An Official Website of the Commonwealth of Kentucky
Are there security protocols governing data access, modification, and release in the adjudication system?