Refine search Expand filter

Reports

Published

Actions for Internal controls and governance 2021

Internal controls and governance 2021

Whole of Government
Compliance
Cyber security

This report analyses the internal controls and governance of the 25 largest agencies in the NSW public sector, excluding state owned corporations and public financial corporations, for the year ended 30 June 2021.

Our preferred approach is to table the ‘Report on State Finances’ in Parliament before any other cluster report. This is because the ‘Report on State Finances’ focuses on the audit results and observations relating to the Total State Sector Accounts, in effect a consolidation of all government agencies. This year the ‘Report on State Finances’ has been delayed due to significant accounting issues being considered in the Total State Sector Accounts and which may impact the Treasury and Transport clusters.

As there are no matters in this report impacting the Total State Sector Accounts we have decided to break with normal practice and table this report ahead of the ‘Report on State Finances’.

What the report is about

This report analyses the internal controls and governance of the 25 largest agencies in the NSW public sector, excluding state owned corporations and public financial corporations, for the year ended 30 June 2021.

What we found

Internal control trends

The proportion of control deficiencies identified as high risk this year increased to 2.8 per cent (2.5 per cent in 2019–20). Six high risk findings related to financial controls while three related to IT controls. Two were repeat findings from the previous year.

Repeat findings of control deficiencies now represent 49 per cent of all findings (42 per cent in 2019–20).

Information technology

We continue to see a high number of deficiencies relating to IT general controls, particularly around user access administration and privileged user access which affected 82 per cent of agencies.

Cyber security

Agencies' self-assessed maturity levels against the NSW Cyber Security Policy (CSP) mandatory requirements are low. Although agencies are required to demonstrate continuous improvement against the CSP, 20 per cent have not set target levels and of those that have set target levels, 40 per cent have not met their target levels.

Policies, processes and definition around security incidents and data breaches lack consistency. Improvement is required to ensure breaches are recorded in registers and action taken to address the root cause of incidents.

Conflicts of interest

Agencies' policies generally meet the minimum requirements of the Ethical Framework set out in the Government Sector Employment Act 2013. However, few meet the Independent Commission Against Corruption's best practice guidelines. Policies could be strengthened in relation to requirements around annual declarations of interests from employees and contractors.

Masterfile management

Policies governing the management of supplier masterfiles and employee masterfiles existed in 79 per cent and 54 per cent of agencies respectively.

Weaknesses were identified in those policies. Access restriction, segregation of duties and record keeping were the most common opportunities for improvement.

Tracking recommendations

Most agencies do not maintain a register to monitor recommendations from performance audits and public inquiries. Registers of recommendations could be improved to include risk ratings and record revisions to due dates. While recommendations can take several years to fully address, the oldest open items were originally due for completion by June 2016.

What we recommended

Agencies should:

  • prioritise actions to address repeat control deficiencies, particularly those that have been repeated findings for a number of years
  • prioritise improvements to their cyber security and resilience as a matter of urgency
  • formalise and implement policies on tracking and monitoring the progress of implementing recommendations from performance audits and public inquiries.

Fast facts

The 25 largest NSW government agencies in this report cover all nine clusters and represent over 95 per cent of total expenditure for NSW public sector.

  • high risk audit findings were identified this year
  • 40% of agencies have not formally accepted residual cyber risk based on their self-assessed maturity levels
  • 52% of agencies do not have a policy on tracking recommendations from performance audits and public inquiries
  • 50% of all internal control deficiencies identified in 2020–21 were repeat findings
  • 75% is the average completion rate of annual staff declarations of interests.

Internal controls are processes, policies and procedures that help agencies to:

  • operate effectively and efficiently
  • produce reliable financial reports
  • comply with laws and regulations
  • support ethical government.

This chapter outlines the overall trends for agency controls and governance issues, including the number of audit findings, the degree of risk those deficiencies pose to the agency, and a summary of the most common deficiencies we found across agencies. The rest of this report presents this year’s controls and governance findings in more detail.

The scope of this year's report covers 25 general government sector agencies. Last year's report covered 40 agencies within the total state sector. For consistency and comparability, we have adjusted the 2020 results to include only the agencies remaining within scope of this year's report. Therefore, the 2020 figures will not necessarily align with those reported in our 2020 report.

Section highlights

  • We identified nine high risk findings, compared to eight last year, with two findings repeated from last year. Six of the nine findings related to financial controls and three related to IT controls.
  • The proportion of repeat deficiencies has increased from 44 per cent in 2019–20 to 50 per cent in 2020–21. The longer these weaknesses in internal control systems exist, the higher the risk that they may be exploited and consequential impact.

This chapter outlines our audit observations, conclusions and recommendations arising from our review of agency controls to manage key financial systems.

Section highlights

  • We continue to see a high number of deficiencies related to IT general controls, particularly those related to user access administration and privileged user access.
  • Agencies are increasingly contracting out key IT services to third parties, however, weaknesses in IT service providers' controls can expose an agency to cyber security risks.

This chapter outlines our audit observations, conclusions and recommendations arising from our review of agencies' cyber security planning and governance arrangements.

Section highlights

  • Agencies' self‑assessed cyber maturity levels against the NSW Cyber Security Policy mandatory requirements are low and have not met their target levels. Forty per cent of agencies have not formally accepted the residual risk from gaps between their target and current maturity levels.
  • Most agencies have conducted cyber awareness training to staff during 2020–21. Some have further enhanced this training through awareness exercises such as simulated phishing emails to test staff knowledge.
  • Registers of security incidents and breaches are not consistent across agencies. Four agencies recorded nil breaches during 2020–21, however, their definition of incidents and breaches was not consistent with other agencies. For instance, they did not include account compromises or denial of service attacks. Only seven agencies' registers included details of actions taken to resolve issues.

This chapter outlines our audit observations, conclusions and recommendations arising from our review of agencies' conflicts of interest management processes.

Section highlights

  • Most agencies have established conflicts of interest policies consistent with the mandatory requirements of the Code of Ethics and Conduct for NSW Government sector employees. Agencies' policies could be strengthened to apply the standard they apply to senior executives to all employees and contractors. Currently, only senior employees are required to make annual declarations of interests, yet the ability to make or influence decisions is delegated to others in the organisation.
  • Half of agencies' policies specify units or divisions that are at higher risk of conflicts of interest arising due to the nature of their business. Policies should identify additional measures at the unit/division level to mitigate these risks.
  • On average, less than 75 per cent of staff completed annual declarations of interest where required. This could be improved with ongoing staff training and awareness, and follow up on incomplete conflicts of interest.

This chapter outlines our audit observations, conclusions and recommendations arising from our review of agency's management of supplier and employee masterfiles.

Section highlights

  • Most agencies have established policies or procedures on supplier masterfile management, however, only 56 per cent do for employee masterfile management.
  • Less than half of agencies review user access rights to supplier or employee masterfiles which contain sensitive information and are susceptible to fraud. Access to edit the masterfiles should be limited to authorised personnel for whom it is required to perform their duties.

This chapter outlines our audit observations, conclusions and recommendations arising from our review of agencies' processes to track and monitor the implementation of recommendations from performance audits and public inquiries.

Section highlights

  • Less than half of all agencies have a formal policy on monitoring recommendations from performance audits or public inquiries. Agencies should formalise and implement policies on tracking and monitoring the progress of those recommendations.
  • 56 per cent of agencies maintain a register of recommendations from performance audits or public inquiries. Registers could be improved to include features such as risk/priority rating, milestone due dates, record of revisions to due dates and explanatory comments.
  • Recommendations can take several years to address, with the oldest unactioned items we noted dating back to 2016. Agencies reported completion of a third of recommendations that were raised within the last year.

Published

Actions for Compliance with the NSW Cyber Security Policy

Compliance with the NSW Cyber Security Policy

Whole of Government
Compliance
Cyber security
Information technology

What the report is about

This audit assessed nine agencies’ compliance with the NSW Cyber Security Policy (CSP) including whether, during the year to 30 June 2020, the participating agencies:

  • met their reporting obligations under the CSP
  • reported accurate self-assessments of their level of maturity implementing the CSP’s requirements including the Australian Cyber Security Centre’s (ACSC) Essential 8.

What we found

Key elements to strengthen cyber security governance, controls and culture are not sufficiently robust and not consistently applied. The CSP is not achieving the objectives of improved cyber governance, controls and culture because:

  • the CSP does not specify a minimum level for agencies to achieve in implementing the 'mandatory requirements' or the Essential 8
  • the CSP does not require agencies to report their target levels, nor does it require risk acceptance decisions to be documented or formally endorsed
  • each participating agency had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis
  • none of the participating agencies had implemented all of the Essential 8 controls
  • agencies tended to over-assess their cyber security maturity - all nine participating agencies were unable to support all of their self-assessments with evidence
  • there is no monitoring of the adequacy or accuracy of agencies' self-assessments.

What we recommended

In this report, we repeat recommendations made in the 2019 and 2020 Central Agencies reports, that Cyber Security NSW and NSW Government agencies need to prioritise improvements to cyber security resilience as a matter of urgency.

Cyber Security NSW should:

  • monitor and report compliance with the CSP
  • require agencies to report the target and achieved levels of maturity
  • require agencies to justify why it is appropriate to target a low level of maturity
  • require the agency head to formally accept the residual risk
  • challenge agencies' target maturity levels.

Agencies should resolve discrepancies between their reported level of maturity and the level they are able to support with evidence.

Separately, the agencies we audited requested that we not disclose our audit findings. We reluctantly agreed to anonymise our findings, even though they are more than 12 months old. We are of the view that transparency and accountability to the Parliament of New South Wales are part of the solution, not the problem.

The poor levels of agency cyber security maturity are a significant concern. Improvement requires leadership and resourcing.

Fast facts

The NSW Cyber Security Policy requires agencies to report their level of maturity implementing the mandatory requirements, which includes the ACSC's Essential 8.

  • 100% of audited agencies failed to reach level one maturity for at least three of the Essential 8 controls.

  • 53% of mandatory requirements implemented in an ad hoc or inconsistent manner, or not at all.

  • 89 of the 104 reporting agencies across government met the reporting deadline of 31 August.

This report assesses whether state government agencies are complying with the NSW Cyber Security Policy. The audit was based on the level of compliance reported at 30 June 2020.

Our audit identified non-compliance and significant weaknesses against the government’s policy.

Audited agencies have requested that we not report the findings of this audit to the Parliament of New South Wales, even though the findings are more than 12 months old, believing that the audit report would expose their weaknesses to threat actors.

I have reluctantly agreed to modify my report to anonymise agencies and their specific failings because the vulnerabilities identified have not yet been remedied. Time, leadership and prioritised action should have been sufficient for agencies to improve their cyber safeguards. I am of the view that transparency and accountability to the Parliament is part of the solution, not the problem.

The poor levels of cyber security maturity are a significant concern. Improvement requires dedicated leadership and resourcing. To comply with some elements of the government’s policy agencies will have to invest in technical uplift and some measures may take time to implement. However, other elements of the policy do not require any investment in technology. They simply require leadership and management commitment to improve cyber literacy and culture. And they require accountability and transparency. Transparent reporting of performance is a key means to improve performance.

Cyber security is increasingly a focus of governments around Australia. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cyber security and is part of the Australian Signals Directorate, a statutory authority within the Australian Government’s Defence portfolio. The ACSC has advised that government agencies at all levels, as well as individuals and other organisations were increasingly targeted over the 2021 financial year1. The ACSC received over 67,500 cybercrime reports, a 13 per cent increase on the previous year. This equates to one reported cyber attack every eight minutes. They also noted that attacks by cyber criminals and state actors are becoming increasingly sophisticated and complex and that the attacks are increasingly likely to be categorised as ‘substantial’ in impact.

High profile attacks in Australia and overseas have included a sustained malware campaign targeted at the health sector2, a phishing campaign deploying emotet malware, spear phishing campaigns targeting people with administrator or other high-level access, and denial of service attacks. The continuing trend towards digital delivery of government services has increased the vulnerability of organisations to cyber threats.

The COVID-19 pandemic has increased these risks. It has increased Australian dependence on the internet – to work remotely, to access services and information, and to communicate and continue our daily lives. Traditional security policies within an organisation’s perimeter are harder to enforce in networks made up of home and other private networks, and assets the organisation does not manage. This has increased the cyber risks for NSW Government agencies.

In March 2020, Service NSW suffered two cyber security incidents in short succession. Technical analysis undertaken by the Department of Customer Service (DCS) concluded that these cyber breaches resulted from a phishing exercise through which external threat actors gained access to the email accounts of 47 staff members. These attacks resulted in the breach of a large amount of personal customer information contained in these email accounts. These attacks were the subject of the Auditor-General's report on Service NSW's handling of personal information tabled on 18 December 2020.

This audit also follows two significant performance audits. Managing cyber risks, tabled on 13 July 2021 found Transport for NSW and Sydney Trains were not effectively managing their cyber security risks. Integrity of data in the Births, Deaths and Marriages Register, tabled 7 April 2020 found that although there are controls in place to prevent and detect unauthorised access to, and activity in the register, there were significant gaps in these controls.

The NSW Cyber Security Policy (CSP) was issued by Cyber Security NSW, a business unit within the Department of Customer Service, and took effect from 1 February 2019. It applies to all NSW Government departments and public service agencies, including statutory authorities. Of the 104 agencies in the NSW public sector that self-assessed their maturity implementing the mandatory requirements, only five assessed their maturity at level three or above (on the five point maturity scale). This means that, according to their own self-assessments, 99 agencies practiced requirements within the framework in what the CSP’s maturity model describes as an ad hoc manner, or they did not practice the requirement at all. Cyber Security NSW and NSW Government agencies need to prioritise improvements to their cybersecurity and resilience as a matter of priority.

This audit looks specifically at the compliance of nine key agencies with the CSP. It looks at their achievement implementing the requirements of the policy, the accuracy of their self-assessments and the attestations they made as to their compliance with the CSP.

The CSP outlines the mandatory requirements to which all NSW Government departments and public service agencies must adhere. It seeks to ensure cyber security risks to agencies’ information and systems are appropriately managed. The key areas of responsibility for agencies are:

  • Lead - Agencies must implement cyber security planning and governance and report against the requirements outlined in the CSP and other cyber security measures.
  • Prepare - Agencies must build and support a cyber security culture across their agency and NSW Government more broadly.
  • Prevent - Agencies must manage cyber security risks to safeguard and secure their information and systems.
  • Detect/Respond/Recover - Agencies must improve their resilience including their ability to rapidly detect cyber incidents and respond appropriately.
  • Report - Agencies must report against the requirements outlined in the CSP and other cyber security measures.

DCS has only recommended, but not mandated the CSP for state owned corporations, local councils and universities.

NSW Government agencies must include an attestation on cyber security in their annual report and provide a copy to Cyber Security NSW by 31 August each year stating whether, for the preceding financial year, the agency has:

  • assessed its cyber security risks
  • appropriately addressed cyber security at agency governance forums
  • a cyber incident response plan that is integrated with the security components of business continuity arrangements, and the response plan has been tested during the previous 12 months (involving senior business executives)
  • certified the agency’s Information Security Management System (ISMS) or confirmed the agency’s Cyber Security Framework (CSF)
  • a plan to continuously improve the management of cyber security governance and resilience.

The purpose of the attestation is to focus the agency's attention on its cyber risks and the mitigation of those risks.

Agencies assess their level of compliance in accordance with a maturity model. The CSP does not mandate a minimum maturity threshold for any requirement, including implementation of the Australian Cyber Security Centre's (ACSC) Essential 8 Strategies to Mitigate Cyber Security Incidents (Essential 8).

Agencies are required to set a target maturity level based on their risk appetite for each requirement, seek continual improvement in their maturity, and annually assess their maturity on an ascending scale of one to five for all requirements (refer to Appendix two for the maturity model). Each control within the Essential 8 is assessed on an ascending scale of zero to three reflecting the agency's level of alignment with the strategy (refer to Appendix three for the maturity model).

Scope of this audit

We assessed whether agencies had provided accurate reporting on their level of maturity implementing the requirements of the CSP in a documented way and covering all their systems.

The scope of this audit covered nine agencies (the participating agencies). These agencies were selected because they are the lead agency in their cluster, or have a significant digital presence within their respective cluster. The list of participating agencies is in section 1.2. The audit aimed to determine whether, during the year to 30th June 2020, the participating agencies:

  • met their reporting obligations under the CSP
  • provided accurate reporting in self-assessments against the CSP’s mandatory requirements, including their implementation of the Australian Cyber Security Centre’s (ACSC) Essential 8
  • achieved implementation of mandatory requirements at maturity levels which meet or exceed the ‘level three - defined’ threshold (i.e. are documented and practiced on a regular and consistent basis).

While the audit does assess the accuracy of agency self-assessed ratings, the audit did not assess the appropriateness of the maturity ratings.

Conclusion

Key elements to strengthen cyber security governance, controls and culture are not sufficiently robust and not consistently applied. There has been insufficient progress to improve cyber security safeguards across NSW Government agencies.
The NSW CSP replaced the NSW Digital Information Security Policy from 1 February 2019. New requirements of the CSP were, inter alia, to strengthen cyber security governance, strengthen cyber security controls and improve cyber security culture.
The CSP is not achieving the objective of improved cyber governance, controls and culture because:
  • The CSP does not specify a minimum level for agencies to achieve in implementing the 'mandatory requirements' or the Essential 8 Strategies to Mitigate Cyber Security Incidents.
  • The CSP does not require agencies to report their target levels, nor does it require risk acceptance decisions to be documented or formally endorsed.
  • All of the participating agencies had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis.
  • None of the participating agencies had implemented all of the Essential 8 controls to at least level one.
  • Agencies tended to over-assess their cyber security maturity, with all nine participating agencies unable to support some of their self-assessments of compliance with one or more mandatory criteria. Optimistic assessment of the current state of cyber resilience undermines effective decision making and risk management in responding to cyber risks.
  • There is no systematised and formal monitoring, by either Cyber Security NSW or another agency, of the adequacy or accuracy of agencies' cyber self-assessment processes.

 

1. Key findings

The CSP allows agencies to determine their own level of maturity to implement the 'mandatory requirements', which can include not practicing a policy requirement or implementing a policy requirement on an ad hoc basis. These determinations do not need to be justified

Agencies can decide not to implement requirements of the CSP, or they can decide to implement them only in an informal or ad-hoc manner. The CSP allows agencies to determine their desired level of maturity in implementing the requirements on a scale of one to five - level one being 'initial – not practiced' and level five being 'optimised'. The desired level of maturity is determined by the agency based on their own assessment of the risk of the services they provide and the information they hold.

The reporting template for the 2019 version of the CSP stated that level three maturity - where a policy requirement is practiced on a regular and consistent basis and its processes are documented - was required for compliance with the CSP. This requirement was removed in the 2020 revision of the reporting template.

This CSP does not require the decisions on risk tolerance, or the timeframes agencies have set to implement requirements to be documented or formally endorsed by the agency head. There is no requirement to report these decisions to Cyber Security NSW.

Some comparable jurisdictions require formal risk acceptance decisions where requirements are not implemented. The NSW CSP does not have a similar formal requirement

Some jurisdictions, with a similar policy framework to NSW, require agencies to demonstrate reasons for not implementing requirements, and require agency heads to formally acknowledge the residual risk. The NSW CSP does not require these considerations to be documented, nor does it require an explicit acknowledgement and acceptance of the residual risk by the agency head or Cyber Security NSW. The NSW CSP does not require that the records of how agencies considered and decided which measures to adopt to be documented and auditable, limiting transparency and accountability of decisions made.

All of the participating agencies had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis

All of the participating agencies had implemented one or more of the mandatory requirements at level one or two. Maturity below level three typically means not all elements of the requirement have been implemented, or the requirements have been implemented on an ad-hoc or inconsistent basis.

None of the participating agencies has implemented all of the Essential 8 controls at level one – that is, only partly aligned with the intent of the mitigation strategy

Eight of the nine agencies we audited had not implemented any of the Essential 8 strategies to level three – that is, fully aligned with the intent of the mitigation strategy. At the time of this audit the ACSC advised that:

as a baseline organisations should aim to reach to reach Maturity Level Three for each mitigation strategy3.

The Australian Signals Directorate4 currently advises that, with respect to the Essential 8:

[even] level three maturity will not stop adversaries willing and able to invest enough time, money and effort to compromise a target. As such, organisations still need to consider the remainder of the mitigation strategies from the Strategies to Mitigate Cyber Security Incidents and the Australian Government Information Security Manual

All agencies failed to reach even level one maturity for at least three of the Essential 8.

Cyber Security NSW modified the ACSC model for implementation of the Essential 8

The NSW maturity model used for the Essential 8 does not fully align with the ACSC’s model. At the time of this audit the major difference was the inclusion of level zero in the NSW CSP maturity scale. Level zero broadly means that the relevant cyber mitigation strategy is not implemented or is not applied consistently. Level zero had been removed by the ACSC in February 2019 and was not part of the framework at the time of this audit. It was re-introduced in July 2021 when the ACSC revised the detailed criteria for each element of the essential 8 maturity model. The indicators to reach level one on the new ACSC model are more detailed, specific and rigorous than those currently prescribed for NSW Government agencies. Cyber Security NSW asserted the level zero on the CSP maturity scale:

is not identical to the level zero of the ACSC’s previous Essential 8 maturity model, but is a NSW-specific inclusion designed to prevent agencies incorrectly assessing as level one when they have not achieved that level.

Attestations did not accurately reflect whether agencies implemented the requirements

Of the nine participating agencies, seven did not modify the proforma wording in their attestation to reflect their actual situation. Despite known gaps in their implementation of mandatory requirements, these agencies stated that they had 'managed cyber security risks in a manner consistent with the Mandatory Requirements set out in the NSW Government Cyber Security Policy'. Only two agencies modified the wording of the attestation to reflect their actual situation.

Attestations should be accurate so that agencies’ and the government’s response to the risk of cyber attack is properly informed by an understanding of the gaps in agency implementation of the policy requirements and the Essential 8. Without accurate information about these gaps, subsequent decisions as to prioritisation of effort and deployment of resources are unlikely to effectively mitigate the risks faced by NSW Government agencies.

Participating agencies were not able to support all of their self-assessments with evidence and had overstated their maturity assessments, limiting the effectiveness of agency risk management approaches

Seven of the nine participating agencies reported levels of maturity against both the mandatory requirements and the Essential 8 that were not supported by evidence.

Each of the nine participating agencies for this audit had overstated their level of maturity against at least one of the 20 mandatory requirements. Seven agencies were not able to provide evidence to support their self-assessed ratings for the Essential 8 controls.

Where agency staff over-assess the current state of their cyber resilience, it can undermine the effectiveness of subsequent decision making by Agency Heads and those charged with governance. It means that actions taken in mitigating cyber risks are less likely to be appropriate and that gaps in implementing cyber security measures will remain, exposing them to cyber attack.

Agencies' self-assessments across government exposed poor levels of maturity in implementing the mandatory requirements and the Essential 8 controls

We reviewed the data 104 NSW agencies provided to Cyber Security NSW. The 104 agencies includes nine audited agencies referred to in more detail in this report. Our review of the 104 agency self-assessment returns submitted to Cyber Security NSW highlighted that, consistent with previous years, there remains reported poor levels of cyber security maturity. We reported the previous years’ self-assessments in the Central Agencies 2019 Report to Parliament and the Central Agencies 2020 Report to Parliament.

Only five out of the 104 agencies self-assessed that they had implemented all of the mandatory requirements at level three or above (against the five point scale). Fourteen agencies self-assessed that they had implemented each of the Essential 8 controls at level one maturity or higher (using Cyber NSW’s four point scale). The remainder reported at level zero for implementation of one or more of the Essential 8 controls, meaning that for the majority of agencies the cyber mitigation strategy has not been implemented, or is applied inconsistently.

Where agencies had reported in both 2019 and 2020, agencies’ self-assessments showed little improvement over the previous year’s self-assessments:

  • 14 agencies reported improvement across both the Essential 8 and the mandatory requirements
  • 8 agencies reported a net decline in both the Essential 8 and the mandatory requirements.

The poor levels of maturity in implementing the Essential 8 over the last couple of years is an area of significant concern that requires better leadership and resourcing to prioritise the required significant improvement in agency cyber security measures.

2. Recommendations

Cyber Security NSW should:

1. monitor and report compliance with the CSP by:

  • obtaining objective assurance over the accuracy of self-assessments
  • requiring agencies to resolve inaccurate or anomalous self-assessments where these are apparent

2. require agencies to report:

  • the target level of maturity for each mandatory requirement they have determined appropriate for their agency
  • the agency head's acceptance of the residual risk where the target levels are low

3. identify and challenge discrepancies between agencies' target maturity levels and the risks of the information they hold and services they provide

4. more closely align their policy with the most current version of the ACSC model.

Participating agencies should:

5. resolve the discrepancies between their reported level of maturity and the level they are able to demonstrate with evidence, and:

  • compile and retain in accessible form the artefacts that demonstrate the basis of their self-assessments
  • refer to the CSP guidance when determining their current level of maturity
  • ensure the attestations they make refer to departures from the CSP
  • have processes whereby the agency head and those charged with governance formally accept the residual cyber risks.

Repeat recommendation from the 2019 Central Agencies report and the 2020 Central Agencies report

6. Cyber Security NSW and NSW Government agencies need to prioritise improvements to their cyber security and resilience as a matter of urgency.


The objective of the CSP is to ensure cyber security risks are appropriately managed. However, meeting this objective depends on the requirements being implemented at all agencies to a level of maturity that addresses their specific cyber security risks. Agency systems and data are increasingly interconnected. If an agency does not implement the requirements, or implements them only in an ad-hoc or informal way, an agency is more susceptible to their systems and data being compromised, which may affect the confidentiality of citizens' data and the reliability of services, including critical infrastructure services.

Agencies determine their own target level of maturity, which may mean the requirement is not addressed, or is addressed in an ad hoc or inconsistent way

While the CSP is mandatory for all agencies, it does not set a minimum maturity threshold for agencies to meet.

The reporting template issued in 2019 stated that agencies were required to reach level three maturity in order to comply with the CSP. The 2020 revision6 of the CSP and guidance indicates that level three maturity may not be sufficient to mitigate risks. It advises the agency may determine the level to which it believes it is suitable to implement the requirements, and allows for an agency to aim for a target level of maturity less than level three. The agency can set its optimal maturity level with reference to its risk tolerance with the objective that that aim ‘to be as high as possible’. However, ‘as high as possible’ does not necessarily mean ‘fully implemented’. The CSP contemplates that a lower level of maturity is sufficient if it aligns with the agency's risk tolerance.

2019 reporting template 2020 reporting template
‘A Mandatory Requirement is considered met if a maturity level of three is achieved. The Agency may choose to pursue a higher maturity level if required.

There is no mandated level for the Essential 8 Maturity reporting’.

‘There is no mandated maturity level for either the Mandatory Requirement reporting or Essential 8 reporting. Agencies need to risk-assess their optimal maturity and aim to be 'as high as possible’.
Source: Maturity Reporting Template v4.0, February 2019.
Source: CSP Reporting Template 2020, May 2020.

The Department of Customer Service asserts that while the quotes above were part of their annual templates and policy documents, their documents were incorrect. They assert that the policy has never required a minimum level of maturity to be reached. They have responded to our enquiries that:

…a level three maturity was not a requirement of the Policy or Maturity Model’ and ‘it is misleading to suggest it was a requirement of the Policy.

This audit found that, based on the 2020 reporting template there is no established minimum baseline. Consequently, because the Department of Customer Service had not established a minimum baseline agencies are able to target lower levels (providing they were within the agency’s own risk appetite), which includes targeting to not practice a CSP policy requirement, or to practice a CSP policy requirement on an ad hoc basis.

Where requirements are not implemented, documentation of formal acceptance of the residual risks by the agency head is not required

The New Zealand Government has an approach that is not dissimilar to NSW, in that it also identifies 20 mandatory requirements and allows for a risk based approach to implementation. However, the New Zealand approach puts more rigor around risk acceptance decisions.

The New Zealand Government requires that agencies that do not implement the requirements must demonstrate that a measure is not relevant for them. It requires agencies to document the rationale for not implementing the measure, including explicit acknowledgement of the residual risk by the agency head. They require these records to be auditable.

A security measure with a ‘must’ or ‘must not’ compliance requirement is mandatory. You must implement or follow mandatory security measures unless you can demonstrate that a measure is not relevant in your context.

Not using a security measure without due consideration may increase residual risk for your organisation. This residual risk needs to be agreed and acknowledged by your organisation head.

A formal auditable record of how you considered and decided which measures to adopt is required as part of the governance and assurance processes within your organisation.

Source: Overview of Protective Security Requirements, New Zealand Government (PSR-Overview-booklet.pdf (protectivesecurity.govt.nz).

The NSW CSP does not require these considerations to be documented or auditable and does not require an explicit acknowledgement or acceptance of the residual risk by the agency head.

None of the participating agencies achieved level three implementation for all mandatory risk prevention and mitigation requirements

Maturity level three is the minimum level whereby an agency has implemented documented processes that are practiced on a regular basis across their environment. An agency has not reached level three if the requirement is implemented on an ad-hoc or inconsistent basis, or if not all elements of the requirement have been implemented.

None of the participating agencies achieved level three implementation for all mandatory requirements.

The requirements of the CSP are organised into five sections. Agency implementation of these requirements is discussed in the next five sections of this report.

  • Lead: Planning and governance requirements. Section 2.1
  • Prepare: Cyber security culture requirements. Section 2.2
  • Prevent: Managing cyber incident prevention requirements. Section 2.3
  • Detect/Respond/Recover: Resilience requirements. Section 2.4
  • Report: Reporting requirements. Section 2.5.

 


6The reporting template issued in 2019 required agencies to reach level three, but that guidance was removed in the 2020 revision.

Appendix one – Response from agencies

Appendix two – The maturity model for the mandatory requirements

Appendix three – Essential 8 maturity model

Appendix four – About the audit

 

Copyright notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for WestConnex: changes since 2014

WestConnex: changes since 2014

Transport
Compliance
Infrastructure
Internal controls and governance
Management and administration
Project management
Risk

What the report is about

The report examined whether Transport for NSW (TfNSW) and Infrastructure NSW (INSW) effectively assessed and justified major scope changes to the WestConnex project since 2014.

What we found

NSW Government decisions to fund WestConnex-related projects outside WestConnex's $16.812 billion budget have reduced transparency and understate the full cost of WestConnex.

The NSW Government's decision to separate Sydney Gateway from WestConnex has reduced transparency over the cost of the road component of Sydney Gateway. $1.76 billion of the cost to complete Sydney Gateway is funded outside the WestConnex budget.

Network integration costs, currently estimated at $2.3 billion, are also funded outside the WestConnex budget. Many of these costs are directly attributable to WestConnex and ought to be included in the reported budget.

The Parramatta Road Urban Amenity Improvement Program, costing $198 million, should also be included as part of the WestConnex reported budget.

Decisions to exclude or remove these elements from WestConnex without justification have seen $4.26 billion of projects funded outside the $16.8 billion budget.

Positively, robust analysis was used to develop and incorporate design improvements into the 2015 WestConnex Updated Strategic Business Case.

The separate components of WestConnex underwent all required assurance reviews. However, the NSW Government's assurance framework does not require ongoing ‘whole-of-program’ assurance for large and complex projects like WestConnex. The absence of a holistic review of WestConnex allows for some costs and benefits to avoid scrutiny.

What we recommended

TfNSW should:

  • review the impact of scope changes on project objectives, costs and benefits for complex infrastructure projects
  • ensure that estimated costs and benefits of works which are reasonably required to meet consent conditions are included in business cases for complex large infrastructure projects
  • establish centralised and project specific record keeping for major infrastructure projects.

Infrastructure NSW should provide transparent whole of program assurance on total costs and benefits when complex projects are split into sub-projects.

Government should consider enhancing public transparency of existing infrastructure assurance processes by requiring that large complex infrastructure programs undergo periodic review at a whole-of-program level.

Fast facts

  • $16.812b 2015 WestConnex business case budget
  • $2.3b current estimated cost of network integration works to enable WestConnex, funded outside the WestConnex budget
  • $1.76b cost to complete Sydney Gateway to enable WestConnex and also funded outside the WestConnex budget
  • $198m Parramatta Road Urban Amenity Improvement Program, originally part of WestConnex but now funded outside the WestConnex budget

WestConnex

WestConnex is a 33 km motorway network that will link the western and south‑western suburbs with the Sydney CBD and the Airport and Port Botany precinct. It will also connect with proposed future motorway links to the north shore, northern beaches, and southern Sydney. The project is being delivered in three stages, with completion scheduled for 2023.

When first conceived by Infrastructure NSW (INSW) in 2012, WestConnex was described as a single integrated concept. In August 2013, government approved a business case for an integrated concept of WestConnex, with an estimated cost of $14.881 billion (in nominal outturn costs). Transport for NSW (TfNSW) is the government agency (sponsor agency) accountable for the delivery of WestConnex in accordance with the business case. In August 2014, the NSW Government established the Sydney Motorway Corporation to fund, deliver and operate WestConnex.

In November 2015, the NSW Government publicly released an updated WestConnex business case with greater detail and design enhancements, which increased the estimated cost to $16.812 billion.

Subsequent to this update, further changes were made to the design, including realignment of the M4 to M5 Link connection to the Western Harbour Tunnel project, an expanded interchange at Rozelle, the deletion of the Camperdown Intersection, and the addition of the Iron Cove Link. The reported budget for WestConnex was not changed as a result of these design updates.

To fund WestConnex, Sydney Motorway Corporation consolidated a concessional loan of $2 billion from the Australian Government, private sector debt and equity funding from the State. The Australian Government also provided a $1.5 billion contribution to the State to partially fund construction of WestConnex.

In August 2018, the NSW Government sold 51 per cent of its stake in Sydney Motorway Corporation for $9.26 billion. At the time of writing, the NSW Government is in the process of selling its remaining 49 per cent stake of Sydney Motorway Corporation.

About this audit

In the course of delivering a complex major infrastructure project, it is reasonable to expect changes to the original design and scope. Changes may occur as the design moves from a high‑level concept to a detailed design for project delivery, as new risks or issues are identified, as demands change, or as other interdependent projects are approved. Changes can also occur in response to potential cost or delivery overruns which arise as a result of planning deficiencies. Where design and scope changes significantly change the project costs and/or expected benefits, the justification for these changes should be robust and transparent.

Following our 2014 performance audit, 'WestConnex: Assurance to the government', the NSW Government established the Infrastructure Investor Assurance Framework (IIAF) to improve accountability and transparency over major projects that are developed, procured, or delivered by government agencies. Under the framework, TfNSW, as project sponsor, is responsible for ensuring the WestConnex project meets all IIAF requirements. These include ensuring the project remains strategically aligned and viable, and benefits are on track. INSW is responsible for coordinating the assurance review process and reporting directly to NSW Cabinet on project delivery against time, budget and risks to project delivery.

The objective of this performance audit is to assess whether TfNSW and INSW effectively assessed and justified major scope changes to the WestConnex project since 2014.

 

Conclusion

Government decisions to separate WestConnex related projects and deliver them outside WestConnex's 2015 business case budget of $16.812 billion has understated the total cost of WestConnex achieving its objectives. The rationale for separating these elements from the WestConnex project scope has not been transparent. Together, these projects represent costs of $4.26 billion funded outside the $16.812 billion WestConnex budget.

Since 2015, the NSW Government has removed several projects from the scope described in the 2015 WestConnex business case, and funded them separately:
  • In mid‑2017, the Sydney Gateway became a separate project outside WestConnex. This project, estimated in 2015 to cost $800 million, now has an estimated cost of $2.56 billion. The project remains partly funded by an $800 million contribution from the $16.812 billion WestConnex budget, with $1.76 billion funded outside the WestConnex budget.
  • In late 2018, the Parramatta Road Urban Amenity Improvement Program became a separate project outside the 2015 WestConnex budget. This project was part of the 2015 WestConnex Business Case and is intended to create urban renewal opportunities around Paramatta Road. It is estimated to cost $198 million.

Work required to integrate WestConnex with existing roads ('network integration') was funded outside the $16.812 billion budget for the November 2015 WestConnex business case. TfNSW is obliged to deliver network integration works to meet the conditions of planning approval for WestConnex. As such, these costs should be included in the WestConnex budget. The current estimated cost of these network integration works is $2.3 billion.

The rationale to exclude or remove each of these elements from the WestConnex project scope has not been transparent, nor supported by robust analysis and justification. These elements are required for WestConnex to achieve its objectives. The additional project costs will also deliver additional benefits not included in the 2015 WestConnex business case. Removing them understates the total cost of achieving the objectives set out in the 2013 and 2015 WestConnex business cases.

WestConnex's complex financing arrangements further reduce transparency on costs.

Transparency over the total cost of WestConnex – including elements funded from other project budgets – is further limited by the project's complex financing arrangements.

Prior to 2018, the Audit Office provided assurance on costs borne and levied by Sydney Motorway Corporation and its controlled entities. Since the NSW Government sold its majority stake in WestConnex in August 2018, the Auditor‑General no longer has the mandate to provide this assurance. Considering this, and the lack of transparency on the cost of projects removed from the WestConnex project scope, there is no transparent or comprehensive view of the total cost to deliver WestConnex – nor of how these cost would be offset by the sale of the government's remaining stake.

There is no 'whole‑of‑program' assurance over the WestConnex program of works. This limits transparency and confidence that WestConnex will meet intended objectives within its budget.

After INSW conducted a gateway review of a draft of the 2015 WestConnex Business Case under the IIAF, the project was broken up into separate components to support staged delivery. Each of these projects, including the Sydney Gateway, as well as the Network Integration Program, underwent the required assurance reviews under the IIAF. INSW also provided monthly progress updates to government. These individual projects are, in themselves, significant in scale and complexity. Addressing them as discrete components for the purposes of the assurance review process is justified and there is no requirement under the IIAF to holistically review projects which together deliver final benefits of the WestConnex program. However, whole‑of‑program review would improve transparency over total costs and benefits.

In 2016, TfNSW revised the design of the M4‑M5 Link and Rozelle to address traffic and integration issues.

TfNSW identified that the concept designs used for the M4‑M5 Link and Rozelle Interchange in the 2015 WestConnex Business Case would not integrate well with surface roads, including the proposed Bays Precinct, and would result in increased traffic on Victoria Road and the ANZAC Bridge. Following a comprehensive review conducted in mid‑2016, TfNSW refined the design of the M4‑M5 Link and Rozelle Interchange to address these limitations without increasing the cost of delivery. TfNSW documented the rationale for the design changes, including how the changes improved on the original design to increase capacity, improve traffic conditions and create more open space.

1. Key findings

Government decisions to fund WestConnex related projects outside of WestConnex's $16.812 billion reported budget have reduced transparency over costs and understate the full cost of WestConnex

In 2015, the work required to integrate WestConnex with existing roads ('network integration') was funded as a separate project with an estimated cost of $1.534 billion outside the 2015 WestConnex budget of $16.812 billion. TfNSW then created the Network Integration Program to respond to the conditions of planning approval for WestConnex. The current estimated cost to deliver all network integration works is $2.3 billion.

Since the 2015 WestConnex Business Case, the NSW Government has removed several elements from the scope of WestConnex and funded them as separate projects, while keeping the published WestConnex budget at an estimated $16.812 billion. Projects removed include:

  • Sydney Gateway, currently costed at $2.56 billion (with an $800 million contribution from WestConnex)
  • Parramatta Road Urban Amenity Improvement Program, costed at $198 million in late 2018 and funded though new funding to the Greater Sydney Commission.

Together, these projects represent costs of $4.26 billion that are not included in the WestConnex budget, but are required for WestConnex to achieve the objectives of the 2013 and 2015 WestConnex Business Cases. The costs of these elements in supporting the objectives of WestConnex is not tracked centrally, and there is no single point of oversight over them. Exhibit 1 compares total WestConnex forecast costs (including related projects) between November 2015 and April 2021.

 

November 2015
($ million)

April 2021
($ million)
WestConnex
Stage 1
Stage 1A (M4 Widening) 497 517
Stage 1B (M4 East) 3,802 3,782
Total 4,299 4,299
Stage 2
King Georges Road Interchange 131 131
New M5 4,335 4,335
Sydney Gateway Contribution 800 800
Total 5,266 5,266
Stage 3
M4‑M5 Link and Rozelle Interchange 7,049 7,049
Urban renewal (Parramatta Road) 198 ‑‑
Urban renewal (Rozelle) ‑‑ 198
Total 7,247 7,247
Total reportable WestConnex 16,812 16,812

Exhibit 1: WestConnex and related projects forecast costs
  November 2015
($ million)
April 2021
($ million)
Related projects
Network integration 1,534 2,300
Urban renewal (Parramatta Road) ‑‑ 198
Sydney Gateway Road Component ‑‑ 1,760
Total 1,534 4,258

Source: AO research.

Many network integration costs are directly attributable to WestConnex and ought to be included in the reported budget for WestConnex

Prior to 2015, the scope of WestConnex included enabling works needed before or during construction, as well as funding for future works to address any adverse traffic outcomes created by WestConnex which become apparent after its opening. These works are also known as network integration works.

When government approved the 2015 WestConnex Business Case, it noted that the project would require $1.534 billion for network integration works to address the impacts of WestConnex on the road network. However, the WestConnex project budget of $16.812 billion did not include funding for network integration works. Instead, Roads and Maritime Services (RMS, now TfNSW) was to fund network integration through its normal budget allocation.

It is important to recognise these costs as part of the total WestConnex project cost because:

  • TfNSW created the Network Integration Program to respond to network traffic and transport elements of the planning conditions of approval for WestConnex granted by the then NSW Department of Planning and Environment under the Environment, Planning and Assessment Act 1979.
  • NSW Treasury guidelines for business cases note that accurate cost estimates include assessment of the financial impact of meeting the conditions of planning approval.
  • Travel time and vehicle operating cost benefits attributed to the WestConnex project in the 2015 WestConnex Business Case assume that some network integration works, then costed at $373 million, were in place.

Refer to Appendix two for more detail on network integration works.

Some of the projects in the WestConnex Network Integration Program provide community and place benefits, such as parklands and cycleways. These benefits have not been attributed to WestConnex. Additionally, some network integration works are likely to deliver additional traffic related benefits to WestConnex. As the Network Integration Program’s primary purpose is to meet the conditions of planning approval for WestConnex, TfNSW should attribute all the costs and benefits of the program to WestConnex.

To September 2021, the total funded cost of the Network Integration Program is approximately $2.077 billion. TfNSW estimates that it will need a further $222 million to complete all expected network integration works.

The NSW Government's decision to separate Sydney Gateway from WestConnex has reduced transparency and accountability for TfNSW's underestimation of the cost of the road component of Sydney Gateway

Sydney Gateway is a high‑capacity connection between the new St Peters Interchange and the Sydney Airport and Port Botany precinct. It includes a road and rail components. The road component was included in the scope of WestConnex in the 2015 WestConnex Business Case. The November 2015 design, which TfNSW costed at $800 million, involved separate roadways from the St Peters Interchange to the International terminal, and to the domestic terminals and Mascot airport precinct.

By October 2016, TfNSW was aware that the $800 million budget for Sydney Gateway was insufficient and revised the forecast cost for the road component to $1.8 billion. The original cost estimate did not sufficiently consider the cost of:

  • constructing a complex design adjacent to the airport precinct
  • obtaining access to land required for the project
  • managing environmental contamination.

On 9 August 2017, the then Minister for WestConnex announced that the Sydney Gateway project was not part of WestConnex.

The 2015 WestConnex Business Case notes that material changes to the WestConnex budget, funding, scope, or timeframe are subject to Cabinet approval processes. It states that, when seeking approval for material changes, the portfolio Minister will make a submission to the relevant Cabinet Committee. Changes in project scope required the approval of the then Cabinet Committee on Infrastructure and should have been endorsed by the WestConnex Interdepartmental Steering Committee.

TfNSW and the NSW Department of Premier and Cabinet (DPC) assert that there is no documentation to support the government’s decision to separate Sydney Gateway from the WestConnex Program, or the WestConnex Interdepartmental Steering Committee's endorsement of a submission to Cabinet seeking approval for the separation.

The established governance processes for major scope changes were not followed in this instance. The lack of transparency regarding government's decision to separate Sydney Gateway from WestConnex also reduces visibility of TfNSW's underestimation of the cost of delivering the road component of Sydney Gateway.

The November 2018 Final Business Case for Sydney Gateway, which was approved by the government, included an estimate of $2.45 billion (nominal outturn cost) for the road component. This estimate included an $800 million contribution from WestConnex. A more recent estimate (late 2020) for this project is $2.56 billion (nominal outturn cost).

The Parramatta Road Urban Amenity Improvement Program should be included as part of the WestConnex budget

A specific objective of the 2015 WestConnex Business Case was the creation of opportunities for urban renewal along and around Parramatta Road. The business case included an allocation of $198 million in the $16.812 billion WestConnex budget for the Parramatta Road Urban Amenity Improvement program, designed to implement aspects of the objective. In November 2018, the NSW Government removed the Parramatta Road Urban Amenity Improvement Program from the WestConnex program of works and reallocated the $198 million (inside the $16.812 billion WestConnex budget) for urban renewal works around the Rozelle Interchange. As part of this decision, government approved new funding of $198 million to the Greater Sydney Commission for the urban amenity program, outside the $16.812 billion WestConnex budget. This understates the cost of WestConnex meeting its objectives by $198 million.

There is no requirement for ongoing ‘whole‑of‑program’ assurance of the WestConnex program of works, including related projects

In August 2015, INSW conducted its first Gateway Review of WestConnex as a program consisting of composite projects. Following that review, TfNSW registered each of the components of WestConnex with INSW as individual projects, rather than keeping WestConnex registered as a program or mega‑project. This is not inconsistent with the IIAF and all WestConnex related projects, including Sydney Gateway and the Network Integration Program, have undergone independent assurance reviews as individual projects under the IIAF.

Once a program like WestConnex is broken down into its composite parts, there is no requirement for the sponsor agency (TfNSW) or INSW to provide independent assurance on the program as a whole until it is completed. This is then done as part of the Gateway review for benefits realisation, which examines whether project benefits are being measured and meet expectations. These individual projects are, in themselves, significant in scale and complexity. While addressing them as discrete components for the purposes of the assurance review process can be justified, the absence of strategic, holistic reviews of WestConnex allows for total costs and benefits to become opaque and avoid scrutiny. Programs of this scale require greater ongoing transparency on total costs and benefits in order to ensure confidence they will meet intended objectives within budget.

There is a lack of public transparency on the total costs and benefits of the WestConnex project

Prior to 2018, the Audit Office provided assurance on costs borne and levied by Sydney Motorway Corporation and its controlled entities. Since the NSW Government sold 51 per cent of its stake in WestConnex in August 2018, the Auditor‑General no longer has the mandate to provide this assurance. The Audit Office is also unable to provide any assurance regarding the performance of tolling concessions.

This means that the total costs of WestConnex, including those levied on road users through tolling, are not reported alongside the full cost of delivering the project. This information, and independent assurance over that information, would provide transparency and context to the outcome of government's sale of its interest in WestConnex.

To enhance the transparency of existing infrastructure assurance processes, government could consider requiring large and complex infrastructure programs to undergo periodic review at a whole‑of‑program level. This could take the form of annual reports to Parliament on the total costs and benefits of selected large and complex projects by the responsible agency. The reports could include an assessment of the cost to government and cost to the community of funding and financing. Independent assurance of the agency report would provide Parliament with greater confidence that infrastructure is delivered economically and providing value for money for the people of NSW.

The Australian National Audit Office provides similar assurance on selected Department of Defence acquisition projects as part of its annual Major Projects Report.

Design enhancements included in the 2015 WestConnex Updated Strategic Business Case were supported by robust analysis

The 2015 WestConnex Business Case contained more detail than the 2013 WestConnex business case. Design enhancements were made as a result of modelling analysis conducted over the two years since the 2013 business case. Enhancements included a full underground link between Kingsgrove and St Peters as part of the New M5 and re‑alignment of the M4‑M5 link tunnel (Stage 3) to include the Rozelle Interchange. The Rozelle Interchange will provide a direct connection to the Anzac Bridge and Victoria Road, and will enable a connection to the proposed Western Harbour Tunnel and Beaches Link. A map and description of these elements can be found at Exhibits 2 and 3 of this report.

In 2016, TfNSW revised the design of the M4‑M5 Link and Rozelle to address traffic and integration issues

As part of preparing the 2015 WestConnex Business Case, TfNSW prepared a Project Definition and Delivery Report (PDDR) for the M4‑M5 Link. This report describes the scope of the project, including a high‑level concept design. TfNSW identified limitations with the proposed design of the M4‑M5 in the PDDR, which it would need to address as the project moved to a detailed design stage. In particular, these limitations included:

  • poor integration with the Bays Precinct masterplan
  • traffic capacity constraints on Victoria Road and Anzac Bridge
  • construction complexity.

Following a comprehensive review in mid‑2016, TfNSW changed the design of the M4‑M5 Link and Rozelle Interchange to address these limitations. These changes included:

  • deletion of the Camperdown intersection to improve traffic conditions on Parramatta Road
  • a fully underground and larger Rozelle Interchange with 10‑hectare dedicated parklands
  • a toll‑free tunnel link from Iron Cove Bridge to Anzac Bridge
  • increasing the lanes in the dual tunnels from three to four each way.

TfNSW documented, but did not publish, the rationale for the design changes, including how the changes addressed the limitations of the previous design while providing increased community benefit through the creation of open space. TfNSW undertook cost comparison studies which estimated that these changes would have a neutral impact on the estimated project cost while achieving the same or improved benefits.

TfNSW's record‑keeping systems for large infrastructure investments negatively impact accountability and transparency

In response to our formal requests for relevant information, made during the conduct of this audit, TfNSW advised that complete and valid records of key decision‑making processes, analysis and advice were unavailable. Additionally, TfNSW often provided information that was incomplete or unverifiable (for instance, unsigned briefing notes). This is not consistent with accepted governance practices and does not comply with the requirements of the State Records Act 1998.

We also requested that TfNSW provide a list of relevant documents held by the Sydney Motorway Corporation (SMC). While TfNSW acknowledged that SMC may hold material relevant to the audit, TfNSW did not have a list or description of these documents. As SMC is now a majority privately held entity, both the Audit Office and TfNSW have limited power to require SMC to provide documentation.

The delivery timeframe for large and complex infrastructure projects such as WestConnex frequently exceeds five years, and some projects can take over a decade to deliver. These projects represent a significant investment of public resources and government agencies should expect independent review and assurance activities such as performance audits. The establishment of dedicated record keeping facilities for major infrastructure projects, such as data rooms, would improve transparency and accountability. This would ensure that the use of public resources is fully auditable in line with public expectations and the requirements of the Government Sector Finance Act 2018, the State Records Act 1998 and the Public Finance and Audit Act 1983.

2. Recommendations

By December 2021, TfNSW should:

1. review the impact of scope changes on project objectives, costs and benefits for complex infrastructure projects

2. when preparing business cases for complex large infrastructure projects, ensure that the estimated costs and benefits of works which are reasonably expected to meet consent conditions are included in the overall project cost and its benefits (as per Treasury guidelines)

3. establish and maintain centralised and project‑specific record keeping, including through dedicated project data rooms, to ensure major infrastructure projects can readily be subject to external oversight and assurance.

By June 2022, INSW should:

4. provide transparent whole‑of‑program assurance on total costs and benefits throughout the project life‑cycle when complex projects are split into sub‑projects.

By June 2022, NSW Government should:

5. consider enhancing the public transparency of existing infrastructure assurance processes by requiring that large complex infrastructure programs undergo periodic review at a whole‑of‑program level. This could take the form of reports to Parliament on the total costs and benefits on selected large and complex projects by the responsible agency, including cost to government and cost to community of funding and financing, as well as an accompanying independent assessment of the agency report.

Following our 2014 performance audit report 'WestConnex: Assurance to the government', the NSW Government established the Infrastructure Investor Assurance Framework (IIAF). INSW is responsible for the development, implementation and administration of the IIAF. The assurance framework involves gateway reviews, health checks, deep dive reviews, and project monitoring and reporting at various stages in the lifecycle of a project. The main aims of the IIAF are to help ensure major infrastructure projects are delivered on time and on budget, and to ensure that reports are regularly monitored by the Cabinet of the NSW Government. The IIAF gateway review process is compulsory for all significant investments and expenditure under the NSW Treasury Gateway Policy.

In accordance with the IIAF, INSW is responsible for the following:

  • providing a dedicated Assurance Team including Gateway Review Managers to coordinate Reviews
  • determining appropriate expert reviewers, and manages scheduling, commissioning and administration of Assurance Review reports. Infrastructure NSW is independent of the Expert Review Team
  • monitoring Tier 1 – High Profile/High Risk projects, Tier 2 and Tier 3 (if required) project performance through independent Assurance Reviews
  • providing independent analysis and advice on key risks and any corrective actions recommended for Tier 1 – High Profile/High Risk, Tier 2 and Tier 3 projects
  • escalating projects to Infrastructure Investor Assurance Committee (IIAC) and Cabinet where projects present ‘red flag issues’ and where corrective action is needed
  • working with delivery agencies to register all capital projects with an estimated cost greater than $10.0 million and ensures they are risk profiled and assigned a risk‑based project tier with an endorsed IIAF Project Registration report
  • preparing forward looking annual Cluster Assurance Plans
  • maintaining and continuously improves the IIAF process
  • reporting to the IIAC, Cabinet and Infrastructure NSW Board
  • regularly report to NSW Treasury on the performance of the IIAF.

In relation to WestConnex, TfNSW is the sponsor agency responsible for meeting relevant IIAF requirements, including:

  • registering and risk profiling projects
  • IIAF gateway, health check, and deep dive assurance reviews
  • regular reporting.

Under the IIAF, it is mandatory for all capital projects valued over $10.0 million to be registered with INSW. Capital projects can be registered either as a program (comprising of a group of related projects or activities) or as a project (which may or may not be part of a program).

According to the IIAF, programs tend to have a lifespan of several years and aim to deliver outcomes and benefits related to an organisation's strategic objectives. Projects tend to have a shorter lifespan, and deal with outputs. Projects can, however, be grouped under a single program if they are similar in nature or if they are aimed at collectively achieving a strategic objective. Complex projects can be delivered in multiple stages, under different contracts, and across different time periods.

The last assurance review of the entire WestConnex program of works as a whole was in 2015

INSW conducted the first IIAF gateway review of WestConnex in August 2015. TfNSW developed a draft WestConnex Updated Strategic Business Case to consolidate the latest analysis on WestConnex, and to confirm that the project remained fit for purpose, economically viable, and financially deliverable. The review followed a recommendation in our 2014 performance audit report that business cases be thoroughly revisited.

During September 2015, INSW conducted additional informal reviews to identify strategic risks associated with public release of the WestConnex business case. Subsequently, INSW gave the Premier of NSW its views on the draft business case, including the following points:

  • The $398 million budget for Sydney Gateway was insufficient to meet the benefits claimed in the business case for a ‘functional’ connection to Sydney Airport and Port Botany. INSW studies indicate a future‑proof solution would require a minimum spend of $755 million.
  • Enabling works for WestConnex estimated at $1.534 billion were excluded from the cost of WestConnex. Significant work remained for RMS to identify mitigation measures to address planning approvals and network performance issues.
  • Enabling works (a Southern Connector), an access ramp and surface road improvements within St Peters were excluded from the draft 2015 business case despite their inclusion in the WestConnex scope in the 2014–15 State Budget.
  • The overall cost of works not funded within the WestConnex budget ranged from $2.011 billion to $2.196 billion. This included the enabling works, access ramp and surface road improvements and the shortfall for Sydney Gateway.

All WestConnex related projects, including Sydney Gateway have undergone independent assurance reviews under the IIAF

Since INSW submitted the first WestConnex progress update report to Cabinet in June 2015, INSW has been reporting monthly on the different stages of the WestConnex Program, including Sydney Gateway, as the projects were registered with INSW as High‑Profile, High‑Risk projects. Separate reporting enabled INSW to report and review each stage with more detailed scrutiny, compared to the reporting and reviewing at a program level.

WestConnex Stage 2 (New M5) underwent both mandatory and non‑mandatory reviews at key points in the project lifecycle. Three mandatory gateway reviews – at Gate 2 (Final business case), Gate 3 (Readiness for market), and Gate 4 (Tender evaluation) – were conducted by TfNSW before the introduction of IIAF. Four non‑mandatory health check reviews and one non‑mandatory deep dive review were conducted after the introduction of the IIAF managed by INSW.

Similarly, WestConnex Stage 3 projects – M4‑M5 link, M4‑M5 Tunnels, and Rozelle Interchange – also underwent mandatory and non‑mandatory reviews at key points in their lifecycle under IIAF.

The M4‑M5 Link had two mandatory gateway reviews and one non‑mandatory health check review under IIAF. These reviews were conducted before Stage 3 was split into two stages, due to major design changes to the Rozelle Interchange and the M4‑M5 tunnels.

The M4‑M5 tunnels had two mandatory gateway reviews (at Gates 3 and 4), one non‑mandatory health check review, and one non‑mandatory deep dive review under IIAF.

Rozelle Interchange also underwent three mandatory gateway reviews at Gate 3 (part 1), Gate 3 (part 2), and Gate 4, two non‑mandatory health check reviews, and one non‑mandatory deep dive review under IIAF.

Since mid‑2017, the Sydney Gateway project has undergone required independent assurance reviews, as well as a number of optional assurance reviews

In November 2016, INSW conducted a mandatory Gate 1 gateway review on a strategic business case for the Sydney Gateway Project. TfNSW did not proceed with this business case. Following the separation of Sydney Gateway from WestConnex in mid‑2017, TfNSW developed a new business case for Sydney Gateway. It has undergone the required Gate 1, Gate 2, and Gate 3 gateway reviews, as well as two non‑mandatory health check reviews, and three non‑mandatory deep dive reviews under IIAF.

Network integration works have undergone all IIAF required assurance reviews

TfNSW completed a strategic business case for the Network Integration Program in August 2020, and INSW completed a gateway review in November 2020. This is despite network integration projects starting as early as 2015, with $645 million having been spent by June 2020. The strategic business case included a prioritisation process for completing remaining works in the program. Prior to November 2020, TfNSW registered individual network integration projects with INSW, and these projects have undergone gateway reviews where required.

The Network Integration Program strategic business case does not include Rozelle interchange network integration works ($353 million) and additional network integration works to settle a contractor claim adjacent to St Peters Interchange ($190 million). These were excluded from the business case on the basis they had already been approved by government, and as such were not subject to the prioritisation elements of the business case. TfNSW has not developed separate business cases for these works, although the scope of the St Peters Interchange works was developed through a negotiated process.

TfNSW did not prepare business cases for some network integration works which have commenced, including the $323 million Campbell Road/Euston Road works

Prior to its development of the August 2020 strategic business case, TfNSW did not prepare business cases for many network integration works that have commenced, and in some instances were completed, before 2019. Significantly, TfNSW did not prepare a business case for the Campbell Road/Euston Road works, which cost $323 million and have been completed.

In 2016, TfNSW’s Business Case Policy requires the creation of business cases for capital projects costing over $1.0 million. At the time of writing this report, TfNSW’s draft policy requires full business cases for capital projects costing $10.0 million or more.

There is no requirement for ongoing ‘whole‑of‑program’ assurance of the WestConnex program of works, including related projects

INSW conducted its first gateway review of WestConnex (as a program, which consisted of composite projects) in August 2015. Following that review, TfNSW registered each of the components of WestConnex with INSW as individual projects, rather than keeping WestConnex registered as a program or complex project. The IIAF allows this to occur.

Separate registration enabled INSW to report and review each stage with more scrutiny compared to whole‑of‑program level review.

Such an approach has merit, considering the individual stages (and components of these stages) are multi‑million dollar works in their own right. Each project has its own timing for gateway reviews at stages such as 'Readiness for Market' and 'Tender Evaluation'.

Once a program such as WestConnex is broken down into its composite parts, there is no requirement for the sponsor agency (TfNSW) or INSW to conduct independent assurance on the program of works as a whole until the whole program is completed as part of the Benefits Realisation (Gate 6) gateway review. The absence of strategic, holistic reviews of projects of the scale and complexity such as WestConnex during their delivery allows for total costs and benefits to become opaque and avoid scrutiny. Projects of this scale require greater ongoing transparency on total costs and benefits in order to ensure confidence they will meet intended objectives within budget.

INSW has advised us that it has prepared a proposal to expand its assurance function to include whole‑of‑program review of inter‑related infrastructure projects.

Appendix one – Responses from agencies

Appendix two – Network integration works

Appendix three – About the audit

Appendix four – Performance auditing

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Parliamentary reference - Report number #351 - released (17 June 2021).

Published

Actions for Report on Local Government 2020

Report on Local Government 2020

Local Government
Asset valuation
Compliance
Cyber security
Financial reporting
Fraud
Information technology
Infrastructure
Internal controls and governance
Procurement

What the report is about

Results of the local government sector council financial statement audits for the year ended 30 June 2020.

What we found

Unqualified audit opinions were issued for 127 councils, 9 county councils and 13 joint organisation audits in 2019–20. A qualified audit opinion was issued for Central Coast Council.

Councils were impacted by recent emergency events, including bushfires and the COVID-19 pandemic. The financial implications from these events varied across councils. Councils adapted systems, processes and controls to enable staff to work flexibly.

What the key issues were

There were 1,435 findings reported to councils in audit management letters.

One extreme risk finding was identified related to Central Coast Council’s use of restricted funds for general purposes.

Fifty-three high risk matters were identified across the sector:

  • 21 high risk matters relating to asset management
  • 14 high risk matters relating to information technology
  • 7 high risk matters relating to financial reporting
  • 4 high risk matters to council governance procedures
  • 3 high risk matters relating to financial accounting
  • 3 high risk matters relating to purchasing and payables
  • 1 high risk matter relating to cash and banking.

More can be done to reduce the number of errors identified in financial reports. 61 councils required material adjustments to correct errors in previous audited financial statements.

Fast facts

  • 150 councils and joint organisations in the sector
  • 99% unqualified audit opinions issued for the 30 June 2020 financial statements
  • 490 monetary misstatements were reported in 2019-20
  • 61 prior period errors reported
  • 53 high risk management letters findings identified
  • 49% of reported issues were repeat issues

Rural fire fighting equipment

Sixty-eight councils did not record rural fire fighting equipment worth $119 million in their financial statements.

The NSW Government has confirmed these assets are not controlled by the NSW Rural Fire Service and are not recognised in the financial records of the NSW Government.

What we recommended

The Office of Local Government should communicate the State's view that rural firefighting equipment is controlled by councils in the local government sector, and therefore this equipment should be properly recorded in their financial statements.

Central Coast Council

A qualified opinion was issued for Central Coast Council (the Council) relating to two matters.

Council did not conduct the required revaluation to support the valuation of roads.

Council also disclosed a prior period error relating to restrictions of monies collected for their water, sewer, and drainage operations, which, based on the NSW Crown Solicitor’s advice, should be considered a change in accounting policy.

What we recommended

The Office of Local Government should clarify the legal framework relating to restrictions of water, sewerage and drainage funds (restricted reserves) by either seeking an amendment to the relevant legislation or by issuing a policy instrument to remove ambiguity from the current framework.

Key financial information

In 2019-20, councils:

  • collected $7.3 billion rates and annual charges
  • received $4.7 billion grants and contributions 
  • incurred $4.8 billion of employee benefits and on-costs
  • held $14.2 billion of cash and investments
  • managed $160.0 billion of infrastructure, property, plant and equipment
  • entered into $3.3 billion of borrowings.

Further information

Please contact Ian Goodwin, Deputy Auditor-General on 9275 7347 or by email.

 

Financial reporting is an important element of good governance. Confidence in and transparency of public sector decision making are enhanced when financial reporting is accurate and timely.

This chapter outlines audit observations related to the financial reporting of councils and joint organisations.

Highlights

  • The Office of Local Government within the Department of Planning, Industry and Environment (OLG) extended the statutory deadline for councils and joint organisations to lodge their audited financial statements by an additional month to 30 November 2020 due to the COVID-19 pandemic.
  • One hundred and thirty-three councils and joint organisations (2019: 117) lodged audited financial statements with the OLG by the revised statutory deadline of 30 November (2019: 30 October). Sixteen (2019: 30) councils received extensions to submit audited financial statements to OLG. Canberra Region Joint Organisation did not submit their audited financial statements by the statutory deadline and did not formally apply for extension before the deadline lapsed.
  • Unqualified audit opinions were issued for 127 councils, nine county councils and 13 joint organisation audits in 2019–20. A qualified audit opinion was issued for Central Coast Council.
  • Unqualified audit opinions were issued for the 2018–19 financial audits of Hilltops, MidCoast and Murrumbidgee Councils, which were not completed at the time of tabling the 'Local Government 2019' report in Parliament.
  • The total number and dollar value of corrected and uncorrected financial statement errors increased compared with the prior year.
  • Sixty-eight councils did not record rural fire fighting equipment in their financial statements worth $119 million. The NSW Government has confirmed these assets are not controlled by the NSW Rural Fire Service and are not recognised in the financial records of the NSW Government.
  • The total number of prior period financial statement errors increased from 59 in the prior year to 61, but the total dollar value of the errors decreased from $1,272 million to $813 million.
  • Councils implemented three new accounting standards in 2019–20 relating to revenue and leases.

 

Recent emergency events, including drought, bushfires, floods and the COVID-19 pandemic have impacted councils.

This chapter will provide insights into how these events have impacted councils, including:

  • financial implications of the emergency events
  • changes to councils' operating models, processes and controls
  • accessibility to technology and the maturity of councils' systems and controls to prevent unauthorised and fraudulent access to data
  • receipt and delivery of stimulus packages or programs at short notice.

Highlights

  • All councils were impacted by the recent emergency events.
  • Councils changed governance, policies, systems and processes to respond to the recent emergency events.
  • Challenges were experienced adapting Information Technology (IT) infrastructure and controls to enable staff to work from home.
  • Sixty-five per cent of councils updated business continuity plans and 42 per cent updated disaster recovery plans as a response to recent emergency events.
  • Councils received various forms of assistance from government relating to the recent emergencies, which was used to provide support to local communities.

Recent emergency events significantly impacted councils

Recent emergencies, including drought, bushfires, floods and the COVID-19 pandemic have brought particular challenges for councils and their communities.

 

A strong system of internal controls enables councils to operate effectively and efficiently, produce reliable financial reports, comply with laws and regulations and support ethical government.

This chapter outlines the overall trends in governance and internal control findings across councils, county councils and joint organisations in 2019–20. It also includes the findings reported in the 2018–19 audits of Hilltops, MidCoast and Murrumbidgee councils as these audits were finalised after the Report on Local Government 2019 was published.

Financial audits focus on key governance matters and internal controls supporting the preparation of councils' financial statements. Audit findings are reported to management and those charged with governance through audit management letters.

Highlights

  • Total number of findings reported in audit management letters decreased from 1,985 in 2018–19 to 1,435 in 2019–20.
  • One extreme risk finding was identified in 2019–20 (2018–19: nil).
  • Total number of high-risk findings decreased from 82 in 2018–19 to 53 in 2019–20. Thirty per cent of the high-risk findings identified in 2018–19 were reported as high-risk findings in 2019–20.
  • Forty-nine per cent of findings reported in audit management letters were repeat or partial repeat findings.
  • Governance, asset management and information technology (IT) comprise over 61 per cent of findings and continue to be key areas requiring improvement.
  • Fifty-six councils could strengthen their policies, processes and controls around fraud prevention and legislative compliance.
  • Sixty-eight councils had deficiencies in their processes to revalue infrastructure assets.
  • Fifty-eight councils have yet to implement basic governance and internal controls to manage cybersecurity.
  • Sixty-four councils should formalise and periodically review their IT policies and procedures.

Total number of findings reported in audit management letters decreased

In 2019–20, 1,435 findings were reported in audit management letters (2018–19: 1,985 findings). An extreme risk finding was also identified this year related to Central Coast Council's use of restricted funds. The total number of high-risk findings decreased to 53 (2018–19: 82 high-risk findings).

Findings are classified as new, repeat or ongoing findings, based on:

  • new findings were first reported in 2019–20 audits
  • repeat findings were first reported in prior year audits, but remain unresolved in 2019–20
  • ongoing findings were first reported in prior year audits, but the action due dates to address the findings are after 2019–20.

Findings are categorised as governance, financial reporting, financial accounting, asset management, purchases and payables, payroll, cash and banking, revenue and receivables, or information technology. The high-risk and common findings across these areas are explored further in this chapter.

Audit Office’s work plan for 2020–21 onwards

Focus on local council's response and recovery from recent emergencies

Local councils and their communities will continue to experience the effects of recent emergency events, including the bushfires, floods and the COVID 19 pandemic for some time. The full extent of some of these events remain unclear and will continue to have an impact into the future. The recovery is likely to take many years.

The Office of Local Government (OLG) within the Department of Planning, Industry and Environment is working with other state agencies to assist local councils and their communities to recover from these unprecedented events.

These events have created additional risks and challenges, and changed the way that councils deliver their services.

We will take a phased approach to ensure our financial and performance audits address the following elements of the emergencies and the Local Government's responses:

  • local councils' preparedness for emergencies
  • its initial responses to support people and communities impacted by the 2019–20 bushfires and floods, and COVID-19
  • the governance and oversight risks that arise from the need for quick decision making and responsiveness to emergencies
  • the effectiveness and robustness of processes to direct resources toward recovery efforts and ensure good governance and transparency in doing so
  • the mid to long-term impact of government responses to the natural disasters and COVID-19
  • whether government investment has achieved desired outcomes.

Planned financial audit focus areas in Local Government

During 2020–21, the financial audits will focus on the following key areas:

  • cybersecurity, including:
    • cybersecurity framework, policies and procedures
    • assessing the controls management has to address the risk of cybersecurity incidents
    • whether cybersecurity risks represent a risk of material misstatement to council's financial statements
  • budget management
  • financial sustainability
  • quality and timeliness of financial reporting
  • infrastructure, property, plant and equipment
  • information technology general controls.

Audit, risk and improvement committees

All councils are required to have an audit, risk and improvement committee by March 2022

The requirement for all councils to establish an audit, risk and improvement committee was deferred by 12 months to March 2022 due to the COVID 19 pandemic.

Audit, risk and improvement committees are an important contributor to good governance. They help councils to understand strategic risks and how they can mitigate them. An effective committee helps councils to build community confidence, meet legislative and other requirements and meet standards of probity, accountability and transparency.

Local Government elections

Local Government elections were postponed for one year due to the COVID 19 pandemic

The Local Government elections were deferred for one year due to the COVID 19 pandemic and will now be held on 4 September 2021. As the statutory deadline for the 2020–21 financial statements is 30 October 2021, some of the newly elected councillors will be required to endorse them.

Implementation of AASB 1059

Accounting standards implementation continue next year

AASB 1059 is effective for councils for the 2020–21 financial year.

A service concession arrangement typically involves a private sector operator that is involved with designing, constructing or upgrading assets used to provide public services. They then operate and maintain those assets for a specified period of time and is compensated by the public sector entity in return. Examples of potential service concession arrangements impacting councils include roads, community housing, childcare services and nursing homes.

AASB 1059 may result in councils recognising more service concession assets and liabilities in their financial statements.

 

Appendix one – Response from the Department of Planning, Industry and Environment

Appendix two – NSW Crown Solicitor’s advice

Appendix three – Status of 2019 recommendations

Appendix four – Status of audits

 

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for Acquisition of 4–6 Grand Avenue, Camellia

Acquisition of 4–6 Grand Avenue, Camellia

Transport
Asset valuation
Compliance
Fraud
Infrastructure
Internal controls and governance
Management and administration
Procurement
Risk

The Auditor-General for New South Wales, Margaret Crawford, has today released a report on Transport for NSW’s (TfNSW) acquisition of 4–6 Grand Avenue in Camellia.

This audit, which was requested on 17 November 2020 by the Hon. Andrew Constance MP, the Minister for Transport and Roads, examined:

  • whether TfNSW conducted an effective process to purchase 4–6 Grand Avenue, Camellia
  • whether TfNSW has effective processes and procedures to identify and acquire property required to deliver the NSW Government’s major infrastructure projects.

The audit found that TfNSW conducted an ineffective process when it purchased 4–6 Grand Avenue, Camellia. The audit also found that TfNSW’s internal policies and procedures to guide the transaction were, and continue to be, insufficient.

The Auditor-General has made seven recommendations to address the issues identified in the report.

On 17 November 2020, the Hon. Andrew Constance MP, the Minister for Transport and Roads, requested this audit under section 27B(3)(c) of the Public Finance and Audit Act 1983.

On 15 June 2016, Transport for New South Wales (TfNSW) acquired 6.3 hectares of land at 4–6 Grand Avenue, Camellia, by agreement from Grand 4 Investments Pty Ltd. Grand 4 Investments was a business entity established by the owners of Billbergia Pty Ltd, a property development and investment company.

TfNSW paid Grand 4 Investments $53.5 million and assumed liability for addressing environmental issues and contamination associated with the site. This took place seven months after the vendor acquired the land as part of a competitive Expression of Interest process, in which TfNSW also participated, for $38.15 million.

TfNSW is the NSW Government agency responsible for most major transport infrastructure projects in New South Wales. TfNSW acquired the Camellia site for use as a stabling and maintenance depot to support the Parramatta Light Rail (PLR) project.

Consistent with the minister’s request, this audit assessed:

  • whether TfNSW conducted an effective process to purchase 4–6 Grand Avenue, Camellia
  • whether TfNSW has effective processes and procedures to identify and acquire property required to deliver the NSW Government’s major infrastructure projects.

In considering the effectiveness of the processes for this purchase, the audit considered:

  • the requirements of the Land Acquisition (Just Terms Compensation) Act 1991 (the Act)
  • the application of sound processes to manage risk to the NSW Government and to achieve value for money
  • the application of disciplines associated with complex procurement, such as probity, in a NSW Government context.
The acquisition of the 4–6 Grand Avenue site in Camellia was consistent with a 2014 feasibility study for the PLR, but occurred before the completion of detailed project planning or an acquisition strategy.

TfNSW made two attempts to acquire the 4–6 Grand Avenue site in Camellia, and was successful on the second attempt. TfNSW recognised the risks associated with early acquisition and had high-level strategies in place should the site not be required.

The specific site had been identified in a feasibility study for the PLR commissioned by TfNSW in 2014 as one of several options in Camellia for a stabling and maintenance depot. However, TfNSW had not done any substantive analysis of the various options to identify a preferred location before the two opportunities to acquire 4–6 Grand Avenue were brought to TfNSW’s attention by the landowners (or their agents). On both occasions, TfNSW chose to actively pursue acquisition in advance of any such analysis.

The acquisition was also not informed by a Property Acquisition Strategy, which TfNSW policy recommends in order to guide the process and manage acquisition specific risks.

In 2015, TfNSW identified that it would require a stabling and maintenance depot in the Camellia area for the Parramatta Light Rail

In 2014, TfNSW commissioned an external engineering consultancy to undertake a feasibility design study for the Parramatta Light Rail - the Parramatta Transport Corridor Strategy Feasibility Design study (herein referred to as ‘the feasibility study’). In early 2015, TfNSW received the feasibility study, which was one of several key sources that informed the development of business cases for the PLR.

The feasibility study recommended that TfNSW should consolidate the maintenance and cleaning operations with overnight stabling facilities on one site. The study noted that the optimal location for any such site would be in close proximity to the proposed network, and noted that the site must have access to road connections to accommodate access for cars and trucks.

The study found that a centrally located stabling and maintenance facility would be required for all routes serving the Parramatta CBD, and that the Camellia industrial area was a preferred location for such a facility. The study noted that the Camellia area was contaminated.

The feasibility study notes that its conclusions were based on assumptions about the light rail system adopted and decisions made by the future operator of the system, who had not yet been selected or appointed.

TfNSW's decision to progress a potential acquisition in 2015 considered the risk that the site may not be required

TfNSW's FIC was responsible for making decisions on funding allocations at a whole of program level within TfNSW. FIC was also responsible for approving ‘high-risk/high-value’ variations to program budgets. Members of the FIC included:

  • Secretary of Transport for NSW
  • Deputy Secretary, Infrastructure and Services
  • Deputy Secretary, Freight, Strategy and Planning
  • Deputy Secretary, Customer Services
  • Deputy Secretary Finance and Investment
  • Deputy Secretary People and Corporate Services.

An April 2015 submission, from the then Deputy Director-General to the agency’s FIC, sought authorisation and funding approval to participate in an Expression of Interest sale process. It noted the risk that the project may not go ahead. The submission advised that:

By acquiring a strategic site now, it reduces the risk of having to pay an improved value or a value that may be subject to rapidly improving land values due to changes in land use and rezoning.

The property can be acquired for the project, held strategically and income generated by leasing the site as hardstand 1 space until the project requires the land for the Parramatta Light Rail project.

If the project does not proceed in the medium to longer term, the property can be sold at a premium to what has been paid today as property fundamentals improve.

This submission acknowledged the risks associated with environmental contamination and proposed that these risks would be managed by negotiating a contract where the remediation and associated expenses would be at the landowner’s cost. 

TfNSW assessed the 4–6 Grand Avenue site as one of several sites in Camellia that was a feasible location for a stabling and maintenance facility

The Departmental feasibility study assessed six potential sites for a stabling and maintenance facility, including 4–6 Grand Avenue, noting strengths and weaknesses of each site. A different site on Grand Avenue was assessed as the ‘base case’ option (1 Grand Avenue). The study’s comments on the 4–6 Grand Avenue site included the following:

With an area of approximately 63,000m2, this site has sufficient space for a depot with the required stabling yard and maintenance facilities. The location allows for good road access and LRT [light rail transit] access would be from Grand Avenue, which may require a road crossing or signalised intersection. The site has been used for general industrial uses; however the land has been cleared and is currently undergoing remediation 2. The site is not affected by flooding based on one in 100-year flood data.

In early 2015, once the opportunity to acquire 4–6 Grand Avenue emerged, TfNSW commissioned a specific feasibility study of the 4–6 Grand Avenue site. The feasibility studies clearly documented the existence of environmental contamination. In April 2015, the report concluded:

Given the limitations of this report and within the parameters that have been set it is concluded that from a spatial and geographic perspective the site at 6 Grand Avenue would be suitable as a stabling and maintenance depot for the Parramatta light rail project. There are few engineering and environmental constraints that would affect the feasibility level analysis of this site and all issues identified, within this desk study, are considered to be resolvable. However this being said there is a significant amount of work necessary to reach the final layout and definition of the stabling and maintenance depot. There are numerous items which require further consideration and conformation; planning approvals could impose restrictions on building heights, noise mitigation measures, light and visual impact requirements all of which can have significant impacts on the spatial requirements of any stabling and maintenance depot. 

The acquisition of 4–6 Grand Avenue was not informed by a Property Acquisition Strategy

For major projects, TfNSW typically requires the project team to complete a Property Acquisition Strategy, which is intended to guide both process as well as specific acquisition issues expected to be faced during the project. The Property Acquisition Strategy is not a mandated document but is a recommended tool to support property acquisition as part of major projects.

TfNSW did not have a Property Acquisition Strategy in place to guide the 2015 Expression of Interest process. On 6 November 2015, the then Project Director for the PLR project emailed the property team, noting a need to develop a Property Acquisition Strategy to close off the scoping design and preliminary business case.

In January 2016, TfNSW developed a draft Property Acquisition Strategy for the Parramatta Light Rail Project, although it was silent on the potential sites for the stabling and maintenance facility.

TfNSW focussed on 4–6 Grand Avenue because it was available and aligned to TfNSW's strategic interests

In early 2015, officials commenced monitoring the market for industrial real estate in the Camellia area and surrounds for possible sites for a stabling and maintenance facility.

In March 2015, then owner of the site, Akzo Nobel Pty Limited released the 4–6 Grand Avenue site through an Expression of Interest process managed by CBRE.

TfNSW’s then Deputy Director-General, Planning, sought approval from FIC to lodge an Expression of Interest up to $30.0 million. Approval was sought on the basis that it would ‘provide certainty for the Parramatta Light Rail project by allowing for a depot site in a suitable location and potentially avoid higher costs or longer timeframes associated with compulsory acquisition following completion of the project’s business case’. FIC approved the request at its meeting on 9 April 2015.

At this time, TfNSW had not conducted any analysis of financial or operational benefits and costs of the potential sites identified in earlier feasibility studies. TfNSW staff advised us that the decision to participate in the Expression of Interest process for 4–6 Grand Avenue was because it was available. There is no documentation substantiating this statement, which TfNSW staff provided verbally as part of this audit.

In November 2015, TfNSW was advised that it was unsuccessful in the Expression of Interest process and that Grand 4 Investments (a related entity of Billbergia) had purchased 4–6 Grand Avenue. TfNSW did not conduct any further analysis of alternative potential sites in Camellia between this date and commencing discussions with Grand 4 Investments in April 2016. In that time there had been some movement on other properties that were included in the feasibility study, including 37–39a Grand Avenue being under offer in September 2015.

In March 2016, TfNSW approached CBRE to organise a meeting with Grand 4 Investments. On 1 April 2016, TfNSW met with Grand 4 Investments.

TfNSW advises that a perceived benefit of the 4–6 Grand Avenue site was that it was not subject to other uses or leaseholds that would increase the cost of compulsory acquisition. Officers involved in the acquisition advised that other nominated sites in the feasibility study were subject to other uses or leaseholds. 


1  A hardstand space is a large, paved area to store cars, heavy vehicles and machinery.
2  Officers familiar with the acquisition could not confirm the nature of remediation being undertaken, but noted that the previous landowner had cleared buildings from the site, which may have been considered part of remediation.
TfNSW's independent valuation, which it commissioned and received after the acquisition, specifically excluded consideration of environmental contamination risk. As a result, TfNSW is exposed to the risk that the acquisition was not fully compliant with the Land Acquisition (Just Terms Compensation) Act 1991 (the Act) because it did not use an accurate estimate of market value during negotiations. That said, the acquisition of 4–6 Grand Avenue by agreement was consistent with preferred processes described in the Act.

TfNSW acquired the site from the landowner by agreement, and this is consistent with provisions in the Act. Obtaining approval for compulsory acquisition should negotiations for agreement break down is also consistent with the Act. That said, TfNSW did not at any time assess whether a compulsory acquisition could have resulted in acquisition at a lower cost than what was negotiated by agreement.

Despite the high risks associated with the acquisition, TfNSW did not commission a formal valuation in time to inform the negotiation and purchase. Instead, TfNSW relied on internal advice to estimate market value, but did not obtain a formal valuation from those advisors. For high-risk transactions, the greater expertise and arm's-length independence of an external specialist valuer should be preferred over an agency's own staff.

On 15 June 2016, the settlement date for the acquisition, TfNSW commissioned a formal independent valuation of the site. On 23 November 2016, TfNSW received the final formal valuation report. By not obtaining a formal independent valuation of the property in advance of acquisition to inform the acquisition value, TfNSW exposed itself to non-compliance with the Act by not establishing the market value as the basis for the acquisition price. TfNSW also breached its own internal policies.

TfNSW instructed the valuer to conduct its valuation within the following parameters:

  • Market valuation on an ‘as is’ basis – market value based on the methodology described in the Act. This approach valued the site at $25.0 million.
  • Market valuation on a speculative development basis – market value based on the financial value of the vendor's intended use of the site which, in this case, involved leasing the site for industrial use. This approach valued the site at $52.0 million, and TfNSW advised us this valuation supported the purchase price.
  • Disregard the impact of environmental contamination – TfNSW specifically instructed the independent valuer to disregard any known (or unknown) site contamination. As TfNSW knew of the significant environmental contamination affecting the site, this parameter resulted in a valuation that overstated the value of the site as it did not consider the cost of environmental remediation. The valuer applied this assumption for both market valuation approaches.

Additionally, as the independent valuer completed the valuation after the purchase was finalised, there is a risk that the valuation may have been influenced by the known purchase price.

TfNSW's failure to acquire a formal valuation and an assessment of the financial impact of environmental remediation before it purchased 4–6 Grand Avenue represents ineffective administration and governance.
TfNSW acquired the site at a time when there was demand and increasing prices for industrial property in the area. However, TfNSW did not effectively assess and manage the risks associated with the acquisition, and gaps in process led to increased risk. Briefings to decision-makers did not contain important information, and we found no evidence that gaps in advice were queried or explored by decision-makers.

TfNSW did not have plans or advice in place to assist in managing risk, such as:

  • a property acquisition plan
  • a comprehensive and up-to-date risk management plan
  • a negotiation strategy, or any authorisation limit or minimal acceptable position
  • an independent professional evaluation
  • external expert advice (with the exception of legal advice relating to the contract of sale).

TfNSW was aware of contamination issues affecting the land and had access to considerable information about the environmental conditions, such as site environmental audit reports and information on the NSW Environment Protection Authority's contaminated land register. However, TfNSW had not analysed specific technical information about the contamination and therefore was not aware of the risk implications and cost for remediation. Despite this, TfNSW changed its position from not accepting the risks and costs of contamination, to acquiring the site unconditionally. The basis for this decision is unclear and undocumented.

Briefing to senior leaders on the acquisition was silent on a number of important matters that would have been important for approvers to consider, including:

  • an explanation of the 40 per cent increase in purchase price between November 2015 and May 2016, and a 165 per cent increase from TfNSW’s offer in April 2015
  • the contamination risks associated with the site and an evidence-based estimate of potential costs to remediate the site
  • advice that an independent valuation had not been obtained, inconsistent with TfNSW policy.

Consideration of the acquisition by FIC was based on a summary business paper and was managed out-of-session, thereby removing the ability for comprehensive consideration of the acquisition proposal and its risks.

The probity management controls and assurances in place for the acquisition of the 4–6 Grand Avenue site were insufficient. These insufficiencies were exacerbated by the probity risk profile of the transaction.

The 4–6 Grand Avenue acquisition was a high-risk/high-value transaction, undertaken in a volatile property market in a short timeframe under pressure from Grand 4 Investments. TfNSW was engaging in a direct negotiation in advance of detailed planning for the acquisition, or the PLR as a whole. These circumstances contribute to heightened probity risk.

TfNSW did not establish a probity plan and sought no probity support throughout the acquisition. Also, with one exception, the staff involved in the acquisition did not complete conflict of interest declarations.

TfNSW was aware of the potential for probity or integrity issues with the transaction when it commissioned an internal audit in connection with the transaction in 2019. Internal discussions considered whether a misconduct investigation may be more appropriate, however no such investigation was undertaken.

TfNSW's insufficient probity practices, in addition to its failure to keep complete or comprehensive records of negotiations or decisions, reduce transparency of the process and its outcome and expose TfNSW to a greater risk of misconduct, corruption and maladministration.

At the time of the transaction, the TfNSW policy framework was not sufficiently risk-focussed and did not provide clarity on when officers ought to apply specific guidance or procedures. TfNSW's policies and procedures are more focussed on acquiring land to meet project needs and timeframes, and less on assuring value for money and managing risks.

At the time of its acquisition of 4–6 Grand Avenue, TfNSW had property acquisitions policies and procedures in place. Each of these were broadly sound in their content and intent. However, they lacked specificity on how or when to apply guidance, and when risk levels should elevate the importance of recommended guidance.

TfNSW's key guidance was principles based and relied on agency staff using their experience and expertise to apply guidance according to the circumstances of an individual transaction. This guidance was not duly applied in the acquisition of 4–6 Grand Avenue, Camellia. In addition, TfNSW does not have quality or control assurance to identify when TfNSW officers did not apply important policies or processes.

The primary focus of the TfNSW’s property acquisition guidance is to achieve vacant possession of land in a timeframe that meets the need of the relevant transport project. There is less specific focus on the need to meet the requirements of the NSW Government financial management framework.

Appendix one – Response from agency 

Appendix two – About the audit 

Appendix three – Performance auditing

 

Copyright Notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Parliamentary reference - Report number #349 - released (18 May 2021).

Published

Actions for Stronger Communities 2019

Stronger Communities 2019

Justice
Community Services
Compliance
Financial reporting
Internal controls and governance
Management and administration
Project management
Service delivery
Shared services and collaboration
Workforce and capability

A report has been released on the NSW Stronger Communities cluster.

From 1 July 2019, the functions of the former Department of Justice, the former Department of Family and Community Services and many of the cluster agencies moved to the new Stronger Communities cluster. The Department of Communities and Justice is the principal agency in the new Stronger Communities cluster.

The report focuses on key observations and findings from the most recent financial audits of agencies in the Stronger Communities cluster.

Unqualified audit opinions were issued on the financial statements for all agencies in the cluster.  

There were 157 audit findings on internal controls. Two of these were high risk and 59 were repeat findings from previous financial audits. ‘Cluster agencies should prioritise actions to address internal control weaknesses promptly with particular focus given to issues that are assessed as high risk’, the Auditor-General said.

The report notes that the NSW Government’s new workers' compensation legislation, which gave eligible firefighters presumptive rights to workers' compensation, cost emergency services agencies $180 million in 2018–19, mostly in increased premiums.

Download the PDF version of report

This report analyses the results of our audits of financial statements of the agencies comprising the Stronger Communities cluster for the year ended 30 June 2019. The table below summarises our key observations.

This report provides parliament and other users of the financial statements of agencies in the Stronger Communities cluster with the results of our audits, our observations, analyses, conclusions and recommendations in the following areas:

  • financial reporting
  • audit observations.

This cluster was significantly impacted by the Machinery of Government (MoG) changes on 1 July 2019. This report focuses on the agencies that from 1 July 2019, comprised the Stronger Communities cluster. The MoG changes moved some agencies from the clusters to which they belonged in 2018–19 to the Stronger Communities cluster. Conversely, the MoG also moved some agencies formerly in the Family and Community Services cluster and Justice cluster elsewhere. Please refer to the section on Machinery of Government changes for more details.

The Department of Communities and Justice is the principal agency of the cluster. The newly created department combines functions of the former Department of Justice and the Department of Family and Community Services.

Machinery of Government (MoG) refers to how the government organises the structures and functions of the public service. MoG changes occur when the government reorganises these structures and functions and those changes are given effect by Administrative Orders.

The MoG changes announced following the NSW State election on 23 March 2019 significantly impacted the Stronger Communities cluster through Administrative Changes Orders issued on 2 April 2019 and 1 May 2019. These orders took effect on 1 July 2019.

Section highlights

The 2019 MoG changes significantly impacted the former Justice and Family and Community Services (FACS) departments and clusters.

  • The Stronger Communities cluster combines most of the functions and agencies of the former Justice and FACS clusters from 1 July 2019.
  • The Department of Communities and Justice is now the principal agency in the new cluster.
  • The MoG changes bring new responsibilities, risks and challenges to the cluster.
  • A temporary office has been established by the Department of Communities and Justice to support the cluster in the planning, delivery and reporting associated with implementing the changes.

Financial reporting is an important element of good governance. Confidence and transparency in public sector decision making are enhanced when financial reporting is accurate and timely.

This chapter outlines our audit observations relating to the financial reporting of agencies in the Stronger Communities cluster for 2019.

Section highlights
  • Unqualified audit opinions were issued for all agencies' 30 June 2019 financial statements. However, further actions can be taken by some cluster agencies to enhance the quality of their financial reporting.
  • In November 2018, the Department of Justice implemented a new Victims Support Services system called VS Connect. Significant data quality issues arising from the VS Connect system implementation impacted the Department's ability to reliably estimate its Victims Support Scheme claims liabilities at 30 June 2019.
    We recommend the Department of Communities and Justice resolves the data quality issues in the new VS Connect System before 30 June 2020 and capture and apply lessons learned from recent project implementations, including LifeLink, Justice SAP and VS Connect, in any relevant future implementations.
  • Our audits found some cluster agencies needed to do more work on their impact assessments and preparedness to implement the new accounting standards, to minimise the risk of errors in their 2019–20 financial statements.
  • Cluster agencies with annual leave balances exceeding the State's target should further review their approach to managing leave balances.

Appropriate financial controls help ensure the efficient and effective use of resources and administration of agency policies. They are essential for quality and timely decision making.

This chapter outlines our observations and insights from our financial statement audits of agencies in the Stronger Communities cluster.

Section highlights

  • Cluster agencies should action recommendations to address internal control weaknesses promptly. Particular focus should be given to prioritising high risk issues. The 2018–19 financial audits of cluster agencies identified 157 internal control issues. Of these, two were high risk and 37.6 per cent were repeat findings from previous audits.
  • Data from the Department of Justice shows the inmate population reached a maximum of 13,798, compared to an operational capacity of 14,626 beds on 31 August 2019. This equates to an operational vacancy rate of 5.7 per cent, which is more than the recommended 5.0 per cent buffer. This is the first time the vacancy rate has exceeded the target over the last five years. Growth in the NSW prison population is being managed through the NSW Government's $3.8 billion Prison Bed Capacity Program.
  • In September 2018, the NSW Government introduced new workers' compensation legislation, which gives eligible firefighters presumptive rights to workers' compensation when diagnosed with one of 12 prescribed cancers. The new legislation cost emergency services agencies $180 million in 2018–19, mainly through additional workers' compensation premiums.

Appendix one – Timeliness of financial reporting by agency

Appendix two – Management letter findings by agency

Appendix three – List of 2019 recommendations 

Appendix four – Status of 2018 recommendations 

Appendix five – Cluster agencies 

Appendix six – Financial data 

 

Copyright notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for Internal Controls and Governance 2019

Internal Controls and Governance 2019

Education
Community Services
Finance
Health
Industry
Justice
Planning
Premier and Cabinet
Transport
Treasury
Whole of Government
Compliance
Cyber security
Fraud
Information technology
Internal controls and governance
Management and administration
Procurement
Project management

This report covers the findings and recommendations from the 2018–19 financial audits that relate to internal controls and governance at 40 of the largest agencies in the NSW public sector. The 40 agencies selected for this report constitute around 84 per cent of total expenditure for all NSW public sector agencies.

The report provides insights into the effectiveness of controls and governance processes across the NSW public sector. It evaluates how agencies identify, mitigate and manage risks related to:

  • financial controls
  • information technology controls
  • gifts and benefits
  • internal audit
  • contingent labour
  • sensitive data.

The Auditor-General recommended that agencies do more to prioritise and address vulnerabilities in their internal controls and governance. The Auditor-General also recommended agencies increase the transparency of their management of gifts and benefits by publishing their registers on their websites.

This report analyses the internal controls and governance of 40 of the largest agencies in the NSW public sector for the year ended 30 June 2019.

1. Internal control trends

New, repeat and high risk findings

There was an increase in internal control deficiencies of 12 per cent compared to last year. The increase is predominately due to a 100 per cent increase in repeat financial and IT control deficiencies.

Some agencies attributed the delay in actioning repeat findings to the diversion of staff from their regular activities to implement and operationalise the recent Machinery of Government changes. As a result, actions to address audit recommendations have been deferred or re prioritised, as the changes are implemented.

Agencies need to ensure they are actively managing the risks associated with having these vulnerabilities in internal control systems unaddressed for extended periods of time.

Common findings

A number of findings were common to multiple agencies. These findings often related to areas that are fundamental to good internal control environments and effective organisational governance, such as:

  • out of date policies or an absence of policies to guide appropriate decisions
  • poor record keeping and document retention
  • incomplete or inaccurate centralised registers or gaps in these registers
  • policies, procedures or controls no longer suited to the current organisational structure or business activities.

2. Information technology controls

IT general controls

We examined information security controls over key financial systems that support the preparation of agency financial statements. We found:

  • user access administration deficiencies at 58 per cent of agencies related to granting, review and removal of user access
  • an absence of privileged user activity reviews at 35 per cent of agencies
  • password controls that did not align to password policies at 20 per cent of agencies.

We also found 20 per cent of agencies had deficient IT program change controls, mainly related to segregation of duties in approval and authorisation processes, and user acceptance testing of program changes prior to deployment into production environments. User acceptance testing helps identify potential issues with software incompatibility, operational workflows, absent controls and software issues, as well as areas where training or user support may be required.

3. Gifts and benefits

Gifts and benefits registers

All agencies had a gifts and benefits policy and 90 per cent of agencies maintain a gifts and benefits register. However, 51 per cent of the gifts and benefits registers we examined contained incomplete declarations, such as missing details for the approving officer, value of the gift and/or benefit offered and reasons supporting the decision.

In some cases, gaps in recorded information meant the basis for decisions around gifts and benefits was not always clear, making it difficult to determine whether decisions in those instances were appropriate, compliant with policy and were not direct or indirect inducements to the recipients to favour suppliers or service providers.

Agencies should ensure their gifts and benefits register includes all key fields specified in the Public Service Commission's minimum standards for gifts and benefits. Agencies should also perform regular reviews of the register to ensure completeness and ensure any gift or benefit accepted by a staff member meets the public's expectations for ethical behaviour.

Managing gifts and benefits

We found opportunities to improve gifts and benefits processes and enhance transparency. For example, only three per cent of agencies publish their gifts and benefits registers on their websites.

Agencies can improve management of gifts and benefits by:

  • ensuring agency policies comprehensively cover the elements necessary to make it effective in an operational environment, such as identifying risks specific to the agency and actions that will be taken in the event of a policy breach
  • establishing and publishing a statement of business ethics on the agency's website to clearly communicate expected behaviours to clients, customers, suppliers and contractors
  • providing on-going training, awareness activities and support to employees, not just at induction
  • publishing their gifts and benefits registers on their websites to demonstrate a commitment to a transparently ethical environment.
Reporting and monitoring

Only 35 per cent of agencies reported trends in the number and nature of gifts and benefits recorded in their registers to the agency's senior executive management and/or a governance committee.

Agencies should regularly report to the agency executive or other governance committee on trends in the offer and acceptance of gifts and benefits.

4. Internal audit

Obtaining value from the internal audit function

Agencies have established and maintained internal audit functions to provide assurance on the effectiveness of agency controls and governance systems. However, we identified areas where agencies' internal audit functions could improve their processes to add greater value. For example, only 73 per cent of CAEs regularly attend meetings of the agency board or executive management committee.

Internal audit functions can add greater value by involving the CAE more extensively in executive forums as an observer.

Internal audit functions should also consider producing an annual report on internal audit. An annual report allows the internal audit function to report on their performance and add value by drawing to the attention of audit and risk committees and senior management strategic issues, thematic trends and emerging risks.

Role of the Chief Audit Executive

Forty-five per cent of agencies assigned responsibilities to the Chief Audit Executive (CAE) that were broader than internal audit, but 17 per cent of these had not documented safeguards to protect the independence of the CAE.

The reporting lines and status of the CAE at some agencies also needs review. At two agencies, the CAE reported to the CFO.

Agencies should ensure:

  • the reporting lines for the CAE comply with the NSW Treasury policy, and the CAE does not report functionally or administratively to the finance function or other significant recipients of internal audit services
  • the CAE's duties are compatible with preserving their independence and where threats to independence exist, safeguards are documented and approved.
Quality assurance and improvement program

Thirty-five per cent of agencies did not have a documented quality assurance and improvement program for its internal audit function.

The policy and the International Standards for the Professional Practice of Internal Auditing require agencies to have a documented quality assurance and improvement program. The results of this program should be reported annually.

Agencies should ensure there is a documented and operational Quality Assurance and Improvement Program for the internal audit function that covers both internal and external assessments.

5. Managing contingent labour

Obtaining value for money from contingent labour

According to NSW Procurement data, spend on contingent labour has increased by 75 per cent over the last five years, to $1.5 billion in 2018–19. Improvements in internal processes and a renewed focus on agency monitoring and oversight of contingent labour can help ensure agencies get the best value for money from their contingent workforces.

Agencies can improve their management of contingent labour by:

  • preparing workforce plans to inform their resourcing strategy and ensure that engaging contingent labour aligns with the strategy and best meets business needs
  • involving agency human resources units in decisions about engaging contingent labour
  • regularly reporting on contingent labour use and tenure to agency executive teams
  • strengthening on-boarding and off-boarding processes.

We also found 57 per cent of the 23 agencies we examined with contingent labour spend of more than $5 million in 2018–19 have implemented the government's vendor management system and service provider 'Contractor Central'.

6. Managing sensitive data

Identifying and assessing sensitive data

Sixty-eight per cent of agencies maintain an inventory of their sensitive data and where it resides. However, these inventories are not always complete and risks may be overlooked.

Agencies can improve processes to manage sensitive data by:

  • identifying and maintaining an inventory of sensitive data through a comprehensive and structured process
  • assessing the criticality and sensitivity of the data so that protection of high risk data can be prioritised.
Managing data breaches

Eighty-eight per cent of agencies have established policies to respond to potential data breaches when they are identified and 70 per cent of agencies maintain a register to record key information in relation to identified data breach incidents.

Agencies should maintain a data breach register to effectively manage the actions undertaken to contain, evaluate and remediate each data breach.

 

This report covers the findings and recommendations from our 2018–19 financial audits that relate to internal controls and governance at 40 of the largest agencies (refer to Appendix three) in the NSW public sector. The 40 agencies selected for this volume constitute around 84 per cent of total expenditure for all NSW public sector agencies.

Although the report includes several agencies that have changed as a result of the Machinery of Government changes that were effective from 1 July 2019, its focus on sector wide issues and insights means that its findings remain relevant to NSW public sector agencies, including newly formed agencies that have assumed the functions of abolished agencies.

This report offers insights into internal controls and governance in the NSW public sector

This is the third report dedicated to internal controls and governance at NSW State Government agencies. The report provides insights into the effectiveness of controls and governance processes in the NSW public sector by:

  • highlighting the potential risks posed by weaknesses in controls and governance processes
  • helping agencies benchmark the adequacy of their processes against their peers
  • focusing on new and emerging risks, and the internal controls and governance processes that might address those risks.

Without strong governance systems and internal controls, agencies increase the risks associated with effectively managing their finances and delivering services to citizens. For example, if they do not have strong information technology controls, sensitive information may be at risk of unauthorised access and misuse.

Areas of specific focus of the report have changed since last year

Last year's report topics included transparency and performance reporting, management of purchasing cards and taxi use, and fraud and corruption control. We are reporting on new topics this year and re-visiting agency management of gifts and benefits, which we first covered in our 2017 report. Re-visiting topics from prior years provides a baseline to show the NSW public sectors’ progress implementing appropriate internal controls and governance processes to mitigate existing, new and emerging risks in the public sector.

Our audits do not review all aspects of internal controls and governance every year. We select a range of measures and report on those that present heightened risks for agencies to mitigate. This year the report focusses on:

  • internal control trends
  • information technology controls, including access to agency systems
  • protecting sensitive information held within agencies
  • managing large and diverse workforces (controls around employing and managing contingent workers)
  • maintaining an ethical culture (management of gifts and benefits)
  • effectiveness of internal audit function and its oversight by Audit and Risk Committees.

The findings in this report should not be used to draw conclusions on the effectiveness of individual agency control environments and governance arrangements. Specific financial reporting, internal controls and audit observations are included in the individual 2019 cluster financial audit reports, which will be tabled in parliament from November to December 2019.

Internal controls are processes, policies and procedures that help agencies to:

  • operate effectively and efficiently
  • produce reliable financial reports
  • comply with laws and regulations
  • support ethical government.

This chapter outlines the overall trends for agency controls and governance issues, including the number of audit findings, the degree of risk those deficiencies pose to the agency, and a summary of the most common deficiencies we found across agencies. The rest of this report presents this year’s controls and governance findings in more detail.

Key conclusions and sector wide learnings

We identified four high risk findings, compared to six last year. None of the findings are common with those in the previous year. There was an overall increase of 12 per cent in the number of internal control deficiencies compared to last year. The increase is predominately due to a 100 per cent increase in the number of repeat financial and IT control deficiencies.
 
Some agencies attributed the delay in actioning repeat findings to the diversion of staff from their regular activities to implement and operationalise the recent Machinery of Government changes. As a result, actions to address audit recommendations have been deferred or re-prioritised, as the changes are implemented. Agencies need to ensure they are actively managing the risks associated with having these vulnerabilities in internal control systems unaddressed for extended periods of time.
 
We also identified a number of findings that were common to multiple agencies. These common findings often related to areas that are fundamental to good internal control environments and effective organisational governance. Examples include:
  • out of date policies or an absence of policies to guide appropriate decisions
  • poor record keeping and document retention
  • incomplete or inaccurate centralised registers or gaps in these registers.

Policies, procedures and internal controls should be properly designed, be appropriate for the current organisational structure and its business activities, and work effectively.

This chapter outlines our audit observations, conclusions and recommendations, arising from our review of agency controls to manage key financial systems.

Key conclusions and sector wide learnings
Government agencies’ financial reporting is heavily reliant on information technology (IT). We continue to see a high number of deficiencies related to IT general controls, particularly those related to user access administration. These controls are key in adequately protecting IT systems from inappropriate access and misuse.
IT is also important to the delivery of agency services. These systems often provide the data to help monitor the efficiency and effectiveness of agency processes and services they deliver. Our financial audits do not review all agency IT systems. For example, IT systems used to support agency service delivery are generally outside the scope of our financial audit. However, agencies should also consider the relevance of our findings to these systems.
Agencies need to continue to focus on assessing the risks of inappropriate access and misuse and the implementation of controls to adequately protect their systems, focussing on the processes in place to grant, remove and monitor user access, particularly privileged user access.

This chapter outlines our audit observations, conclusions and recommendations, arising from our review of agency controls to manage gifts and benefits. 

Key conclusions and sector wide learnings

We found most agencies have implemented the Public Service Commission's minimum standards for gifts and benefits. All agencies had a gifts and benefits policy and 90 per cent of agencies maintained a gifts and benefits register and provided some form of training to employees on the treatment of gifts and benefits.

Based on our analysis of agency registers, we found some areas where opportunities existed to make processes more effective. In some cases, gaps in recorded information meant the basis for decisions around gifts and benefits was not always clear, making it difficult to determine whether decisions in those instances were appropriate and compliant with policy. Fifty-one per cent of the gifts and benefits registers reviewed contained declarations where not all fields of information had been completed. Seventy-seven per cent of agencies that maintained a gifts and benefits register did not include all key fields suggested by the minimum standards.

Areas where agencies can improve their management of gifts and benefits include:

  • ensuring agency policies comprehensively cover the elements necessary to make it effective in an operational environment, such as identifying risks specific to the agency and actions that will be taken in the event of a policy breach
  • establishing and publishing a statement of business ethics on the agency's website to clearly communicate expected behaviours to clients, customers,suppliers and contractors
  • updating gifts and benefits registers to include all key fields suggested by the minimum standards, as well as performing regular reviews of the register to ensure completeness
  • providing on-going training, awareness activities and support to employees, not just at induction
  • regularly reporting gifts and benefits to executive management and/or a governance committee such as the audit and risk committee, focussing on trends in the number and types of gifts and benefits offered to and accepted by agency staff
  • publishing their gifts and benefits registers on their websites to demonstrate a commitment to a transparently ethical environment.

This chapter outlines our audit observations, conclusions and recommendations, arising from our review of agency internal audit functions.

Key conclusions and sector wide learnings 

We found agencies have established and maintained internal audit functions to provide assurance on the effectiveness of agency controls and governance systems as required by TPP15-03 'Internal Audit and Risk Management Policy for the NSW Public Sector'. However, we identified areas where agencies' internal audit functions could improve their processes to add greater value, including: 

  • documenting and implementing safeguards to address conflicting roles performed by the Chief Audit Executive (CAE)
  • ensuring the reporting lines for the CAE comply with the NSW Treasury policy, and the CAE reports neither functionally or administratively to the finance function or other significant recipients of internal audit services
  • involving the CAE more extensively in executive forums as an observer
  • documenting a Quality Assurance and Improvement Program for the internal audit function and performing both internal and external performance assessments to identify opportunities for continuous improvement
  • reporting against key performance indicators or a balanced scorecard and producing an annual report on internal audit to bring to the attention of the audit and risk committee and senior management strategic issues, thematic trends and emerging risks that may require further attention or resources.

This chapter outlines our audit observations, conclusions and recommendations, arising from our review of agency controls to on-board, manage and off-board contingent labour.

Key conclusions and sector wide learnings

Agencies have implemented controls to manage contingent labour and most agencies have some level of reporting and oversight of contingent labour at an executive level. However, the increasing trend in spend on contingent labour warrants a renewed focus on agency monitoring and oversight of their use of contingent labour. Over the last five years spend on contingent labour has increased by 75 per cent, to $1.5 billion in 2018–19.

There are also some key gaps that limit the ability of agencies to effectively manage contingent labour. Key areas where agencies can improve their management of contingent labour include: 

  • preparing workforce plans to inform their resourcing strategy, and confirm prior to engaging contingent labour, that this solution aligns with the strategy and best meets business needs
  • involving agency human resources units in decisions about engaging contingent labour
  • regularly reporting on contingent labour use to agency executive teams, particularly in terms of trends in agency spend, tenure and compliance with policies and procedures
  • strengthening on-boarding and off-boarding processes, including establishing checklists to on-board and off-board contingent labour, making provisions for knowledge transfer, and assessing, documenting and capturing performance information.

This chapter outlines our audit observations, conclusions and recommendations, arising from our review of governance and processes in relation to the management of sensitive data.

Key conclusions and sector wide learnings

Information technology risks are rapidly increasing. More interfaces between agencies and greater connectivity means the amounts of data agencies generate, access, store and share continue to increase. Some of this information is sensitive information, which is protected by the Privacy Act 1988.

It is important that agencies understand what sensitive data they hold, the risks associated with the inadvertent release of this information and how they are mitigating those risks. We found that agencies need to continue to identify and record their sensitive data, as well as expand the methods they use to identify sensitive data. This includes data held in unstructured repositories, such as network shared drives and by agency service providers.

Eighty-eight per cent of agencies have established policies to respond to potential data breaches when they are identified and 70 per cent of agencies maintain a register to record key information in relation to identified data breach incidents.

Key areas where agencies can improve their management of sensitive data include:

  • identifying sensitive data, based on a comprehensive and structured process and maintaining an inventory of the data
  • assessing the criticality and sensitivity of the data so that the protection of high risk data can be prioritised
  • developing comprehensive data breach management policies to ensure data breaches are appropriately managed
  • maintaining a data breach incident register to record key information in relation to identified data breaches incidents, including the estimated cost of the breach
  • providing on-going training and awareness activities to employees in relation to sensitive data and managing data breaches.

Appendix one – List of 2019 recommendations 

Appendix two – Status of 2018 recommendations

Appendix three – In-scope agencies

 

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for Contracting non-government organisations

Contracting non-government organisations

Community Services
Compliance
Fraud
Management and administration
Procurement
Regulation
Service delivery

This report found the Department of Family and Community Services (FACS) needs to do more to demonstrate it is effectively and efficiently contracting NGOs to deliver community services in the Permanency Support Program (a component of out-of-home-care services) and Specialist Homelessness Services. It notes that FACS is moving to an outcomes-based commissioning model and recommends this be escalated consistent with government policy.

Government agencies, such as the Department of Family and Community Services (FACS), are increasingly contracting non-government organisations (NGOs) to deliver human services in New South Wales. In doing so, agencies are responsible for ensuring these services are achieving expected outcomes. Since the introduction of the Commissioning and Contestability Policy in 2016, all NSW Government agencies are expected to include plans for customer and community outcomes and look for ways to use contestability to raise standards.

Two of the areas receiving the greatest funding from FACS are the Permanency Support Program and Specialist Homelessness Services. In the financial year 2017–18, nearly 500 organisations received $784 million for out-of-home care programs, including the Permanency Support Program. Across New South Wales, specialist homelessness providers assist more than 54,000 people each year and in the financial year 2017–18, 145 organisations received $243 million for providing short term accommodation and homelessness support, including Specialist Homelessness Services.

In the financial year 2017–18, FACS entered into 230 contracts for out-of-home care, of which 49 were for the Permanency Support Program, representing $322 million. FACS also entered into 157 contracts for the provision of Specialist Homelessness Services which totalled $170 million. We reviewed the Permanency Support Program and Specialist Homelessness Services for this audit.

This audit assessed how effectively and efficiently FACS contracts NGOs to deliver community services. The audit could not assess how NGOs used the funds they received from FACS as the Audit Office does not have a mandate that could provide direct assurance that NGOs are using government funds effectively.

Conclusion
FACS cannot demonstrate it is effectively and efficiently contracting NGOs to deliver community services because it does not always use open tenders to test the market when contracting NGOs, and does not collect adequate performance data to ensure safe and quality services are being provided. While there are some valid reasons for using restricted tenders, it means that new service providers are excluded from consideration - limiting contestability. In the service delivery areas we assessed, FACS does not measure client outcomes as it has not yet moved to outcomes-based contracts. 
FACS' procurement approach sometimes restricts the selection of NGOs for the Permanency Support Program and Specialist Homelessness Services
FACS has a procurement policy and plan which it follows when contracting NGOs for the provision of human services. This includes the option to use restricted tenders, which FACS sometimes uses rather than opening the process to the market. The use of restricted tenders is consistent with its procurement plan where there is a limited number of possible providers and the services are highly specialised. However, this approach perpetuates existing arrangements and makes it very difficult for new service providers to enter the market. The recontracting of existing providers means FACS may miss the opportunity to benchmark existing providers against the whole market. 
FACS does not effectively use client data to monitor the performance of NGOs funded under the Permanency Support Program and Specialist Homelessness Services
FACS' contract management staff monitor individual NGO performance including safety, quality of services and compliance with contract requirements. Although FACS does provide training materials on its intranet, FACS does not provide these staff with sufficient training, support or guidance to monitor NGO performance efficiently or effectively. FACS also requires NGOs to self-report their financial performance and contract compliance annually. FACS verifies the accuracy of the financial data but conducts limited validation of client data reported by NGOs to verify its accuracy. Instead, FACS relies on contract management staff to identify errors or inaccurate reporting by NGOs.
FACS' ongoing monitoring of the performance of providers under the Permanency Support Program is particularly limited due to problems with timely data collection at the program level. This reduces FACS' ability to monitor and analyse NGO performance at the program level as it does not have access to ongoing performance data for monitoring service quality.
In the Specialist Homelessness Services program, FACS and NGOs both provide the data required for the National Minimum Data Set on homelessness and provide it to the Australian Institute of Health and Welfare, as they are required to do. However, this data is not used for NGO performance monitoring or management.
FACS does not yet track outcomes for clients of NGOs
FACS began to develop an approach to outcomes-based contracting in 2015. Despite this, none of the contracts we reviewed are using outcomes as a measure of success. Currently, NGOs are required to demonstrate their performance is consistent with the measures stipulated in their contracts as part of an annual check of their contract compliance and financial accounts. NGOs report against activity-based measures (Key Performance Indicators) and not outcomes.
FACS advises that the transition to outcomes-based contracting will be made with the new rounds of funding which will take place in 2020–2021 for Specialist Homelessness Services and 2023 for the Permanency Support Program. Once these contracts are in place, FACS can transition NGOs to outcomes based reporting.
Incomplete data limits FACS' effectiveness in continuous improvement for the Permanency Support Program and Specialist Homelessness Services
FACS has policies and procedures in place to learn from past experiences and use this to inform future contracting decisions. However, FACS has limited client data related to the Permanency Support Program which restricts the amount of continuous improvement it can undertake. In the Specialist Homelessness Support Program data is collected to inform routine contract management discussions with service providers but FACS is not using this data for continuous improvement. 

Appendix one – Response from agency

Appendix two – About the audit

Appendix three – Performance auditing

 

Parliamentary Reference: Report number #323 - released 26 June 2019

Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for Engagement of probity advisers and probity auditors

Engagement of probity advisers and probity auditors

Transport
Education
Health
Compliance
Internal controls and governance
Procurement
Project management
Workforce and capability

Three key agencies are not fully complying with the NSW Procurement Board’s Direction for engaging probity practitioners, according to a report released today by the Acting Auditor-General for New South Wales, Ian Goodwin. They also do not have effective processes to achieve compliance or assure that probity engagements achieved value for money.

Probity is defined as the quality of having strong moral principles, honesty and decency. Probity is important for NSW Government agencies as it helps ensure decisions are made with integrity, fairness and accountability, while attaining value for money.

Probity advisers provide guidance on issues concerning integrity, fairness and accountability that may arise throughout asset procurement and disposal processes. Probity auditors verify that agencies' processes are consistent with government laws and legislation, guidelines and best practice principles. 

According to the NSW State Infrastructure Strategy 2018-2038, New South Wales has more infrastructure projects underway than any state or territory in Australia. The scale of the spend on procuring and constructing new public transport networks, roads, schools and hospitals, the complexity of these projects and public scrutiny of aspects of their delivery has increased the focus on probity in the public sector. 

A Procurement Board Direction, 'PBD-2013-05 Engagement of probity advisers and probity auditors' (the Direction), sets out the requirements for NSW Government agencies' use and engagement of probity practitioners. It confirms agencies should routinely take into account probity considerations in their procurement. The Direction also specifies that NSW Government agencies can use probity advisers and probity auditors (probity practitioners) when making decisions on procuring and disposing of assets, but that agencies:

  • should use external probity practitioners as the exception rather than the rule
  • should not use external probity practitioners as an 'insurance policy'
  • must be accountable for decisions made
  • cannot substitute the use of probity practitioners for good management practices
  • not engage the same probity practitioner on an ongoing basis, and ensure the relationship remains robustly independent. 

The scale of probity spend may be small in the context of the NSW Government's spend on projects. However, government agencies remain responsible for probity considerations whether they engage external probity practitioners or not.

The audit assessed whether Transport for NSW, the Department of Education and the Ministry of Health:

  • complied with the requirements of ‘PBD-2013-05 Engagement of Probity Advisers and Probity Auditors’
  • effectively ensured they achieved value for money when they used probity practitioners.

These entities are referred to as 'participating agencies' in this report.

We also surveyed 40 NSW Government agencies with the largest total expenditures (top 40 agencies) to get a cross sector view of their use of probity practitioners. These agencies are listed in Appendix two.

Conclusion

We found instances where each of the three participating agencies had not fully complied with the requirements of the NSW Procurement Board Direction ‘PBD-2013-05 Engagement of Probity Advisers and Probity Auditors’ when they engaged probity practitioners. We also found they did not have effective processes to achieve compliance or assure the engagements achieved value for money.

In the sample of engagements we selected, we found instances where the participating agencies did not always:

  • document detailed terms of reference
  • ensure the practitioner was sufficiently independent
  • manage probity practitioners' independence and conflict of interest issues transparently
  • provide practitioners with full access to records, people and meetings
  • establish independent reporting lines   reporting was limited to project managers
  • evaluate whether value for money was achieved.

We also found:

  • agencies tend to rely on only a limited number of probity service providers, sometimes using them on a continuous basis, which may threaten the actual or perceived independence of probity practitioners
  • the NSW Procurement Board does not effectively monitor agencies' compliance with the Direction's requirements. Our enquiries revealed that the Board has not asked any agency to report on its use of probity practitioners since the Direction's inception in 2013. 

There are no professional standards and capability requirements for probity practitioners

NSW Government agencies use probity practitioners to independently verify that their procurement and asset disposal processes are transparent, fair and accountable in the pursuit of value for money. 

Probity practitioners are not subject to regulations that require them to have professional qualifications, experience and capability. Government agencies in New South Wales have difficulty finding probity standards, regulations or best practice guides to reference, which may diminish the degree of reliance stakeholders can place on practitioners’ work.

The NSW Procurement Board provides direction for the use of probity practitioners

The NSW Procurement Board Direction 'PBD-2013-15 for engagement of probity advisers and probity auditors' outlines the requirements for agencies' use of probity practitioners in the New South Wales public sector. All NSW Government agencies, except local government, state owned corporations and universities, must comply with the Direction when engaging probity practitioners. This is illustrated in Exhibit 1 below.

Published

Actions for Compliance of expenditure with Section 12A of the Public Finance and Audit Act 1983 - Law Enforcement Conduct Commission

Compliance of expenditure with Section 12A of the Public Finance and Audit Act 1983 - Law Enforcement Conduct Commission

Justice
Compliance
Management and administration

The Hon. Troy Grant MP, Minister for Police and Minister for Emergency Services requested an audit under section 27B(3)(c) of the Public Finance and Audit Act 1983, to determine whether expenditure on overseas travel by the Law Enforcement Conduct Commission (the Commission) complied with section 12A of the Public Finance and Audit Act 1983.

On 9 November 2018, the Hon. Troy Grant MP, Minister for Police and Minister for Emergency Services (the Minister), requested an audit under s. 27B(3)(c) of the Public Finance and Audit Act 1983 (the PF&A Act) to determine whether the expenditure of $8,074.66 on overseas travel by the Law Enforcement Conduct Commission (the LECC) complied with s. 12A of the PF&A Act.

In forming my audit conclusion, I have reviewed documentation provided by the Minister and the LECC, made enquiries of LECC staff, and sought independent legal advice on key aspects of the PF&A Act and the Law Enforcement Conduct Commission Act 2016 (the LECC Act) and their interface.
 

In my opinion, the LECC did not comply with s. 12A of the PF&A Act because the Minister:

  • had not delegated his authority to approve expenditure for overseas travel to an officer in the LECC
  • had specifically declined approving a request from the LECC to incur expenditure on the travel in question.

Despite this, the LECC incurred the expenditure.

In my view, the LECC required the Minister’s approval to incur the overseas travel expenditure before it could legally spend funds for this purpose from its appropriation.

The LECC is an independent investigative body, funded by appropriation, to oversight NSW Police and the Crime Commission 

The Bill to establish the LECC was introduced to parliament following a review of the police oversight system.1 The establishment of the LECC drew together functions previously undertaken by the Police Integrity Commission, the Ombudsman and the Inspector of the Crime Commission. It aimed to ‘remove overlapping responsibilities, inefficiencies and failures’ and ‘create a single civilian law enforcement oversight body’.2 

Part 4 of the LECC Act sets out the functions of the Commission as an independent investigative body. The objects of the LECC Act are summarised in Appendix one. The LECC Act provides that the Minister cannot direct the LECC on how to perform its functions. 

Notably, s. 22 of the LECC Act states:

The Commission and Commissioners are not subject to the control or direction of the Minister in the exercise of their functions.

For the financial year ended 30 June 2018, under s. 22 of the Appropriation Act 2017 (NSW), $21,195,000 was appropriated to the Minister for the LECC’s services. This provided the statutory basis for the sum in question to be drawn from the Consolidated Fund, but only in accordance with the PF&A Act.

The PF&A Act is the legislation that governs the administration of public finances

The PF&A Act determines how expenditure is to occur and sets out the conditions under which such expenditure can occur in NSW public sector agencies.The LECC is an agency within the NSW public sector.

Section 12A of the PF&A Act stipulates that:

A Minister to whom a sum of money is appropriated out of the Consolidated Fund for a use or purpose (whether by an annual Appropriation Act or other Act) may delegate to another Minister or to an officer of any authority, or authorise another Minister to delegate to an officer of any authority, the committing or incurring of expenditure from the sum so appropriated.

Section 12 of the PF&A Act also stipulates that:

Expenditure shall be committed or incurred by an officer of an authority only within the limits of a delegation in writing conferred on the officer by a person entitled to make the delegation.

The relevant ‘authority’ in this case was the Office of the Law Enforcement Conduct Commission (Office of the LECC) - a body which, under the Government Sector Employment Act 2013 (the GSE Act)employs the staff of the LECC.

Prima facie, as the LECC is funded by appropriation and is subject to the PF&A Act, its officers can only commit or incur expenditure with a delegation from the Minister.

The Minister did not delegate his right to approve expenditure on overseas travel

In April 2017, the Minister approved the LECC’s financial delegations under the authority vested in him by s. 12A of the PF&A Act. However, he reserved his right to approve any expenditure on overseas travel. This effectively required the LECC to obtain his approval for each instance of such expenditure.

The Minister declined approval of a LECC request for an officer to travel overseas 

In August 2017, the Chief Commissioner sought the Minister’s approval to incur overseas travel expenditure. The Minister exercised his right under the PF&A Act to decline the request and confirmed this in writing:

Establishment of LECC being in its infancy, travel is not supported at this time. Operating priorities should be the focus at this time.

The LECC paid the overseas travel expenses without a delegation or Ministerial approval

In October 2017, despite the absence of a delegation or approval from the Minister to incur expenditure on overseas travel, the Chief Commissioner approved a total of $8,074.66 for the LECC’s Director of Covert Services to travel to, and attend an international conference.

The LECC booked and paid for the travel in four payments between October and December 2017. Over the same period the Chief Commissioner reimbursed the agency for these expenses from his personal funds. On 13 October 2017, the Chief Commissioner wrote to the Minister asking him to reconsider his decision. On 12 January 2018, in the absence of a response from the Minister, the Chief Commissioner directed the LECC’s finance officer to ‘repay the relevant costs to my account’.5 On 16 January 2018, the LECC’s Chief Executive Officer approved the reimbursement to the Chief Commissioner, which occurred on 17 January 2018. Appendix three provides further detail on the series of payments. 

The Chief Commissioner first disclosed he had been reimbursed for the expenses, without Ministerial approval, in March 2018. In August 2018, the Chief Commissioner made a further disclosure about the expenditure at Budget Estimates.6

The Chief Commissioner argues the overseas travel expenditure was properly incurred

The Chief Commissioner argues the LECC’s overseas travel expenditure was properly incurred because:

  • the travel was undertaken in pursuit of the detective and investigative functions specified in s. 26(b)(i) of Part 4 of the LECC Act7  
  • a specific reservation in public policy cannot be qualified by general rules of public policy.8 The Chief Commissioner argues s. 22 of the LECC Act is a specific provision that conflicts with the general provisions in ss. 12 and 12A of the PF&A Act. In his view, the conflict is resolved by applying the principle that a specific later provision effectively repeals an earlier general provision. In his view, the LECC Act contains a specific provision that the Minister cannot direct the LECC in exercising its functions, whereas the PF&A Act contains general provisions which deal with the spending of public money.

The Chief Commissioner believes the Minister’s decision7:

  • was not made in the bona fide exercise of the power conferred on him by the PF&A Act as it interfered with the management of the LECC’s operating priorities
  • and his failure to enquire into the operational situation of the LECC were not decisions a rational decision maker could have made
  • was made for an improper purpose and was biased, in that the Minister had approved expenditure for a member of NSW Police to travel to the conference, but denied the same to a member of the LECC, which oversights NSW Police
  • breached s. 22 of the LECC Act, because it directed the LECC Commissioners in the exercise of their functions.

The Crown Solicitor and Solicitor General advised the expenditure breached the PF&A Act

On 7 September 2017, the Crown Solicitor advised the Office of Police (part of the Department of Justice) that:

The Minister’s authority to determine whether or not to approve a particular expenditure from the amount appropriated from the Consolidated Fund for the purpose of the Commission under the Constitution Act 1902 and the PF&A Act is not affected by s.22 of the LECC Act. These have different spheres of operation. It is not unusual for otherwise independent bodies to be subject to restrictions with respect to the use of public moneys.9

Subsequently, the Crown Solicitor asked the Solicitor General to review the matter of her previous advice. On 14 December 2017, the Solicitor General concurred with the Crown Solicitor’s advice. He concluded that:

Although LECC has a high degree of independence under its legislation, it is a body operating in the public sector and within the context of the broad policies of the government of the day in relation to public administration... it is not a function of LECC or its Commissioners to deal directly with money appropriated to the Minister out of the Consolidated Fund.10

The Secretary of the Department of Justice forwarded the Crown Solicitor’s and the Solicitor General’s advice to the Chief Commissioner.11 The Chief Commissioner continues to contest the Crown Solicitor’s and the Solicitor General’s advice.12

The Minister referred the matter to the Inspector of the LECC

In August 2018, the Minister referred the Chief Commissioner’s disclosure in Budget Estimates13 that he had been personally reimbursed for an expense concerning overseas travel by an officer of the LECC, to the Inspector of the LECC (the Inspector).14 The Inspector is the person, under s. 122 of the LECC Act, responsible for 'auditing the operation of the Commission for the purpose of monitoring compliance with the law of the State'. On 4 September 2018, the Inspector recused himself from investigating the Minister’s complaint.15 In his letter to the Premier dated 19 September 2018, he wrote ‘I informed the Minister for Police that I had acquired information in my capacity as Inspector of LECC (and in the discharge of my statutory functions) prior to receiving his letter of complaint…’. He further suggested to the Minister and the Premier that an Assistant Inspector be appointed to investigate the complaint under s. 121(1) of the LECC Act to give ‘proper and independent’ consideration to the Minister’s complaint.16 

The Minister asks the Auditor General to audit the transaction’s compliance with the PF&A Act

An Assistant Inspector appointed under section 121 of the LECC Act can exercise any function of the Inspector, including ‘auditing the operations of the Commission’. The reasons why an Assistant Inspector was not appointed to investigate the matter are not apparent. Instead, on 9 November 2018, the Minister requested the Auditor General to conduct an audit of whether the expenditure complied with s. 12A of the PF&A Act.17


1  By the former shadow Attorney General, Mr Andrew Tink AM.
2  Second reading speech of Minister Troy Grant for the LECC Bill.
3  Per the definition of ‘authority’ in s. 4(1) of the PF&A Act and the definition of ‘Public Service agency’ in s. 3 of the GSE Act and Part 3 of Schedule 1 to the GSE Act.
4  A timeline of the key events relevant to this audit is set out in Appendix two.
5  Note from the Chief Commissioner to LECC’s finance officer.
7  Letter from the Chief Commissioner to the Secretary of the Department of Justice 24 November 2017.
8  Letter from the Chief Commissioner to the Auditor‑General 12 December 2018.
9  Crown Solicitor’s advice ‑ NSW Parliamentary website.
10  Solicitor‑General’s advice ‑ NSW Parliamentary website.
11  The Chief Commissioner acknowledged receipt of the Crown Solicitor’s and Solicitor‑General’s advice on 24 November 2017 and 26 February 2018 respectively.
12  Letter from the Chief Commissioner to the Auditor‑General 12 December 2018.
14  Letter from the Minister to the Hon. Terry Buddin SC, Inspector of the LECC.
15  Letter from the Hon. Terry Buddin SC, Inspector of the LECC to the Minister 4 September 2018.
16  Letter from the Hon. Terry Buddin to the Premier 19 September 2018.
17  Ss. 12 and12A of the PF&A Act were repealed by the Government Sector Finance Legislation (Repeal and Amendment) Act 2018 Schedule 2[5] and re‑enacted as s5.2 of the Government Sector Finance Act 2018. However, these provisions were the law at the time of the events.

In forming my adverse conclusion, I considered the Chief Commissioner’s argument that s. 22 of the LECC Act prevailed over those sections of the PF&A Act that deal with spending public money, and:

  • the principles of statutory interpretation that might apply when a potential conflict between a general provision in one Act and specific provisions in another exists
  • whether an apparent conflict exists
  • whether the Chief Commissioner was entitled to incur the expenditure without Ministerial approval
  • whether the Minister was lawfully entitled to withhold approval for the expenditure from the Chief Commissioner.

The principles of statutory interpretation apply where potential conflicts exist between Acts

A basic principle of statutory interpretation is that all legislation be given its full scope and effect. Courts, and thereby other interpreters, are not at liberty to consider any word or meaning as superfluous. The starting point is that all words must be given some meaning and effect.18 If there is an apparent conflict between two Acts, the pieces of legislation should be read in such a way as to avoid that conflict by giving the words the construction that produces the greatest harmony and the least inconsistency.19

One way conflict can be avoided is to apply the approach that a later general provision does not override an earlier specific provision.20 However, this approach is rebuttable, as a later general Act might also be said to qualify an earlier specific Act.21 The reverse can also apply, in that a later specific Act can be claimed to qualify or supersede an earlier general provision. In such a case, it is said that the later Act impliedly repeals the earlier. This is an easier case to make out because it is apparent the parliament has dealt with the specific instance and it would be reasonable to expect that it had considered any contrary general legislation. However, here again, the courts have qualified this approach by suggesting it should be presumed unlikely that a parliament would intend to contradict itself. If the specific Act was intended to qualify an earlier general Act, then the legislation would have spelt this out.

One must therefore always start from the premise that all words are to be given meaning and effect, and that meaning should enable both pieces of legislation to operate. It is only where the point is reached that it is not possible for both pieces of legislation to operate to their full extent that the approaches to resolving conflicts can be usefully invoked. The approaches may then be useful to determine which is the primary provision and which provision must give way to the requirements set out in that primary provision.

Is there an apparent conflict between the LECC Act and the PF&A Act that needs to be resolved?

No. The LECC Act deals specifically with the operational functions of the LECC, while the PF&A Act deals with the specific issue of expenditure by a delegate of the Minister. 

The Chief Commissioner argues that s. 22 of the LECC Act is a specific provision and should take precedence over general delegation provisions in the PF&A Act, namely ss. 12 and 12A. He argues this because s. 22 deals specifically with the operation of the LECC and prohibits the Minister from directing the LECC in the performance of its functions. In his view, this includes the administrative and financial functions impliedly invested in the LECC for it to perform the specific functions referred to in the LECC Act.

However, it can also be readily argued that s. 22 of the LECC Act deals with the general issue of Minister's directions to the LECC and the PF&A deals with the specific issue of expenditure by a delegate of the Minister. While the expenditure of funds may be essential for the LECC to perform its functions, that expenditure is controlled by the PF&A Act, as it controls all expenditure from the Consolidated Fund. The PF&A Act is the specific legislation that relates to expenditure.

The issues that have arisen can be resolved by looking at the effect of the two Acts in their application to the facts. In my view, the PF&A Act and the LECC Act can be applied to the facts under consideration as they deal with different issues and are thereby capable of separate operation. 

Was the LECC able to incur expenditure without Ministerial approval?

No. The PF&A Act applies to the LECC in the same way it applies to all NSW Government agencies. While the Minister had approved the LECC’s financial delegations under the authority vested in him by s. 12A of the PF&A Act, he reserved his right to approve all expenditure on overseas travel. This effectively required the LECC to obtain his approval for each instance of such expenditure. As the Minister did not approve the overseas travel request, the Chief Commissioner was not legally able to authorise the expenditure.

The PF&A Act determines how expenditure is to occur and sets out the conditions under which such expenditure can occur in New South Wales public sector agencies. Expenditure can ‘only be committed or incurred by an officer of an authority within the limits of a delegation in writing conferred on the officer by a person entitled to make the delegation’.22

Was the Minister lawfully entitled to withhold approval of the overseas travel expenditure?

Yes. If one accepts the premise that the PF&A Act determines the basis on which public money can be spent, it follows that the Minister could exercise the discretion reserved to him by financial delegation and withhold approval of the overseas travel expenditure for the LECC officer.

Section 22 of the LECC Act prevents the Minister from directing the LECC to send (or not to send) an officer to a conference. However, the Minister did not direct the LECC as to whether the person should or should not attend the conference. Rather, he exercised the responsibility given to him to determine how public funds were to be spent.

The appropriation to the LECC provided funding to the delegate of the Minister to support the performance of the agency’s functions. However, the expenditure of money for overseas travel was governed by ss. 12 and 12A of the PF&A Act. This gave the Minister discretion to approve or refuse to approve expenditure for overseas travel on a case by case basis. It follows from this that the Chief Commissioner was not entitled to spend money for overseas travel, even though in the Commissioner’s view it was beneficial to the performance of the LECC’s functions.

It may be suggested that the Minister’s refusal to provide funding for a particular function may have the same effect as directing an agency not to perform that function. NSW’s constitutional structure of government establishes that public money can only be spent in accordance with legislation and if expenditure requires a Minister’s approval, that approval establishes the ability of an agency to spend that money. That said, in reserving approval for certain types of expenditures, care should be exercised not to unduly interfere with the legitimate functions of independent agencies.


18  Commonwealth v Baume (1905) 2 CLR 405 per Griffith CJ at 414.
19  Australian Alliance Assurance Co Ltd v Attorney‑General (Qld) [1916] St R Qld 135 at 161.
20  Maybury v Plowman (1913) 16 CLR 468 at 473‑4 the approach is often described within the Latin tag (generalia specialibus non derogant).
21  Associated Minerals Consolidated Ltd v Wyong Shire Council [1974] 2 NSWLR 681 at 686.
22  Section 12(1) of the PF&A Act.
 

This assurance audit is a ‘direct engagement’ whereby the Auditor‑General provides the Minister and parliament with reasonable assurance about whether $8,074.66 spent on overseas travel by the LECC complied, in all material respects with s. 12A of the PF&A Act.

My audit was conducted in accordance with applicable Standards on Assurance Engagements (ASAE 3100 ‘Compliance Engagements’).

In conducting my audit, I have complied with:

  • the independence requirements of Australian Auditing and Assurance Standards
  • ASQC 1 ‘Quality Control for firms that Perform Audits and Reviews of Financial Reports and Other Financial Information, Other Assurance Engagements and Related Service Engagements’
  • relevant ethical pronouncements.

Parliament promotes independence by ensuring the Auditor‑General and the Audit Office of New South Wales are not compromised in their roles by:

  • providing that only parliament, and not the executive government, can remove an Auditor‑General
  • mandating the Auditor‑General as auditor of public sector agencies
  • precluding the Auditor‑General from providing non‑audit services.

I have reviewed documentation provided by the Minister and the LECC, gained an understanding of the LECC’s controls and processes for approving and making expenditure and made enquiries of LECC staff. I have also:

  • gained an understanding of the relevant pieces of legislation and case law
  • reviewed the advice of the Crown Solicitor and the Solicitor‑General
  • sought independent legal advice on key aspects of the PF&A Act and the Law Enforcement Conduct Commission Act 2016 (the LECC Act) from an acknowledged expert in statutory interpretation
  • conducted interviews with key persons
  • reviewed the documentation listed in Appendix four.