Refine search Expand filter

Reports

In progress

Actions for Development applications: assessment and determination stages

Development applications: assessment and determination stages

Local Government
Planning
Internal controls and governance
Management and administration
Service delivery

A development application (DA) is a formal application for development that requires consent under the NSW Environmental Planning and Assessment Act 1979. It is usually lodged with the local council for processing and determination, and consists of standard application forms, supporting technical reports and plans.  The NSW Department of Planning and Environment (DPE)’s ‘Development Assessment Best Practice Guide' describes the development assessment pr

In progress

Actions for Biodiversity offsets

Biodiversity offsets

Planning
Environment
Industry
Infrastructure
Management and administration
Regulation

The NSW Biodiversity Offsets Scheme is intended to offset impacts on biodiversity due to development (for example: roads, buildings, and other infrastructure) that cannot otherwise be avoided. It aims to do this through in-perpetuity stewardship agreements with landholders to better manage biodiversity, generating credits that offset obligations created by development. This audit will assess whether the Department of Planning and Environment and the Bio

In progress

Actions for Compliance review: Cybersecurity

Compliance review: Cybersecurity

Community Services
Education
Environment
Finance
Health
Justice
Local Government
Planning
Premier and Cabinet
Industry
Transport
Treasury
Whole of Government
Cyber security
Information technology
Risk

In February 2019 the Department of Finance, Services and Innovation launched the NSW Cyber Security Policy to ensure all NSW Government departments and public service agencies are managing cyber security risks to their information and systems. The policy mandates a number of requirements that are a minimum that all agencies must implement. In addition agencies must assess their level of cyber maturity. This audit will examine whether agencies are complyi