AN ACT TO MAKE CHANGES TO LAWS RELATED TO TRANSPORTATION.
Senate amendments amend the 4th edition, as amended, as follows.
Amendment #2 adds new Section 3.1, directing the Environmental Management Commission (EMC) and the Department of Environmental Quality (DEQ) to implement the Neuse River Basin Riparian Buffer Rule (15A NCAC 02B .0233, including the proposed readoption and recodification of that rule as 15A NCAC 02B .0714, adopted by the EMC and approved by the Rules Review Commission) by designating Airport Impacted Property as Allowable with Mitigation. Defines Airport Impacted Property as any tract of property contiguous to airports located in the Neuse River Basin served by greater than 50,000 flights annually that is impacted by a relocation of State-maintained road to accommodate expansion or relocation of airport operations. Directs the EMC to adopt rules to amend the Rule consistent with the implementation provisions.
Amendment #3 modifies proposed Article 10B, Peer-to-Peer Vehicle Sharing, of GS Chapter 20. Amends the definition of vehicle sharing provider to refer to "personal vehicle sharing" rather than "private motor vehicle rentals." Amends proposed GS 20-280.17 to allow airport operators to, among previously provided authorities, (1) charge peer-to-peer vehicle sharing programs, as previously defined (rather than vehicle sharing providers), a reasonable fee for use of the airport's facility and (2) requiring a peer-to-peer vehicle sharing program (rather than a vehicle sharing provider) provide data for purposes of monitoring and auditing compliance.
© 2022 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.