+ − Summary
+ − Full Texts (2)
+ − Actions (23)
- Signed by Governor (Acts, ch. 74)
- Delivered to Governor
- Enrolled, signed by each presiding officer
- Passed 97-0
- House concurred in Senate Committee Substitute
- Posted for passage for concurrence in Senate Committee Substitute
- Taken from Rules
- To Rules (H)
- Received in House
- 3rd reading, passed 38-0 with Committee Substitute
- Posted for passage in the Consent Orders of the Day for Friday, March 21, 2014
- 2nd reading, to Rules
- Reported favorably, 1st reading, to Consent Calendar with Committee Substitute
- To State & Local Government (S)
- Received in Senate
- 3rd reading, passed 100-0 with Committee Substitute
- Placed in the Consent Orders of the Day for Thursday, January 30, 2014
- Taken from Rules (H)
- 2nd reading, to Rules
- Reported favorably, 1st reading, to Consent Calendar with Committee Substitute
- Posted in committee
- To State Government (H)
- Introduced in House
+ − Amendments (2)
SCS
Retain original provisions, except: make technical corrections; define "individually identifiable health information"; define "nonaffiliated third party" to include persons who have a contract or agreement with an agency and receive personal information under that contract or agreement, but are not necessarily providing services or resources; define "security breach" to include nonaffiliated third parties and consider likelihood of harm to individuals; make Kentucky Board of Education agency responsible for implementing security and breach investigation procedures for public school districts; delete language requiring notification of additional requirements beyond those required under this bill; allow nonaffiliated third parties and agencies 72 hours for security breach notification instead of 24 hours; prohibit private right of action; effective January 1, 2015.
HCS/LM
Retain original provisions, except: require the Department for Local Government to consult with public entities in development of security and breach investigation procedures for local governments; require the Commonwealth Office of Technology to make available technical assistance for the establishment of security and breach investigation procedures upon request of an agency; require agencies to notify appropriate entities when investigation reveals misuse of personal information has not occurred; declare that provisions of the Act do not impact the Open Records Act; make the Act effective January 1, 2015.