A BILL TO BE ENTITLED AN ACT TO PREVENT IDENTITY THEFT OF DISCHARGED VETERANS BY RESTRICTING THE RELEASE OF MILITARY SERVICE DISCHARGE DOCUMENTS. Enacted March 28, 2013. Effective March 28, 2013.
Summary date: Mar 28 2013 - More information
Bill S 50 (2013-2014)Summary date: Feb 12 2013 - More information
Senate committee substitute makes the following changes to the 1st edition. Makes technical changes.
Bill S 50 (2013-2014)Summary date: Feb 5 2013 - More information
Under current law, military discharge documents are a public record; however, the discharge documents are exempt from public inspection except as specifically permitted in GS 47-113.2(b), which defines terms as used in this statute.
Extends the exception to permit public inspection of the discharge documents to also apply to subsection (m) of GS 47-113.2, which provides that subsection (e) does not apply to images of military discharge documents that have been on file for over 80 years (was, 50 years).
Under current law GS47-113.2(e) specifies prohibitions against making availablea copy of military discharge documents or any information from those documents available after the effective date of this section other than under the exemptions in subsections (b) or (h) of the statute. Under current law, subsection (h) deals with the adoption of request forms to implement the provisions of this statute.
Provides that the act is effective when it becomes law and that it applies to the release of discharge documents after the effective date and to the release of any other information from those documents after that date.
© 2021 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.