Reports
Actions for Development applications: assessment and determination stages
Development applications: assessment and determination stages
A development application (DA) is a formal application for development that requires consent under the NSW Environmental Planning and Assessment Act 1979. It is usually lodged with the local council for processing and determination, and consists of standard application forms, supporting technical reports and plans. The NSW Department of Planning and Environment (DPE)’s ‘Development Assessment Best Practice Guide' describes the development assessment pr
Actions for Coordination of Response to COVID-19
Coordination of Response to COVID-19
Coordination of Response to COVID-19 (auditees: NSW Health, NSW Police Force, Department of Premier and Cabinet, Department of Customer Service, Resilience NSW) This audit will assess the effectiveness of NSW Government agencies’ coordination of the COVID-19 response in selected LGAs (an “LGA of concern” and a regional LGA) after June 2021. We will address the audit objective with the following lines of inquiry: Line of Inquiry 1: Coordinated response
Actions for Cyber Security NSW
Cyber Security NSW
Audit background Cyber Security NSW (CS NSW) was established in 2019 in response to the 2018 performance audit report, Detecting and Responding to Cyber Security Incidents. That audit found that there was no whole-of-government capability to detect and respond effectively to cyber security incidents. CS NSW is relatively new and operates within the Department of Customer Service (DCS) with a large scope of responsibilities. As such, the focus of this au
Actions for Security of student information
Security of student information
Schools collect and maintain detailed student data, including sensitive personal information. Schools can also require or encourage students to use third party software applications for learning and other school related activities. This audit will examine how effectively schools ensure student data is secure – both within their own systems and when provided to third parties. This audit may also examine the effectiveness of information security governance