NSW Budget: ICT spend breakdown
- 12 June, 2012 13:45
The NSW Government has handed downs its 2012-13 Budget, revealing relatively modest investment in information and communications technology (ICT) and a strong focus on infrastructure investment.
Computerworld Australia brings you a breakdown of the major ICT investment for the 2012-13 year.
NSW Health In 2012-13, NSW Health will spend $2.3 million on implementing the NSW Organisational Risk Management System (NORMS). The project will “support identifying, notifying, managing, reporting and providing feedback on all clinical, occupational health and safety, property, security and hazard-related incidents,” according to the budget.
Education In 2012-13, the Department of Education and Communities will invest an estimated $447 million in school education services infrastructure . Of this, $62 million will be spent on continuing 16 major building projects and one information technology project.
$71 million will be spent on upgrading the Department’s information management systems for finance, human resources, payroll and student administration in order that the larger Learning Management and Business Reform project may proceed.
$85 million will be spent on TAFE education services infrastructure including $14 million for eight major new TAFE building projects and two new information technology projects, and $62 million for various upgrades and additions including a learning management and business reform project and a TAFE e-learning project.
Police In 2012-13, The NSW Police Force will invest an estimated $152 million in capital infrastructure in 2012-13, of which $39 million will be spent on technology upgrades.
“Information processing and operational capacity will be improved through the ongoing upgrade of the Police Force’s core operational policing system, the continued roll-out of digital closed-circuit television in police stations, phase 2 of an ICT equipment upgrade, a SAP technical upgrade, a LiveScan hardware refurbishment, a shared image management system storage extension, the Court Outcomes Enhancement project and the next phase of the Joined Up Justice project,” the budget reads.
Courts In 2012-13, the Attorney General’s Division will invest an estimated $98 million in court infrastructure, including information systems support, in 2012-13. Of this $98 million, $18 million is expected to be spend on continuing technology upgrades to the following systems: enterprise finance, justice infrastructure renewal, the next phase of Joined Up Justice, jury management, LifeLink (Registry of Births, Deaths and Marriages) and justice information access.
Utilities In the area of water, Sydney Water will in 2012-13 spend $61 million will IT assets and systems will be upgraded to support business efficiency improvements.
In the area of power transmission, TransGrid will also spend $84 million on ICT projects, including replacing the Sydney West control room, improving information technology, upgrading communications and optical fibres and replacing secondary systems.
Rail In 2012-13, RailCorp will spend $50 million on a digital train radio project aimed at updating train radio systems with digital technology to improve network communications.
Arts and culture In 2012-13, The State Library will spend $5 million on a heritage discovery and asset management system involving an upgrade to its core ICT technology systems and platforms, which underpin its service delivery to clients onsite and online.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.