Advertisement
Home Blog Page 110

AST announce new updates to KeyWatcher Management System and KeyPro Plus

AST is proud to announce the recent launch of the updated KeyWatcher Touch. The recent upgrades make this unit more user-friendly and capable than ever before due to the large 7 inch touchscreen, improved integration capabilities and convenient features such as a mobile application.

However standout additions are the “KeyAnywhere” feature, which will enable the user to return a key to any KeyWatcher in the organisation and the “KeyFind” feature that allows you to locate which KeyWatcher a specific key is housed in or determine who has it out at the time.

For AST’s established customers, the KeyPro Plus application provides a single application platform, allowing KeyWatcher Illuminated and KeyWatcher Touch hardware to work together.

The KeyPro Plus allows for customers to introduce an upgrade path if they require the KeyWatcher Touch’s hardware features and enhancements from the existing KeyWatcher Illuminated, such as Scheduled Report, User Group Profiles and Real Time Monitoring. As the KeyPro Plus is an open source platform, it allows for high level interfaces to numerous Security Management Systems.

In order to find out more about the new exciting changes, contact AST directly – www.astpl.com.au or 02 8020 5555.

Could New Security Technology Save Lives?

pic1According to a recent report by Channel Seven News, a man who had a stroke and spent 20 hours unconscious in a Sydney hospital toilet before he was found, has died.

The man went to the Royal North Shore Hospital on Monday for an appointment in the outpatient clinic, and when he failed to present himself to the clinic staff, he was listed as a “no show”.

He was found on Tuesday in a hospital toilet, sparking a major investigation into how he went unnoticed for so long.

On Saturday, the hospital confirmed the man had died. “On behalf of Royal North Shore Hospital I extend our deepest sympathies to the family,” Dr Andrew Montague of the Northern Sydney Local Health District said in a statement.”

Takenaka Engineering (TAKEX) has developed a ‘Toilet Occupancy Sensor’ (TAKEX TS-7). This sensor has been designed to detect and engage when a person enters a toilet and stays engaged until the toilet is no longer occupied. When connected to a Nurse-call system or Building Management System, the time that the toilet is occupied can be monitored. If a pre-set time expires, assistance can be automatically summoned by the hospital’s pre-existing monitoring systems.

Unique aspects of this device

According to Tom Kinkade, Australian National Sales Manager for Takex America Inc, “There is a big difference between detecting the presence of an awake/alert person and one that is completely motionless. The majority of presence sensors use motion detection techniques (PIR, Ultrasonic, Microwave) to determine whether or not an area is occupied. Motion detection technologies are unable to detect a completely motionless body.

In developing this product, our engineers considered the unique circumstances of toilet occupancy monitoring.

  • The sensor must detect a person entering the toilet.
  • The sensor must stay engaged while the toilet is occupied.
  • The sensor must stay engaged, even if the occupant is completely motionless.
  • The sensor must stay engaged if the occupant has fallen onto the floor and remains motionless.”

The TS-7 sensor uses optical “phase differential” distance measurement to define the distance between the ceiling and the toilet and the ceiling and the floor surface. The sensor will detect a person entering the restroom and will continue to detect their presence, even if they lie down on the floor.

Those people working in facilities management, life safety services and security roles who might like more information about this potentially life saving product can contact Tom Kinkade +61 (3) 9544 2477 or email tkinkade@takex.com

 

Important ASSA ABLOY Australia Brand update announcement

Over the coming weeks ASSA ABLOY Australia will be rolling out important brand change to two current product ranges. The changes will take affect for Arrow by Lockwood and Padde by Lockwood.

Padde by Lockwood – Lockwood

Padde is an Australian-based, niche brand that has been supplying quality electromechanical door locking solutions since 1966. Padde has also proven capable of innovation to preempt future market needs. A strong commitment to R&D and new product development has ensured dynamic growth for the brand every year since incorporation.

In 2005 the Lockwood hard endorsement was added to the Padde Logo, adding strength in the specification market where the Lockwood brand is the market leader. From July 1, 2015 the Padde brand will become a full Lockwood branded offering and will now be referred to as the Lockwood Padde range. This will include new Lockwood branded packaging, new point of sale and marketing collateral.

The Padde product as we know and love today will not change, yet simply move into the Lockwood family brand. Having the range now under the Lockwood banner will allow us to leverage Lockwood’s brand equity, concentrate our marketing and R&D activities whilst also bolster and complement the full Lockwood door hardware package across all market channels.

Arrow by Lockwood – Yale

Yale is one of the oldest international brands in the world and probably the best-known name in the locking industry. The Yale history captures major innovations that have marked the evolution not just of Yale, but of the entire locking industry.

In August 2000 Yale was purchased by the ASSA ABLOY Group, and has since then been animportant part of the global leader in door opening solutions around the world. The Yale brand was reintroduced into the Australian market in 2009, and will maintain its focus on the consumer market.

To strengthen and bolster the Yale range in Australia the Arrow by Lockwood range will now come under the Yale brand offering. All current Arrow by Lockwood branded products including door closers and locksets will be re-branded to Yale effective July 1, 2015. Overtime new products will be added to the Yale range, further expanding the offering into semi commercial and residential platforms.

New websites for both Yale and Lockwood will be launched in June 2015. The new responsive websites will have the respective product ranges added to Lockweb (Padde) and Yale (Arrow) including new product brochures and downloadable content including images. In addition to packaging and branding changes, all part numbers will be updated for both Arrow by Lockwood and Padde by Lockwood, part number conversion charts can be found on the new web pages below.

Lockwood – www.lockweb.com.au

Yale – www.yalelock.com.au

About ASSA ABLOY

ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience. ASSA ABLOY is represented in all major regions, in both mature and emerging markets, with leading positions in Australia, Europe and North America. ASSA ABLOY is the company behind leading brands in Australia including, ABLOY, Henderson, Lockwood, Whitco and Yale.

For more information visit www.assaabloy.com.au

HILLS ANNOUNCES PARTNERSHIP WITH ALARM.COM

hillsLogo

Hills and Alarm.com announced a strategic partnership today to bring Alarm.com’s advanced smart home services to Hills significant partner base.

Alarm.com, the leading platform solution for the smart home, offers cloud based security and home automation services. From a single mobile app, users can control and manage interactive security, video monitoring and energy management solutions as well as a broad ecosystem of connected devices.

Hills Head of Product Practice, Daniel Lee said the Alarm.com offering was the next step in home security and automation.

“Hills is delighted to announce this partnership with Alarm.com and to bring the next frontier of security technology to the market,” Daniel Lee said.

The Alarm.com services platform is deeply integrated with Tyco Security Product’s DSC alarm panels and gives end users a security and home automation system that adds significant convenience and peace of mind to their lives.

“We’re very excited about our partnership with Hills and the opportunity to deepen the reach for Alarm.com’s leading smart home services in the Australian market,” said Reed Grothe, Alarm.com’s Senior Vice President for Global Business Development.

“Security and home automation services are driving broad consumer adoption of the smart home and this partnership will help Hill’s dealer network capitalize on the opportunity,” Reed Grothe said.

Alarm.com’s leading services are built around home security and also include home automation devices like lights, locks, and smart thermostats. The user can control and manage devices and appliances in their home from anywhere through a smart phone app, and the home can automatically take action to manage energy more efficiently and reduce waste. It’s easily customised to suit the needs of any family.

Alarm.com’s smart home services with Tyco Security Product’s DSC security panels were on display at Security Expo 2015 held in Melbourne in July.

MEDIA CONTACT
Melanie Stewart, Hills Limited, Product Communication and Innovation Manager
MB: +61 448 431 378
Email: Melanie.Stewart@hills.com.au

Use Of Force And Workplace Violence: A Growing Risk

pic2By Dr Tony Zalewski.

Increasing crime rates for violence, including domestic violence, illicit drug use such as ice and a more challenging public to authority of public safety personnel, has further impacted upon the ability of operational security staff to meet workplace objectives.

Inevitably, some interactions between members of the public with security staff have the potential to escalate to a physical level, with some interactions requiring the use of force. Typically, force is a potential option to remove a patron from licensed premises, to stop an unauthorised entry into a building or to complete the arrest of a resisting shoplifter outside a retail store.

This article will discuss issues relating to the use of force in the workplace, including matters relevant to the increased risk of workplace violence.

The Statistics

Common forms of assault throughout Australia remain prominent within reported crime statistics. Victoria’s 2014 assault data disclosed an increase of 1.7 percent for reported assaults to 46,912. For the same period, the rates for New South Wales remained constant at around 34,000 non-domestic assaults and in Queensland around 18,100 annually. Reported crime statistics do not disclose incidents involving security staff, albeit the New South Wales crime statistics did recently report an 8.1 percent increase in assaults on police.

A growing area of concern is domestic violence and its potential impact within the workplace. Throughout Australia, one woman is killed every week and one hospitalised every three hours due to a domestic incident. Victorian police attended 65,393 domestic incidents in 2013–14, twice as many as in 2009–10, and charges were laid in approximately 30,000 of those attendances. Most Australian police forces report up to 50 percent of all operational policing time is now spent handling domestic incidents.

Workplace disputes are another area of concern, whether between workers or others in or around the workplace. Safe Work Australia and other state or territory agencies have published guidance materials to assist safety and security leaders develop appropriate proactive and reactive measures for their workplaces.

Security staff operate in diverse environments, including hospitality and gaming premises, commercial and public buildings, air and maritime ports, high-risk defence and other government sites and major retail operations to name a few. It is therefore foreseeable there will be circumstances requiring physical intervention by security staff, whether intervening to keep the peace or to effect a lawful purpose such as arresting a shoplifter or removing an aggressive patron. It must be remembered that any physical intervention is a high-risk activity, hence the importance of an appropriate system.

Industry Guidance

There is a plethora of information freely available on the Internet to assist employers and security leaders develop an appropriate system to cope with aggression and violence in the workplace. For example, the Australian Capital Territory (2010), New South Wales (2002), Victoria (2003 and 2014) and Western Australia (2010) have published materials addressing the risk of workplace violence. Each recommends a risk assessment as the foundation for developing any strategy. For security staff this is reinforced by AS/NZS2241:2011 Guard and Patrol Security Services (2.6.1) where a risk assessment should be conducted prior to the commencement of any work. This is particularly important to minimise risks associated with workplace violence.

Use of Force and Tactical Options Model

As use of force is a high-risk activity, it is important that all staff are regularly appraised to ensure their competency level is maintained. It is not acceptable to rely on pre-licensing training of security staff as a measure for competency. Employers must ensure each employee receives appropriate training against the perceived level of risk associated with force in an operational perspective at their workplace. There should also be operating procedures to guide staff in both understanding the organisations and relevant legal requirements.

Use of force typically involves three considerations:

  1. lawful justification to apply force
  2. reasonableness in that force was a necessary option
  3. the amount of force was proportionate to the danger in the circumstances

Pre-licensing training and various materials such as those provided by industry associations can further assist to elaborate upon these points. However, if each of the three considerations cannot be clearly evidenced, this high-risk activity may impact adversely upon the individuals, the organisation and ultimately the industry. This highlights the importance of employers ensuring current competency of their employees in this high-risk area of work and a complete understanding of their tactical options when confronted with a potential use-of-force incident.

Many organisations use a tactical options model in the development of their staff. Use of such a model can assist staff to understand that, as an incident continues, ongoing assessment in the use of tactical options must also occur. There are variations on tactical options models; however, it is important that any model is relatively simple to understand and not complicated with unnecessary content or jargon. Below is an example of a basic tactical options model. Note that assessment commences in the centre of the model and works out and around to determine the most appropriate tactical option at any given time.

justLaw-image1

 

It is important that employers, in the context of the relevant workplace, ensure staff are provided with procedures that explain each of the options for that particular workplace. A generic tactical options document is inappropriate and will lead to mere confusion in a high-risk incident. Pre-planning is essential, hence the importance of a risk assessment with risk controls developed prior to any work activity. This approach in itself will minimise risk.

Procedures that enhance operational security activity involve step-by-step instructions of how to perform routine for common tasks. For example, a procedure for approaching should include the following before any instructions about communication or the use of force:

  1. Before approaching the person, conduct a quick safety risk assessment, that is, dual purpose weapons, associates of the person in the immediate vicinity, furniture or others that might create a danger and the like.
  2. Notify another staff member (or summon support if working as part of a team).
  3. Approach the person, adopting a position of safety and advantage.

This method further minimises risk whilst also enhancing safety for everyone present.

Common Problems

Common problems associated with the use of force by security staff involve unlawful striking or the overuse of physical controlling measures to achieve an outcome. For example, unlawful striking often involves blows to the head of another. This is hard to justify in most circumstances. A poor controlling measure might involve applying a transport wrist lock as a punishment rather than an escort hold. In these circumstances the hold could lead to permanent injury and litigation. Laying with one’s bodyweight on another can cause serious injury, as has been evidenced across Australia in a number of positional asphyxia cases.

Some areas of security work also have particular issues to address, such as ensuring staff understand limitations on external activity and their authorised areas of work. This is commonly evidenced in crowd control at licensed premises where discretion on where external staff can operate needs to be removed. It is never justifiable to follow a removed patron down the footpath away from the venue or across the street to resolve a conflict. Similarly, it is never justifiable to chase a fleeing shoplifter through a busy shopping centre to effect an arrest.

Conclusion

Use of force is a high-risk but inevitable requirement within security operations. Employers must ensure a suitable system of work has been developed that takes into account, in the context of the relevant workplace, risks associated with the use of force.

Statistics suggest the risk of physical interventions is a foreseeable option across all industry sectors. As security staff are the front-line defenders for security and safety at any workplace, their competence must be maintained through a formal system of assessment, guidance and supervision. Such competency assessment and guidance should also be recorded within staff files to ensure there is evidence of an employer’s attention to this high-risk security activity.

For over 20 years Dr Tony Zalewski has provided expert security reports to courts in all Australian jurisdictions. He has four degrees, including a law degree, from Australian universities and has worked on over 500 cases, including some of Australia’s leading security-related civil actions. He also provides advice about security across industry sectors and is a security adviser to governments locally and abroad.

 

Terrorists And Facility Managers: Why They Need Each Other

Facility managers

The Facility Manager’s relationship with the terrorist is one of mutual support. The terrorist needs the sites under the control of the Facility Manager as targets; the Facility Manager can use the threat posed by terrorists to consider the measures in place, their effectiveness, relevance, and the documented and assumed responsibilities of the various managers on-site. The Facility Manager has two overarching responsibilities: to provide a safe and secure environment, and to minimise disruption to the tenants. These two responsibilities need to be done in an economical and profitable manner. The Facility Manager is the person best suited to ensure the site’s plans, policies, procedures and occupants are co-ordinated and effective.

The threat posed by organised groups and “lone wolf” terrorists is not new. Since the mid-Nineteenth Century, extremists have been committing acts of violence in managed sites: anarchists, ethno-nationalists, separatists, right and left wing activists, as well as religious and racist zealots. During, the terrorist decade of the mid-1960s-70s there were bombings, shootings, hostage takings, and other acts of violence across Australia. Since then we have had many incidents, some of which were political, some criminal, and some the result of mental illness. With the exception of the odd shooting in the bush, and attacks against private houses, they have all occurred in managed facilities. The intent and capability have always existed. What has changed and led to an increase in the national alert level is the loose association of aligned terrorist groups and individuals with the stated aim of committing public acts of violence.

Terrorist methods remain largely the same: bombings, assaults, murders, and hostage takings. The London underground was bombed in 2005 and in 1883; very little of what we are seeing today is innovative. Occasionally a new attack vector is tried, such as flying a plane into a building or bringing an explosive laden dinghy up against a warship, but the usual attacks are those which are easy to arrange and conduct: armed assaults, hostage taking and bombings, or a combination of these. Traditionally, targeting is of places where people work, meet, transit, rest and play – i.e. managed facilities. These may be commercial buildings, apartments or hotels, sporting venues, entertainment hubs, theme parks, retail centres, open air, or fully under cover. In each case, they offer the terrorist a location where people gather and where media will report the “propaganda of the deed”.

For the Facility Manager, terrorist attacks are low likelihood events, well below the probability of mechanical failure, contractual breaches, or tenant issues. But, a terrorist incident is a high consequence matter and the site-wide ability of the tenants to respond safely and effectively must be considered.

The Facility Manager may seek to devolve the responsibility onto tenants; however, the question of who co-ordinated the identification, assessment and response will probably return to the person responsible for the overall management of the facility. Most sites are multi-tenanted, including: caterers, retail, child care, carpark operator, other businesses, security and maintenance contractors, and possibly even the Facility Manager’s office. Having each tenant arrange their own emergency management system and security plans without some form of co-ordinated understanding of the capabilities, expectations and planned responses, can only lead to confusion and possibly death. Delegation to tenants may appear to absolve the Facility Manager of providing a safe and secure environment; however, site-wide co-ordination is likely to be raised in later inquiries. If the facility has only one tenant, then overall responsibility may rest with that organisation. Even a single tenant facility may be found to have a range of other organisations on-site. All tenants, including, or perhaps especially, small ones – such as a café or chocolatier – should be involved in site-wide discussions on safety, security and emergencies.

There are three key issues the Facility Manager should ensure are co-ordinated: prevention, detection and response. The roles and responsibilities for these functions vary from site-to-site between: the Facility Manager, the Security Manager, Safety/WHS Manager, and the Chief Warden. All of them have some responsibility for aspects of the preventative and response capabilities, but the Facility Manager has overall responsibility for ensuring that all activities on-site are co-ordinated. The Facility Manager should be aware of how many security, safety, WHS managers, and Chief Wardens are on-site, and whether each tenant has their own or any of these positions.

Prevention is primarily a security function, and is about protection from deliberate human action – in this case: violent attacks by terrorists. Other disciplines worry about mechanical failure, weather events, human stupidity, etc. If security staff are on-site, which is not always the case, they will be the frontline – expected to identify the hazard and step between it and the tenants and visitors. It is worth determining if on-site security has the contracted, or assumed, responsibility to assess incidents and to initiate a response that can result in thousands of people being moved and closing down the facility for hours.

The level of preventive security obviously relates to the function of the site. The general nature of the facility may be open to the public, have highly controlled access or, in most cases, a combination of both with some public areas and some access controlled sections. The site’s protective environment is also dependent on its image: is it a family friendly venue with a discreet security posture or one with a highly visible, deterrent security presence? When considering protection, it is not possible to determine which tenants are likely to be targets. Some may obviously be at greater risk than others, but the presence of visible security measures may drive the terrorist to attack easier and less obvious tenants – such as the recent incident at a café in Martin Place in Sydney.

The reality is that for most facilities, particularly those that seek to be opening and welcoming, it will be difficult to prevent someone from entering public areas and committing acts of violence. For sites that have access control systems, preventing unauthorised entry through a combination of good security policies, procedures and practices supported by technology, should prevent incidents in the secure areas. Of course, this does not stop the “trusted insider”, who has been granted access, from causing harm.

Detection is the primary factor in minimising the effects of an act of violence. Detection relies heavily on staff, particularly those who deal with the public. The staff may work for the Facility Manager, for one of the sub-contractors, or for one of the tenants. The Facility Manager is in a position to co-ordinate awareness and response training with or through the security manager(s), the emergency manager(s), and the Chief Warden(s) for the site. The Facility Manager and other managers need to foster an environment that encourages and does not belittle staff for reporting people, items or incidents that they think are out of place or do not fit. The key is staff being aware of the normal environment and knowing what to do if they see anything they think is out of the ordinary. They need to know to whom they report, how, and what to say.

Incidents that may be out of the ordinary are groups or individuals acting in a furtive manner, appearing to conceal items, wearing inappropriate clothing for the season or event, people who seem inordinately interested in back-of-house areas or how the site works, and of the security and emergency response plans. Actions that raise suspicions may not be the prelude to a terrorist act, it may be the planning or conduct of a range of criminal activities. In all cases it is worth noting and reporting.

A factor the facility Manager may wish to consider is when are they to be advised of an incident. Should the Facility Manager be told when an incident is first reported, during or after the assessment, when the emergency services arrive, or after they have been evacuated?

An appropriate response is fundamental to protecting both lives and business operations. Response should not always equate to an immediate evacuation, the concept of “better safe than sorry” is a fallacy. There is nothing safe in moving thousands of people in a way that they are not used to – unless they are being moved away from a hazard. If an evacuation is initiated when there is no hazard, the tenant’s business will be severely disrupted, and the responsible manager’s judgement called into question. If the site is not evacuated when there is a hazard, people will die. The difficult part is determining whether the incident does pose a hazard.

Even for tenants that have been identified as potential targets and allocated additional security, such as the publishing office in Paris, a determined terrorist may still attack the site, and adjust their planning and weapons to exceed the protective measures.

Management of an incident, particularly a terrorist initiated one, requires accurate information from those who observed the initial event, objective assessment, and implementation of the appropriate response. If there are multiple security providers on-site, comparing their contracted responsibilities and individual response plans is worthwhile, if not essential. It may be that the plans are in conflict with each other. The chain of authority for initiating an evacuation needs to be identified, defined and documented.

Questions that need to be addressed include: who is responsible for assessing the incident; who has authority to respond, particularly if the response includes closing down the site; what are the tenants’ expectations; what are the contracted responsibilities; and what are the legal and ethical responsibilities, particularly of the Facility Manager?

There are specialists with a wealth of knowledge to assist in developing appropriate, site specific policies, procedures and practices. There are also those of less skill. We are seeing a new group of “talking heads” appearing on media outlets, offering advice on terrorism and security. Managers, and particularly Facility Managers, should recognise that security is a management discipline with its own body of knowledge, research and literature. When seeking security guidance, managers should apply the same criteria they would for any other management advisor: appropriate qualifications, relevant security management experience (not just law enforcement or military experience), internationally recognised certifications, membership of appropriate professional associations, relevant professional indemnity insurance, and applicable State/Territory licences. It is unwise to expect suitable advice on managing the protection of life, business, profitability and reputation from anyone without the appropriate skills, qualifications, certifications and experience.

To ensure the site has prevention, detection and response capabilities appropriate for the functions and image of the site, the Facility Manager should ensure that “someone” reviews the co-ordination, communication and co-operation between the parties. Ideally this could be the site’s Chief Warden but probably the best positioned, experienced and relevant person to do so is the Facility Manager. If it is not the person responsible for managing the facility, then who is it?

As a preliminary step, the Facility Manager should review the site’s Emergency Plans, actually read them and walk through them. Are the plans really applicable to the site if they are of the “insert client’s name here” type, with only the diagrams having changed from any other site? Do they reflect what will happen? Do the plans address the actual tenant base; does it include the Child Care Centre; kitchen areas; critical assets; secondary hazards (those things normally on-site and safe until acted upon by an event such as a fire or explosion); what will happen if surrounding buildings also evacuate to the same location? Do the plans actually offer guidance to the Chief Warden or is the plan littered with “Warden makes wise decision here” type statements? Having contracted and paid for Emergency Plans does not mean the resultant product is suitable for the facility.

There are a number of instances where simple compliance with AS3745 “Planning for emergencies in facilities” may not provide appropriate levels of co-ordination, management or safety. If the incident, say a hostage taking or mass shooting event, is external to the building, do the emergency plans adequately address how to “Shelter In Place (SIP)” until a safe response can be identified? Shelter in place gets passing mention in AS3745. In relation to SIP, Facility Managers have a critical role as they are the ones most likely to know where the strongest and most secure areas of the facility are to be found, and how long people can stay in the building – particularly if water or sewerage are cut off. Do the plans provide sensible and relevant guidance on what to do if there is an armed assault, knifing, hostage taking, unattended item, or a post-blast incident?

Communication between parties is critical, not only during an incident but prior to one. Do the various tenants know what is expected of them, do they share information on security measures, and the responsibilities of their wardens and security managers/supervisors, whether they be in-house or contracted? What are the threshold levels for the various tenants to initiate an evacuation? For some, particularly government tenants, an evacuation can be called on a much lower level of confidence that there is a hazard than for corporate tenants that are aware of the financial cost of disrupting the site for three hours or more. If one tenant evacuates, is it expected that others will? What happens if some tenants decide to evacuate and some to shelter in place? How do tenants advise the Facility Manager and Chief Warden that there is an incident? In some new buildings Warden Intercommunication Points (WIP) phones are being designed out, which raises questions over how Area Wardens will be advised of specific response actions if the requirement is not for a full evacuation. What is the Facility Manager’s responsibility for ensuring that all tenants can be advised of the appropriate response as determined by the relevant site-wide authority?

The Martin Place hostage incident of December 2014 raises a number of interesting points. Why surrounding buildings kept staff on-site rather than evacuating them away from the hazard, particularly once it was believed that the gunman was acting alone? What communication systems were in place to advise staff to keep away from windows overlooking the incident, and how was this enforced? Were all tenants, including small ones, contacted and advised of the appropriate response? Was there a Chief Warden for each site, or were tenants responsible for their own decisions as to the appropriate response? Were there safe egress routes that did not expose tenants to the hazard as they evacuated? If not, what alternatives were available? Was security of the site maintained once it was evacuated? Were there plans for the reoccupation process? For government and others with classified or sensitive information, did the emergency plan include the security of hard and soft copy data, and how was this verified? For sites with potentially hazardous areas, how were they managed during the evacuation and how could this have continued over a period of days?

Co-ordination of those involved in providing a safe environment – including, prevention, detection and selection of an appropriate response – may be left to the contracted emergency service planning and training contractor, if it can be demonstrated that the provider did deliver appropriate procedures and training that addressed a wide range of incidents and that all tenants attended and were involved in the planning and training. Otherwise, the Facility Manager may need to suggest that co-ordination meetings with flow-down training and information sharing to all on-site may be of benefit.

As well as the tenants, there are others concerned with the reputation of the site as a safe and secure facility – owners, the organisation with signage rights, insurers, emergency services, regulators, and neighbours.

A factor that will affect the assessment of an incident is where the Facility Manager is geographically located: on-site, in a different building, or even a different city to the particular facility. In which case, who has the local responsibility for providing the safe and disruption free environment?

Facility Managers should be willing to challenge security, emergency and safety reports that fail the “common sense” test, and to send them back to the provider requiring them to be rewritten to reflect the needs and operating environment of the specific facility.

The Facility Manager has a responsibility to ensure that the safety of tenants and visitors is protected through co-ordination of security and emergency management policies, procedures and practices. Knowing that they have a relationship with terrorists, no matter how unwillingly, the Facility Manager cannot be complacent.

Q Security Partners With FLIR Systems

FLIR N133EB_N133ED_N233EE2Industry powerhouse Q Security Systems has today announced its partnership with FLIR Systems, one of the most trusted respected names in thermal imaging technology.

This new partnership will see Q Security Systems become the exclusive Australian distributor for FLIR’s new IP Visual range. Included in the new range is a wide array of dome, PTZ and bullet cameras. However, perhaps the most exciting aspect of the new range from FLIR, aside from the highly cost effective price tag for a class leading product, is the launch of the new FLIR Cloud.

According to Q Security Systems CEO Rob Rosa, “FLIR Cloud™ is a cloud-enabled software platform designed to connect to all FLIR NVRs and MPX DVRs giving end users centralized control over multiple FLIR systems across multiple sites from any Windows or Mac computer.”

“This is an extremely exciting time to be launching a partnership with an industry leader like FLIR as we believe the new FLIR Cloud takes a proven, industry leading product and makes it even better by ensuring users can quickly, easily and painlessly connect to FLIR cameras via a quick and simple 3-step setup process that makes complicated networking and port forwarding a relic of the past.”

According to Rosa, “Users need only download the CMS, enter the unique Device ID printed on the system label (or a free FLIR DDNS address) and create a personalized password. FLIR Cloud™ servers instantly connect your system over the Internet via the Device ID, enabling a secure handshake between the FLIR system and the viewing device.”

“The new range of FLIR cameras combined with the FLIR Cloud is truly amazing,” states Rosa. “This is the first time I have seen a solution where users can quickly and easily set up a world-class surveillance center with up to 64 cameras on each screen and multi-monitor support easily.”

Once up and running, users need only click and drag the mouse to zoom in on live or recorded video and aim PTZ cameras. Furthermore, they can enhance their monitoring capabilities with E-maps, custom views, alerts, multiple user accounts and other advanced features.

“Without doubt, the most outstanding feature of this new system, and one of the main reasons we are so excited to launch the partnership at this point in time, is the ease with which the FLIR Cloud and FLIR cameras work”

Backed by a three year warranty and the promise of quality and reliability that is the FLIR brand, the new cost effective camera range from FLIR is set to see thermal imaging become an important part of every CCTV installation.

For more information on the FLIR range or the FLIR CMS Cloud visit Q Security at  qsecuritysystems.com.au

 

A Very Brief Introduction To Surveillance Detection

pic1There has been a great deal of discussion lately around the potential for homegrown terrorism potentially carried out by young men returning to Australia from the conflict in Syria feeling disillusioned, angry and radicalised by their experiences and exposure to people who would see harm done to Australian citizens and businesses. To that end, the Australian Government is working hard with Australian security agencies to detect and deter such individuals before they can carry out any sort of attack. However, as everyone knows, it only takes one person.

Therefore, the question becomes, what can the security industry do to play a role in preventing terrorist attacks on Australian soil? One possible course of action is to better understand the process undertaken by individuals intent on carry out attacks with a view to thwarting attacks and better protecting shopping centres, sports stadiums, public transport terminals and so on.

Surveillance detection (SD) is the attempt to covertly determine if surveillance is being conducted and, if so, to collect general information on the surveillance entity – time, location, appearance, actions and correlations to the target.

Before introducing some of the fundamentals of this subject, following are some general clarifications about the intentions behind this article:

  • The field of SD is both wide and deep, and many of its fundamental principles admit some exceptions, and even exceptions to the exceptions. The purpose of this article is to provide a simple and brief introduction. It is therefore important to keep in mind that no such introduction can possibly contain the countless details and case-by-case contingencies and exceptions that exist.
  • No article, book or seminar can be said to actually teach people how to perform SD. Though some of the wording in this article might seem instructional, this is primarily for the sake of brevity; it is not intended to teach anyone how to execute surveillance detection operations.

A good way to begin explaining surveillance detection is to break it into its two components:

  1. Understanding what to look for – what it is about other people that needs to be detected.
  2. Understanding how and from where to look – what it is about the SD operative that will enable him or her to look for surveillance (SD location, appearance, demeanour and so on).

What to Look For

Many people tend to think that in order to detect surveillance, one should try to spot anyone who seems suspicious, out of place, nervous, or taking a special interest in the asset in question (such as intently observing, taking notes, photographing or videotaping). Though these factors might exist, it is important to note that rather obvious indicators of this sort will only be detected if the level at which the surveillance is being carried out is low. In other words, the very first thing that a well-trained surveillance operative will learn is how to NOT display any of the above indicators. Operatives can always hope for easily detectable surveillance indicators (and should always look for them), but they would be wise to also try to detect the less obvious indicators of surveillance as well.

The single most important indicator that a person might be conducting surveillance (on any level) is the person’s correlation to the target. If the term correlation seems a bit vague or general that is because it is. This is one of the reasons why surveillance can be quite difficult to detect, especially the higher levels of surveillance when correlations are at their most subtle. In general, a correlation can be any act of observation, movement, signalling, communication, or even just presence over time and distance in some kind of conjunction with the location, timing and/or movements of the target. And though there are ways to blur and camouflage these types of correlations, except for very rare cases there is no real way to completely eliminate them while still conducting effective physical surveillance.

The best way to understand what correlations to a target might look like, and why they almost always exist when surveillance is carried out, is to experience how it actually feels to conduct surveillance and to therefore correlate to a target oneself. After an operative experiences how surveillance feels in the flesh, he will be much better positioned to spot people who are going through the same experience. In much the same way, casinos and fraud detection units have been known to hire ex-cheats, frauds and con artists, who have become extremely adept at detecting the very same tricks they themselves used to employ. This is a relatively rare situation when ‘it takes one to know one’ – or at least to detect one.

Hostile surveillance is a process that begins by understanding the area around a target, locating potential vantage points and understanding what kinds of people spend time at the vantage points (what they do, what they look like and so on). A vantage point is a location from which the operative can conduct surveillance on a target, and a good surveillance vantage point is one that gives the operative access to important visual information, while allowing him to appear completely natural. Good vantage points might be coffee shops, park benches, crowded areas, or any environment into which the surveillance operative can naturally blend while observing the target.

What makes surveillance so difficult, however, is that as seemingly normal as an operative might strive to appear, the fact will always remain that there is a constant tension – or even a contradiction – between how the surveillance operative appears and what the operative is actually doing. And it is within the scope of what the operative is actually doing – visually collecting information on the target – that most surveillance correlations are to be found. Hiding or blending in is easy if the focus is to hide and blend in. But if the operative is also trying to visually collect information on a target, spot a particular action or movement of a target, or observe changes and habits of a target, then as subtle as they may be, correlations to the target are almost inevitable.

The simple act of observing a target is a correlation. Moving in conjunction with or following a target is another type of correlation. Paying close attention to the target at specific key moments can be a type of correlation. Signalling, gesturing, hiding, telephoning, texting, or even just checking the time in conjunction with a target’s movements or activities can all be a correlation. A particularly difficult correlation to detect is what is called correlation over time and/or distance. If, for example, the target is a CEO who is staying at a hotel for a week while on a business trip, a correlation can be something as subtle as an individual spending every morning at that hotel lobby, every day for the duration of that week. Even if the individual does not appear to be observing, filming, or communicating as the CEO moves through the hotel lobby (there are a number of electronic tools that can make these actions very difficult to detect), the simple presence of the individual over time can be a correlation in itself. If the CEO happens to be on a multi-city business trip and the same individual in question is seen spending time in the lobby of each hotel the CEO is staying at, then, again, even without correlating in action, merely being present over time and distance in conjunction with the CEO can be a type of a correlation.

How and From Where to Look

With an understanding of what to look for, the question now becomes how and from where should operatives look for it? To answer this question, it is necessary to understand two things:

  1. A correlation, not unlike an equation, has two sides to it. In this case, the two sides are the target and the surveillance operative. Therefore, to establish whether or not a correlation exists, in most cases, it is necessary to be able to observe both sides of the correlation – simultaneously if possible. Exceptions to this rule do exist, where surveillance can be detected without also observing the target, but these usually require the SD operative to either have advanced knowledge of the target’s exact movements, timing, actions and so on and/or to be in covert communication with either the target itself, or (in most cases) the target’s security or close protection unit.
  2. Since SD needs to be done covertly (without the surveillance operative noticing it), an SD vantage point should be one that gives the SD operative a single field of vision that includes both the potential surveillance vantage point and the target – that is, one that does not require turning one’s head back and forth (the above-mentioned exception applies here as well).

The ideal SD vantage point, therefore, will be somewhere behind the potential surveillance vantage point. In this way, not only will an SD operative be able to simultaneously see both sides of the correlation (target and surveillance operative), but it will be easier for the SD operative to remain hidden from the surveillance operative. For example, if an outward-facing bench at the edge of a nearby park is recognised (mapped out) as a good potential surveillance vantage point on a company headquarters, a potential SD vantage point might be a bench further back in the park, overlooking both the surveillance vantage point bench and the company headquarters.

It is important to remember that convenient notions of ideal SD situations or ideal SD vantage points often tend to crash on the hard rocks of field reality. Ideal situations, in other words, are not always available, and one of the most important purposes of realistic field training is to learn how to deal with less than ideal conditions and still get the job done.

Ami Toben is the director of consulting, training and special operations at HighCom Security Services, a security and investigation company based in the San Francisco Bay area in the US. He is an experienced security director, trainer, account manager and published writer with over 14 years of military and private sector security experience and a successful record of providing high-end services to Fortune 500 corporations, government and law enforcement agencies, foundations and wealthy individuals. His professional experience includes: full-spectrum facility security operations, special-event security, executive protection, low-profile and covert security projects, metal detector operations, estate security, shareholder meeting security, surveillance and surveillance detection projects.

Dutch Consul-General Gives Boon Edam Australia the Seal of Approval New doors open for Boon Edam in Australia

Boon EdamMELBOURNE: 17 July 2015 Royal Boon Edam, the world leading entry expert and provider of sustainable, secure entry services, has launched its highly anticipated Speedlane Lifeline series of security entry barriers into the Australian market through its own Australian subsidiary. Launched during the Security Conference & Exhibition in Melbourne, with the well appreciated support of the Dutch Consul-General Willem Cosijn, last week marked the beginning of a new chapter in the long 140 year history of Boon Edam.

Supporting Dutch Businesses in Australia

Boon Edam has a long history in Australia through distribution partners, but is now ready to stand on its own feet in a strong and mature market. “One of my main jobs as a Consul-General of the Kingdom of the Netherlands, is supporting Dutch businesses in Australia and developing trade opportunities in horticulture, agriculture, manufacturing and logistics that can benefit from mutual cooperation,” the Consul-General says. “Royal Boon Edam is such a valued brand that I am proud to showcase them as a quality, Dutch business.” The company will offer its full portfolio of products and services along with its valued reputation as the leading supplier of revolving doors, secure entry solutions, supported by premium service.

Expertise the Australian Market Deserves

Since 1873 Boon Edam has been developing premium entrance products and has built up over 140 years of experience through innovation and customer service expertise. One of the primary reasons for bringing the business to Australia is to guarantee the premium service levels that have made the company such a household name across the globe. ‘’Australia has shown a continuous positive trend in the economy and is a mature market for sustainable and secure building entrance solutions. Combined with a clear emphasis on quality, life cycle costs, comfort and design that makes up for a very healthy combination with a lot of potential for Boon Edam. Our own presence also ensures that we can provide the best possible service to various global customers that are active in Australia.’’ says Lourens Beijer, Royal Boon Edam International’s Chief Commercial Officer.

What it is to be Royal

Boon Edam’s focus on quality and customer satisfaction was clearly rewarded when it was honoured with the Dutch Royal mark in 2004. “This is not a mark that comes for free,” the Consul-General says. Companies only receive the Royal mark from the Dutch Royal house when they are considered trustworthy, reliable and make state of the art products. It is awarded to businesses that are continuously held in high-esteem and have shown to be exceptionally faithful to proper ethics in doing business. In many markets this Royal seal of approval supports customers to recognise what Boon Edam stands for.

As a man who believes in first impressions, the Consul-General estimates Royal Boon Edam and the new Speedlane Lifeline series will have an immediate impact in the Australian market. “It is important to make a very good first impression, and that should start at the door with Boon Edam products and services.”

Find out more about Boon Edam Australia: www.boonedam.com.au

For more information please contact:
Tia Metaxas
Marketing Executive
03 9692 7600
info@boonedam.com.au

About Royal Boon Edam

Royal Boon Edam is a global market leader in entry solutions. Headquartered in the Netherlands, with 140 years of experience in engineering quality, we have gained extensive expertise in managing the movement of people through office buildings, airports, healthcare facilities, hotels and many other types of buildings. We are focused on providing an optimal experience for our clients and their clients. By working together our clients, we help determine the exact requirements for the mobility hotspot in and around your building and develop a solution that is customised for you in three key areas: sustainability, security and service.

With a distribution network that spans the globe, we are able to offer the Boon Edam experience anywhere, anytime. Our manufacturing facilities are based in the Netherlands, China and the United States of America allowing us to produce as close to our markets as possible and creating shorter transportation paths. A network of twenty subsidiary companies in Europe, Asia and the Americas and distributors in over 55 other countries combine the global expertise of Royal Boon Edam with intimate knowledge of your local market requirements.

Reputation Risk And The Cyber-Enemy Within

hack-320At a time when organisations worry about cyber-security threats from hackers, criminals, competitors and foreign governments, many fail to properly recognise the operational and reputational risk from insider security breaches.

This was highlighted last month when a disgruntled 26-year-old IT engineer appeared in court in Melbourne after he hacked into his employer’s mainframe computer because he felt he was ‘under appreciated.’ His defence claimed he planned to appear a ‘hero’ by demonstrating his skills in restoring the system.  But the Magistrate didn’t see it like that and denounced his “pernicious, vile and vicious” act.

Similarly, last year the UK supermarket group Wm Morrison had payroll information and bank account numbers of 100,000 staff stolen by an employee and posted online.  In that case the reputational damage for Morrison’s was further compounded by the fact that just weeks earlier the Bradford-based company’s former Group Treasurer was charged with two counts of insider dealing after trading in shares of an associated company before a major announcement.

Despite the current rash of headline-grabbing major data breaches by activists and criminals – think no further than the hack attack on Sony – assaults by insiders are far more prevalent.   The latest PwC cybercrime survey of security, IT and business executives shows that total security incidents detected by respondents increased 48% year on year, with those caused by current or former employees being by far the largest category. The report found that the percentage of respondents who point the finger at current employees rose by 10%, and almost one third of respondents said insider crimes were more costly and more damaging than those perpetrated by outsiders.

When it comes to damage, it’s easy to forget that two of the highest profile cyber-breaches in recent years were committed by insiders.  Private Bradley Manning walked off-base with classified military information and gave it to Wikileaks, and Daniel Snowden stole and released millions of sensitive files while working for a defence contractor.  Yet amid all the resulting panic over issues of national, political and military security, both these notorious cases were basically insider breaches by employees, albeit that they caused massive damage.

And it’s this fear of exposure to potential damage which helps ensure the full extent of insider attacks is largely hidden from public view.  In fact, 75% of the respondent in the PwC cyber crime survey said they did not involve law enforcement or bring legal charges in compromises committed by insiders.

The desire to avoid embarrassment and adverse publicity is understandable, yet organisations remain highly vulnerable.  The PwC report found less than half of respondents (49%) said they had a cross-organisation team which regularly convenes to discuss coordinate and communicate about issues involving information security.  With insider cyber-attacks on the rise, the risk of reputational damage or an operational crisis is very real, and this threat demands a much higher level of management commitment and communication planning.

Honoring Our Heros

Australian Security Medals Foundation (ASMF) Gala dinnerThe Australian Security Medals Foundation (ASMF) has once again celebrated the achievements of outstanding personnel in the security industry at its annual Gala dinner and awards night held this year at the Australian War Memorial in Canberra on Friday July 19th.

Each year, the ASMF, through nominations submitted by both members of the security industry and the broader community, identified and awards two categories of medals:

  • The Australian Security Medal of Valour (ASMV), recognising acts of bravery and initiative; and
  • The Australian Security Medal (ASM), recognising contribution to security professionalism and providing examples of outstanding citizenship, positive leadership, insights or influence at a strategic management level.

This year, the Australian Security Medals Foundation awarded five Australian Security Medals for Valour. Recipients included:

  • Matthew Newman – for his bravery and quick thinking in protecting innocent bystanders from a knife wielding offender at a local Sydney shopping complex
  • Jye Nevins – for his quick actions in helping police detain an armed offender, despite receiving knife related injuries in the process
  • Emir Balicevac  and Gary Jannese – for their calm and professional actions, demonstrating not only bravery but also extraordinary compassion in saving a young a man’s life who was both intoxicated and highly agitated and intent on self harm.
  • Charlie Erdogdu – who without hesitation acted to stop a man in a busy Sydney mall who, while in a highly agitated and disturbed state, had dowsed himself and the area around in in kerosene with the intent of setting himself and other alight.

The foundation also awarded five Australian Security Medals to distinguished individuals including:

  • NSW Police Deputy Commissioner Nick Kaldas – for his years of support to the security industry, working behind the scenes to foster greater relationships between private security and police.
  • George Zeitoune – for outstanding efforts working with the community in his role as a security professional to assist young men and women through community programs he has pioneered.
  • Neville Kiely – for his consistent committed over the years to getting the security industry and its customers to adopt a standard-based approach to alarm installation and use. As part of his commitment, he has funded educational material for consumers and provided staff to share knowledge with consumers, as well as other security companies in addition to his volunteer work with a number of different industry group.
  • Tom Roche of SNP – for his tireless charity work as well and the role he has played in helping to drive industry standards and develop and mentor new industry leaders through programs such as iLead.
  • Kathy Pavlich – for her decades of work in educating, mentoring and guiding people in the security industry.

For more information about the Australian Security Medals Foundation and current and past recipients, please visit inspiringsecurity.com

 

 

 

HILLS SIGNS UP AS MASTER AUSTRALIAN VIVOTEK

SurveillanceHills has signed a new agreement to be the master Australian distributor of the world’s leading IP surveillance solution brand, VIVOTEK from 1 July 2015.

Daniel Lee, Head of Hills CCTV and IT practice welcomed the VIVOTEK range to the Hills stable of camera products and will mark the new alliance with a VIVOTEK showcase at the upcoming ASIAL security show in Melbourne.

“We are committed to meeting the diverse range of customer needs which is why we are delighted to bring VIVOTEK to our range.

“Hills is proud to be able to offer our customers one of Australia’s biggest ranges of network camera options,” Daniel Lee said.

VIVOTEK is pleased to work with Hills as a distributor in the Australian market: “Both Hills and VIVOTEK are committed to deliver innovative, best in class surveillance products to customers.
“Hills is a strategically important partner of VIVOTEK. As its expertise in surveillance products and channel management, we believe both companies can be benefit from this partnership.” says William Ku, Vice President, VIVOTEK.

In addition, HILLS will showcase the industry-leading surveillance solutions of VIVOTEK during Securing Expo, including the Ultra-Megapixel fisheye network camera, FE8391-V; the 5-Megapixel mini fisheye network camera, FE8180; and the world’s first PoE switch with IP surveillance management functions, VivoCam PoE switch.

Do Directors Really Know What Duties They Owe Under The Law?

It is amazing how many people in the security industry open businesses based on the idea ‘I can do it better’. While entrepreneurial spirit is a great thing, those same people often do not give a great deal of thought to the ramifications of taking on the position of director of a company.

Source of Directors’ Duties

Duties are imposed on directors through a number of sources, including:

  • statute or legislation
  • case law or court-made law
  • the constitution of the company.

Statute or legislation refers largely to the Corporations Act 2001 (Commonwealth) (the Act) which is an Act of Parliament that sets out various legal provisions, including directors’ duties and penalties applicable if those duties are breached.

Case law (also known as common law) is law created by courts. Often such laws arise where there are gaps in the legislation/statute and when the courts are called upon to define how statute should be applied to particular cases.

The company constitution is the document which sets out various rules that apply in relation to the particular company. The provisions of a standard constitution are often adopted from legislative provisions.

Due to the substantive nature of the above matters, this article only explores those duties on directors which are imposed by legislation.

Who is a Director?

Section 9 of the Act defines a director of a company or other body as including:

  • a person who is appointed to the position of director or alternate director regardless of the name that is given to his or her position, and
  • most importantly and interestingly, a person who is not validly appointed as a director, but either:
  • that person acts in the position of a director, or
  • the directors of the company or body are accustomed to act in accordance with that person’s instructions or wishes.

Therefore, even the statutory definition of director means that people other than those who are clearly appointed as being one can still be viewed as owing the duties of directors under statute/legislation and case-made law.

Statutory or Legislative Duties Owed by Directors

  1. Section 180 (1) – Duty of care and diligence and the business judgment rule

This section requires a director or other officer of a company to exercise his powers and discharge his duties with a degree of care and diligence that a reasonable person would exercise if they:

  • were a director or officer of a corporation in that corporation’s circumstances, and
  • occupied the office held by, and had the same responsibilities within the corporation as, the director or officer.
  1. Section 180 (2) – The business judgment rule

This section states that a director or other officer of a corporation who makes a business judgment is taken to meet the requirements of section 180 (1) and his equivalent duties at common law and in equity in respect of a judgment if he:

  • makes the judgment in good faith for a proper purpose, and
  • does not have a material personal interest in the subject matter of the judgment, and
  • informs himself about the subject matter of the judgment to the extent that he reasonably believes to be appropriate, and
  • rationally believes that the judgment is in the best interests of the corporation.

A ‘business judgment’ is taken to be any decision (including to omit to do something) relating to the business operations of a corporation.

It is not sufficient for a director to simply deny being aware of the risks of having the company transact in certain ways without having carried out due diligence or informed himself of the risks of the transaction.

  1. Section 181 – Duty of good faith

Section 181 (1) of the Act states that a director or other officer of a corporation must exercise his powers and discharge his duties:

  • in good faith in the best interests of the corporation, and
  • for a proper purpose.

A director might be found in breach of this provision even if he believes that he is acting honestly.

  1. Section 182 – Duty not to make improper use of position

Section 182 (1) of the Act states that a director, secretary, other officer or employee of a corporation must not improperly use his position to:

  • gain an advantage for himself or someone else, or
  • cause detriment to the corporation.

A director can be found in breach of this duty even if he or another person does not in fact receive some form of benefit or cause some form of loss to the corporation if he is found to have conducted himself with the intention and purpose of obtaining the benefit or causing the detriment.

An example would be where a director uses information which he learned through his position in the corporation (and which was not public knowledge) to have the company engage in a transaction which benefitted himself or his family. A well-known example would be what is commonly referred to in the media as insider trading.

  1. Section 183 – Duty not to make improper use of information

Section 183 (1) of the Act states that a person who obtains information because he is, or has been, a director or other officer or employee of a corporation must not improperly use the information to:

  • gain an advantage for himself or for someone else, or
  • cause detriment to the corporation.

Again, regardless of whether an advantage is obtained or a detriment is caused, a director or former director can still be found in breach of this duty if he has the intention and purpose of obtaining such an advantage or causing detriment. Again, insider trading would fall into this type of category.

  1. Section 184 – Criminal offences

Directors can also become liable for criminal offences under the Act in certain circumstances. The penalties for criminal offences tend to be more severe and can involve imprisonment. The main penalties for criminal offences arise under section 184 of the Act. The following is a summary of the types of scenarios in which criminal liability can ensue.

  • Where a director is reckless or intentionally dishonest and fails to exercise his powers and discharge his duties:
  • in good faith in the best interests of the corporation, or
  • for a proper purpose.
  • Where a director uses his position dishonestly:
    • with the intention of:
    • gaining an advantage for himself or someone else, or
    • causing detriment to the corporation, or
    • recklessly as to whether the use may result in him or someone else:
    • gaining an advantage, or
    • causing a detriment to the corporation.
  • Where a person obtains information because he is or had been a director or other officer or employee of a corporation if he uses that information dishonestly:
    • with the intention of:
    • gaining an advantage for himself or someone else, or
    • causing detriment to the corporation, or
    • recklessly as to whether the use may result in:
    • him or someone else gaining an advantage, or
    • causing detriment to the corporation.
  1. Section 588G – Duty not to trade whilst insolvent

Section 588G of the Act also imposes a duty on a director to avoid the corporation trading whilst insolvent. A corporation is deemed to be insolvent when it is unable to pay its debts as and when they fall due and payable.

A director will be in breach of this duty if:

  • he is or was a director of the corporation at the time it incurred a debt, and
  • the corporation was insolvent at that time or becomes insolvent by incurring that debt, and
  • at the time of incurring the debt, there were reasonable grounds for suspecting that the company was insolvent or would become insolvent as a result of incurring the debt.

However, the following defences are open to such a director:

  • where it can be proved that, at the time that the debt was incurred, that the person had reasonable grounds to expect, and did expect, that the company could pay its debts as they fell due and became payable and that it would remain in that position even if it incurred the debt.
  • where the person, at the time that the debt was incurred had reasonable grounds to believe and did in fact believe that:
  • a competent and reliable person was responsible for providing adequate information about whether the company was solvent, and
  • that other person was fulfilling that responsibility, and
  • on the basis of the information provided that the company was solvent at the time and would remain solvent upon incurring that debt and any other debts at that time.
  • in the case of a director, where at the time that the debt was incurred by the corporation, that director did not take part in the management of the company because of illness or for some other good reason.
  • if the director took all reasonable steps to prevent the corporation from incurring the debt.

So, in summary, becoming a director of a company has many implications. For that reason, it is imperative that anyone taking on this role is aware of those duties and responsibilities so that he at least has the knowledge to hopefully avoid situations that may lead to a breach of any of those duties.

Half Aussie IT Managers Report Weekly Cyber Breach

A new report released today by Centrify Corporation reveals that nearly half of Australian IT managers believe their organisations experience attempted data breaches every week.

While major breaches at iconic brands like Sony and Office of Personnel Management in the US make headlines, Centrify, the leader in securing identities from cyber threats, commissioned the survey to evaluate the frequency of breaches on organisations that do not make the front page.

Results show not only that corporations are vulnerable to attack, they validate Centrify’s hypothesis that protecting identity is at the heart of protecting data.

The survey reports that 46 per cent of IT managers believe their organisations had experienced an attempted security breach in the previous seven days. Incredibly, 13 per cent — one in eight — believed that such an attack had occurred in the previous 60 seconds.

Reflecting this concern, a majority of these IT managers (56 per cent) nominate security as their biggest concern for the next year, closely followed by cloud computing (55 per cent). The third most pressing concern was mobile applications and management (21 per cent).

The survey of more than 100 IT attendees at last month’s AusCERT event aimed to find out if corporations are as secure as they need to be. These Australian findings tally with the results of Centrify research undertaken in the US and the UK where security is also a leading concern. Centrify has a well-established presence in Australia and New Zealand, with clients ranging from small businesses to large corporations and government agencies.

Centrify Senior Director APAC Sales Niall King said the survey findings reinforced what customers were telling Centrify. “The combination of cloud computing and mobile access is creating incredible security headaches for organisations globally.”

“Because Australia is an early adopter of technology, our IT managers are already feeling the stress of defending against the vulnerabilities created by this convergence of mobility and ubiquitous access.”

“At Centrify, we believe that identity is the new perimeter. The good news is that with the right tools in place, you can protect your organisation against unrelenting attacks,” he continued.

A clear finding from the survey is that most IT managers (83 per cent) are as concerned or more concerned about security breaches at their organisations than they were 12 months ago. Only five per cent are less concerned.

Mr. King said Centrify was committed to providing organisations with the tools they needed to secure an evolving corporate perimeter. “The challenge is that today’s corporate perimeter has nothing to do with physical headquarters and contains data that resides in the cloud and on the numerous devices employees and contractors use in the field,” he said.

“As employees reach for the cloud or their mobiles to get their jobs done, it opens up greater security vulnerabilities. As a result, there is greater need than ever for unified identity security across multiple devices and platforms. It’s our hope that this survey helps convince IT decision makers to take steps now to enhance identity management before hackers find holes and exploit them.”

For media assistance in Australia, call John Harris on 08 8431 4000.

About Centrify

Centrify strengthens enterprise security by managing and securing identities from cyber threats. As organisations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With our platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. More than 5000 customers, including half of the Fortune 50 and more than 80 Federal agencies in the US, leverage Centrify to secure identities. Learn more at www.centrify.com

Our mailing address is:
Impress Media Australia
Box 95
Adelaide, SA 5000
Australia

Icom IP100 H

We look at Icom’s compact, yet powerful IP100H WLAN or IP radio system. Measuring only 95 mm high (~3.7 inches) and weighing 205 grams, the IP100H is one of the smallest professional radios on the market.