Queensland Numbered Acts

[Index] [Table] [Search] [Search this Act] [Notes] [Noteup] [Previous] [Next] [Download] [Help]

CHILD PROTECTION (OFFENDER REPORTING AND OFFENDER PROHIBITION ORDER) AND OTHER LEGISLATION AMENDMENT ACT 2023 - SECT 40

Amendment of sch 2 (Personal details for reportable offenders)

40 Amendment of sch 2 (Personal details for reportable offenders)

(1) Schedule 2 , item 9—
omit, insert—
9 The make, model, colour and registration number of the following vehicles—
(a) any vehicle that the reportable offender—
(i) owns; or
(ii) has driven on at least 7 days within a 1-year period, whether or not the days are consecutive;
(b) any caravan or trailer—
(i) that the reportable offender generally resides in; or
(ii) that was attached to a vehicle driven by the reportable offender, if the offender has driven the vehicle on at least 7 days within a 1-year period, whether or not the days are consecutive.
(2) Schedule 2 , item 15—
omit, insert—
15 Details of either of the following used, or intended to be used, by the reportable offender, including passwords—
(a) an email address;
(b) for each account used, or intended to be used, by the offender to communicate through the internet or another electronic communication service—the unique name, number or other identifier used by an internet-based application or the electronic communication service to identify the user’s account with the application or service.
Examples of accounts used to communicate through the internet or another electronic communication service—
an instant messaging service, a chat room, a social networking site
(3) Schedule 2
insert—
15A Details of each digital device in the reportable offender’s possession, or that the offender has access to, including details of each software application stored on the device, or that can be accessed using the device, that is designed or used to hide—
(a) the identity or location of a person who administers, accesses or uses a network, computer, the device or another digital device; or
(b) information stored on a network, computer, the device or another digital device, including, for example, photographs, username and password combinations, and other software applications; or
(c) communication, including the exchange of information, between 2 or more persons using a network, computer, the device or another digital device; or
(d) the location of a network, computer, the device or another digital device.
Examples of software applications—
a password manager, a hidden digital vault, a virtual environment, software that encrypts, or encrypts and hides, information



AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback