Refine search Expand filter

Reports

In progress

Actions for Development applications: assessment and determination stages

Development applications: assessment and determination stages

Local Government
Planning
Internal controls and governance
Management and administration
Service delivery

A development application (DA) is a formal application for development that requires consent under the NSW Environmental Planning and Assessment Act 1979. It is usually lodged with the local council for processing and determination, and consists of standard application forms, supporting technical reports and plans.  The NSW Department of Planning and Environment (DPE)’s ‘Development Assessment Best Practice Guide' describes the development assessment pr

In progress

Actions for Biodiversity offsets

Biodiversity offsets

Planning
Environment
Industry
Infrastructure
Management and administration
Regulation

The NSW Biodiversity Offsets Scheme is intended to offset impacts on biodiversity due to development (for example: roads, buildings, and other infrastructure) that cannot otherwise be avoided. It aims to do this through in-perpetuity stewardship agreements with landholders to better manage biodiversity, generating credits that offset obligations created by development. This audit will assess whether the Department of Planning and Environment and the Bio

In progress

Actions for Cyber Security NSW

Cyber Security NSW

Finance
Cyber security
Information technology
Risk

Audit background Cyber Security NSW (CS NSW) was established in 2019 in response to the 2018 performance audit report, Detecting and Responding to Cyber Security Incidents. That audit found that there was no whole-of-government capability to detect and respond effectively to cyber security incidents. CS NSW is relatively new and operates within the Department of Customer Service (DCS) with a large scope of responsibilities. As such, the focus of this au

Planned

Actions for Security of student information

Security of student information

Education
Compliance
Cyber security
Information technology
Internal controls and governance
Risk

Schools collect and maintain detailed student data, including sensitive personal information. Schools can also require or encourage students to use third party software applications for learning and other school related activities. This audit will examine how effectively schools ensure student data is secure – both within their own systems and when provided to third parties. This audit may also examine the effectiveness of information security governance