The life of a bounty hunter is not for the stupid and foolhardy. A quick blaster can save your life, but making sure you're wearing some good armor is just a smart insurance policy. In the case of the bounty hunter Maro Baize, his armor is just that. A means of protecting himself while on the job, and in places where it counts obscuring his identity when on the hunt.
All the pieces of the armor are legal, although his use of it might be questioned in the more "civilized societies" where coming in armored would be crass. As such in full armor he would likely be restricted in places such as Alderaan, Naboo, ect. and government buildings would not necessarily be happy with him wearing his helmet to obscure his face.
To both give a visualization of Maro's armor, as well as to provide a handy means of understanding his equipment in rp.
Type and Coverage
Type: Light/Medium/Heavy Armor
Coverage: (Coverage regions for Light armor is 1-3 regions, Medium is 4-5, Heavy is 6-7)
Head: Full helmet made of duraplast and meant to protect the head from blaster fire. Contains Scout HUD and a Filter
Torso: Segmented duraplast plates covering from the neckline to the belt.
Back: Segmented duraplast plates covering from the neckline to the belt.
Lower Arms: Armorweave gloves and wrist mounted dart launcher
Upper Legs: Duraplast plates guarding thighs.
Function 1: Scout HUD
Scout HUD - Contains a 4x magnifier and Compass.
Function 2: Filter
Filters are bulky attachments to a helmet, or function as part of a mask, that filter out environmental contaminants such as smoke or most toxins. They are susceptible to caustic substances and damage.
Function 3:Dart Launcher
Can launch a dart accurately up to 15m. This dart is filled with a fast-acting, short-lived sedative that can render near-humans unconscious, or a sedative tailored to one specific alien physiology. The dart is incapable of penetrating even the lightest armor, or even thick leathers. The dart has the same practical effect as a medium stun bolt.
Function 4:Computer Spike
Computer spikes are used to forcibly decrypt or unlock computer terminals. Most civilian systems can be cracked in one posting round, while most military or hardened systems take two or more.