Queensland Numbered Acts
[Index]
[Table]
[Search]
[Search this Act]
[Notes]
[Noteup]
[Previous]
[Next]
[Download]
[Help]
CHILD PROTECTION (OFFENDER REPORTING AND OFFENDER PROHIBITION ORDER) AND OTHER LEGISLATION AMENDMENT ACT 2023 - SECT 40
Amendment of sch 2 (Personal details for reportable offenders)
40 Amendment of sch 2 (Personal details for reportable offenders)
(1) Schedule 2 , item 9—
omit, insert— 9 The make, model, colour and registration number of the
following vehicles— (a) any vehicle that the reportable offender— (i)
owns; or
(ii) has driven on at least 7 days within a 1-year period, whether
or not the days are consecutive;
(b) any caravan or trailer— (i) that the
reportable offender generally resides in; or
(ii) that was attached to a
vehicle driven by the reportable offender, if the offender has driven the
vehicle on at least 7 days within a 1-year period, whether or not the days are
consecutive.
(2) Schedule 2 , item 15—
omit, insert— 15 Details of either of the following used, or intended to be
used, by the reportable offender, including passwords— (a) an email address;
(b) for each account used, or intended to be used, by the offender to
communicate through the internet or another electronic communication
service—the unique name, number or other identifier used by an
internet-based application or the electronic communication service to identify
the user’s account with the application or service. Examples of accounts
used to communicate through the internet or another electronic communication
service— an instant messaging service, a chat room, a social networking
site
(3) Schedule 2 —
insert— 15A Details of each digital device in the reportable offender’s
possession, or that the offender has access to, including details of each
software application stored on the device, or that can be accessed using the
device, that is designed or used to hide— (a) the identity or location of a
person who administers, accesses or uses a network, computer, the device or
another digital device; or
(b) information stored on a network, computer, the
device or another digital device, including, for example, photographs,
username and password combinations, and other software applications; or
(c)
communication, including the exchange of information, between 2 or more
persons using a network, computer, the device or another digital device; or
(d) the location of a network, computer, the device or another digital device.
Examples of software applications— a password manager, a hidden digital
vault, a virtual environment, software that encrypts, or encrypts and hides,
information
AustLII: Copyright Policy
| Disclaimers
| Privacy Policy
| Feedback