Originally Posted by
ButcherBird
Anyone else read through this document?
Yeah, I did - plus a couple of other ones. The full collection for late 2007/2008/early 2009 is here:
https://secure.infrastructure.gov.au...onsReports.htm
There are some oddities indeed. But the rules do seem to be applied relatively similarly across various requests.