Skip to main content

Government to take over Malaysian enforcement

Malaysia’s government is looking into taking over the operation and enforcement of the automated enforcement system (AES) from the concessionaires that were appointed to run it, following feedback from the steering committee of the Performance Management and Delivery Unit (Pemandu). A steering committee involving Pemandu, the Road Transport Department (JPJ), Ministry of Finance (MoF), Economic Planning Unit, Attorney-General’s Chamber and the Public Works Department has been appointed to discuss the matt
August 21, 2013 Read time: 2 mins
Malaysia’s government is looking into taking over the operation and enforcement of the automated enforcement system (AES) from the concessionaires that were appointed to run it, following feedback from the steering committee of the Performance Management and Delivery Unit (Pemandu).

A steering committee involving Pemandu, the Road Transport Department (JPJ), Ministry of Finance (MoF), Economic Planning Unit, Attorney-General’s Chamber and the Public Works Department has been appointed to discuss the matter and other related issues.

According to acting transport minister Datuk Seri Hishammuddin Tun Hussein, the steering committee will determine the direction and expansion of the AES, including all the guidelines. Operations may be handed over to a government-owned company.

“The principle and purpose of the AES is to ensure road safety, but from the feedback we have received, the two main issues people are concerned about are the privatisation of the enforcement and private companies getting benefits from the fines,” he said.

He added that the government is looking at amending the revenue-shared module used presently to one that is more fair and transparent to all parties. “Issues that bog down the AES and affect certain parties will be addressed,” he stated.

The two contractors appointed to run the AES project are Beta Tegap, which will utilise equipment from Australian-based 112 Redflex Traffic Systems and run AES for the southern region, and ATES, which will operate equipment from German company 79 Jenoptik 2185 Robot, and is responsible for the rest of the country, including Sabah and Sarawak.

The reports add that the fourteen AES cameras already in place from the pilot project will continue operations. Last month, a news report indicated that as many as 1,079 AES cameras have yet to be installed nationwide, with their locations to be determined by the Malaysian Institute of Road Safety and Research (MIROS).

For more information on companies in this article

Related Content

  • Effortless mobility for everyone
    September 10, 2021
    To improve the way we move people around, a lot of stakeholders are going to need to start cooperating and aligning, suggests Edwin van den Belt, software architect at Dat.mobility
  • Canadian province of Ontario extends red light monitoring
    July 4, 2016
    The City of Toronto, Canada, has awarded Jenoptik’s Traffic Solutions division an order to continue its red light monitoring program and to expand it in the Greater Toronto area. The contract, which extends one awarded ten years ago, will run for five years from January 2017, also includes an optional extension for a further five years and a centralised back office system.. Jenoptik will shortly begin negotiations with seven other municipalities in Canada’s Ontario province. Jenoptik had already installe
  • UK ‘pauses’ smart motorway roll-out
    January 12, 2022
    All-lane running motorway schemes to be halted until five years' safety data is available
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take