Security Insider Magazine: Vol: 21 | Issue 1 | Apr/May 2016

Page 1

SECURITY

THE MAGAZINE FOR SECURITY PROFESSIONALS

MAGAZINE VOL.21 | ISSUE 1 | APR/MAY 2016

THE ROLE OF

PRIVATE SECURITY IN

SUPPORTING POLICE RESPONSES TO

DOMESTIC VIOLENCE 81 18

PP255003/02390

2016 AUSTRALIAN SECURITY AWARDS FOR EXCELLENCE NOMINATIONS NOW OPEN


Trust SCSI for all your Security & Communication needs..

DirectConnect is a 4G Fixed IP Address SIM Service that allows secure connections via PC or Mobile devices to CCTV, Access Control, BMS, Medical Alerts and IP devices via SCSI Dedicated VPN Network. The power and flexibility of BOLD’S Central Station Monitoring Automation Software enables you to increase revenue, Improve efficiencies and offer new revenue streams to existing and new customers.

SCSI’S DirectWireless is the most cost effective, Australian made, reliable, wireless alarm communicator that connects you to Australia’s only dedicated Private alarm transmission network, DirectWireless.

SecureCall portal is an extremely powerful tool used to monitor rebates via reports and search tools over all alarm traffic.

OUR PRODUCTS:

PLATINUM SPONSOR:

POWERED BY:

www.scsi.com.au . sales@scsi.com.au . 1300 555 570


DirectConnect NEW 9 Fixed IP Sim Service

9 Optus and Telstra flexible data plans

9 Secure VPN Connection

9 4G high bandwidth data rates

9 CCTV, Access Control, BMS, Medical and IP Device supported

9 All NVR’s supported

BOLD Technologies 9 Central monitoring automation software 9 Increase revenue and improve efficiencies 9 Offer GPS Tracking and Lone worker

9 Change Truly automated and autonomous to Virtual Operator & Bidirectional Text 9 Social Media monitoring 9 Failover to multiple locations

9 Alarm verification

DirectWireless 9 IPhone and Android support

9 True end to end polling

9 Self activation

9 10 year warranty

9 Over the Air Download to over 20 panels

9 NBN Ready

9 Australia’s only private security network

9 Plug ’n’ Play alarm panel connections 9 Dual Sim 3G Technology

SecureCall 9 Receive rebates on all inbound 1345 calls

9 Zero network access fees and no monthly fees

9 Paid directly by Optus

9 Maintain ownership of your 1345 number

9 No lock in contracts

www.scsi.com.au . sales@scsi.com.au . 1300 555 570


INSIDER_Mar/Apr 2014 Iss1_48pp

31/3/14

7:27 PM

Page 6

CONTENTS CONTENTS VOL.21 | ISSUE 1 | APR/MAY 2016

VOL.19 | ISSUE.1 | APRIL 2014

30

22

HOW PRIVATE SECURITY CAN

SECURITY 2014 SUPPORT POLICE RESPONSES BREAKS INTO TO DOMESTIC VIOLENCE MELBOURNE

10

18

24

STRATEGIES TO COMBAT THE CROWD SCIENCE: SAFETY AND CHANGING SECURITY THREATS ANALYSIS PROMOTING THE USE RISKTHE NBN - WHERE AND OF CHALLENGES ASIAL MEMBERS TO NOW?

REDUCTION THROUGH DESIGN

09

06 | President’s message 08 | Nick Kaldas makes his 08 | President’s message last ASIAL address as Deputy 09 | Security 2014 Gala dinner Commissioner of the NSW and conference Police Force 10 | Privacy legislation changes 12 | Are you sticking your neck out? 14 | ASQA inquiry 14 | NBN update: Migration 16 | 2014 Australian Security Assurance Policy released Industry Awards for Excellence

ASIAL Strategic Partners:

4 | April 2016 | SECURITY INSIDER 6 //SECURITY INSIDER APR 2014

30 CPTED TO SAFE: 24FROM THE EVOLUTION OF CRIME

16 | The Security Exhibition & Conference unites the industry 20 | Changes to specialist cabling once again in Melbourne competencies 22 | Recognising excellence within 32 | Help your employees catch the Australian security industry their super 28 | What security professionals 34 | A busy year ahead in Workplace need to know about the ICE Relations epidemic 36 | ASIAL new member listing /

ARE YOU PREPARED?

32 35 37 | 36 38 | 42 | 40 42

| Leading Australia’s Anti- Terrorism Efforts Back to Grass Roots Recognition program | ASIAL Monitoring Centre ASIAL Monitoring centre Certification listing certification listing | Avoiding Unfair Dismissals Hot products for Small Business ASIAL Calendar of events | Hot products | ASIAL Calendar of Events


Introducing the ALL NEW

LITE The T4000’s little brother has arrived. Boasting a lightweight price and a little less hardware without compromising on simplicity and performance.

• Simple plug and play installation • Ultra-fast 3G network connectivity • Dual SIM network technology • Compatible with common alarm systems • High level integration with Inner Range Integriti & Concept systems • Over-the-air upload/download to compatible alarm systems • Contact-ID and IRFast with text formats

0

IN

AU

IGNED

IA

S DE

STRA

L

For more information contact Inner Range: T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com


PRESIDENT’S PRESIDENT’S MESSAGE MESSAGE

Showcasing the significant AVOIDING INCONSISTENCIES contribution our industry makes IN STATE-BASED to the Australian economy LICENSING REQUIREMENTS A fter more than a decade, the Security 2014 Exhibition and Conference returns to Melbourne in early June. Judging by the strong n my last President’s I response from exhibitors,Message, the long awaited spoke about the Australian Skills return has been well received.This year’s Quality Authority (ASQA) event will run from the 4-6th strategic June at the review ofExhibition security industry training Melbourne & Convention which documented a number of key Centre. findings andnearly recommendations. From It is now 30 years an ASIAL perspective since a small group ofmany ASIALof these findings not new revelations and we industry are representatives have raisedthe them the State and organised firstwith industry Territory Regulators timetoand exhibition. It is pleasing seetime again, that event to go to nothe avail. I amcontinues talking specifically about from strength to strength and the Mutual Recognition Scheme which provideRTO’s an opportunity for the allows and students to exploit industry to showcase the inconsistencies in state-based licensing impressive array of products and services requirements by obtaining a licence in offers.Through the ongoing partnership ait different jurisdiction to where they live between and intendDiversified working. Communications Australia and ASIAL, Association Subsequent to thethe release of the continues play a key role helping review, theto Association has in again metto showcase the industry’s capabilities. with Regulators to seek their opinion expanded andThis findyear’s out what action,exhibition if any, willfloor space and outstanding conference be taken to address the findings and program provides an excellent recommendations of the ASQAopportunity report. to As view the latest security technologies, yet, there are no tangible hear from internationally renowned indications of what actions will be taken experts, as well as network and socialise to address what has been a failure of the with industry colleagues from across the regulatory system to control the quality of country. vocational training delivered to security Another important industry event I personnel. would like to bring your attention to is the Following the release of the ASQA 19th Annual Australian Security Industry strategic review, the ABC’s 7:30 Report Awards for Excellence to be held in shone a spotlight on the apparent ease Sydney on the 23rd October 2014. Our in which a security licence applicants industry performs an increasingly with minimal English literacy skills and a important role in the Australian economy tourist visa can obtain a security licence and it is important that this is recognised in NSW. The program highlighted actions through awards programs such as this. taken against a Queensland based Nominations are now open for the awards, RTO who it is to alleged soldlodging answers so I urge you consider anto individuals undertaking security training. application. Further details are available on The report also raisedthe concerns about page 28 and through ASIAL web site. the Later use ofthis theyear mutual recognition ASIAL’s board elections scheme which hasby seen 50 per cent will be conducted the over Australian of all new licence applications in NSW Electoral Commission. Members will be coming this path. notified through in due course by the AEC about

I

610| //SECURITY April 2016 | SECURITY INSIDERINSIDER JUNE 2014

arrangements for the election.This process allows for every Duly Authorised Representative of a financial corporate member the opportunity to submit a So, vote. as an employer, what can you postal do In tomy identify and President’s eliminate individuals previous Message, I who have obtained licences of from wrote about the importance good questionablepractices. RTOs? Simply a few governance Failureasking to do the more questions as part of your right thing more ofteninterview than not process, would be aingood start. For will result negative example: consequences for your • What is organisation. the name of the RTO who provided the II? ASIAL AsCertificate an Association • How long did the trainingits take? actively enforces of Conduct, • Did youProfessional receive yourCode Certificate II a position matched by our training in the State in which you are ASIAL Board’s licencedactions.The and working? recent to expel • How long weredecision you resident in Hootspah PtyinLimited fromunderwent its the State which you membership training? and to impose a $120,000 financial and your specific • Have sanction you received licence for the compliance requirements Kings State in which you wantontothe work via Security Group highlights this.The mutual recognition? continuation the Kings Security By askingof more questions, youGroup’s will be ASIAL membership was conditional on better informed when making a decision accepting and complying with payment on the skillset of the applicant and their of the sanction and meeting specific suitability to provide quality service to compliance requirements.The company your business. advised that it was unable to maintain its On another note it was disappointing membership as required by the ASIAL to hear that NSW’s Deputy Police Board, and as a result their ASIAL Commissioner Nick Kaldas announced membership was relinquished. his retirement from the force. Nick Whilst it is important to learn from the has been a strong supporter of the mistakes of others, it is equally as Association and only recently ASIAL’s important to understand that compliance CEO Bryan de Caires and myself met is not a dirty word. For our industry to with him to discuss opportunities for grow and flourish, it is vital that we greater co-operation between the police develop a stronger culture of compliance. and the industry. We wish Nick all the Finally, I look forward to seeing many of best in the next stage of his career. In the you at Security 2014 in Melbourne or later meantime, ASIAL remains committed to in the year at the 2014 Australian Security working with police across all jurisdictions Industry Awards for Excellence.

to build greater respect and trust.

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: communications@asial.com.au Web: www.asial.com.au Publisher

Editor Bryan de Caires | security@asial.com.au Editorial Enquiries communications@asial.com.au Advertising Tania Laird | advertising@asial.com.au Creative Director Martin Costanzo | martin@webfx2.com.au Graphic Design + Digital Webfx2 Digital | design@webfx2.com.au Editorial Contributors Contributors AON, Chris Delaney and Greg Chris Delaney, Ben Beville, Kelly Jennings Sundberg,

Keith Still+and Kirsty Jagger Print Distribution Print +Advertising Distribution Nationwide Group Fineline bi-monthly Printing Published Published bi-monthly Estimated Readership of 10,000 Estimated readership 10,000do not Views expressed in SecurityofInsider necessarily reflect the opinion of ASIAL. Advertising

Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL.Advertising otherwise stated with permission. All contributions does not imply endorsement by ASIAL, unless are welcomed, the publisher reserves the otherwise statedthough with permission. All contributions are welcomed, though the publisher right to decline to publish or to reserves edit forthe style, right to decline publish to edit for style, grammar, lengthtoand legalorreasons. Press Releases grammar, length and legal reasons. Press Releases to: security@asial.com.au. can be emailed to: communications@asial.com.au. Internet references in articles, stories and Internet references in articles, stories and advertising werecorrect correct at the of printing. advertising were at the timetime of printing. ASIAL does not not accept accept responsibility responsibilityformisleading for misleading Copyright©2016 (ASIAL) views. Copyright©2014 (ASIAL) All Allrights rightsreserved. reserved. Reproduction of Reproduction of Security SecurityInsider Insidermagazine magazinewithout without permission is strictly prohibited. Security Insider is permission is strictly prohibited. Security Insider is a subscription based publication, rates and further a subscription based publication, rates and further details can be found at www.asial.com.au.

does not imply endorsement by ASIAL, unless

details can be found at www.asial.com.au.

[NEXT ISSUE] JUNE 2016 [Next Issue] AUGUST 2014

ISSN 1442-1720

ISSN 1442-1720

Kevin McDonald McDonald Kevin President President


Unrivalled GERMAN quality, Outstanding Performance, Exceptional Reliability!

1

Install the cameras & NAS storage device c25

i25

p25

Mx AU 4 Port PoE Switch

Mx AU NAS

m25

2

Power On

3

Auto Enrol Cameras

4

Customise MxMC VMS

MOBOTIX AU “PLUG N PLAY” WITH 4 EASY STEPS. Preconfigured to meet Australian requirements. 1300 319 499 csd.com.au VIC: Mulgrave, Tullamarine NSW: Northmead, Alexandria ACT: Fyshwick QLD: Loganholme SA: Marleston WA:NOTES Balcatta CCTV INTERNAL RELEASE


INDUSTRY NEWS

NICK KALDAS MAKES HIS LAST ASIAL ADDRESS AS DEPUTY COMMISSIONER OF THE NSW POLICE FORCE

L

ess than two weeks after addressing the NSW Security Industry Breakfast Briefing hosted by ASIAL in Parramatta, Nick Kaldas ended his 34 year career with the NSW Police Force. Mr Kaldas enjoyed a varied career that saw him lead commands such as the Homicide Squad and the Gangs Squad. As an Assistant Commissioner, Mr Kaldas continued to shape the NSWPF Counter Terrorism and Special Tactics Command as the country’s first specialised state-based counter terrorism command. In more recent times he implemented strategies that ultimately saw a significant reduction in gun crime, particularly in metropolitan Sydney. He was also a Corporate Spokesperson for Cultural Diversity. When Mr Kaldas addressed the NSW Security Industry Breakfast Briefing he said “I see nothing but friends and allies in the room. We are as one.” He then went on to encourage greater collaboration between police and private

8 | April 2016 | SECURITY INSIDER

security in fighting crime, especially terrorism. “The September 11 report talked about the failure of imagination; nobody was sitting and thinking about what was possible, what the enemy was conjuring,” he said. “For you in the industry and for us [in law enforcement], we’ve got to recognise that this is something that’s evolving and its evolving quite rapidly. They’re not standing still, they are trying new and innovative things to hurt us. And we all have an obligation to sit and think about that sometimes, work out what it means for us in our various roles and then try to deal with that. “There is a difference between being in charge and taking charge.

You’re all in positions of leadership and you have an obligation to actually take charge. “You can’t wait for the balloon to go up. It’s best to do things when there is no crisis, to think and to prepare and to exercise, if you can, when there is no problem - because when it comes up it will stand you in good stead.” Assistant Commissioner Geoff McKechnie APM will be acting Deputy for the immediate period ahead. Report possible signs of terrorism to the National Security Hotline number on 1800 1234 00. Trained operators are available 24 hours a day, seven days a week, and you can remain anonymous.



INDUSTRY NEWS

STRATEGIES TO COMBAT CHANGING SECURITY THREATS AND CHALLENGES If the heading caught your attention, you should definitely visit the 2016 Security Exhibition & Conference. Australasia’s premier security industry event will be held at the Melbourne Convention and Exhibition Centre from 20-22 July 2016. Registrations are now open.

Security Conference, 20-21 July Bringing together leading local and international security experts, ASIAL’s Security 2016 Conference will discuss strategies to combat the changing security threats and challenges faced by business, government and the broader community.

Speakers Among the speakers confirmed are: • Duncan Lewis AO, DirectorGeneral, ASIO • Mark Duckworth, Chief Resilience Officer, Department of Prime Minister and Cabinet • Roman Quaedvlieg APM, Commissioner, Australian Border Force • John Yates QPM, Director of Security, Scentre Group & Westfield Corporation • Dave Crossley, Head of Security, Emergency Planning and Response, Sydney Opera House • Caroline Sapriel, Managing Director, CS&A International Risk & Crisis Management (USA) • Professor Keith Still, Director, Crowd Risk Analysis (UK) • Kelly Sundberg, Associate Professor, Mount Royal University (Canada)

Read guest contributions by Dr Still and Dr Sundberg from pages 18 and 24 respectively.

10 | April 2016 | SECURITY INSIDER

Registration Register for the conference at securityexpo.com.au.

For more information including early bird discount details, please see www.securityexpo.com.au

A limited number of sponsorship and promotional opportunities are available for the 2016 Security Exhibition & Conference. For more information email: advertising@asial.com.au.

Conference and Conference Satchel Sponsors

Find out more about the Security Exhibition and Gala Dinner by turning to page 16.


QUANTUM DELIVERS

an intelligent, scalable storage platform to build the new video surveillance and physical security infrastructure.

Addressing the challenges created by more cameras, higher resolutions, and increasingly complex analytics, Quantum solutions enable customers to maximize critical data value by storing, sharing and preserving digital assets over their entire lifecycle.

Find out more from Quantum ANZ: ANZsales@quantum.com or 1 800 999 285 (Aus) or 0800 105 999 (NZ) www.quantum.com/video-surveillance


INDUSTRY NEWS   

ARE YOU STICKING YOUR NECK OUT?

Raising awareness of members among consumers, ASIAL’s high visibility Consumer Awareness Campaign is underway around Australia. The #SecureBiz campaign kicked off in February, with digital screens in 268 premium CBD office towers of Perth, Adelaide, Melbourne, Sydney, Canberra and Brisbane. 85 per cent of the network is made up of SME organisations, with the remainder being corporate/multinational and government. The campaign had approximately 1, 126, 077 viewers. Phase two of the campaign comprised airport advertising in Sydney, Melbourne, Brisbane, Adelaide and Perth domestic airports, targetting 100 per cent of all departing and arriving passengers, as well as every entry and exit to the Qantas Club and Business Lounges. As Security Insider goes to print, this campaign is still running. Results will be shared in the next edition of the magazine. For the remainder of the year, ASIAL has a busy schedule of print, digital and social media advertising.

GET INVOLVED 1. Use your logo: This national campaign will boost ASIAL brand awareness; we’ll be telling

12 | April 2016 | SECURITY INSIDER

                       

consumers to look for the ASIAL member logo, so make sure you are using yours! Place the ASIAL logo on your website, business cards, other marketing materials and social media. 2. Order your free member stickers: We have free ASIAL Member Logo stickers for your vehicles and/ or office door/windows – email membership@asial.com.au to request yours today. 3. Self-promote: Utilise the SecureBiz Quiz as a free marketing resource; it may encourage former and/or prospective clients to re/ engage with you.Your services will certainly be front of mind if they connect with the SecureBiz Quiz because you shared it on your website, social media, in your email signature and newsletter. 4. Add it to your pitch: Trying to

get a client across the line? Send them the SecureBiz Quiz link: www.securebiz.com.au. It will act as a third party endorsement, from the peak body for security professionals in Australia, of the fact that they need to consult with a licensed security professional who is an ASIAL Member. 5. Get social: ASIAL will be promoting the SecureBiz Quiz and engaging with participants on Facebook, Twitter and LinkedIn, Make sure you’re connected with us so you can engage with end users too. *If you’re offering Home Security Services, www. homesecuritychallenge.com.au remains active, so you can share that in place of www.securebiz. com.au.

   

  




                          

   

 

                                                                                                                                          

   



 



  





  



   


INDUSTRY NEWS

NBN UPDATE: MIGRATION ASSURANCE POLICY RELEASED The Government has released its Migration Assurance Policy (MAP) to support the transitioning of existing broadband and phone services customers by limiting the disruption during the switch-over to the fixed-line national broadband network (nbn). In urban areas and townships across Australia, the nbn is replacing Telstra’s fixed line network which is compulsorily switched off 18 months after the nbn is activated in a rollout region. To date, 154 regions around Australia have reached their compulsory disconnection date, representing a footprint of over 300,000 premises. Throughout 2016 alone, the number of regions reaching their disconnection date is expected to triple. For the customer, the transfer to the nbn will involve the installation of new equipment, increased download speed and a predictable smooth migration experience. The MAP statement thoroughly outlines a number of assurance principles and sets out expectations concerning the roles and responsibilities of service providers to ensure the migration process is predictable and straightforward for consumers. A smooth migration process will be essential in coming years as the nbn rollout gathers

momentum. nbn’s three-year rollout plan will expand the network footprint to include more than nine million homes and businesses across Australia by the end of 2018. This new policy is the result of extensive collaboration between the Australian Government, NBN Co Limited and Telstra, and informed by feedback from stakeholder consultations, industry and public submissions on the draft framework. The MAP emphasises the importance of consistent and accurate information and data sharing between parties to make connecting to the fibre nbn troublefree. It establishes four critical pillars which underpin the successful switch-over from Telstra’s copper and HFC networks to the NBN fixed line network. The four pillars that support successful migration are: 1. Serviceability – to ensure a working service is available at the premise when an order is placed. 2. Product availability – a suitable product range to meet consumer needs; 3. End-user awareness and management – the need for consistent and timely information and support for households and businesses; and

4. Installation and activation – the timely completion of orders for an nbn service. The MAP Policy resolves network shortfalls which caused extended waiting times for connections; ordering system errors; and inconsistent data which led to missed appointments and occasional unexpected disconnections. Other early migration problems that are being addressed included inappropriate equipment placement, accuracy of information from installers, and general consumer understanding about the nbn installation process. The policy and framework will be updated as needed over time, including addressing any additional migration issues as they arise and the documents are available from the Communications and Arts website: www.communications.gov.au/newpolicy-guide-nbn-migration.

THE WORLD DAY FOR SAFETY AND HEALTH AT WORK An annual international campaign to promote safe, healthy and decent work, the World Day for Safety and Health at Work is held on 28 April. In the lead up to the campaign, ASIAL is raising awareness of the need for all businesses to have a Safe Workplace Management System in place. The WHS Act 2011 places significant obligations on ‘officers’ of a company to be able to demonstrate their active participation in the practical implementation of WHS preventative measures. Breaches can attract fines and penalties of up to $3

14 | April 2016 | SECURITY INSIDER

million per breach of a corporation and $600,000 per breach for an individual, and up to five years imprisonment. While most approach their obligations with the best of intentions, WHS compliance can be complex and time consuming. Even the most well meaning ‘officers’ risk being in breach. Imagine being able to safeguard against breaches in as little as 15 minutes per week...

ASIAL Members now have exclusive access to Safe Workplace Management System that creates a Workplace Health & Safety plan tailored to your business within minutes of signing up. It keeps you informed of your obligations, safeguarding against costly breaches. It’s accessible anytime via any internet enabled device. And it only costs $275 per annum (including GST). Find out more at www.asial. com.au/resources/whs.


Meet your WHS obligations in 15 minutes per week

Available to ASIAL members for $275 (incl GST) per annum The ASIAL Safe Workplace Management System is a total WHS system, designed to AS4801 and tailored to the Australian security industry: Includes an office account and a mobile account accessible to manpower/electronics security staff in the field Creates a WHS plan for your business and sends automated email reminders Stores forms, incident reports, photos, licence and insurance details for your business, employees and contractors

Watch video demo at www.asial.com.au/WHS


ADVERTORIAL

THE INDUSTRY UNITES AGAIN IN MELBOURNE

R

egistrations are now open to attend the 2016 Security Exhibition & Conference; Australasia’s premier security industry event, which is returning to the Melbourne Convention & Exhibition Centre from 20-22 July, following another outstanding event in 2015. The Security Exhibition & Conference connects a community of leaders and showcases the most innovative solutions to hit the Australian market, supporting the future direction of the security industry. Security will once again be the ‘must attend’ event to keep up-todate for all security professionals - from installers and integrators to end users and consultants - uniting more than 4,500 attendees with 150 leading suppliers in the security industry, including Honeywell, Dahua Technology, Assa Abloy, Samsung, EVVA, Hikvision and Gallagher. Security 2016 Event Manager, Alanna Phillips, said: “Held in Sydney for 12 consecutive years, it’s great to remain in Melbourne for a third year, to consolidate relationships and to nurture business in this market. The event is a three day showcase of the latest business solutions, live demonstrations and a world class

16 | April 2016 | SECURITY INSIDER

conference.” “Security presents a yearly opportunity to reunite with the best in the industry while discovering and experiencing the latest, cutting edge products and innovations to hit the Australian marketplace from video surveillance, access control, networking and integration, alarm systems, perimeter security and much more,” Ms Phillips said. Other key features of the 2016 event include: The ASIAL Conference program – Aimed at security end users, offering a tailored education experience across three days, the ASIAL conference program features a world class line up of expert speakers. See page 10 for details. The 2016 Security Gala Dinner - Hosted in partnership with the Australian Security Industry Association Limited ASIAL, the annual dinner is held to celebrate, reward and engage security professionals, suppliers and clients from across the country. Taking place on the first night of the exhibition and conference at the stunning Plaza Ballroom at the Regents Theatre in Melbourne’s CBD, the Security Gala Dinner is the industry’s ‘must attend’ networking event incorporating a

three-course meal, fine wine and great entertainment. Tickets will be available soon! Live Demonstrations – Due to popular demand, live demonstrations will offer attendees the possibility for an interactive and tangible form of visitor experience. The live demonstrations will feature an exciting and diverse range of cutting edge technologies and equipment, from a vast host of exhibitors, which will address the growing need for security solutions. The demonstrations will be conducted at exhibitor booths, by technical product experts, with ample space to set up a working system, may it be interactive software on a laptop, a hardware setup or even simulators. Visitors will be able to hear about the most upto-date search techniques used, the equipment used to combat crime, and watch a rolling programme of carefully arranged activities and demos, all in safe and secure surroundings. Join us for more progressive security innovation, education and industry schmoozing in Melbourne from 20-22 July 2016. For more information on the Security Exhibition & Conference visit: www.securityexpo.com.au.


REGISTRATION NOW OPEN SOURCE

LEARN

NETWORK

1000’s OF PRODUCTS & SOLUTIONS

THE LATEST TRENDS & TECHNIQUES

WITH YOUR INDUSTRY PEERS

PRINCIPAL EXHIBITION SPONSOR

LEAD INDUSTRY PARTNER

ORGANISED BY

LIMITED EARLY BIRD PASSES AVAILABLE FOR THE ASIAL SECURITY CONFERENCE

REGISTER ONLINE NOW SECURITYEXPO.COM.AU


SAFETY AND RISK ANALYSIS

CROWD SCIENCE:

SAFETY AND RISK ANALYSIS g

By Prof. Dr. G. Keith Still

ABSTRACT “Before beginning, plan carefully.” Marcus Tullius Cicero (106 BC - 43 BC) “The single biggest problem in communication is the illusion that it has taken place.” George Bernard Shaw (1856 - 1950) The conventional approach to risk assessment, for crowds in places of public assembly, is to evaluate the likelihood and consequences of an accident or incident and then to multiply these two numbers together. The risk assessment documentation is presented as a table that includes the total, a brief description of the risk and an equally brief risk mitigation note. The table based approach to risk analysis represents the risk as a static value, one number, one description, and fails to describe the basic characteristic of places of public assembly; crowds are by their very nature, dynamic. We need a new approach to understanding crowd risks and a method of defining the dynamics risks for major events. The conventional approach is flawed for several reasons. • Numerical bias in estimation risks • The process is often marginalised (cut and paste from previous documents) • Information is lost in the process.

18 | April 2016 | SECURITY INSIDER

NUMERICAL BIAS The typical risk analysis classifies the potential risks into two defined values. The first is called the likelihood of the risk occurring, the second is the consequence of the risk occurring. These are typically shown as a multiplication table similar to the one below.

When you multiply these two numbers you define a single value which is then assigned to a specific risk. A score of less than 5 will be a “low risk” a score between 5 and 10 will be a “medium risk” and a score of 10 or above will be a “high risk.” From a numerical perspective, there are 10 boxes defined as “high risk” definition (10/25 = 40%), 8 boxes that are less than 5, “low risk”, (8/25 = 32%) and the remaining 7 boxes are medium risk (7/25 = 28%). 68% of the table is therefore biased towards “medium” and “high risk”. The process of multiplying two numbers biases the table towards the higher risks, hence the final value is typically higher than

expected. This bias fundamentally over-estimates the “value” of the risk. There are numerical methods of removing this numerical bias, but these are rarely used in the events industry. Also, the assignment of a single value can be both inappropriate and misleading for any risks that are dynamic in nature.

MARGINALISATION The process of completing a risk assessment takes time. The risk assessor has to visualise the risk, define the likelihood and consequences of the risks, describe the risk, define the mitigation process and then document the risk assessment. There are software database systems, form filling tables, that expedite this documentation process, but this is just the start. In itself, the risk assessment/documentation does nothing, the process of risk management is not solved by filling in the forms. Equally it takes a lot of time to read the risk assessment, to


SAFETY AND RISK ANALYSIS

process the information, to revisualise the risks and define an action plan for crowd management. Over the last 25 years, and specifically, as an expert witness in prosecution cases, the risk assessment document is one of the first documents that are scrutinised. Failure to adequately define the risks to the individuals in a crowd are one of the simplest things to identify from the risk assessment and risk management plan.

risk assessment “anticipated crowd capacity and ensure facilities are adequate” is missing at least three elements of information. Location – where in the system does this apply? What are the anticipated crowd capacities and arrival rates? Which facilities are there likely to be problems? How would we recognise those problems? What is the definition of “adequate”? Duration – the entry system may

have specific time that the risks are higher (for a football match this may be the last 15 minutes before kick off, for a concert this may be several hours prior to gates open). Elements around the site may also have time related risks such as transport terminals. There is no provision in the risk assessment template to outline duration? Severity – the risks may fluctuate, may be dependant on external factors. For example, crowd crushing may be a result of weather (seeking shelter), of transport delays, arrival of a celebrity, there are many factors that can influence the number of people in specific sections of an event and the risks need to relate to this dynamic. Severity can be a function of the difference of the arrival rate and the throughput rate. Some queueing may be necessary.

THE IMPORTANCE OF A RISK ASSESSMENT When investigating major incidents, the risk assessment one of the first

MISSING INFORMATION The third, and most important point, of the crowd risk analysis process is that is fails the basic principles of Information Theory (Shannon 1949). It is impossible to reconstruct the conditions that give rise to many crowd related risks, risk that are dynamic in nature, from the risk assessment documentation. The process described above produces a single number, a static value. Crowds are dynamic in nature, and crowd risks can change over time.

INFORMATION THEORY FAILURE We stated that the standard form of the risk assessment fails the principles of information theory, in that the information is recorded and, at some point in the future, someone else need to pick up this document and decode the record back into useful information. For example, the statement in the above

Learn more about crowd safety and risk analysis by attending the 2016 Security Exhibition & Conference from 20-22 July 2016 at Melbourne Convention & Exhibition Centre. Dr. Still will be delivering a keynote presentation and half-day executive briefing as part of the ASIAL Security Conference. More information can be found at www. asial.com.au/events/category/securityconference-exhibition. SECURITY INSIDER | April 2016 | 19


SAFETY AND RISK ANALYSIS

documents to be reviewed. One of the key questions is: “Did the event organiser, approval/licensing/permitting officer and operations teams understand the risks during the event?� Clearly, if the process has been poorly documented, individuals and organisations are potentially open to claims of negligence. To illustrate how the process can (and does) go wrong let us work through an example.

CROWD RISK ARE DYNAMIC We need to understand the dynamics of risk for crowds. An event will typically have three primary phases of crowd movement, ingress (where the crowd approach the venue and pass through the entry system), circulation (where the crowds move around the various points of interest within the event) and egress (where the crowds leave the event). We can have an emergency during ingress, during circulation (midevent) and during egress. So there are three distinct periods, each of which should require a normal and emergency/contingency plan. This is often overlooked and an evacuation plan will typically only refer to the mid-event emergency. However, if the crowd are in the process of entering a system and there is a need to evacuate at that time, it is a very different set of challenges than a mid-event evacuation. Two things should now be obvious. The first is that the form above does not lend itself to the necessary description of the dynamics of crowd risks. The second is that a single value (medium, high, 15, etc.) does not represent risks that have a specific duration that may be high for a short time, then zero for the duration of the event. If we consider the risk of crowd crushing during ingress/entry systems, this page is a recent image from a USA stadium.

20 | April 2016 | SECURITY INSIDER

A trip, slip or fall in this area could have fatal consequences, but this is a very short duration, outside the stadium, not noticed by the staff (inside the stadium) who are all busy.

VISUALISING THE DYNAMICS OF RISK The challenge was to devise a method that would both be simple to implement, and provide useful information for the person who both

evaluates and manages crowd risks. We need to identify the following: Location - Risk may be focussed on a specific location. Duration - Risk may exist for a specific time Severity - Risk may have different levels of severity at different times We can do so by mapping the risk. Rather than try to explain the process, let us show you a dynamic risk map. There is timeline across the top, and red amber


SAFETY AND RISK ANALYSIS

green represents the congestion in these locations, at those times.

We can see in a few images, the evolution of the crowd dynamic (and

congestion over time). They say a picture is worth a thousand words, try and describe these images in words and you’ll see how much information is transmitted in a few simple diagrams.

CONCLUSION The conventional approach to risk assessment using a static number and notation often fails to describe the potential problems, specifically for crowd movements in places of public assembly. A competent person can calculate the volume and capacity of the system, but the information can be lost in translation. A picture paints a thousand words, a thousand words in a risk analysis or event plan can be difficult to visualise. Try drawing your event, illustrating the crowd flow, the directions of approach. Try colouring areas of high-risk red, medium risk orange and low risk green. Do this for a series of diagrams, each illustrating a part of the site at a different time. You have now mapped the dynamics of risk in such a way that a layperson can pick up the document and understand the location, duration and severity of a dynamic risk. The test of your risk assessment should always be related to the information it presents to the reader. If a layperson, someone unrelated to your event, cannot understand the document, then you need to ask yourself, is this fit for its intended purpose, would this stand up to scrutiny in a court of law?

ABOUT THE AUTHOR: Prof. Dr. G. Keith Still FIMA FICPEM SFIIRSM MEWI FIPM the Professor of Crowd Science at Manchester Metropolitan University (UK) running a MSc programme in Crowd Safety and Risk Analysis. He develops and teaches a wide range of international crowd safety and crowd risk analysis short courses for event organisers, police, first responders, emergency planners, city authorities, building control and licensing officers. His courses have run at the UK Cabinet Office Emergency Planning College, Universities and client sites around the world for over 25 years. Over the last two decades, Keith has consulted on some of the world’s largest, and most challenging crowd safety projects in the world. He is a Fellow of the Institute of Mathematics and its applications. (FIMA) a visiting Professor of Crowd Science (Bucks New University), a regular visiting speaker at Easingwold (the UK Cabinet Office Emergency Planning College 1999 - 2014), a member of Mensa for over 30 years, a Fellow of the Institute of Civil Protection and Emergency Management (FICPEM), a Specialist Fellow of the International Institute of Risk and Safety Management (SFIIRSM), the Professor of Crowd Science Manchester Metropolitan University (MMU), a Member of the Expert Witness Institute (MEWI) and a Fellow of the Institute of Place Management (FIPM).

SECURITY INSIDER | April 2016 | 21


AWARDS FOR EXCELLENCE

RECOGNISING EXCELLENCE WITHIN THE

AUSTRALIAN

SECURITY INDUSTRY

In 2016, the Australian Security Industry Awards for Excellence and Outstanding Security Performance Awards again provide an opportunity to recognise companies and individuals across the security sector who have demonstrated exceptional achievement. The Australian Security Industry Awards for Excellence, organised by ASIAL, is now in its 21st year. The Outstanding Security Performance Awards (OSPAs) return to Australia for the second year. And hundreds are expected to attend the prestigious joint Awards Ceremony and Dinner, returning in October to The Westin in Sydney’s iconic Martin Place.

KEY DATES • 8 April 2016 – Nominations open; • 31 August 2016 – Nominations close; • 20 October 2016 – Award winners announced.

AWARD CATEGORIES

Awards for Excellence OSPAs Individual Achievement – General Security Outstanding Individual Achievement – Technical Security Outstanding Individual Achievement – Security Student Outstanding Gender Diversity Outstanding Indigenous Employment Outstanding Special Security Event or Project (<$200k) Outstanding Special Security Event or Project (>$200k) Outstanding Integrated Security Solution (<$200k) Outstanding Integrated Security Solution (>$200k) Outstanding Product of the Year: Outstanding - Alarms Outstanding - Access Control Outstanding - CCTV - Communication / Transmission System 22 | April 2016 | SECURITY INSIDER

In House Security Team In House Security Manager Contract Security Company (Guarding) Security Consultant Security Training Initiative Security Partnership Investigator Police / Law Enforcement Initiative Risk Management Solution Cyber Security Initiative Cyber Security Initiative Female Security Professional


AWARDS FOR EXCELLENCE

The awards criteria can be downloaded from www.asial. com.au/events/event/awardnominations. Cost and conditions of entry • $95 (including GST) per nomination • You may nominate more than once in multiple categories • Any company or individual working in the Australian security industry is entitled to enter • Familise yourself with the awards nomination criteria Judges The 2016 judging panel will include: • Damian McMeekin, Head of Group Security, ANZ Bank. • Mark Edmonds, Manager, Security Capability, Sydney Trains • Vlado Damjanovski, CCTV Specialist, ViDi Labs Pty Ltd • John Adams, Editor, Security Electronics Magazine

• Chris Beatson, Director NSW Police Force, PoliceLink Command Further judges will be announced shortly.

AWARDS CEREMONY AND DINNER Event details Date: Thursday 20 October 2016 Time: 7pm - 10.30pm Address: The Westin, Martin Place, Sydney Cost: $175 per person or $1,650 for a table of 10 (GST included in prices) Bookings: Online (opening soon) Dress code: Lounge suit/cocktail Social media: @asial_au, @ theOSPAs, #SecurityAwards Entertainment Media personality James O’Loghlin is back by popular demand! If you weren’t with us last year, you may recognise James

O’Loghlin from Good News Week, Rove Live, Sunrise, Lateline, The Evening Show and more than 300 episodes of The New Investors. And on 20 October 2016, you’ll spot him emceeing the 21st annual Australian Security Industry Awards for Excellence and second annual Outstanding Security Performance Awards (OSPAs). Between courses awards will be presented to winners and James will provide light comedic entertainment. There will also be an opportunity to pose in front of the photo wall, have your happy snap taken by a professional photographer and network with other security professionals. Visit the website for updates www.asial.com.au/events.

SECURITY INSIDER | April 2016 | 23


CRIME REDUCTION

FROM CPTED TO SAFE: THE EVOLUTION OF

CRIME REDUCTION

THROUGH DESIGN g

By Dr. Kelly W. Sundberg & Dr. Tanya E. Trussler

INTRODUCTION Emerging in 2011, the SAFE Design Standard® methodology (Security Achieved through Functional Environmental Design) represents one of the most significant advances in crime reduction through design in over a decade. What started as a small exploratory study, grew to become a complex and applied analysis of how crime reduction through design could be more effective, efficient, comprehensive, and consistent –– resulting in the creation of the SAFE Design Standard® methodology.

THE EVOLUTION OF CRIME REDUCTION THROUGH DESIGN In many regards, the SAFE Design Standard® reflects and expands on what is commonly referred to as modern Crime Prevention Through Environmental Design (CPTED). The term CPTED was first coined in 1971 by Criminologist C. Ray Jeffery in his seminal work, Crime Prevention Through Environmental Design. Jeffery formalized the notion that crime is in large part the result of opportunities presented within physical environments, and that criminal risks could be mitigated by adapting these environments. Drawing on the scholarship of noted urbanization and design scholars such as Jane Jacobs and Christopher Alexander, as well as social psychologists, sociologists, and criminologists such as Burrhus Frederic (B.F.) Skinner, Daniel Glaser, and Sara Boggs, Jeffery’s proposed that effective crime reduction needed to both reflect 24 | April 2016 | SECURITY INSIDER

and connect social psychology, social ecology, urban planning, and design perspectives. Concurrent with the development of Jeffery’s CPTED, City Planner and Architect Oscar Newman wrote his formative 1972 work, Defensible Space: Crime Prevention Through Urban Design. Similar to Jeffery, Newman noted the importance design played in reducing the risk of crime and also improving overall neighborhood safety. Newman defined ‘defensible space’ as a built environment where physical characteristics such as layout and site plan promoted occupants’ becoming more active contributors to building and site security. Focusing on inner-city housing projects and the imbalanced distribution of crime and building deterioration between project buildings, Newman concluded that crime was more common in buildings where occupants felt they had no control or personal responsibility for their surroundings. In many respects Newman’s Defensible Space was established on the ideas of social control, crime prevention, and public health as they relate to community and building design. Also during the 1970s, UK Home Office researchers Ronald Clarke and Patricia Mayhew began exploring how the daily routines of individuals either contributed to or detracted from their likelihood of become engaged in criminal activity or being victimized. Emerging from this research came the notion of Situational Crime Prevention (SCP), which focused on reducing

criminal opportunities as opposed to addressing offender specific traits. Clark and Mayhew suggested that efforts such as target hardening, improving surveillance, and deterring potential offenders from accessing areas vulnerable to criminal activity, all played central roles in reducing criminal opportunity. Subsequent SCP researchers examined issues such as privacy rights, the ethics of controlling offender mobility, and how socioeconomics potentially impacts criminality. Today, SCP research challenges what characteristically was viewed as acceptable criminal risk by examining the root causes of crime. By moving beyond the simply management of risk, contemporary SCP proposes crime reduction approaches that involve the active participation of community stakeholders in achieving safety and security. Though both Jeffery’s and Newman’s original works received much criticism for being overly simplistic, untested, and narrow in scope, contemporary security experts and applied researchers have since demonstrated the importance


CRIME REDUCTION informed design plays in crime reduction. During the 1980s through to early-2000s, security consultants, educators, and researchers such as Tim Crowe, Garner Clancey, and Severin Sorensen, began developing training programs and technical guidelines that expanded on Jeffery’s, Newman’s, as well as Clarke and Mayhew’s original scholarship. In 1998, Greg Saville and Gerry Cleveland introduced 2nd Generation CPTED, which reflected the psychological and sociological perspectives for achieving community cohesion, health, and security. Since the 2000s, thanks in large part to security experts and applied researchers such as Lawrence Fennelly and Randall Atlas, modern CPTED has come to be interpreted as the joining of Jeffery’s original CPTED with Saville and Cleveland’s 2nd Generation CPTED, and also including the core principles found in Newman’s Defensible Space and Clarke and Mayhew’s Situational Crime Prevention.

FOUNDATION OF CRIME REDUCTION THROUGH DESIGN Since the 1970s, planning, design, and space programming have increasingly been used as central components for reducing the opportunity of crime. Moreover, design has progressively been viewed as a key aspect in causing the users of spaces to become more active players in crime reduction efforts. Although dependent on the specific method or strategy taken, all contemporary crime reduction through design approaches in part are based on the following six interrelated tactics:

barriers and/or security technologies that aid in managing, controlling, and directing users of a property to aid in deterring, detecting, and delaying unauthorized access and use; 3) Surveillance — incorporates open sightlines that allow the observation of space activity and pedestrian movement both within specific spaces and between areas of space transition, and/or using security technologies to monitor areas prone to criminal risk; 4) Placemaking and Activity Support — making design and space programming decisions that take into account surrounding environments and adjoining circulation to encourage the intended and legitimate use of spaces, avoid usage by conflicting groups, and promote mixed space usage; 5) Target Hardening — reducing criminal opportunity by physically reinforcing restricted spaces or areas prone to criminal risk through the use of security patrols, security technologies (video surveillance and alarms), security policies, and physical barriers (tamper and graffiti resistant materials, reinforced doors and windows, and other control elements such as gates and locks);

and, 6) Image and Maintenance — ensuring properties are well maintained, clean, and are damage/vandalism-free to bolster territoriality and encourage stewardship among users. Since the 1970s, researchers have clearly demonstrated that design can meaningfully contribute to enhanced security. This research also establishes that crime reduction through design is an important factor in having an urban environment being viewed as a safe and more desirable place in which to live, learn, work, and play. Considering how CPTED has evolved over the decades, it is no wonder that modern CPTED and related crime reduction through design approaches have increasingly become important considerations when developing buildings, sites, and communities.

THE SAFE DESIGN STANDARD® Specific to the SAFE Design Standard®, property owners now have the opportunity to certify that their property has been specially designed and developed to mitigate the risk and fear of crime. Central to the SAFE Design Standard® is the inclusion of informed and desired design as essential elements for achieving enhanced

1) Territorial Reinforcement, Defensible Space, and Hierarchy of Space — incorporating design elements that clearly distinguish public from private space and promote clear and legible wayfinding in and around a property to communicate ownership and control, and promote stewardship among users; 2) Access Control, Management, and Connectivity — including well defined entrances and gateways, appropriate lighting, and having

SECURITY INSIDER | April 2016 | 25


CRIME REDUCTION

Learn more about crime reduction through environmental design by attending the 2016 Security Exhibition & Conference from 2022 July 2016 at Melbourne Convention & Exhibition Centre. Dr. Sundberg will be delivering a keynote presentation and half-day executive briefing as part of the ASIAL Security Conference. More information can be found at www. asial.com.au/events/category/securityconference-exhibition. security. Moreover, the SAFE Design Standard® uses evidence-based quantified measures that are informed by an analysis of both locational and site-type risk. Likewise, the SAFE Design Standard® considers the evident hierarchical relationship between: 1) Maintenance — based on the broken windows theory and reflective of the modern CPTED, maintenance within the SAFE Design Standard® methodology refers to a property being regularly maintained as a means to establish territoriality and communicate ownership; 2) Access and Wayfinding — drawing from Newman’s emphasis on access control, access and wayfinding refers to the way property entry and exit are managed, effective wayfinding is supported, and unauthorized access and use are in part deterred, detected, delayed, and denied; 3) Visibility and Observation — drawing on Jacobs’ notion of ‘eyes on the street’, visibility and observation refers to the ability to readily identify possible hazards, risks, or threats, with a focus on users being more aware of their surroundings; and, 4) Security and Control Technologies — security and control technologies refers to the use of security personnel and technologies to complement, and at times supplement, design elements intended to detect, deter, delay, and deny unauthorized access and use. By taking a comprehensive, systematic, and evidence-based approach in the assessment of a property’s perimeter, landscape, building

envelope, and interior space, the SAFE Design Standard® supports a more consistent, accurate, and repeatable means for assessing building and site security. What noticeably differentiates the SAFE Design Standard® from other crime reduction through design approaches, is that the SAFE Design Standard® certification is delivered using a model analogous to voluntary environmental sustainability certification programs such as the US Green Building Council’s (USGBC) LEED® rating program and the Green Building Council of Australia’s (GBCA) Green Star™ certification program. Acknowledging the success of these programs, it was felt that the SAFE Design Standard® certification program also should be managed and administrated by a nonprofit organization –– ultimately making it a more objective, accurate, and consistent approach to crime reduction through design. Equally, it was agreed that the SAFE Design Standard® would benefit if all those applying the methodology were first required to demonstrate their understanding of the foundational scholarship that informs contemporary crime reduction through design. Considering this, in 2014 the nonprofit SAFE Design Council was established to oversee and award SAFE Design Standard® certification, deliver specialized crime reduction through design education, and also accredit those professionals applying the SAFE Design Standard® methodology. While accredited professionals autonomously apply the SAFE Design

Standard® methodology to the projects they are involved in designing, developing, and maintaining, the SAFE Design Council ultimately ensures the methodology was applied correctly and in a manner reflective of identified locational and site-type risk. Likewise, the SAFE Design Council also reviews the proposed design modifications prior to there being implemented, to ensure they in fact meet the rigorous requirements of the methodology. In short, by having an independent nonprofit organization managing and administering certifications under the SAFE Design Standard®, property managers and owners can feel confident knowing that the methodology was applied consistently, comprehensively, and accurately.

CONCLUSION Achieving effective physical security is far more than simply installing surveillance cameras, alarms, and other technologies. To truly achieve effective crime reduction through design, planners, landscape architects, architects, engineers, and interior designers need to consider how design and engineering can contribute to security at the commencement of a project –– not as an afterthought when the project has been completed. Moreover, by taking a systematic, evidence-based, and risk-informed approach to crime reduction through design, physical security ultimately will be better informed and optimized. Lastly, when design supports positive social interactions, complements the surrounding community, and aims to retain desired functionality and design attributes, overt and obtrusive fortification can be avoided –– a core philosophy of the SAFE Design Standard®. In essence, informed approaches to crime reduction through design not only reduce the risk and fear of crime, they also contribute to community vibrancy and livability.

Dr. Kelly Sundberg and Dr. Tanya Trussler are tenured Associate Professors in the Department of Economics, Justice, and Policy Studies at Mount Royal University (Calgary, Alberta, Canada) and are recognized internationally as leaders in the advancement of crime reduction through design research and scholarship. 26 | April 2016 | SECURITY INSIDER


Building tomorrow AustralianSuper is for everyday Australians, we help invest your money to create the best possible retirement outcomes. You can have peace of mind knowing your savings are being managed by an awardwinning fund that has invested over $95 billion* on behalf of our members.

We have the highest rating possible from all of these independent rating agencies:

Visit australiansuper.com *As at 31 December 2015. SuperRatings does not issue, sell, guarantee or underwhite this product. Go to superratings.com.au for details of its ratings criteria. Go to australiansuper.com/ratings for details on the Heron Partnership’s rating of AustralianSuper. This is general financial advice only and does not consider your personal objectives, situation or needs. You should read the PDS and other relevant information at australiansuper.com to see if it is right for you. Prepared by AustralianSuper Pty Ltd ABN 94 006 457 987, AFSL 233788


ICE EPIDEMIC

WHAT SECURITY PROFESSIONALS NEED TO KNOW

ABOUT THE ICE EPIDEMIC g

By Kirsty Jagger, Marketing & Communications Manager, ASIAL

Australia is the third highest consumer of methamphetamine, including ice, according to the United Nation’s 2014 World Drug Report. In recent years, ice has been the subject of much conversation - politically, in the media and even in the home. And it has also been a hot topic for the security industry since January, when a police office and security officer were shot by an ice-crazed patient at the Nepean Hospital in NSW. So as a security industry professional, what do you need to know about ice and its effects? What is ice? The Australian Drug Foundation explains: Ice is a stimulant drug, which means it speeds up the messages travelling between the brain and the body. It is a type of methamphetamine, which is generally stronger and more addictive and has more harmful side effects than the powder form known as speed. Ice usually comes as small chunky clear crystals that look like ice. It can also come as white or brownish crystal-like powder with a strong smell and bitter taste. Other names include: Crystal meth, shabu, crystal, glass, shard. According to the Australian Drug Foundation, ice is generally smoked or injected and the effects can be felt in 3 to 7 seconds. It is sometimes 28 | April 2016 | SECURITY INSIDER

swallowed (15 to 30 minutes to feel the effects) or snorted (3 to 5 minutes to feel the effects).

Identifying ice use Emergency Physician at Royal Perth Hospital, Julia George (who is also completing a two year Fellowship in Clinical Toxicology) addressed the Western Australia Security Industry Breakfast Briefing on how to identify someone using ice. “In my experience they’re not generally quiet; They’re often agitated, aggressive and may have bizarre thoughts or behaviour. They can be violent and may be unpredictable. Users can be paranoid, respond to nonexistent stimuli, homicidal, suicidal,” Dr George said. “From a brain point of view, users

experience euphoria which can tip over – with a little too much drug – to agitation and even psychosis. People who are acutely intoxicated with ice may actually be seeing non-existent things, hearing voices, feeling ants under their skin; be convinced that they are being followed or spied on or tortured. “[They] often have so much adrenaline flowing – and so much paranoia about what you might do to them – that they will fight tooth-and-nail and display some amazing strength when they are restrained.”

Principles of safe restraint are paramount – “On the note of restraint, positional asphyxia – whereby a person is restrained in such a way that they suffocate and may die – is a real entity and ice users are at increased risk for this over and above your average Joe.”


ICE EPIDEMIC

Other health complications “In addition, all that adrenaline flowing around increases the heart rate, the blood pressure, the temperature,” Dr George said. “Young people can have strokes or heart attacks. They can rupture the aorta; the major blood vessel leaving the heart. They can push their temperature to 42 degrees and melt their muscles, damage their organs and die of multi-organ failure.” The Australian Drug Foundation says with regular use, ice may eventually cause: • Extreme weight loss due to reduced appetite • Dental problems • Regular colds or flu • Trouble concentrating • Breathlessness • Muscle stiffness • Anxiety, paranoia and violence • Depression • Heart and kidney problems • Increased risk of stroke • Needing to use more to get the same effect • Dependence on ice • Financial, work or social problems

Managing ice psychosis High doses of ice and frequent use are associated with increased risk of developing ‘ice psychosis’. The Australian Drug Foundation advises this condition is characterised by paranoid delusions, hallucinations and bizarre, aggressive or violent behaviour. Professor of Addiction Studies and Services at Monash University and Director of Turning Point, Dan Lubman addressed the recent Victorian Security Industry Breakfast Briefing hosted by ASIAL. He presented research demonstrating that the risk of psychosis increases the more heavily someone is using, and decreases when they use less. “We also know that the more ice

someone uses, the greater the risk they will become aggressive. Drinking heavily further increases the risk of violence,” Professor Lubman said. He highlighted that many people who develop problems with ice also have a history of trauma, which means that they are more likely to become aggressive if they feel that they are in danger or that they are being attacked. “It is important to be aware of when someone’s frustration or anger levels rapidly increase, and how to deescalate the situation in a calm, clear and confident manner. Approaching the person respectfully, addressing them by their name or establishing some rapport is an important first step,” Professor Lubman said. “Listening to their concerns and trying to get an understanding of what the problem is helps you connect with the person, rather than being seen as a threat. It then provides an opportunity to provide the person with clear choices, such as deciding on whether they want to leave calmly and that their concerns will be followed up by the manager or that the police should be called.” While Professor Lubman highlighted the significant role of the lead communicator, he also reinforced the importance of a team approach. “The team should be on standby, and ready to provide immediate assistance if required. Other staff should be moving themselves, other staff and customers out of the situation, so as to reduce risk, and provide a low stimulation environment.” Dr George agreed it was important to know how to deescalate the situation. “I’ve seen many borderline patients who had the potential to escalate and require restraint and sedation, talked down by our excellent security staff or

police officers – having staff trained to do this can make the world of different and avoid many problems with injuries or potential lawsuits or workers compensationtion,” Dr Geogre said “For the purposes of security staff, the priorities should be their safety and then the safety of bystanders and the subject, in addition to trying to figure out which people require medical attention for treatment and assessment of complications.”

Managing overdose If a large amount or a strong batch is taken, it could also cause an overdose. The Australian Drug Foundation advises that if any of the following effects are experienced an ambulance should be called straight away by dialling triple zero (000): • Racing heartbeat and chest pain • Breathing problems • Fits or uncontrolled jerking • Extreme agitation, confusion, clumsiness • Sudden, severe headache • Unconsciousness • Stroke, heart attack or death Director of Emergency at St Vincent’s Hospital and Sydney Hospital for more than three decades, and Senior Australian of the Year 2016, Professor Gordian Fulde spoke to the NSW Security Industry Breakfast Briefing about the importance of knowing First Aid in these situations – most importantly, the recovery position. “The airway is the most preventable cause of death in hospitals and out of hospitals,” Professor Fulde said.“If you lay them on their side, that means the tongue falls forward.You’ve probably saved a lot of people’s lives if you do it often.” Where to go for more information In an emergency call 000. For a full list of state-based and national services see, www.druginfo. adf.org.au/contact-numbers/help-andsupport. SECURITY INSIDER | April 2016 | 29


DOMESTIC VIOLENCE

HOW PRIVATE SECURITY

CAN SUPPORT POLICE RESPONSES TO DOMESTIC VIOLENCE Domestic violence is a serious issue in Australia. Nationally, police respond to an average of 657 domestic violence incidents every day. And almost two people are killed every week in domestic violence related incidents. Recently ASIAL commissioned a report, prepared by Professor Tim Prenzler and Lauren Fardell from the University of the Sunshine Coast, to consider ‘The role of private security in supporting police responses to domestic violence’.

T

he researchers were given a free hand to follow the evidence trail and draw their own conclusions from the available evidence. And they concluded security-based approaches, working with police and domestic service agencies, offer a largely untapped opportunity to assist in reducing the opportunity for offending. The follow is an excerpt from the Executive Briefing. One of the perplexing aspects of the recent and ongoing crisis in Australia around domestic violence is the lack of attention to, and lack of government support for, home security and duress alarm programs. This might in part be an effect of the lack of strict scientific evidence. However, the available evidence

30 | April 2016 | SECURITY INSIDER

associated with these programs would suggest that there is a strong case for all victims to have access to these forms of protection as part of a citizen’s entitlement to safety (Towns, 2014). Available costbenefit data also appear to make a powerful case for these alternatives, or additions, to conventional responses. The present review found that home security and personal alarms offer a promising security-based response for reducing domestic violence in a way that empowers victims and provides tangible and immediate protection. In terms of the wide range of intervention options introduced for domestic violence, security-based methods are the least detached and least abstract for victims and

their children. Home security and personal alarms can be seen and felt and managed in the everyday circumstances of people’s lives: in the place where they most want to be safe – their home – but also in the wider and essential world of work, education, shopping and recreation. In addition to evidence of real reductions in threatening behaviour and reoffending, these interventions appear to contribute to enormous improvements in feelings of safety, providing a liberating effect in reducing or eliminating psychological stress and fear. This report canvassed evidence regarding the potential role of private security in helping to reduce the number of repeat domestic violence incidents, especially in


DOMESTIC VIOLENCE

supporting police responses. The study was unable to identify case studies or other sources involving full experimental designs showing clear evidence of large positive effects. Nonetheless, a number of systematic evaluations were identified, involving a variety of data, which provided strong evidence of the potential benefits of security applications. At the same time, the incomplete but highly promising nature of the evidence means that better research should be the subject of immediate government support. The strongest public policy outcome from the present review therefore involves support for substantive pilot projects in a range of settings around Australia. Adequate funding needs to be made available for either home security or personal alarm projects,

or preferably a combination of both, that include adequate resources for evaluation components – including appropriate comparison groups, multiple impact measures and longterm follow up periods. Overall then, the available evidence indicates that interventions to reduce domestic violence need to occur across a number of domains. One of these involves private security support for police and domestic violence service agencies, especially in the areas of shelter security, home security and personal alarms. Optimal conditions for success include a coordinated program, a dedicated coordinator, and involvement of all stakeholder groups (including police and private security) within a risk-based system that gives maximum control to women.

Mobile personal duress alarms stand out in terms of all-round security. At the same time, the best prospect for a security-based approach to reducing repeat offending over the long-term, and the one that gives greatest control to women, is a combination of a home security program and a duress alarm program. Security-based approaches have a large, and largely untapped, role to play in significantly reducing the opportunity for offending – mainly in terms of breaches of protection orders – across a range of settings inside the home and in the wider community. To access the full Executive Briefing and Report, visit http:// www.asial.com.au/news/domesticviolence-the-role-of-security-insupporting-police •

SECURITY INSIDER | April 2016 | 31


ANTI-TERRORISM

RAISING THE BAR

Leading Australia’s Anti-Terrorism Efforts Back to Grass Roots g

By Ben Beville*

T

here’s a TED Talk by Simon Sinek, based on his book titled Start with Why. If you haven’t at least watched the TED Talk, those 18 minutes could transform your life and your business. Sinek makes the brilliant observation that every single organisation on the planet knows what they do; some know how they do it; but very few know why they do it. The great leaders that inspire us are the ones that start with why, then work towards how to do it, and only then arrive at what they do. Perhaps you’re great at what you do. Perhaps you’re a great security professional, a great business person, a great athlete, or a great parent. Perhaps you know everything about what you do, and everything about how you do it. But why do you do what you do? Why do you get out of bed every morning? Why do you work in this industry? Why do you care about anti-terrorism? In my previous article I proposed that to build our anti-terrorism capabilities, we must begin with three essential core values: Integrity First, Service before Self, and Excellence in All We Do. I also presented the Four Pillars of Capacity Building, introduced to me by the U.S. Navy to develop military training programs for African developing nations: Training & Professionalism, Domain Awareness, Infrastructure, and Response Capability. What I

32 | April 2016 | SECURITY INSIDER

haven’t yet mentioned is that there is another piece that joins it all together: leadership. In this episode of Raising the Bar, I’ll highlight the importance of leadership to develop the fundamentals of training and professionalism. As you read, it’s important for you to have your why in the backdrop. Why do you work in security? Since my last writing I had an extraordinary opportunity to work as a zone 2IC for Summernats, Australia’s largest car show with nearly 2000 participating vehicles and over 100,000 patrons over five days. Special thanks to my good friends at Diverse Training Concepts for giving me that incredible opportunity. Wow! I learned so much about our industry in such a short period! Throughout the event I had approximately 70 security officers I helped oversee, a fairly representative sample of the demographics in our industry. I had officers from diverse nationalities and religions, and I also had officers from very diverse professional backgrounds: IT, engineers, military, and even a PhD whose English was far better than mine will ever be! They all had one thing in common: without exception, every one of them wanted to do a good job. With such a diverse group, the greatest challenge was figuring out how to lead them. I might digress to mention

that I watched two of my officers, foreigners who spoke very broken English, save a man’s life during a medical emergency. Despite the language barrier, they made all the right choices, and I can tell you that you would be extremely lucky to hire officers such as them! This was only the most prominent example, and that week I met many other security officers that were equally extraordinary. Fast-forward to the final day, after days of observing my officers endure all kinds of disrespect from patrons. I was warned this day would be chaotic; patrons no longer cared if they got evicted, and many would seek to make a glorious exit on their way out the gate. By the third mid-morning incident I decided I had enough. I went out on the road and showed my young officers how to stand a proper guard. “If you look bored and tired, they will not respect you,” I said to them. “You need to look alert, like you’re ready for anything!” I explained to them exactly what I wanted: stand this way, feet and hands like this; stand tall; chin up; chest up; every time a car drives by, you look that driver in the eye! I’m probably not telling you anything you don’t already know, and I have no doubt they had probably heard it all before, but I don’t believe anyone had ever showed them. I set up, shall we say, a pseudo-


ANTI-TERRORISM

military checkpoint by one of the unattended exit gates. Then I was constantly on the radio to them: take your hands out of your pockets; don’t sit down; stop playing with that water bottle; get off your phone. I didn’t just tell them what to do; I went out there and did it with them. Suddenly something remarkable began to happen before my eyes. Within 15 minutes they started to vaguely resemble a team. They were standing out there on that road as they had done all week, but something was different now: they were doing it together. They started to show an element of pride, and would you believe, even a hint of selfconfidence. And let me tell you, within the hour they were slowly starting to look like professional soldiers! It was an intimidating sight. I know because I could see the drivers coming from a distance. Some drivers would punch the accelerator with a lead foot, and when they got close enough to see the team of now confident, assertive officers looking them straight in the eye, they immediately jerked their foot off the pedal without anybody having to say a word. I taught my officers to offset that intimidation by being ultra-friendly in their interactions with patrons. With our body language doing all the commanding, we didn’t have to bark orders at our patrons. I introduced my officers to a revolutionary concept

that had previously escaped them: treat your patrons with respect, and they will respect you in return! We had zero incidents for the remainder of that shift. That’s right, I said zero! In the military we have something called military bearing, which I believe is a fundamental skill every Australian security professional must be able to master. If you’ve ever served a day in the military, the mere mention of the term should rock you to your core. The U.S. Marine Corps, an organisation which is arguably the world’s leading expert in military bearing, defines it as “the way you conduct and carry yourself. Your manner should reflect alertness, competence, confidence, and control.” Or to quote an official blog by Sergeant Major Michael S. Burke, it’s an air “... not to be %&@#!* with.” “It’s not just about giving off a bad-ass vibe,” he wrote,“because any thug can be a tough guy. A Marine should be firm, courteous, tactful and leave you with the impression that if the wolf came knocking he’d kick the wolf’s tail for you.” Exactly how is it that Marines are able to achieve such a high level of professionalism and military bearing, even despite the wide diversity of recruits coming from so many backgrounds and walks of life? Simply put: training. If you work in security in any

capacity, that makes you my brother or sister in arms. Today we might compete for new business; tomorrow we might be called to defend this country. We’ll need that level of comradery to be successful. As your brother in arms, I need you to understand this: if you’ve ever complained that the people under your command aren’t trained or competent enough to provide a superior level of service to your customers, then I can tell you exactly where to find the problem. Our problem isn’t a people problem; in fact, it isn’t even a regulatory problem. Our problem is a leadership problem, and I believe that’s something we can influence and change. Throughout my short time in this industry I’ve observed that many of our officers are extremely competent. I’ve seen it with my own eyes! Unfortunately, I’ve also observed that a great many others in our industry are untrained, lack discipline, and lack military bearing. They have all the required licenses and certificates, yet they lack the fundamental skills to be proficient in their duties, and they lack those skills because as an industry we have not yet put the proper structures in place to train them to do their job. Don’t take my word for it. I highly encourage you to read through the recent report on the Australian Skills Quality Authority’s (ASQA’s) national strategic review of training for the SECURITY INSIDER | April 2016 | 33


ANTI-TERRORISM

security industry. ASQA conducted this review as a result of reports by Coroners investigating the deaths of patrons at the hands of untrained security officers. Their directive was to identify any areas of systemic poor practice and recommend appropriate solutions. Of the RTOs that were audited, 80.6% of those offering security training were not fully compliant at the initial audit. Most of them were able to correct the deficiencies, but it should come as no surprise to us that the report concluded the training of security officers across the industry is woefully inadequate. A recent 7.30 report by the Australian Broadcasting Corporation revealed that “security training is being compromised, with government-approved organisations selling qualifications to people who’ve not done any training at all.” When I first began this writing endeavour to raise awareness about increasing the level of training and professionalism within our industry, I often felt like a lone voice challenging the status quo. Many of my readers have since shared with me that they too have felt that way at one point or another, often dissipating powerless against the overwhelming current, and maybe that resonates with you at some level. Let me tell you something: it’s OK to be that lone voice, because very quickly I discovered that we’re not alone at all. In fact, I’ve discovered there are many

of us who share the same views on this topic, even at very senior levels. So many. Then why aren’t we leading that change? The question you might be asking is, what does any of this have to do with Anti-Terrorism? Well everything! Before we’ll have a chance at protecting this country from terrorists, we’ll need to earn the respect of the very people we’re trying to protect. In living by the core values of Integrity First, Service before Self, and Excellence in All We Do, then really developing that pillar of Training & Professionalism, it won’t take long for our industry to earn that respect. Do you know the difference between a novice boxer and a professional? The novice boxer is constantly seeking to learn every advanced technique he can possibly get a hold of, thinking it will give him some mystical edge in the ring. The professional boxer works tirelessly on his fundamentals: his basic footwork, punching and head movement. Anti-terrorism is no different. The only catch is that in our field, we have to lead the training of those fundamentals, day in and day out. The most obvious heroes are the brave men and women of the ADF, ASIO, ABF, Police, Fire Brigades, Ambulance Services, and other relevant agencies. But assume the home-grown terrorists are already here, because they are. By the time of the first 000 call, it’s already too late, and innocent people have

About the Author Ben Beville is a Business Development Manager and Security Consultant at Southern Cross Protection. He was formerly a Lieutenant Commander in the U.S. Navy, where he served 11 years active and reserve. Throughout his period of service, he completed multiple deployments to Africa and the Middle East, both afloat and ashore. Early in his career he served as a Boarding Officer aboard the guided missile cruiser USS Chosin, where he assembled and trained three highly proficient boarding teams that were tasked with providing maritime security for Iraq’s oil terminals. He returned years later to a similar role, planning Maritime Interception Operations

34 | April 2016 | SECURITY INSIDER

already died. Guess what! If you’re a security officer in this country, that makes you the first line of defence against a terrorist attack, and in my book, that makes you a hero, too. In response to the recent ASQA report, ASIAL CEO Bryan de Caires released a statement to the media where he said: “as recent global events have shown, we live in changing and challenging times. [...] it is vital that the industry has access to appropriately trained personnel with the necessary competencies to perform the duties they are tasked with. The time has come for action and the introduction of a nationally consistent approach to security industry training and licensing.” I second his call for action. I for one am proud to be an Australian security officer. I’m proud to stand next to you to protect this great country of ours, now my home as well as yours. We have a lot of great people in our industry who want to do a good job. If we train them well, they will exceed our expectations. If we lead them, they will follow. My vision for our industry is this: within the next decade, Australia has the most professional, most highly trained security force in the world. And why do we do what we do? Because our country and our loved ones require us to step up to the plate and protect them. What role will you play in helping our industry achieve this?

aboard the carrier USS John C. Stennis. Among his numerous other assignments, he was also a regional specialist in Africa, working for various U.S. Embassies to coordinate U.S. Navy activities in their respective countries, including Navy ship visits to high-risk ports. Prior to receiving his Honourable Discharge and making a permanent move to Australia in 2014, his final duty station was as a watchfloor supervisor at the coalition operations centre in Djibouti, where he also assisted the U.S. Embassy in facilitating the training and equipping of 550 Djiboutian peacekeepers deploying to Somalia to support United Nations operations. Ben.Beville@sxprotection.com.au.


ASIAL Graded Security Monitoring Centres* Current as at: 15th March 2016

COMPANY (SHORT FORM NAME)

STATE

CERT. NO. GRADE

EXPIRES

ADTSecurity

NSW

448

A1

2 Apr 2017

ADTSecurity (Data Centre)

NSW

449

A1

2 Apr 2017

Allcare Monitoring Services

WA

463

A2

4 Mar 2018

ARM Security

WA

446

A1

10 Mar 2017

ART Security

VIC

438

A1

30 Sep 2016

BENS Wholesale Monitoring

NSW

442

A1

14 Nov 2016

Calamity Monitoring

NSW

422

A1

20 Mar 2016

Chubb Monitoring Centre

NSW

464

A1

9 Mar 2018

Energize Australia

VIC

433

C2

13 Aug 2016

Executive Security Solutions

VIC

435

A1

21 Aug 2016

Glad Security

NSW

443

A2

25 Nov 2016

Golden Electronics

TAS

440A

A1

16 Oct 2016

Grade One Monitoring

NSW

424

A1

8 May 2016

Grid Security

NSW

439

A1

16 Oct 2016

Instant Security Alarms

QLD

457

A1

23 Sep 2017

Linfox Armaguard

VIC

434

A1

14 Aug 2016

Mekina Technologies

TAS

461

A1

15 Jan 2018

Onwatch

NSW

451

A1

20 Apr 2017

Paul-Tec (Australia)

NSW

454A

A1

1 Aug 2017

Proforce Security

VIC

423

A1

24 Apr 2016

Protection Pacific Security

VIC

436

C2

1 Aug 2016

RAA Security Services

SA

447

A1

14 Feb 2017

Secom Australia

NSW

458

A1

14 Dec 2017

Sectrol Security

VIC

452

B2

19 Aug 2017

Security 1

ACT

460

A2

09 Dec 2017

Securemonitoring

VIC

459

A1

23 Nov 2017

Security Alarm Monitoring Service

SA

426

A1

18 Jun 2016

Security Control Room

VIC

455

A1

18 Aug 2017

NSW

462

A1

10 Feb 2018

Spectus

WA

450

A1

12 Apr 2017

State Government Protective Security Service

QLD

427

C1

18 Jun 2016

Telstra SNP Monitoring (Hamilton)

NSW

453

A1

29 July 2017

Telstra SNP Monitoring (West Ryde)

NSW

431

A1

13 Aug 2016

Ultimate Security & APS Monitoring Centre

NSW

456

A1

16 Sep 2017

SMC Australia

*The above-listed ASIAL Graded monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to grading.

SECURITY INSIDER | April 2016 | 35


WORKPLACE RELATIONS

AVOIDING

UNFAIR DISMISSALS

FOR SMALL BUSINESS g

By Chris Delaney, ASIAL Industrial Relations Advisor

One of the great dilemmas for small business is how to dismiss an employee for poor performance or conduct and at the same time avoid an unfair dismissal claim. In this article I will explain the process involved in defending an unfair dismissal claim, why compliance with the Small Business Fair Dismissal Code may be sufficient for a small business to successfully defend a claim of unfair dismissal, how the Fair Work Commission deals with claims and what is ‘good practice’ when dealing with and dismissing poor performing employees.

What is a “Small Business”? For the purposes of the Fair Work Act 2009 (Cth) (the Act) a small business is one with fewer than 15 employees (permanent or regular casuals, including those of associated business entities) at the time the employee was dismissed. Any more than that and the Small Business Dismissal Code (Code) does not apply. The Code commenced on 1 July 2009 and was varied in 2011 and applies to small business employers with fewer than 15 employees. Under the Act employees who have worked for the employer for less than 12 months, or who have genuinely been made redundant do not have a remedy in the Fair Work Commission (FWC) for alleged unfair dismissal. The Code is simple and brief and provides a checklist for the employer to use as a guide to ensuring procedural 36 | April 2016 | SECURITY INSIDER

fairness in the process of dismissing an employee. Following the Code and completing the checklist will go a long way towards providing proof of fairness and mitigating a claim of unfair dismissal that the employee may make as a consequence of the dismissal. Employees eligible to claim will be heard by the FWC , which will consider a number of factors in order to determine whether the dismissal was unfair. These include each of the ‘procedural fairness’. In unfair dismissal cases process is very important – in many cases if the process is unfair the dismissal will be determined to be unfair also. The FWC will take into account: • That there was a dismissal; • whether there was a valid reason for the dismissal relating to performance or conduct; • any prior warnings given to the employee; • if the employee was given the opportunity to respond to the allegations on performance or conduct; • any unreasonable refusal by the employer to let a support person attend meetings relating to performance, conduct or dismissal to assist the employee;

• the degree to which the size of the employer’s business might impact on the fairness of the procedures followed to dismiss the employee; • the degree to which the absence of a dedicated HR specialist or HR advice might impact on the fairness of the procedures followed to dismiss the employee; and • any other matter that FWC considers relevant.

Completing the checklist will not guarantee success Merely completing the checklist will not be enough to satisfy the FWC that the dismissal was fair. Our advice is simple, if you want the best chance of defending an unfair dismissal claim: Keep documentary evidence such as: • copies of written warnings • minutes of meetings • witness statements • evidence of unsatisfactory performance (such as work records) • reports of investigations • other relevant correspondence

What happens if the employee lodges a claim for unfair dismissal? The employee must file a claim within 21 days of being dismissed. The FWC will send a copy of the claim to the


WORKPLACE RELATIONS employer and the employer must send a reply to the claim back to the FWC (Form 3 Employer’s Response) and to the employee within 7 days. In most cases the next step is that the FWC will set up a time for a conciliation conference (generally telephone-based and within two to three weeks of the application being made), and send both parties details of that telephone conciliation. A conciliator from the FWC assists the parties in an informal, unrecorded discussion to reach agreement and avoid the expense of a formal hearing. The conciliator does not take sides or make determinations. He or she will guide the parties, clarify the issues and provide a reality check for both sides with the aim of have the parties reach a settlement, agreeable to all. Commonly this occurs if the parties reach a monetary settlement to the employee. This could include giving the employee and opportunity to resign or any other concession agreeable to both parties – it is a negotiated settlement and should be considered in light of the commercial realities. If the matter is not resolved at conciliation the matter will proceed to a formal hearing or conference where the FWC will make a decision about the claim. The FWC’s decision is final save for any appeals opportunities, however these are rare. The decisions are also on the public record and available on the FWC website.

What happens in a Formal Hearing or conference A hearing or conference is the last step in an unfair dismissal claim. It is a formal and public process by which a Commissioner or Deputy President or other member of the FWC will hear and consider all of the evidence and submissions and make a legally binding decision resolving the unfair dismissal application. Each party must prepare a case including written witness statements and arguments, out line of submissions

and be prepared to examine and/or cross examination witnesses. It is rare for small business owner to have the capacity to successfully run a defense without representation. Possible outcomes include: • The dismissal was fair and the claim is dismissed. • The dismissal is found to be unfair and the Commission orders that the employee be reinstated (sometimes with back-pay). • The dismissal was unfair but reinstatement is not appropriate and compensation (up to six months pay) is ordered. • The dismissal is found to be unfair however there is no remedy appropriate • The matter is dismissed because a jurisdictional objection or other objection is upheld.

Lessons for the Employer The employer should have disciplinary policies and procedures in place, which allow proper investigation of any under performance, and the chance for an employee to improve You may be expected to prove that what you have done was ‘reasonable’ or ‘fair’. That may depend on the warning procedure you adopt. An employer should be careful to warn an employee if there is a potential that the employee’s conduct could lead to a dismissal. A warning can be verbal or written, which an employer delivers to an employee with a view to informing the employee to certain actions, which were inconsistent with the employer’s reasonable expectations. Written warnings must be clear, concise and leave no doubt that the employee must improve if they are to keep their job. Taping a disciplinary meeting will not be admissible as evidence without the employee’s permission. Our simple advice is that as soon as an employee displays signs of poor performance and/or conduct deal with the issues and document everything.

Discuss with the employee your concerns, give them an opportunity to state their side and give them time to improve their performance and change their behavior. Always set a follow up meeting to review the employee’s progress towards the required improvement and deal with any continuing problems. A warning may be appropriate in cases where the employee: • is not performing work to the required standard; • is not turning up on time or leaving the job early; • presents for work in a condition unfit to perform their tasks; • refuses to follow a reasonable request; • has chronic absenteeism; or • is abusive or discourteous to others. While the employer is not legally bound to provide three warnings, where it is a matter that requires improvement but is not serious it may be appropriate to give a first and then a second warning. In cases where the issues are more serious a first and final warning may be acceptable. A warning procedure is not relevant where an employee is instantly dismissed for ‘misconduct’. However it is often difficult to convince the FWC that the behavior of the employee was so bad as to make instant dismissal as opposed to dismissal with notice an appropriate choice for the employer. Dealing with disciplinary problems in the workplace can be a difficult task and a distraction from the day to day running of your business. Very often employers either avoid the confrontation that accompanies these discussions or conversely rush in and make decisions that can cause problems later in proceedings. There is a lot to gain by taking timely professional advice before acting on a disciplinary problem. ASIAL can help and free advice is only a phone call away. It could just save you a lot of time and expense.

*Chris Delaney is ASIAL’s Industrial Relations Advisor. He can be contacted at ir@asial.com.au Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.

SECURITY INSIDER | April 2016 | 37


ASIAL NEW MEMBERS

WELCOME TO OUR NEW MEMBERS ASIAL is pleased to welcome the following members who have recently joined the Association. PROVISIONAL CORPORATE MEMBERS

CSCOMMS Pty Ltd

Security Services

Kimadd Computers & Internet Services

Netcorp GPS Pty Limited

WIT Protection Services Pty Ltd

Pty Ltd

Next Security Pty Ltd

Club Home Response Pty Ltd t/a Club

Mantr Security Pty Ltd

QA Electrical (QLD) Pty Ltd

Home Response

MNA Group Pty Ltd t/a GS3

Rapid Protection Australia Pty Ltd

Fieldstar Services Pty Ltd

National Collection & Investigation

Response Force Security Group P/L

Gerado Pagano t/a East Coast Security

Services Pty Ltd

SCS Smart Homes Pty Ltd

& Safety

Platinum Safes Pty Ltd

Seada Electro Technology Pty Ltd

H.C.H Investment Pty Ltd t/a Knights

Providence Consulting Group Pty Ltd

Security Consulting Group Pty Ltd

College

RCS Telecommunications Pty. Ltd.

Sekkon Group Pty Ltd

High Secure Security Pty Ltd

Ridgeway Remote Pty Ltd

Supamaxx Australia Pty Ltd

IDS Security Solutions Pty Ltd t/a IDS

SASAA Corporate Solutions Pty Ltd

Victor John Love

Security Solutions

TCM Security Pty Ltd

IPS National Training Academy Pty Ltd

The Western Australia Turf Club t/a Perth

Lekak Group Pty Ltd

Racing

ASIAL MEMBER RECOGNITION PROGRAM

Lords Integrated Corporate Services P/L

Vital Hospitality Group Pty Ltd

The ASIAL member recognition program

Metro Construction Solutions Pty Ltd

Wain Greg Rath T/as Country to Coast

acknowledges longstanding association

My Security Matters Pty Ltd t/a BLR

Cabling

members. Recognition categories

group Services

include Platinum (25 years+), Gold

Pioneer Security Solutions Pty Ltd

CORPORATE UPGRADES

(16-24 years), Silver (11-15 years) and

RACQ Operations Pty Ltd

ADCCTV Electronics Pty Ltd

Bronze (6-10 years).

Rocketsons Pty Ltd

Alarm Monitoring Centre Pty Ltd

Secorp Protective Services Pty Ltd

Artec Group Pty Ltd

PLATINUM

Sensor Security NSW Pty Ltd

Austec.Com Pty Ltd t/a Alert Security

Alpha Alarms Pty Ltd

SiteSafe Medical and Rescue

Solutions

South Pacific Distribution Pty Ltd

Auswide Security Services Pty Ltd

GOLD

Southern Cross Security (INT) Pty Ltd

Charter Security Protective Services Pty

Technology Provisioning Services P/L

Taskforce Security Pty Ltd

Ltd

Strudwick Security Pty Ltd

Data Integration & Security Cameras Pty

ASAP Australian Security and Protection

CORPORATE MEMBERS

Ltd

Pty Ltd

Addictive Technology Solutions Pty Ltd

Fares Electrics Pty Ltd

Prosys Services Pty Ltd

ASH Pty Ltd

GK Solutions Pty Ltd

Alvaro & Suzy Romanelli t/a AR Security

Bradley Marcus Symons t/a One

Master Services Aust Pty Ltd

Innovations

Locksmith

MSGA Holdings Pty Ltd t/a SGA

KL Lowman & PA Lowman trading as

38 | April 2016 | SECURITY INSIDER


ASIAL MEMBER RECOGNITION

Norwest Security Services

Syncronix Security Pty Ltd

Craig Paul Spencer t/a RMI Security

George & Helen Simos t/a Pronet

Midline Security Pty Ltd t/a Theft

Pratt Pty Ltd

Security & Data

Prevention

Kenneth Raymond Paxton t/a K & D

Johnson Controls Australia Pty Ltd

Titanium Security Pty Ltd

Allguard Security Service

MGT Security Services Pty Ltd

BSM Security (QLD) Pty Ltd

Doust Automation & Control Pty Limited

Commodore Alarms Systems Pty Ltd

Nathan Hunt t/a Wolf Tactical Security

Plover Security Services

Lancaster Investigations Pty Ltd

Services

Meridian United Services Pty Ltd

R & B Security Services Pty Ltd t/as

Vince Blanco t/a VB Information

Kolam Pty Ltd t/a Adroit Alarm System

Alarmlogic & Alarmnet Monitoring

Technology

Perkins Security Solutions Pty Ltd

SECUREcorp Pty Ltd

If you would like to participate in the

Create Security Pty Ltd

ASIAL member recognition program,

BRONZE

Dynamic Alternatives Pty Ltd

please email security@asial.com.au.

SCS Smart Homes Pty Ltd

Discreet Investigations & Security P/L

Neighbourhood Security (Sydney) P/L

Phone Tech Australia Pty Ltd

ALPHA ALARMS RECOGNISED AS A PLATINUM ASIAL MEMBER ASIAL Membership Manager Sylva Pechackova presented Blake Bridgwood with a Certificate of Recognition, honouring Alpha Alarms as a Platinum ASIAL Member, at the NSW Security Industry Breakfast Briefing. The program provides eligible long standing Members a point of difference when promoting their security services. Members with a recognition level have access to a Platinum, Gold, Silver or Bronze ASIAL Member Recognition logo. The ASIAL Recognition Program rewards Corporate Members who have held consecutive years of ASIAL membership. For further information on the program please email security@asial.com.au.

SECURITY INSIDER | April 2016 | 39


HOT PRODUCTS

QXS HYBRID – FLASH ECRAFT PRODISK SERIES PERFORMANCE AT 30% OF THE COST ■ Electrocraft Australia > 02 8811 5155 g

Australia > 1800 999 285 ■ Quantum Web > www.electrocraft.com.au

g

NEW!

Email > ANZsales@quantum.com

Enter the Digital Era with the Ecraft Pro Series range of equipment. Website > www.quantum.com This equipment allows you to digitally modulate any source in SD and QXS combines drives, high performance and standard hard drives in a HD format overflash a coax system. single storage array. Quantum’s patented software the drives Sources include AV(CVBS), HDMI and Q-Tier SDI from media manages players, cameras, optimising performance – delivering flash speeds at 30% of the cost of all flash receivers etc. arrays. This means faster write times for more cameras and larger “live” VMS Our coax and IPTV/CCTV system designers will assist you with design databases. QXS is ideal for virtualised VMS installations, analytics, and enterprise and support to ensure that the installation is efficient.The EPS series is grade ideal deployments. solution when the site is required to use the existing infrastructure QXS iscosts Mil-Spec hardened EPS and NEBS certified with leading VMS solukeeping at minimum. seriesrated; is a typical solution for retirement tions. Sizing and cost generally suits medium to large projects. villages, pubs, clubs, sporting venues, hospitals, correctional centres and earn more: Quantum Australia 1800 999 285 or ANZsales@quantum.com high risers. g

Mention Security Insider and receive 10% off your quote until 30 June.

HIKVISION COVERT INTERLOGIX EXTENDS NVRIPRANGE WITH CAMERA HIGH PERFORMANCE NVR70 SERIES g g

NEW!

Security Merchants Australia > 1300 663319 904 ■ Central Security Distribution > 1300 499 Website > www.securitymerchants.com.au ■ Web > www.centralsd.com.au

When reliability is mission critical,1.3MP look to the new TruVision NVR70 by Interlogix Hikvision DS-2CD64 WDR Covert IP Camera Series provide with features network dual recorder both including flexibility and easeredundancy, of installation, its redundant size allowsPSUs, the camera to failover even camera export/import. easily blendconfiguration into very limited space, which makes it ideal for discreet Real-time Full HD recordings can be product accessed via the License TruVision surveillance applications.This incorporates true free 120dB WDR, Navigatorassoftware, app image even full browser-based access for well as TVRmobile other powerful processing functionalities like live, 3D recordingDNR and configuration. and BLC. Additionally, the DS-2CD64 series supports on-board The NVR70 supports to 400Mbps incoming camera bandwidth, or up storage of up-toup64GB and ROIofcodec to save on overall bandwidth to 128 IPand camera channels. storage. It also provides choice of lens and mounting types for Designed to to accommodate large amounts of surveillance data, the NVR 70 is equipped users find an option to best fit their needs. with up to 64TB of embedded storage in a RAID configuration, or up to 96TB in a non-RAID configuration.

NEW ‘RM’ HIKVISION H.264+ VMS FROM CANON COMPRESSION TECHNOLOGY ■ Canon Australia > 1800 021 167 NOW IN AUSTRALIA ■ Email AVAILABLE > specialised.imaging@canon.com.au ■ Web > www.canon.com.au/networkcameras

g

Central Security Distribution > 1300 319 499

g Website > www.centralsd.com.au Besides offering an extensive range of high

quality IP cameras, Canon has just launched the latest version of its’ video management software, CSD is pleased to announce the release of H.264 this latest product for high RM version 3. This new software supports compression development from HIKVision, whichdriving will dramatically changeIncluded is resolution megapixel video without up storage costs. the small tokeyword mediumtagging surveillance market feature in Australia. NVRit very easy an intuitive and filtering whichThe makes range includes variousfrom models from 4 to 16 channels andIt the to analyse footage multi-camera environments. also comes cameras have 2MP to & support 4MP variants standard options standard in versions up to 9ascameras (RM-9), 25 with cameras (RMoutstanding WDR capabilities. Available viewer from mid-March atalso all available 25) and 64 cameras (RM-64). Additional licenses are CSD branches around country. for projects larger than the 64 cameras.

Available from: Central Security Distribution Pty Ltd

40 | April 2016 |INSIDER SECURITY INSIDER 38 //SECURITY APR 2014


HOT PRODUCTS

HIKVISION DTU3G/IP 2MP INDOOR RECESSED MINI CAMERA ■ SCSIDOME > 1300 555 570 HIK-2CD2E20F28 ■ Email > daleacott@securitycommunications.com Web > www.securitycommunications.com Central Security Distribution > 1300 319 499 Website > www.centralsd.com.au SCSI’s DTU3G/IP wireless alarm communicator is Australian

g ■ g

made and designed. Dual-SIM technology provides 6 secure paths using Telstra HIKVISION 2MP INDOOR RECESSED MINI NextG, Optus 3G, Telstra GPRS, Optus GPRS, Ethernet & PSTN. With DOME CAMERA thousands already sold and installed, the DTU3G/IP has been released to the Australian Security Industry with success. The This Recessed-mount IP Camera features HD outstanding resolution (1920 X combination of multiple, proven communication paths ending the days of 1080), on-board SD storage up to 128GB and an ultra-compact nuisance “poll fails” and unwarranted guard attendances. design, making it the ideal, low profile, unobtrusive solution for The DTU3G/IP connects to the DirectWireless Network, Australia’s any small business or office space. The camera is easy to install only dedicated and private alarm transmission network. withTothe adjustable clamps adjust to SCSI fit any finddownlight out more about the DTU3G/IP , contact onceiling 1300 555 570.

thickness and sports a 2.8mm lens, Digital WDR and 3D-DNR

NEW!

SUPERIOR DETECTION WITH THE KEEP YOUR CASH FLOWING WITH PARADOX NVX80 DETECTOR SIMPRO PAYMENTS ■ g Central simPROSecurity > 1300Distribution 139 467 > 1300 319 499 ■ > www.centralsd.com.au g Web Website > www.simpro.com.au

NEW!

The NVX80 with all-new delivers Payments, superior With Paradox the all-in-one payment feature SeeTrue™ of simPROtechnology Software, simPRO you candetection collect payment for your services quickly and securely card, motion with advanced capabilities, beyond others by in credit its class. without theaneed for merchantoffacilities. Boasting combination technologies including: active infrared, When used with the simPRO app, simPRO enables microwave, and SeeTrue™, thisConnect unique mobile aggregation enablesPayments highly efficient your technicians to collect payment in the field as soon as a job is complete. Your detector sensitivity while at the same time, enhances reliability and customers can also pay you online through the Customer Portal, by following a minimises false alarms. link in an emailed invoice, or over the phone. All payments are processed through Programming and configuration are simple with the NVX80's full-colour the simPRO system. OLED screen and four-button interface. Suitable for both indoor and outdoor ASIAL members receive 20% Off the initial cost and 10%Off ongoing costs of simPRO applications, is truly the detector to choose when protecting highis Enterprise and the oneNVX80 free simPRO Connect licence with every Enterprise licence*. *Offer value, high sitesEnterprise that demand highwho performance. only valid for security new simPRO customers are ASIAL members.

THE T4000’S LITTLE BROTHER HAS INTEGRITI 8AMP SMART POWER SUPPLY ARRIVED PACKED WITH FEATURES FROM INNER RANGE g

Inner Range Melbourne > 03 9780 4300 Email > IREnquiries@innerrange.com ■ Email > admin@innerrange.com g Web > www.innerrange.com ■ Web > www.innerrange.com ■ Inner Range Melbourne > +61 3 9780 4300 g

Boasting lightweight price and environment, a little less hardware without compromising In today’s ademanding security monitoring of the powersupply on simplicity and performance. status is pivotal to the operation and performance of anysecurity system, and the The T4000 Lite is Power fully packed the features of the originalnew T4000 Integriti 8Amp Smart supply with deliversthis very effectively.The Inner Security Communicator, with aSmart smaller pricesupply tag itisa is the ideal solution for Range Integriti 8Amp 13.75Vdc power highly efficient purpose built power supply designed to meetthe modern spec requirements installations wheresolution the T4000 is being powered fromhigh an existing batteryunique Access Control Intruder Systems.When Inner backedtoalarm system. Theand T4000 Lite Security is compatible with mostused alarmwith panels Ranges Integriti system, thepanel 8Amp quick connect status and simply connects to the viapowersupply its telephoneoffers port, eliminating the need monitoring for critical such asto Battery Fault,The LowT4000 Battery, for a dedicated alarmpowerrelated panel phoneaspects, line connection the street. Battery Not Present, Battery Failed Test, Mains Power failure, Power Supply Low Lite handles all alarm communications via its Ultra-fast 3G dual SIM and Volts, Power Supply Failure and status monitoring of all Smart Fuses. 10/100 Mbps Ethernet polled communications paths.’

SECURITY | April 41 SECURITYINSIDER INSIDER APR2016 2014//| 41


2016 ASIAL NATIONAL CALENDAR OF EVENTS 6 APRIL 2016 | ACT INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Premier Belconnen Price: $47.50 (Member), $57.50 (Non- Member) 7 APRIL 2016 | TAS INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hobart Function Centre Price: $47.50 (Member), $57.50 (Non- Member) 5 MAY 2016 | VIC INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Batman’s Hill on Collins, Melbourne Price: $50 (Member), $60 (Non- Member) 26 MAY 2016 | NSW INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Holiday Inn, Parramatta Price: $50 (Member), $60 (Non- Member) 1 JUNE 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 20-22 JULY 2016 | SECURITY 2016 EXHIBITION & CONFERENCE Venue: Melbourne Convention & Exhibition Centre 4 AUGUST 2016 | SA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Sebel Playford Hotel, Adelaide Price: $47.50 (Member), $57.50 (Non- Member) 5 AUGUST 2016 | WA INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hotel Northbridge, Perth Price: $47.50 (Member), $57.50 (Non- Member) 31 AUGUST 2016 | NSW INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Holiday Inn, Parramatta Price: $50 (Member), $60 (Non- Member). 7 SEPTEMBER 2016 | QLD INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Hillstone St Lucia, Brisbane Price: $47.50 (Member), $57.50 (Non- Member) 12 OCTOBER 2016 | ACT INDUSTRY BREAKFAST BRIEFING Time: 7.30am-9.00am | Venue: Premier Belconnen Price: $47.50 (Member), $57.50 (Non- Member)

Interested in sponsoring an ASIAL event? Email advertising@asial.com.au



Untitled-1 1

26/11/2014 10:45 am


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.