodyand a current individual security licence.

The cost of $295.00+GST includes online assessmentand certification as a Master SecurityTechnician for 3 years.

To retain the Master SecurityTechnician credential,recertification is required every three years. Participantsneed to complete a skills maintenance program andassessment at a fee of $175.00 + GST (which includes afurther 3 years certification).

About ASIALDeveloped, funded and administered by ASIAL, the STCprogram is an ASIAL initiative to address the skillsshortage faced by the electronic security sector.

ASIAL is the recognised peak national body for thesecurity industry. With over 3,000 members, ASIAL’smembership represents approximately 85%of the securityindustry in Australia.

ASIAL is a Cabling Registrar under the AustralianCommunications and Media Authority’s Cabling ProviderRules. Over 5,000 cablers are registered with ASIAL.

ASIAL has long been a strong advocate for the growthand development of the electronic security sector. Forclose to 20 years the Association has operated a highlyrespected monitoring centre certification program andhas provided strong leadership in the development of

22 //SECURITY INSIDER AUG/SEP 2012

SSEECCUURRIITTYY TTEECCHHNNIICCIIAANN CCEERRTTIIFFIICCAATTIIOONN

ASIAL believes that to help develop strategies to address thefuture workforce development needs of employers in theelectronic security sector, an industry-led professionaldevelopment program is vital.

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 22

Page 23: Security Insider Aug/Sep 2012

industry standards.Attracting appropriately skilled workers has always

been a priority for electronic security providers. However,growing competition for workers from other industrysectors means that it is increasingly important thatemployers have in place strategies to attract and retainthe ‘right’ people. Added to this, technologicaldevelopments such as the rollout of the NationalBroadband Network and the emergence of IP-basedsolutions are driving changes to the skill sets requiredby security technicians.

ASIAL believes that to help develop strategies toaddress the future workforce development needs ofemployers in the electronic security sector, an industry-led professional development program is vital.

About IntegracomManagement GroupIntegracom Management Group is a NationallyRegistered Training Organisation (RTO) specialising inTelecommunications and Electronic Security Training.Thecompany offers Government funded traineeships forboth the telecommunications and security industries.

Through well resourced state of the art facilities andhighly trained staff, the company is committed toensuring the currency of its resource materials to ensurethe delivery of high quality and professional training.Thiscommitment to quality is manifest in the attention todetail employed in the utilisation of the company’straining centres and in course delivery.

Integracom are a prime RTO associated with theNational Broadband Network as well as consultants tothe Department of Broadband Communications and theDigital Economy (DBCDE).Through its training portfoliocovering Telecommunications, Electronic Security andRF integration, the company is able to develop anddeliver tailored training packages applicable to anenterprise’s requirements.

Using Modular Object-Oriented Dynamic LearningEnvironment or 'Moodle' as the on line LearningManagement System (LMS), the company hasdeveloped a full suite of on line training courses.Thelearning management system allows interactivitybetween enrolled students as well as instructors andmentors. It also incorporates online simulators toenable students to test out their knowledge in acontrolled environment.

Integracom recognises the technical ability andexperience of technicians already working in thefield and use the learning management system tohelp convert that experience into nationallyrecognised qualifications.The learning management

system also provides an excellent platform for remotelearning for the many security technicians working inregional and remote areas.

More informationAs a long overdue initiative, the STC program is animportant step in providing a nationally recognisedframework for security technicians.You can obtain moreinformation on the STC program as follows:Web: www.securitytechniciancertification.com.au.Email: [email protected] Mail: SecurityTechnician Certification, Security IndustryHouse, 41 Hume Street, Crows Nest, NSW 2065.

SECURITY INSIDER AUG/SEP 2012// 23

SSEECCUURRIITTYY TTEECCHHNNIICCIIAANN CCEERRTTIIFFIICCAATTIIOONN

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 23

Page 24: Security Insider Aug/Sep 2012

SECURITY 2012IN PHOTOS25-27 JULY | SYDNEY

24 //SECURITY INSIDER AUG/SEP 2012

SSEECCUURRIITTYY 22001122 WWRRAAPP UUPP

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 24

Page 25: Security Insider Aug/Sep 2012

ASIAL would like tothank the sponsors ofSecurity 2012.

SECURITY INSIDER AUG/SEP 2012// 25

SSEECCUURRIITTYY 22001122 WWRRAAPP UUPP

Platinum ConferenceSponsor

Cocktail ReceptionSponsor

Cocktail ReceptionSponsor

Platinum Gala DinnerSponsor

Gala Dinner Entertainment Sponsor

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 25

Page 26: Security Insider Aug/Sep 2012

26 //SECURITY INSIDER AUG/SEP 2012

SSEECCUURRIITTYY 22001122 WWRRAAPP UUPP

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 26

Page 27: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 27

Page 28: Security Insider Aug/Sep 2012

Acouple of months ago, Ireceived a letter expressingconcern about how hard it

was becoming for security firms tocompete for services because ofpressure being applied by clients formanpower rates as much as 20 percent or more below cost.

The writer went on to raise thealarm that most sub-contractors didnot have public liability or personalinsurance, were not registered for GST,superannuation or workers’compensation – and thatunderpayment of minimum wages andcasualisation of permanent positionsto avoid on-costs was widespread.

Essentially, what the author wascanvassing with me is behaviour that,in the United States for example, isdescribed as “wage theft”!

Within my Branch, I use the term“serious non-compliance” to describedeliberate, systematic avoidance ofworkplace relations laws by peoplewho adopt a business model or

approach that is unethical andunlawful.

We tackle this issue in a number ofways – including litigation and targetedcompliance campaigns. Each year, weconduct up to 7000 random, or spot,audits around the country – and in thepast 12 months we have looked at thesecurity, cleaning, retail and clericalsectors.

In selecting campaigns and auditprograms, the Fair Work Ombudsman(FWO) targets industries whereproblems exist (high complaint ratesand high violations) and whereworkers are unlikely to complain dueto their vulnerable status (lowcomplaint rates and high violations).

To decide which industry sectors totarget, the FWO scans the environmentand conducts a detailed complaintsanalysis using – among other things -a strategic matrix, a review ofcampaign reports to identify complaintrates and trends, a review of the mediato identify current and emerging

issues, analysis of industry trendinformation and intelligence from ourown inspectors working in the field.

Our objective is to challengeemployers to work toward self-compliance and to voluntarily correctproblems that we identify. At the endof each campaign, we publicly releasea report on our findings and we regardthese reports as both educative andcompliance opportunities inthemselves.

In May, the FWO released a 30-pluspage report on the findings of asecond National Security IndustryCampaign conducted in 2011 as afollow-up to work we had undertakenin 2009.

In this column, I would like toexplore the background to the originalcampaign and share the results of themost recent findings, which to ourgreat pleasure, revealed a significantincrease in compliance.

An analysis of the FWO data baseshows that from January 1, 2009 to

28 //SECURITY INSIDER AUG/SEP 2012

FFAAIIRR WWOORRKK OOMMBBUUDDSSMMAANN

BIG LIFT INCOMPLIANCE,BUT SECURITY FIRMS REPORT

WAGEPRESSURES

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 28

Page 29: Security Insider Aug/Sep 2012

December 31, 2010, we receivedcomplaints against 138 securitycompanies throughout Australia.

As a result of investigations by FairWork inspectors, monetarycontraventions were identified whichresulted in a total of $296,919 beingreimbursed to staff who had beenunderpaid.

A state by state breakdown ofthese underpayments shows that$131,169 was returned to workers inNSW, $92,099 to employees inVictoria, $37,595 to workers inQueensland, $18,154 to workers inSouth Australia, $12,494 to workers inWestern Australia, $3,230 to workersin Tasmania, $1,571 to workers in theACT and $607 to workers in theNorthern Territory.

In March, 2010, the FairWorkOmbudsman published the findings ofa national campaign conducted in thesecurity industry during 2009 – and theresults disclosed a sector struggling tocomply with Commonwealth workplacerelations laws.

Of 302 audits undertaken in 2009,we found only 143 employers, or 47per cent, to be compliant. Of the 159employers who were non-compliant,we identified a total of 289contraventions.

There were 91 monetarycontraventions which saw us recovera total of $1.125 million back-pay for1156 employees around the countrywho had been short-changed.Thiscomprised $347,485 for workers inNSW, $251,253 for workers in Victoria,$240,772 for workers in WesternAustralia, $80,365 for workers inTasmania, $71,662 for workers in theACT, $47,197 for workers in SouthAustralia, $46,961 for workers in theNorthern Territory and $39,627 forworkers in Queensland.

After identifying this low-level ofcompliance, the Fair Work

SECURITY INSIDER AUG/SEP 2012// 29

FFAAIIRR WWOORRKK OOMMBBUUDDSSMMAANN

Steve Ronson

Our objective is tochallenge employersto work toward self-compliance and tovoluntarily correctproblems that weidentify.”

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 29

Page 30: Security Insider Aug/Sep 2012

30 //SECURITY INSIDER AUG/SEP 2012

Ombudsman called for leadershipfrom the security industry todramatically improve its compliance,noting that the task of drivingbehavioural change was not a job forthis Agency alone.

Subsequently, the Fair WorkOmbudsman provided funding to theAustralian Security IndustryAssociation in 2010 under its $2.5million shared Industry AssistanceProgram (SIAP) to assist employers tobetter understand their workplaceobligations.

The Association produced a guidefor employers with information on theNational Employment Standards,classifications, hours of work, breaks,shift work penalties, overtime,employment status, employee recordsand payslips and rates of pay.

ASIAL also ran seminars in Hobart,Brisbane, Melbourne, Adelaide, Perth,Sydney and Canberra for almost 300participants.

In May, 2011, we commenced asecond round of audits in the securityindustry as a follow-up to the 2009campaign - and found the level ofcompliance had risen from 47 percent to 75 per cent.That is a fantasticimprovement and indicates that ourpro-active auditing work is achievingthe desired outcomes.

Fair Work inspectors audited 392employers and found 295 werecompliant. Ninety seven employerswere identified as non-compliant, with36 per cent of breaches relating tounderpayment of wages, and a total of$427,000 has been recouped for 658employees Australia-wide. NSWrecorded the highest recovery of$140,093, representing almost 33 percent of the total.Then followed Victoriawith $134,336, SA with $52,595, NTwith $38,835, Queensland with$32,870, WA with $25,545 andTasmania with $2886.There were nounderpayments in the ACT.

The average amount of moneyrecovered per audit in 2009 was $3726,but in 2011 this decreased to $1408.

In all, a total of 155 contraventionswere identified in the 2011 campaign –56 (36 per cent) relating tounderpayment of wages, 38 (24 percent) related to payslip issues andtime and wages record-keepingrequirements and 28 (18 per cent)related to penalty rates.

At the time of writing, 42companies remain under investigation.

In the latest campaign, Inspectorsfound:• 15 employers who had monetary

breaches in 2009 amounting to atotal of $187,146 recordedunderpayment breaches in 2011resulting in back-payments totalling$87,402.

• Seven employers who had payslipand record-keeping breaches in2009 recorded underpaymentbreaches in 2011 requiring them toback-pay staff a total of $83,094.

• Thirteen employers found to becompliant in 2009 recordedmonetary breaches in 2011 requiringback-payments to staff totalling$60,000.

• Six employers with underpaymentstotalling $11,139 in 2009 recordedpayslip and record-keeping breachesin 2011, and

• Seven employers found to becompliant in 2009 recorded payslipand record keeping breaches in 2011.The highest overall contravention

rate was recorded in Tasmania, where42 per cent had some form of breach.Then followed the NT with 37 per centnon-compliance, NSW and the ACT 33per cent each, SA 32 per cent,Victoriaand Queensland 22 per cent each andWA 7 per cent.

The FairWork Ombudsmanconsiders that most contraventionswere the result of a lack of

understanding by employers of theirobligations. However, there are a smallnumber where we may considerenforcement action.

The survival of security businessesis dependent on the ability of thebusiness to be competitive and wincontracts. However, it seems someemployers are prepared to ignore theirworkplace obligations in an attempt towin contracts.

While I welcome the improvementin compliance, the results of the 2011campaign still indicate a need forongoing education and intervention inthe security industry with businessesreporting pressure to quote fortenders at rates below minimumentitlements.

The role of the Fair WorkOmbudsman is to promoteharmonious, productive, co-operativeworkplace relations.

We place great importance on thecollaborative nature of our partnershipswith employer organisations such asASIAL in increasing awareness ofworkplace obligations.

The majority of our work is directlyaimed at ensuring the playing field islevel by improving fairness andcompliance in the workplace, and weare committed to achieving this. Ourapproach is to ensure that industriesknow their responsibilities more thanever before and to give practical helpto implement these responsibilities.

A reminder that we have a tailoredindustry page devoted to informationon the security sector on our websiteat www.fairwork.gov.au. In addition,you can call our Infoline on 13 13 94on weekdays, follow us on Twitter andFacebook and sign up to a regular e-newsletter.

Steve Ronson,Executive-Director DisputeResolution & ComplianceFair Work Ombudsman

FFAAIIRR WWOORRKK OOMMBBUUDDSSMMAANN

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 30

Page 31: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 31

Page 32: Security Insider Aug/Sep 2012

32 //SECURITY INSIDER AUG/SEP 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:08 PM Page 32

Page 33: Security Insider Aug/Sep 2012

SECURITY INSIDER AUG/SEP 2012// 33

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 33

Page 34: Security Insider Aug/Sep 2012

34 //SECURITY INSIDER AUG/SEP 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 34

Page 35: Security Insider Aug/Sep 2012

SECURITY INSIDER AUG/SEP 2012// 35

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 35

Page 36: Security Insider Aug/Sep 2012

36 //SECURITY INSIDER AUG/SEP 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 36

Page 37: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 37

Page 38: Security Insider Aug/Sep 2012

Why the PSPF is importantThe PSPF provides relevant securitymanagers and other stakeholders witha framework that requires them todesign, implement and continuallyimprove their security program.

In defining the practiceareas/domains within which security ismanaged, the PSPF adopts apragmatic approach that regards ITsecurity as a function of informationand physical security. It thus identifiesand addresses at least one concern ofconvergence by recognising thatinformation security is far broader thanelectronic data confidentiality, integrity,and availability.The implications hereare particularly pertinent for ChiefInformation Officers (CIOs), InformationTechnology Security Advisors (ITSAs)

and Agency Security Advisors (ASAs)alike.

What does the PSPF mean toGovernment?The PSPF maps a baseline fororganisations that fall under itsjurisdiction and ensures a commonplanning approach to securitymanagement whilst providing fordivergence stemming from localconditions and organisationalimperatives.The subsequentpropensity for commonality,benchmarking, reporting, and risk-based planning is significantlyimproved.

While the protective securitypolicies for each agency will inevitablydiffer, depending upon the range of

business and security risks, theminimum security requirements aremandatory for all agencies.

Compliance with mandatoryrequirements provides the requisiteassurance for secure informationsharing across Government. TheFramework supports agencies inimplementing the Government’sprotective security policy.

Protective security is a combinationof procedural, physical, personnel, andinformation security measuresdesigned to provide Governmentinformation, functions, resources,employees and clients with protectionagainst security threats.

The Government requires agencyheads to have in place effectiveprotective security programs that

In June 2010, the Directive on the security of Governmentbusiness was issued by the Commonwealth Attorney-General,The Hon Robert McCelland MP.The Directive states:

The Australian Government takes appropriate measuresto protect its people, information and assets, at home andoverseas. How the Government protects its people,information and assets is critical to effective engagementwith the Australian people.The Protective Security PolicyFramework is designed to help agencies:• identify their individual levels of security risk tolerance;

• achieve the mandatory requirements for protectivesecurity expected by Government; and

• develop an appropriate security culture to securely meettheir business goals.Maintained by the Commonwealth Attorney-General’s

Department (AGD), the PSPF replaces the ProtectiveSecurity Manual (PSM- although the Classified PSM (CPSM)remains extant).The trajectory of the PSPF extends beyondprescriptive security compliance towards an approach thatis decidedly risk based.

38 //SECURITY INSIDER AUG/SEP 2012

PPRROOTTEECCTTIIVVEE SSEECCUURRIITTYY PPOOLLIICCYY FFRRAAMMEEWWOORRKK

PUTTINGTHEPSPF PUZZLETOGETHERBy Mark Bezzina, Konrad Buczynski and Dr Georgia Lysaght.

Brief background and history of the PSPF

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 38

Page 39: Security Insider Aug/Sep 2012

ensure:1 Their respective agency’s capacity

to function;2. The safety of those employed to

carry out the functions ofGovernment and those who areclients of Government;

3. The public’s confidence in theGovernment and its agencies; and

4. Official resources and informationthe agency holds on trust, bothfrom and for the public, and thoseprovided in confidence by othercountries, agencies andorganisations, are safeguarded.

What does the PSPF cover?The PSPF is comprised of 33elements and 177 singlerequirements. The section belowprovides an overview of the PSPFelements.

Please note that this is only a highlevel summary and readers are advisedto go to the excellent sourcedocuments available at thehttp://www.protectivesecurity.gov.auwebsite. Additionally, the content of thePSPF has been slightly modified in thebelow section to cater forimplementation within private industry.

The PSPF has 13 governanceelements that cover the high-levelsystemic aspects of effective security.In summary the following elements fallunder governance:

1. Security information andtraining

2. Senior management support3. Clear management

responsibility for security4. Security planning5. Security policy and

procedures6. Risk management7. Internal assessment and

reporting8. Investigation of incidents and

corrective action9. Meeting legal requirements10. Meeting requirements in

agreements

11. Resilience and businesscontinuity management

12. Contractor management13. Fraud and financial controlsThe PSPF has 6 personnel security

elements that ensure only appropriatepeople have access to classifiedinformation or important assets. Insummary, the personnel securityelements cover:

1. Employee clearance vetting2. The need for roles to have

defined security clearancelevels

3. Maintenance of a register ofcleared staff and roles

4. Security clearances must besponsored

5. The Australian GovernmentPersonnel Security Protocolshould be followed

6. Changes in circumstances forcleared staff should bemonitored

The PSPF has 7 information securityelements to ensure the integrity ofavailability and confidentiality ofinformation irrespective of its media. Insummary, the information securityelements cover:

1. Information security planningand policies

2. Framework to providedirection and coordinatedmanagement of information

security3. Policies and procedures for

the security classification andcontrol of information assets

4. ICT systems and networktasks managed securely andconsistently

5. Risk based controls andaccess processes

6. Security measures at allstages of ICT systemdevelopment andimplementation

7. ICT systems meet legalrequirements

The PSPF has 7 physical securityelements that ensure unauthorisedpeople cannot access importantassets. In summary, the physicalsecurity elements cover:

1. Physical security policy andplanning

2. Physical security policies andprocedures

3. Protective security in facilityselection and modification

4. Physical security must meetrelevant employeroccupational health andsafety obligations

5. Duty of care for members ofthe public

6. Implement measures thataddress the risk of ICTequipment and information

SECURITY INSIDER AUG/SEP 2012// 39

PPRROOTTEECCTTIIVVEE SSEECCUURRIITTYY PPOOLLIICCYY FFRRAAMMEEWWOORRKK

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 39

Page 40: Security Insider Aug/Sep 2012

being made inoperable orotherwise misused

7. Plans and procedures to moveup to heightened securitylevels in emergencies

Additionally, the following protocolsand guides support the PSPF:1. Australian Government personnel

security management protocol• Agency personnel security guidelines• Security clearance subject guidelines• Procedural fairness guidelines• Reporting changes in personal

circumstances guidelines• Contact reporting guidelines• Personnel security practitioners

guidelines• Personnel security adjudicative

guidelines2. Australian Government information

security management protocol• Australian Government security

classification system• Protectively marking and handling

sensitive and security classifiedinformation

• Agency cyber security responsibilitieswhen transacting online with thepublic

3. Australian Government physicalsecurity management protocol

• Security zones and risk mitigationcontrol measures

• Working away from the office• Physical security of ICTequipment,

systems and facilities• Event security

Why is this important for yourorganisation?It is essential that you achieve andmaintain compliance with the PSPF ifyou deal with the AustralianGovernment and are expected toadhere to sections of, or indeed, theentire Framework. Nothing says ‘trustedpartner’ more than an organisation thatmakes the effort to treat securitymanagement seriously.This can havean enormous impact on capability,reputation and ultimately, success in

winning future Governmentopportunities.

Achieving compliance with the PSPFrequires an investment, and not onethat is singularly financial. Leadership isundeniably the most critical componentin this process, for a determinedexecutive leadership group will ensurethat the requisite sponsorship,resourcing and priority

Much like risk management, securitymust not be considered an afterthoughtor add-on to projects or indeedeveryday initiatives. Security must beembedded in processes, much likework, health and safety is in thecontemporary business environment.

How you can incorporate thePSPF into your businessIn order to incorporate the PSPF intoyour business you should do thefollowing:• Implement a risk management

system• Implement a philosophy of

integrating controls • Use the PSPF and related

documents as a check list forassessing your security program

• Do not underestimate the value ofsecurity intelligence and effectivelymanaging the security of peoplefrom a vetting and a safetyperspective

• Consider how you manage andcontrol information in yourorganisation. Many Australianorganisations are weak at classifyingand security important informationand managing access to thatinformation.

How can you leverage the PSPFto gain more success in workingwith government?Align your systems to the PSPF todemonstrate that you are adhering tothe structure.This will allow ease incommunicating your level of securityand provide Government clients with

confidence.Aligning with the PSPF will enable

easier pre-qualification and will alsoenable you to easily show the level ofcompliance of your systems when youput forward tenders for projects.

There are sections in the PSPF thatdeal with contractors and outsourcing.If you do not comply you will not getwork.

Final thoughtsThe PSPF takes an integrated riskbased and all hazards approach tobuilding resilience in your business.

Employing the range of tools andtechniques detailed in the PSPF canfacilitate the development of highlyefficient security systems.This will alsoensure that you do not over or underengineer security in your organisation.

The PSPF is the only reputableauthoritative existing bench-mark ofsecurity systems. It provides a basis togive your board, shareholders and otherimportant stakeholders comfort thatyour security system is effective.Topurchase a framework similar to thePSPF would prove excessively costlyparticularly as the Government hasextended significant levels ofinvestment into the development of thistool. Additionally, the PSPF builds onthe PSM and ISM that have been longestablished and tested frameworks.

The PSPF is cognisant of nationaland international standards so yoursecurity system will be well aligned withnot just best practice here in Australia,but also internationally.

In implementing the PSPF yourorganisation will be more robust andwill be able to withstand a number ofpotential disruptions and challengesleading to greater sustainability.

Article by Agilient Pty Ltd(www.agilient.com.au) Authors: Mr MarkBezzina; Mr Konrad Buczynski, CPP,CPRM; and Dr Georgia Lysaght.

40 //SECURITY INSIDER AUG/SEP 2012

PPRROOTTEECCTTIIVVEE SSEECCUURRIITTYY PPOOLLIICCYY FFRRAAMMEEWWOORRKK

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 40

Page 41: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 41

Page 42: Security Insider Aug/Sep 2012

Subcontracting, pyramid subcontracting and usingindependent contractors in the private security industry mayhave the potential to expose many principal contractors toactions for underpayment of wages, remedies for allegedunfair dismissal and/or contracts being overturned byCourts determining them to be “unfair”.

Although subcontracting is a legitimate form of workarrangement that is primarily commercial and should beconducted in accordance with the law, unfortunately asignificant number of subcontracting arrangements havebeen entered into as a means of avoiding variousresponsibilities under employment and taxation laws.Thesearrangements are termed “sham contracting” and areunlawful and expose the parties to prosecution, fines andclaim for failure to provide minimum rates of pay andconditions.

Both the Fair Work Ombudsman and the ATO havemade it clear that in 2012 they will pursue employers forsham contracting.

And from November 2012, as a result of amendments tothe Security Industry Act 1997 (NSW), a master licenseholder (principal) may face penalties (of up to $22,000.00)if they sub contract the work without the client expresslyagreeing in a contract and the principal provides the clientwith the particulars of any sub contractor engaged to dothe work.The same applies to a sub contractor furthersubcontracting the work.

Subcontracting in the Private Security industry typicallyrefers to the situation in which a head contractor allocatesresponsibility for a particular aspect of the work to be doneto a specialist supplier of security services. It usuallyinvolves the following arrangements:• subcontracting businesses that employ workers under

an award or workplace agreement covering wages andconditions and subcontracting to others when needed;

• self-employed individual subcontractors who seek workindependently (independent subcontractors); or

• self-employed individual subcontractors who seek work

42 //SECURITY INSIDER AUG/SEP 2012

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

SHAMCONTRACTINGEMPLOYERS NEEDTO ENSUREBONA FIDE RELATIONSHIPS By Chris Delaney

We recently came across a member who had paid thousandsfor advice and a draft Enterprise Bargaining Agreement - hadthey have called us we could have saved them thousands ofdollars to do the same work.

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 42

Page 43: Security Insider Aug/Sep 2012

through employment agencies.The Independent Contractors Act 2006 and the Fair

Work Act 2009 protect the status of independentcontractors by freeing them from the constraints ofindustrial and employment laws.

Employers need to be careful to avoid entering into shamcontracting arrangements with their workers. Subcontractingshould not be a substitute for direct employment but agenuine commercial arrangement to supplement andcompliment the direct workforce.

The status of contractors, while the subject of many legaldecisions, still remains a matter of each arrangementdetermined on its individual merits. However, employers needto be aware that the FairWork Act 2009 and the IndependentContractors Act 2006, have made it easier for the FWO andthe ATO to prosecute them for sham contracting.

Benefits and risks of engaging contractorsFor many SMEs, using contractors rather than employeesmay seem an attractive option because it can reduce costs,increase flexibility, avoid the cost of superannuationcontributions, PAYG withholding tax, workers compensationpremiums, annual leave, personal/carer's leave, long serviceleave, notice of termination, redundancy pay or minimumwages in modern awards.

Attractive as this may seem, having these arrangementsdeemed to be shams (which many may well be), places theemployer at significant risk of prosecution, including:• Prosecution by the FWO for sham contracting and breach

of modern awards and National Employment Standards,which can incur penalties of up to $33,000 per breach fora company and $6,600 for an individual

• Prosecution by the ATO for unpaid superannuationcontributions and PAYG taxation

• Unfair dismissal and adverse action claims from adismissed WorkerMany of the arrangements that exist with “ABN holders” in

the security industry are potentially sham contractingarrangements.

Sham contractingThe FWO will investigate the conditions of employment of aworker, engaged as a contractor, if the indicate lower rates ofpay and/or reduced conditions available to an employeeperforming the same work.The employee will, most likely, becovered by a Modern award and the minimum NationalEmployment Standards or, alternatively a collectiveworkplace agreement. If the arrangement between theparties, has been created to look like a real commercialarrangement, but in essence is typical relationship betweenan employer and their employee, it will be treated as a “sham

contract. Often these arrangements involve, among otherthings, an ABN, a so called contract, and payment uponinvoices rather than by wages, all designed to avoid tax,workers compensation, annual leave and a myriad of othercosts for the parties. Unfortunately in most instances the subcontractor is the one most disadvantaged.

General Protections of the FairWork Actand reverse onusSham contracting is specifically dealt with under the GeneralProtections provisions of the FairWork Act.Therefore the onusis on the employer to prove that they have not misrepresenteda contract of employment as a contract for services underwhich the worker is treated as a contractor.

SECURITY INSIDER AUG/SEP 2012// 43

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

“Clients of security providers willneed to be more aware of theirexposure to prosecution for beinginvolved in the contraventions oftheir security provider.”

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 43

Page 44: Security Insider Aug/Sep 2012

Note:The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this

information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific.

Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference to

an Employee Relations professional. ASIAL members can contact Chris Delaney by emailing [email protected]

This makes it much easier for the FWO to prosecuteemployers for sham contracting because they no longer haveto prove their case.That burden falls upon employers to provethat they have not engaged in sham contracting. For examplein May 2012 the Federal Magistrate’s Court found that aTasmanian resort operator was trying to avoid payingsuperannuation contributions, income tax and payroll tax byencouraging employees to become independent contractors.The operator was fined $280,500 for deliberately exploitingworkers through sham contracting arrangements, while one ofthe owners was fined nearly $14,000.The company was alsoordered to pay $40,000 for underpaid wages.

That decision is one of many that show that the FWO willprosecute both corporations and individuals involved in shamcontracting. Liability can fall to anyone who "has been in anyway, by act or omission, directly or indirectly, knowinglyconcerned in or party to" the breach.

South Australian Trolley CollectorsThere are two important cases currently before the FederalMagistrate’s Court. In these cases the FWO has sought to joinColes Supermarkets to an action against the Starlink group ofcompanies alleged to have been involved in substantialunderpayments to employees engaged as subcontractors.Starlink were contracted to five Coles Supermarkets toprovide trolley collection services. Starlink then subcontracteda sole trader to provide the services and the sole traderemployed the trolley collectors. Coles is vigorously defendingits position and the matter is likely to run for several moremonths before there is an outcome.

In the first prosecution FWO claims that there is a totalunderpayment of wages and entitlements to four employeesin the order of $143,000, and the second claims a totalunderpayment to six employees of around $149,000.

The case is important because the FWO claims thatColes knew that under the contracting prices it paid to theStarlink companies, it was not feasible to provide therequired trolley collecting services without undercuttingminimum wage rates. In other words, the allegation is thatthe client was involved in the contraventions of the employer,despite the fact that it was not itself the employer.

The FWO has not accused Coles of sham subcontracting, however do suggest that Coles was knowinglyconcerned in the breach.This may become an example ofhow inappropriate use of contracting may result in liability –

not just for the principal but also for the client.

In a recent address to employers, Nick Wilson, the FairWork Ombudsman issued this warning:

“Turning a corporately-sanctioned 'blind-eye' tooutsourced work that is performed by another enterpriseusing contractors on below-award rates of pay may exposeenterprises up the procurement chain to liability.

All parties should undertake due diligence whenoutsourcing work to contracted workers, particularly tolowest-cost providers, to ensure lower costs areattributable to efficiencies in the business and not due tothe potential exploitation of workers on below award rates.”

For Security providers this means thinking very carefullyabout whether their business model should include subcontractors and if so how to ensure that these are bona fidecontractors who do not expose the business to litigation.

ASIAL recommends that members seeking to enter intosubcontracting arrangements seek professional advice toavoid uncertainty and exposure to prosecution.

Clients of security providers will need to be more aware oftheir exposure to prosecution for being involved in thecontraventions of their security provider. This meansensuring contracts include provisions that protect theorganization, including:• A thorough understanding of the business operations

proposed by the contractor;• Determining if the contractor is able to deliver the services

within the industrial relations regulations• Ensuring no further subcontracting, of any part of the

services to be provided;• Insisting on guarantees from service providers in relation

to their industrial compliance; and• conducting appropriate audit(s).• using contracting to avoid responsibility for compliance

with applicable industrial regulation and liability for non-compliance may not work.

ASIAL recommends that clients of security providersmake themselves aware of the business operations of thesecurity operator and avoid making decisions solely onprice.While there are no restrictions on the price a securitybusiness can charge a client, there are minimum costsincluding statutory entitlements, insurances and licensingwhich cannot be lawfully avoided.

44 //SECURITY INSIDER AUG/SEP 2012

IIRR AADDVVIICCEE && SSUUPPPPOORRTT

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 44

Page 45: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 45

Page 46: Security Insider Aug/Sep 2012

HHOOTT PPRROODDUUCCTTSS

New Tamper Evident Chambern Harcor Security Seals & Bags > +612 9454 4200n Email > [email protected] Web > www.harcor.com.au

simPRO Field Mobilityn simPro > 1300 139 467n Email > [email protected] Web > www.simpro.com.au

Your time is money and your hours are billable. Cut your travel and admin timedown by at least 20% per day per person with simPRO Field Mobility.

Our range of simPRO Field Mobility options let you and your staff stayconnected and keep your entire system up-to-date with real-time overview ofthe labour, material and equipment costs incurred, the margin you haveapplied and the invoiced amount.

Our SmartPhone version is optimised for phone sized devices such asAndroid, Windows Mobile, iPhone and devices such as the Datalogic Elf.

Get out and about with simPRO Field Mobility and simplify your businessprocesses so you can spend more time making money, not chasing it.

Pelco Digital Sentry Network VideoRecorder – DSSRVn Pelco by Schneider Electric > +612 9125 9310n Email > [email protected] Web > www.pelco.com

46 //SECURITY INSIDER AUG/SEP 2012

Flexible IP VMS for mainstream security applicationsThe new Pelco Digital Sentry Network Video Recorder provides allthe power you need to maximise HD recording and leverage existinganalogue investments. With 280 Mbps bandwidth, support for up to 128IP streams, increased storage options and built-in reliability, thispowerful new platform delivers more HD capability than ever before.Thenew Pelco Digital Sentry can accommodate up to 64 analogue camerasat D1 resolution and full frame rate. Simplify and optimise your videosecurity platform and choose the new Pelco Digital Sentry as your one-stop solution for all the HD and analogue recording power you need.

The high level of security, environmental and cost benefits offered, areincreasing the popularity of reusable tamper evident bags. Designedspecifically to set a new standard in tamper evident security, Harcor haslaunched the Only Tamper Evident Chamber.

We’ve created a range of different TEC chambers to suit the needs ofour clients. These chambers all include Harcor’s newly patented“Fracture Safe” design.

In addition to the increased security, the new robust chamberscontinue to provide reliable sealing and easy opening/closing of reusablesecurity bags.

For additional information on reusable tamper evident bags or to see ademo of the TEC Chamber please visit www.harcor.com.au

NEW!

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 46

Page 47: Security Insider Aug/Sep 2012

HHOOTT PPRROODDUUCCTTSS

Award Winning PANOMERAn CR Kennedy > +613 9823 1555n Email > [email protected] Web > www.crkennedy.com.au/surveillance

Smartphone Control for Concept3000/4000 Systemsn For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au

Inner Range has released a WEB interface kit designed to provide convenientcontrol of Concept Security Systems via any web browser. It is optimized for use onportable smart touchscreen devices such as iPhones, iPads,Android Mobile Devicesand Tablet PC's, but can be used on any device with a WEB browser application.

Smartphones can be used to remotely control Concept Security Systems fromanywhere in the world.There are no additional apps to install orpurchase – simply useyourdevices existing web browser.The userscreens are intuitive and provide a simpleuser-friendly layout that is very easy to use. The Concept WEB interface providesMulti-User login,Arming & Disarming of SecurityAreas,Locking & Unlocking of Doors,Control of Home Automation Devices and viewing of system reviews events.

Inner Range Rack Mount Enclosuren For more information contact:n Web > www.innerrange.comn Web > www.centralsd.com.au

Inner Range has released a universal Rack Mount Enclosure designed foruse with its Concept and Integriti system hardware. Featuring a trulyuniversal design that allows virtually all Inner Range System Controllers orLAN modules to be installed into a 19” rack equipment cabinet withoutrestricting critical access to cabling, termination of connections or accessfor commissioning and maintenance purposes. Flexible installation optionsallow the rack mounted drawer to be configured to meet a vast array ofspecifications, allowing mix & match installation of System Controllers,Universal Expanders, Relay Cards, Access Control Modules, InputExpanders, UniBus Expansion Cards, Multipath Communications Devicesand up to 4 Doors of fully Intelligent Access Control.Inner Range Melbourne: www.innerrange.com.

Dallmeier is famous for creating the world’s largest Casinosurveillance systems in places such as Macau and Singapore.Panomera is Dallmeier’s completely new camera technology forsurveillance of very large areas. It offers a panoramic overview with real-time HD recording, so can significantly reduce infrastructurerequirements. Projects such as Airports, sporting arenas etc previouslyrequiring huge numbers of cameras, can now be covered withPanomera. Unlike Megapixel systems, Panomera uses H.264 encodingto deliver up to 51 megapixels in real time.

Panomera won the coveted “CCTV Camera Equipment of the Year”Award at IFSEC 2011.The first showing of Panomera in Australia was atthe Security 2012 show.

NEW!

SECURITY INSIDER AUG/SEP 2012// 47

NEW!

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 47

Page 48: Security Insider Aug/Sep 2012

HHOOTT PPRROODDUUCCTTSS

Introducing Kenwei’s new TouchScreen Video Intercom Room Stationn Central Security Distribution > 1300 319 499n Email > [email protected] Web > www.centralsd.com.au

HF-1 Needle-Proof KevlarMetal Detection Glovesn UniGuard Management & Security > 1300 133 366n Email > [email protected] Web > www.uniguard.com.au

HF–1 gloves give the operator the ability to have hands free metaldetection with the protection of Kevlar.This gives the wearer addedprotection from hypodermic needles, knives and razor blades.

They are light weight and comfortable to wear as well as beingeasy to use with no adjustments necessary for use. Just switch onand they are ready to go. Available as a pair or singularly.Product Specifications:Sizes: L,XL,XXL,Weight: 149g (approx),Battery: Standard 9VAlkaline,Battery Life: 400 hours, Sensitivity: 0.5g, Warranty: 12 monthmanufacturer warranty.

Adam’s AD11V Metal Detectorn UniGuard Management & Security > 1300 1333 66n Email > [email protected] Web > www.uniguard.com.au

48 //SECURITY INSIDER AUG/SEP 2012

The Adam’s AD11V is a high powered, highly sensitive metaldetection unit which comes with standard audio/visual alarm facility,but with the added ability, via a two-position rocker switch, to switchthe detector to either standard or discreet mode.

This feature has proven very useful when working in a noisyenvironment or if the operator wishes to conduct a searchprocedure, while keeping eye-contact with the subject beingscanned.

The AD11V comes with a 12 month manufacturer warranty andhas a 0.1g sensitivity mass. A single 9V alkaline battery shouldprovide with approximately 400 hours of operational time.

Compatible with all Kenwei 4 wire Residential and Apartment intercoms,Kenwei’s new 7” touch screen produces an exceptional colour image on upto 8 Video Stations and through its distributorsupports up to 4 doorstationson one system.

Featuring selectable display skins and available in black or white, the702TC will excite the most stylish customers. Speaking of features; the702TC boasts date and time display, do not disturb and direct dial to anyof the 8 room station. Adding the 36 Event on board memory,programmable tones and 2 independent relay outputs as standard makesthis door station an absolute gem.NEW!

NEW!

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 48

Page 49: Security Insider Aug/Sep 2012

ADT Security NSW 366 A1 09 Mar 2013

Allcare Monitoring Services WA 379 A2 28 Feb 2014

ARM Security WA 360 A1 10 Mar 2013

ART Security VIC 356 A1 30 Oct 2012

Calamity Monitoring NSW 383 A1 20 Mar 2014

Central Monitoring Services NSW 380 B1 21 Mar 2014

Commonwealth Bank of Australia NSW 389 A1 24 Sep 2014

Golden Electronics TAS 355 A1 17 Oct 2012

Grade One Monitoring NSW 378 A1 13 Feb 2014

Grid Security Services NSW 381 A1 18 Mar 2014

GSS Asset Management QLD 385 C2 31 Oct 2012

Instant Security Alarms QLD 365 A1 29 May 2013

Insurance Australia Limited (operating with Insurance Australia Data Centre) NSW 377 C1 17 Jan 2014

ISS Security NSW 373 B3 25 Nov 2013

Linfox Armaguard VIC 346 A1 08 Aug 2012

Mekina Technologies TAS 349 A1 16 Aug 2012

NSS Group NSW 384 A1 07 May 2014

Onwatch NSW 375 B1 08 Oct 2012

Paul-Tec Australia NSW 367 A1 28 Feb 2013

Protection Pacific Security VIC 348 C2 31 July 2012

RAA Security Services SA 358 A1 12 Dec 2012

Secom Australia NSW 374 A1 14 Dec 2013

Sectrol Security VIC 369 B2 19 Aug 2013

Securemonitoring VIC 370 A1 23 Nov 2013

Securenet Monitoring Services NSW 386 A1 04 May 2014

Security Alarm Monitoring Service SA 387 A1 18 Jun 2014

Security Control Room VIC 362 A1 06 May 2013

Sesco Security WA 364 A1 03 Jun 2013

SMC Australia QLD 372 A1 07 Dec 2013

SMC Australia VIC 371 A1 16 Dec 2013

SNP Security (Newcastle) NSW 368 A1 17 Aug 2013

SNP Security (Sydney) NSW 390 A1 31 May 2013

Spectus WA 376 A1 28 Dec 2013

State Government Protective Security Service QLD 388 C1 22 May 2014

Westpac Banking Corporation NSW 382 A1 19 Mar 2014

Woolworths Limited NSW 351 C1 04 Nov 2012

Company (short form name) State Cert. No. Grade Expires

ASIAL Certified Security Monitoring Centres*

Current as at: 26 July 2012

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and graded forcompliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listedcompanies which may change the nature of their operations subsequent to Certification.

Australian Security IndustryAssociation Limited

SECURITY INSIDER AUG/SEP 2012// 49

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 49

Page 50: Security Insider Aug/Sep 2012

ASIAL NATIONALCALENDAR OF EVENTS 2012/2013

To find out more register online www.asial.com.au/eventscourses or email [email protected]

AUGUSTVIC Industry Breakfast Briefing7.30-9.00amThursday 23rd August 2012Quality Hotel Batman's Hill on Collins623 Collins Street Melbourne 3000Superintendent Russell Barrett, LicensingRegulation Division (VIC POL)

OCTOBERQLD Breakfast Briefing7.30-9.00am,10 October 2012Niche Event Spaces, Stones Corner, Brisbane

ACT Breakfast Briefing7.30-9.00am,17th October 2012Belconnen Premier Inn, Canberra

SA Breakfast Briefing7.30-9.00am,18th October 2012Sebel Playford Hotel, Adelaide

WA Breakfast Briefing7.30-9.00am,19 October 2012Hotel Northbridge, Perth

TAS Breakfast Briefing7.30-9.00am,19 October 2012Hobart Function and Convention Centre

OCTOBERSecurity Industry Leadership Program23-25 October 2012Macquarie Graduate School of ManagementTalavera Road (Opposite the M2 - betweenHerring and Culloden Roads)Macquarie Park NSW 2113

2013Security Industry Leadership Program19-21 February 2013Melbourne Business School200 Leicester StreetCarlton VIC 3053

2013 Australian Security IndustryAwards for ExcellenceNominations open for the 2013awards on the 1st October 2012

The awards dinner will be held on the 2nd May2013 at the Park Hyatt Hotel, Melbourne.

NOVEMBERVIC Breakfast Briefing7.30-9.00am,23rd November 2012Quality Hotel Batman's Hill on Collins623 Collins Street, Melbourne

NSW Breakfast Briefing and National AGM7.30-9.30am,28th November 2012Mantra Hotel, Parramatta

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 50

Page 51: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 51

Page 52: Security Insider Aug/Sep 2012

INSIDER_Aug/Sep 2012 Iss3_52pp 5/8/12 10:09 PM Page 52