Bill Summary for H 219 (2011-2012)

Summary date: 

Mar 9 2011

Bill Information:

View NCGA Bill Details2011-2012 Session
House Bill 219 (Public) Filed Wednesday, March 2, 2011
TO PROVIDE THAT A PERSON REQUIRED TO REGISTER AS A SEX OFFENDER MUST INDICATE ON THE INITIAL REGISTRATION FORM THE NAME UNDER WHICH THE PERSON WAS CONVICTED FOR THE SEX OFFENSE, TO PROVIDE THAT THE REGISTRANT MUST ALSO NOTIFY THE APPROPRIATE SHERIFF OF ANY NAME CHANGE BY THE REGISTRANT AND INCLUDE NAME CHANGES AS PART OF THE VERIFICATION PROCEDURE, TO DIRECT THE DIVISION OF CRIMINAL STATISTICS TO MAINTAIN THE STATEWIDE REGISTRY SO THAT A MEMBER OF THE PUBLIC MAY CONDUCT SEX OFFENDER SEARCHES USING ANY NAME OR ALIAS OF A REGISTRANT, TO CLARIFY THAT SEX OFFENDERS MAY NOT CHANGE THEIR NAME PURSUANT TO CHAPTER 101 OF THE GENERAL STATUTES, TO AMEND THE LAW REGARDING THE VENUE IN WHICH TO FILE A PETITION TO TERMINATE A SEX OFFENDER REGISTRATION REQUIREMENT, AND TO APPROPRIATE FUNDS TO THE DEPARTMENT OF JUSTICE FOR COMPUTER AND SOFTWARE REPAIRS TO THE STATEWIDE REGISTRY COMPUTER SYSTEM.
Intro. by T. Moore, Hager, Cook, Pridgen.

View: All Summaries for BillTracking:

Bill summary

House committee substitute makes the following changes to 1st edition. Amends proposed new GS 14-208.9(f) to require a person to report in person to the sheriff within three business days (was, ten days) if a person required to register as a sex offender changes his or her name. Deletes appropriation of funds to the Department of Justice for computer and software repairs to the statewide registry computer system. Makes conforming changes to title and effective date.

© 2022 School of Government The University of North Carolina at Chapel Hill

This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.

Printer-friendly: Click to view