PRESENTATION OF THE PROPOSED SECURITY INDUSTRY REGULATION BILL, 2001 by Francois Slabbert Manager: Legislation and Policy Development 02 May 2001.

Slides:



Advertisements
Similar presentations
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
Advertisements

International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
Domestication and Implementation Package B The duty to prevent torture and other ill treatment © The Article 5 Initiative, 2013.
Report Writing Unit III. What is a business report?  A business report is an oral presentation or written business document that provides information,
TECHNICAL VOCATIONAL EDUCATIONAL AND TRAINING COLLEGES AN INTRODUCTION TO THE IMPEMENTATION OF A COMPLIANT RISK MANAGEMENT PROCESS July 2014.
>>0 >>1 >> 2 >> 3 >> 4 >> “PROPERTY CONCEPTS REVISITED”
PRESENTATION ON THE SAFETY AT SPORTS AND RECREATIONAL EVENTS BILL TO THE PORTFOLIO COMMITTEE ON SPORT AND RECREATION TUESDAY, 18 AUGUST 2009 Private Security.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Health and safety at work
Theme 7: Occupational Health and Safety Act 85 of 1993
Competition law and Article 8 ECHR VMR, 13 March 2008 Jolien Schukking.
Circulation of authentic instruments under Regulation 650/2012 speaker – Ivaylo Ivanov – Bulgarian Notary Chamber.
1 driven by knowledge and experience 1 CHARITIES ACT 2009 ELECTORAL ACTS 1997 – 2002 PRESENTATION BY JOE O’MALLEY Partner At OPEN on 29 June 2011.
Fall 2013 Select Issues With Respect to the Filing of Chapter 9 Bankruptcy by the City of Detroit J. Robert Stoll Mayer Brown LLP Visiting Professor University.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Student ID:MA3N0202 Name: Li-Wen Chang(Jenny) 1.  What’s the “Financial supervision mechanism”  The Financial Supervisory Commission (FSC)  Case ─
Planning an Audit The Audit Process consists of the following phases:
Agreement on Anti-Dumping Measures Anti - Dumping Importers would like to import goods if available at a price lower than that of the good in the importing.
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
Private Stock Offerings. Three popular and distinct types of private (non-public) stock offerings: Regulation D Series (known as Private Placement Memorandum.
Supervision and regulation of banking system duty is given to a autonomous organization called Banking Regulation and Supervision Agency. BRSA is public.
National Smartcard Project Work Package 8 – Corporate Structures Report.
DEPARTMENT: AGRICULTURE SELECT COMMITTEE ON LAND AND ENVIRONMENTAL AFFAIRS AGRICULTURAL PRODUCE AGENTS AMENDMENT BILL 30 September 2003.
Business Ethics Lecture Rights and Duties 1.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
PRESENTATION TO THE NCOP ON THE CONVENTION ON INTERNATIONAL INTERESTS IN MOBILE EQUIPMENT BILL, MARCH 2007.
State Information Technology Agency Amendment Bill State Information Technology Agency Amendment Bill [B 24B -2002] September 2002.
TOURISM BILL “ THE CONTENTS ” Friday; 17 May 2013.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Petroleum Pipelines Bill June SAPIA supports regulation of the petroleum pipelines industry  Industry is of vital national importance  Key to.
Medical Schemes Amendment Bill, 2002 Department of Health Briefing to Portfolio Committee on Health 3 September 2002.
1 DD/krs/ Sentech presentation to the PC on Science & Technology on the South African National Space Agency FINAL 04 June 08 SENTECH PRESENTATION TO THE.
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development South African Post Office Bill, [B2-2010] Department of Communications.
PUBLIC ADMINISTRATION MANAGEMENT BILL PRESENTATION TO THE PORTFOLIO COMMITTEE ON PUBLIC SERVICE AND ADMINISTRATION 27 FEBRUARY 2014.
PRESENTATION TO THE SELECT COMMITTEE ON PUBLIC SERVICES: RENTAL HOUSING AMENDMENT BILL C SEPTEMBER: MINISTER OF HUMAN SETTLEMENTS DATE: 4 MARCH 2014.
MR THEMBA WAKASHE DIRECTOR-GENERAL DEPARTMENT OF ARTS AND CULTURE PRESENTATION OF THE DAC LEGISLATIVE PROGRAMME 2010 TO THE PORTFOLIO COMMITTEE OF ARTS.
SOUTH AFRICAN WEATHER SERVICE AMENDMENT BILL, 2013 Briefing to the Portfolio Committee on Water and Environmental Affairs 25 July
Introduction zPrivate Security Industry Regulation Act, No.56 of 2001, provides for the regulation of the private security industry. zPrivate Security.
1 This project is supported by the European Union 3 rd MEDREG-IMME Seminar Reform and Opening of Maghreb Electricity Markets September 2013 MRA (Malta)
1 SUBMISSION TO THE PARLIAMENTARY PORTFOLIO COMMITTEE ON POLICE “THE PRIVATE SECURITY INDUSTRY REGULATION AMENDMENT BILL, 2012” PRESENTED BY: C LOUW 1.
Section 25 Company Registration. Section 25 Registration  The section 25 company registration is tested for the comfort of the government an company.
INTRODUCTION TO CZECH BUSINESS LAW 1 Time & Location Thursday10-12 a.m. Grading – criteria Participation in lectures - 50% Presentations Discussion Test.
FORMATION OF COMPANY. Steps for formation of a company  Electronic filing of form  Incorporation of company  Certificate of incorporation  Promoter.
Corporate forms in Ghana. Corporate environment is made up of registered companies, statutory corporations, sole proprietorships, incorporated private.
Advisory Bodies: The Brown Act, the First Amendment and Other Issues California Council of School Attorneys May 15, 2009 Burlingame, California © 2009.
Company LOGO Chapter4 Internal control systems. Internal control  It is any action taken by management to enhance the likelihood that established objectives.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 6 – Company Law Bilateral screening:
Commercial Law and International Transactions Basic Information on the Course Time & Location: –Thursday; room a.m. Commercial Law (lecturer.
ComplianceAid Caribbean Basin AML Conference 2016 “How to End a Relationship Under AML” Randy Graham, CEO March 10, 2016.
National Credit Bill 10 August 2005 Mike Falconer Karen Pinheiro.
Europe’s ‘Highly Competitive Social Market’ Economy
(Auditing & Accounting) Bill, 2003
Dispute Resolution Between ICT Service Providers in Saudi Arabia
(Portfolio Committee on Justice and Correctional Services)
PRESENTATION OF MONTENEGRO
MILITARY OMBUD BILL JUNE 2011 Gen Mmono
SCOPE Aim Background Proposal 1 Proposal 2 Proposal 3 Proposal 4
Overview of the Electricity Regulation Bill
Data protection issues in regulatory investigations
PRESENTATION OF THE AUTHORITY’S ANNUAL REPORT TO THE PORTFOLIO COMMITTEE ON SAFETY & SECURITY 4TH NOVEMBER Private Security Industry Regulatory.
Learning Lab Workshop: Protecting Human Rights through PSIRA’s Code of Conduct 13 November 2017 Margaret Gichanga: Research and Development Unit
TITLE PRESENTATIONDATE AUTHOR JOBTITLE.
OHSC 2018 CONSULTATIVE WORKSHOP - GAUTENG PROVINCE ENFORCEMENT
LEGAL REQUIREMENTS FOR ACT 13 OF 2006
Telkom Submission on the National Credit Bill
Summary Slide TELKOM SA LTD ORAL SUBMISSION
© 2013 Sri U-Thong Limited. All rights reserved
DEPARTMENT OF PUBLIC WORKS PRESENTATION: COMMENTS ON THE FOREIGN SERVICE BILL [B ]
Presentation transcript:

PRESENTATION OF THE PROPOSED SECURITY INDUSTRY REGULATION BILL, 2001 by Francois Slabbert Manager: Legislation and Policy Development 02 May 2001

INTRODUCTORY OBSERVATION  To our understanding certain operations, operational divisions and personnel of Telkom are required to comply with specific provisions of the Bill, which in terms of its objects is meant to apply to the private security, private investigations and related industries only.

BUSINESS UNITS POTENTIALLY EFFECTED BY THE BILL  The following in-house operational units, functionaries and support personnel of Telkom are potentially effected by the Bill:  its in-house security and investigations section,  its market research section,  its market intelligence section,  its mergers and acquisitions section,

 its credit control section,  its collections division,  its personnel division,  its risk management section, and  its information technology (IT) security division.

 The aforementioned functional units, functionaries and support personnel will fall under the jurisdiction of and be regulated or prescribed to by inter alia: ADDITIONAL REGULATIONS FOR REGULATED INDUSTRIES

 the Security Industries Regulations Act;  regulations promulgated pursuant thereto;  the Minister of Safety and Security;  the Security Industry Regulatory Authority;  the Security Officers Board; and  the code of conduct for security service providers.

REGISTRATION AS SECURITY SERVICE PROVIDER  Telkom and other non-security entities might arguably be obliged either to:  register as security service provider with the Security Industry Regulatory Authority, or  if unable to comply with the qualifying registration criteria or a failure to obtain exemption from the Minister close down its business investigations, intelligence and associated activities.

OBJECT OF THE BILL  The sole stated purpose of the Bill is "To provide for the regulation of the security industry; for that purpose to establish a regulatory authority; and to provide for mattes connected therewith".

MOTIVATION FOR THE EXCLUSION OF NON-SECURITY INDUSTRIES FROM THE APPLICATION OF THE BILL  Telkom submits that as a public company -duly incorporated in terms of the Companies Act of 1973 with as its principle object the rendering telecommunications services- it should be exonerated in all of its capacities from compliance with any of the provisions of the Bill.

 It is submitted that only those persons or entities that have as their principal business objective the rendition of security or associated services do in fact belong to the security industry or constitutes a security business within the meaning of the object of the Bill.

PROVISIONS THAT MAY IMPACT ON TELKOM'S OPERATIONAL AND BUSINESS INTERESTS  The definitions and other provisions hereafter listed probably has the cumulative effect of making the Security Industry Regulation Bill applicable on Telkom's management, employees, activities, operations, business associations and activities to a greater or lesser extent; the relevant provisions being:

 the definition of "code of conduct"  the definition of "private Investigator"  the definition of "security equipment"  the definition of "security industry"  the definition of "security officer"  the definition of "security service"  the definition of "security service provider"

 the definition of "the Act"  section 2 of the Bill  section 20 of the Bill, and  section 28 of the Bill  These provisions, are potentially onerous, disruptive, and harmful to Telkom's business and operational interests, and will more fully be dealt with hereafter.

The Implicit Distinction between "Security Service Provider" and "Security Business"  Persons "… using …[their] … employees to protect or safeguard merely …[their] … own property and other interests, or persons or property on the premises or under the control of such person …" are excluded from the definition of "security business" but apparently not from the definition of "security service" or of "security service provider".

 Although the insertion of the phrase "for remuneration or reward" in relation to "security service provider" may have the effect of excluding Telkom in certain instances, it does not have a similar effect on its security investigations and intelligence personnel.

 The obligation to register with the Security Industries Authority and compliance with the industry code, for instance, will apparently apply to Telkom equally if is binding on members of its staff.

 The definition in the Bill of "private investigator" includes most of the activities normally performed by Telkom's security and investigations, IT security, business intelligence and many other sections also. This definition contained in section 1 of the Bill effectively transforms Telkom into a private investigator with all the attendant obligations of the Bill being imposed and binding on it. The Definition of "Private Investigator"

The Definitions of "Security Officer", "Security Service" and "Security Industry"  A "security officer" is defined as someone who is employed by another and performs for remuneration one or more security services. The definition includes many of Telkom's employees who render "security services" aimed at protecting company property, particularly in the form of incorporeal property such as business interests, but also the installation and servicing of "security equipment" and the monitoring of signals or transmissions from electronic security equipment. We have already noted that in terms of the Bill these personnel, as well as their supervisors and managers are all regarded as security service providers in their own right and therefore subject to all the provisions of the Bill relating to security service providers.

CONCLUSIONS  Whilst it has undoubtedly become imperative for the security and private investigation services industries to be regulated, the introduction of measures aimed at achieving that end should be contained within the confines of its original objectives and to the security industry in particular.

 Within the modern competitive business environment the services of efficient investigations, security and intelligence functionaries within commercial companies have become more than just a convenience. Businesses have come to rely on these functions to formulate policies and strategies on which continued competitiveness and profitability, and even its very existence depends.

 In that sense and in that environment it is extremely undesirable for either the operations themselves or for the staff performing those functions to be subject to undue regulation, disruption, scrutiny or interrogation. Because market forces and market movements are so volatile, timing is often vital to the effect and worth of the performance of an act or of the conclusion of a transaction or listing so that and any untimely interference or stoppage could amount to an effective derailment.

RECOMMENDATIONS  In view of the aforementioned considerations it is submitted that, notwithstanding any contrary provision or interpretation of the Bill, all in-house security, investigations and intelligence functions performed by commercial companies -that do not have as their principal business the provision of security or private investigation services to third parties- be expressly excluded from the application of the Bill.

 It is further submitted that the definition of "private investigator" in section 1 of the Bill be amended by the insertion of the following words at the end of the section: "but shall exclude any business intelligence operations which a company may undertake in the course and scope of its normal and reasonable endeavours to safeguard its security, strategic, operational, and business interests and that of its holding company or subsidiaries."

Thank you!