A BILL TO BE ENTITLED AN ACT TO REQUIRE THE BUILDING CODE COUNCIL TO AMEND THE NC BUILDING CODE TO ALLOW OCCUPANTS YOUNGER THAN EIGHTEEN IN TEMPORARY OVERFLOW EMERGENCY SHELTERS FOR THE HOMELESS. Enacted June 12, 2013. Effective June 12, 2013.
Summary date: Jun 13 2013 - More information
Bill H 687 (2013-2014)Summary date: May 6 2013 - More information
House committee substitute to the 1st edition makes the following changes. Adds that the shelter must also be equipped with smoke detectors in all sleeping areas in order for the temporary overflow emergency shelter for the homeless to be allowed to house occupants under the age of 18.
Bill H 687 (2013-2014)Summary date: Apr 10 2013 - More information
Provides for the implementation of Section 424.1.1 of the 2012 NC Building Code by the Building Code Council (Council) and local governments, which establishes that temporary overflow emergency shelters for the homeless, to allow occupants under the age of 18 when the shelter (1) is intended to serve homeless families that include children under 18 and their parents or other legal guardians and (2) the temporary shelter consists of a group of churches or other nonprofit religious entities that have agreed to host the shelter occupants on the premises of each church or religious entity on a rotating basis. The above should be implemented and only discontinued when the Council adopts amendments, notwithstanding GS 150B-19(4), to the Homeless Shelter Provision, providing for the inclusion of occupants under the age of 18 as specified above.
Sets out the definitions of council, code, and homeless shelter provision as they are used and understood in this act.
© 2021 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.