Kansas pairs the Wayfair-Owens Personal Information Protection Act at K.S.A. § 50-7a01 with a dedicated records-disposal duty, and the state’s heavy agricultural-data, financial-services, and federal-contracting concentrations mean a retired Kansas device frequently carries data subject to multiple overlapping regimes. The Enterprise Compliance Reference below provides the Kansas posture in a single table; the sections that follow walk every duty, regulator, and penalty band with statute citation and recent Attorney General enforcement context.

| Compliance Topic | What Kansas Requires | Who Enforces | Penalty Band | What All Green Recycling Provides |
|---|---|---|---|---|
| 1. Breach Notification (Wayne Owen Act) | Reasonable and prompt investigation; notice in “most expedient time possible and without unreasonable delay” under K.S.A. § 50-7a02; consumer reporting agency notice for 1,000+ residents. | Kansas Attorney General | Up to $10,000 per violation via KCPA § 50-636 | Certified media shredding with serialized Certificate of Destruction. |
| 2. Holder of Personal Information (Security) | Reasonable procedures and practices appropriate to the nature of the information under K.S.A. § 50-6,139b(b)(1). | Kansas AG | Up to $10,000 per violation via KCPA carryover | Certified data destruction aligned to NIST SP 800-88 Rev. 2. |
| 3. Records Disposal | Reasonable steps to destroy by shredding, erasing, or otherwise modifying personal identifying information to make it unreadable or undecipherable under K.S.A. § 50-6,139b(b)(2). | Kansas AG | Up to $10,000 per violation via KCPA carryover | Certified data wiping aligned to NIST Clear / Purge. |
| 4. Data Destruction Standard | No state-specific standard prescribed; NIST SP 800-88 Rev. 2 is the federal civilian baseline. | N/A (federal baseline) | N/A | Hard drive shredding for media subject to federal sector overlay. |
| 5. Hazardous & Universal Waste | RCRA-delegated state program under K.A.R. 28-31; universal-waste rules at K.A.R. 28-31-273; CRT rules at 40 C.F.R. § 261.39. | KDHE Bureau of Waste Management | Up to $25,000/day under K.S.A. § 65-3441 | Certified electronics recycling with environmental disposition record. |
| 6. Federal Overlay & Audit Posture | HIPAA, FTC Safeguards, GLBA, FAR 52.204-21, DFARS 252.204-7012; documented Certificate of Destruction, chain-of-custody, environmental disposition. | HHS OCR, FTC, federal prime contractors | HIPAA up to $2.067M per identical violation per year (2025) | IT asset reporting packaged for compliance, legal, and audit teams. |
Kansas’s privacy compliance regime is structured around the Wayne Owen Act (K.S.A. Chapter 50, Article 7a), the holder-of-personal-information security and destruction duty at K.S.A. § 50-6,139b, and the Kansas Consumer Protection Act (KCPA, K.S.A. §§ 50-623 through 50-643). Retirement of a Retired Electronic Asset in Kansas is governed by (1) K.S.A. § 50-7a02, which requires reasonable and prompt investigation of any breach and notice to affected Kansas residents in the most expedient time possible and without unreasonable delay, (2) K.S.A. § 50-6,139b(b)(1), which requires holders of personal information to implement and maintain reasonable procedures and practices appropriate to the nature of the information, (3) K.S.A. § 50-6,139b(b)(2), which requires reasonable destruction steps making personal identifying information unreadable or undecipherable, (4) the KCPA carryover at K.S.A. § 50-636 with civil penalties up to $10,000 per violation, (5) the KDHE-administered RCRA-delegated hazardous-waste program at K.A.R. 28-31, and (6) the universal-waste rules at K.A.R. 28-31-273. Kansas does not operate a statewide manufacturer-takeback or EPR program for electronics. Audit defensibility is the ability to reconstruct each step of asset retirement across that duty surface on demand.
Kansas enterprises operate against HIPAA, GLBA, the FTC Safeguards Rule, FACTA, FAR 52.204-21, and DFARS 252.204-7012 federal regimes (heavily so for Wichita aerospace and Manhattan ag-research), with K.S.A. § 50-7a01 layered on top as a state notification and disposal overlay. A regulated enterprise must satisfy the stricter of (1) Kansas statutes including the Wayne Owen Act § 50-7a02 and the holder-of-personal-information duty at § 50-6,139b, (2) federal sector rules including the HIPAA Security Rule, the FTC Safeguards Rule, GLBA, FAR 52.204-21, and DFARS 252.204-7012, and (3) customer or prime-contract clauses. K.S.A. § 50-6,139b(b)(1) provides a deeming clause: compliance with federal or state law or regulation that governs the holder’s procedures and practices is deemed compliance with the Kansas reasonable-procedures duty, and noncompliance with the federal/state rule is prima facie evidence of a Kansas violation. The destruction duty at § 50-6,139b(b)(2) applies unless federal law or regulation prescribes a different destruction outcome.
The preemption matrix below states, for each federal regime that touches enterprise IT asset disposition in Kansas, whether Kansas law is preempted by, equal to, or exceeds the federal floor, and where it exceeds, the specific stricter element.
| Federal Regime | Kansas Posture | Stricter Element (if any) |
|---|---|---|
| HIPAA Security Rule (45 CFR Part 164 Subpart C) | equals | Federal regime controls; state law does not exceed the federal floor. |
| GLBA / FTC Safeguards Rule (16 CFR Part 314) | equals | Federal regime controls; state law does not exceed the federal floor. |
| FACTA Disposal Rule (16 CFR § 682.3) | Kansas exceeds | K.S.A. § 50-7a03 requires destruction of records containing personal information by shredding, erasing, or modifying to make unreadable. |
| DFARS 252.204-7012 / FAR 52.204-21 / CMMC 2.0 (32 CFR Part 170) | equals | Federal regime controls for federal contractors; CMMC 2.0 effective December 16, 2024 applies through prime-contractor flow-down. |
| RCRA Subtitle C (40 CFR Parts 260-279) | equals | K.A.R. 28-31 implements RCRA Subtitle C; state administers EPA-authorized program at the federal floor. |
NIST SP 800-171 Revision 3 (May 2024 final) is the operative federal CUI sanitization baseline for federal-contractor environments, and CMMC 2.0 (32 CFR Part 170, effective December 16, 2024) is the operative DoD contractor framework that enforces the NIST 800-171 control set through assessment-based compliance levels. Federal contractors operating in Kansas must satisfy CMMC 2.0 in addition to Kansas state law.
K.S.A. § 50-7a02 requires a person who conducts business in Kansas or a government entity that owns or licenses computerized data containing personal information, upon becoming aware of any breach of the security of the system, to conduct in good faith a reasonable and prompt investigation. If the investigation determines that misuse of information has occurred or is reasonably likely to occur, the person or entity must give notice as soon as possible to the affected Kansas resident in the most expedient time possible and without unreasonable delay. Notice may be delayed if a law enforcement agency determines that notification would impede a criminal investigation. Consumer reporting agency notice is required for breaches affecting 1,000+ residents. Substitute notice provisions apply for cost-prohibitive or large-scale events. Violations are enforceable through KCPA with civil penalties up to $10,000 per violation under K.S.A. § 50-636.
K.S.A. § 50-6,139b establishes the freestanding security and disposal duty in Kansas. Under § 50-6,139b(b)(1) a holder of personal information must implement and maintain reasonable procedures and practices appropriate to the nature of the information, and exercise reasonable care to protect the personal information from unauthorized access, use, modification, or disclosure. The reasonable-procedures standard is interpreted with reference to the entity’s industry, the sensitivity of the data, and accepted information-security practices. Under § 50-6,139b(b)(2) the holder must take reasonable steps to destroy or arrange for the destruction of records within its custody or control containing personal information when no longer intended to be maintained, by shredding, erasing, or otherwise modifying the personal identifying information in the records to make it unreadable or undecipherable. The outcome standard parallels Cal. Civ. Code § 1798.81 and other state records-disposal statutes.
Violations of the Wayne Owen Act and § 50-6,139b are enforceable through the Kansas Consumer Protection Act (K.S.A. §§ 50-623 through 50-643). K.S.A. § 50-626 prohibits unconscionable acts and § 50-627 prohibits deceptive acts and practices. K.S.A. § 50-636 authorizes civil penalties up to $10,000 per violation, restitution to affected consumers, and attorney fees. Kansas AG and county/district attorneys may bring KCPA actions.
Kansas state agencies retire IT assets under Kansas Office of Information Technology Services (OITS) policy. The operative controls include Kansas Information Technology Architecture (KITA); ITEC Policy 7230 Information Security; Kansas Department of Administration surplus; Kansas State Records Board retention schedules. Public-sector retirement requires permanent removal of data before transfer or surplus, documented chain of custody, records-retention-schedule alignment for any records-bearing media, and surplus-property routing through the state’s authorized disposal channel. Private-sector enterprises that contract with the state, that operate in regulated public-sector adjacent industries (higher education, K-12, state-funded healthcare), or that subcontract to state agencies inherit these duties through contract flow-down. See Kansas Office of Information Technology Services (OITS) policy guidance.
Kansas’s student-data privacy statute at K.S.A. § 72-6311 et seq. regulates K-12 ed-tech operators that collect, store, or process covered student information. The statute imposes data-minimization, retention-limit, destruction-on-termination, and prohibition-on-secondary-use duties. School districts, charter schools, higher-education institutions in scope, and ed-tech service providers retiring devices that have held covered student records must verify data destruction under Kansas’s outcome standard and retain the destruction certificate.
K.S.A. § 50-6,139b(b)(2) prescribes an outcome (unreadable or undecipherable) and remains method-agnostic. The operative method baseline is NIST Special Publication 800-88 Revision 2 (operative September 26, 2025), which categorizes media sanitization as Clear, Purge, and Destroy. Kansas state agencies follow Kansas Office of Information Technology Services (OITS) cybersecurity standards (ITEC Policy 7230A), which reference NIST 800-88. The audit-defensible position for a Kansas enterprise is NIST 800-88 Rev. 2 alignment with method selection driven by media type, data sensitivity, and federal sector overlay.
Kansas-resident PII on fixed media requires the NIST 800-88 Rev. 2 Destroy outcome through physical shredding because K.S.A. § 50-7a01’s breach trigger reaches unencrypted media in enterprise custody. Hard drive shredding reduces magnetic and solid-state media to particles small enough that data reconstruction is forensically impossible.
Certified data wiping aligned to NIST 800-88 Clear or Purge is appropriate where the asset is being remarketed or redeployed.
Media degaussing is the appropriate Purge method for legacy magnetic media. SSDs, NVMe, and modern flash media require cryptographic erase (Purge) or physical destruction (Destroy).
Certified media shredding covers non-drive media including optical disks, tape cartridges, USB drives, memory cards, smart cards, and any printed material containing personal information subject to K.S.A. § 50-6,139b.
Kansas does not operate a statewide manufacturer-takeback or EPR program for electronics. Enterprise IT asset retirement in Kansas routes through the federal RCRA-delegated state hazardous-waste program administered by the Kansas Department of Health and Environment (KDHE) Bureau of Waste Management under K.A.R. 28-31 (authorized by K.S.A. § 65-3430 et seq.). Hazardous-waste characterization follows the federal toxicity characteristic for lead (CRT glass, circuit-board solder), mercury (LCD backlights, switches, thermostats), cadmium (batteries, pigments), and chromium (circuit boards).
Enterprise / commercial equipment covered by the Kansas e-waste program: NO. Kansas has no state e-waste EPR program; enterprise IT asset retirement routes through K.A.R. 28-31 hazardous-waste rules and K.A.R. 28-29 universal-waste rules. Kansas is an EPA-authorized state administering its own RCRA Subtitle C hazardous-waste program through K.A.R. 28-31; the state program operates at the federal floor unless explicitly more stringent.
Universal-waste rules at K.A.R. 28-31-273 cover batteries, lamps, mercury-containing equipment, mercury thermostats, and paint. Generator status follows the federal VSQG / SQG / LQG framework; cradle-to-grave generator liability applies. Civil penalties under K.S.A. § 65-3441 run up to $25,000 per day per violation. Enterprise IT asset retirement routes through certified electronics recycling with environmental disposition records and, where applicable, hazardous-waste manifests.
Server hardware and enterprise storage arrays contain operating-system data, application data, log files, configuration files with credentials, and database content. Certified server recycling covers the full asset including drive bays, controller cards, and embedded firmware storage. Every drive in the chassis must be sanitized to the Destroy category under NIST 800-88 Rev. 2 before custody transfer when protected health information, financial-account information, or covered defense information was processed.
Certified laptop recycling and certified computer recycling route through the same chain-of-custody framework as server hardware.
Certified cell phone recycling includes verified erase of internal flash and handling of embedded SIM and eSIM material containing subscriber identifiers.
Secure equipment destruction covers prototypes, defective products, and regulated equipment. Product recall management, defective product destruction, and classified equipment destruction cover specialized scenarios.
Kansas enforcement is concentrated at the Kansas Attorney General Consumer Protection Division (via KCPA carryover), county and district attorneys, KDHE Bureau of Waste Management (for hazardous-waste violations), and federal regulators with concurrent jurisdiction. Kansas has been a multistate participant in recent cyber actions (TikTok 2024, Marriott 2024, Equifax 2019). The audit-reconstruction-of-events standard is operative.
| Statute / Authority | Civil Penalty Band | Private Right of Action | Enforcer |
|---|---|---|---|
| K.S.A. § 50-7a02 (Wayne Owen Act) | Enforceable through KCPA | NO (AG-only) | Kansas AG |
| K.S.A. § 50-6,139b (security + disposal) | Enforceable through KCPA | NO (AG-only) | Kansas AG |
| K.S.A. § 50-636 (KCPA) | Up to $10,000 per violation; restitution; attorney fees | NO (KDHE enforcement) | Kansas AG; county/district attorneys |
| K.A.R. 28-31 (hazardous waste) | Up to $25,000/day under K.S.A. § 65-3441 | NO (Kansas State Department of Education enforcement) | KDHE |
| HIPAA (federal overlay) | Up to $2,067,813 per identical violation per year (2025 adjusted) | LIMITED (HIPAA private actions) | HHS OCR |
In addition to the Kansas Attorney General and the Kansas environmental agency, state-level sectoral regulators hold audit and inquiry authority over IT-asset-disposition-relevant controls within their regulated populations. The Kansas Office of the State Bank Commissioner examines banks and credit unions for GLBA-aligned information-security-program controls. The Kansas Insurance Department examines insurance licensees for the written information security program required by the NAIC Insurance Data Security Act or state-equivalent. The Kansas Department of Health and Environment examines healthcare entities for HIPAA Security Rule compliance. The Kansas Board of Regents oversees FERPA-overlapping records and student-data-privacy duties at state institutions of higher education. The Kansas Corporation Commission examines investor-owned utilities for customer-data-protection controls. Each sectoral regulator can issue document requests, on-site examinations, or consent orders that probe the chain-of-custody, sanitization-certificate, and environmental-disposition records produced during IT asset retirement.
Kansas Attorney General consumer-protection enforcement is built from the documentary record an enterprise can produce, and a Retired Electronic Asset that cannot be tied to a serialized destruction Certificate is treated as a presumptive K.S.A. § 50-7a02 disposal-duty failure.
All Green Recycling operates certified IT asset disposition structured around Kansas’s statutory duty surface. Asset pickup is scheduled with a documented chain of custody, secured transport through IT equipment packaging and transportation, certified data destruction at the receiving facility, environmental disposition, and audit-ready reporting. Asset remarketing recovers residual value while preserving chain of custody.
All Green Recycling’s secure data destruction service line is structured to satisfy the K.S.A. § 50-6,139b “unreadable or undecipherable” outcome standard and align to NIST SP 800-88 Rev. 2.
Certified electronics recycling diverts retired electronic assets from landfill through KDHE-authorized channels that satisfy K.A.R. 28-31 hazardous-waste characterization and K.A.R. 28-31-273 universal-waste rules. R2v3, NAID AAA, and e-Stewards frameworks are used as reference frameworks for downstream-handler accountability.
Secure equipment destruction covers product-recall management, defective-product destruction, and classified-equipment destruction.
Reverse logistics covers multi-site enterprise pickups, manufacturer return programs, and customer-driven returns.
Every engagement produces a uniform documentation package delivered through IT asset reporting: serialized asset list, chain-of-custody log, Certificate of Data Destruction, Certificate of Recycling, environmental disposition record, hazardous-waste manifest where applicable, and HIPAA / GLBA / FTC Safeguards documentation entries where the federal overlay applies.
The questions below are the questions enterprise compliance, security, audit, and procurement leaders ask during vendor evaluations, RFP reviews, and breach-response planning when a Retired Electronic Asset is moving through IT Asset Disposition in Kansas.
Kansas does not impose a fixed-day deadline. Under K.S.A. § 50-7a02, the covered entity must conduct a reasonable and prompt investigation upon awareness of a breach. If misuse has occurred or is reasonably likely, notice must be given as soon as possible to affected Kansas residents in the most expedient time possible and without unreasonable delay. Consumer reporting agency notice is required for breaches affecting 1,000+ residents. Violations are enforceable through KCPA § 50-636 with civil penalties up to $10,000 per violation.
No. K.S.A. § 50-6,139b(b)(2) requires reasonable steps to destroy records by shredding, erasing, or otherwise modifying personal identifying information to make it unreadable or undecipherable. The audit-defensible posture is alignment to NIST SP 800-88 Rev. 2 through certified data destruction with verification per device.
No. K.S.A. § 50-7a01(g) enumerates SSN, driver’s license, state ID, and financial account or credit/debit card numbers combined with code/password as personal information. Biometric data is not enumerated, and Kansas has no separate biometric statute. Enterprises processing biometric data should still apply NIST 800-88 Purge or Destroy at retirement under contractual or sector-rule obligations.
Yes. K.S.A. § 50-6,139b(b)(1) provides that compliance with a federal or state law or regulation governing the holder’s procedures and practices is deemed compliance with the Kansas reasonable-procedures duty, and noncompliance with the federal/state rule is prima facie evidence of a Kansas violation. HIPAA-, GLBA-, or FTC Safeguards-covered enterprises that document compliance with the federal rule have a built-in deeming defense for the Kansas duty.
No. Kansas does not operate a statewide manufacturer-takeback or EPR program for electronics. Enterprise IT asset retirement routes through KDHE-authorized hazardous-waste channels under K.A.R. 28-31 and is executed through certified electronics recycling with environmental disposition records.
Yes. K.A.R. 28-31 implements federal RCRA with cradle-to-grave generator liability. Universal-waste streams are governed by K.A.R. 28-31-273. Civil penalties under K.S.A. § 65-3441 run up to $25,000 per day per violation.
NIST Special Publication 800-88 Revision 2 (operative September 26, 2025) is the federal civilian baseline. Kansas state agencies follow Kansas OITS ITEC Policy 7230A, which references NIST 800-88.
Wayne Owen Act and § 50-6,139b violations are enforced through the Kansas Consumer Protection Act. K.S.A. § 50-636 authorizes civil penalties up to $10,000 per violation, restitution to affected consumers, and attorney fees. Kansas AG and county/district attorneys are the enforcement authorities.
All Green Recycling holds ISO 14001:2015 and ISO 45001:2018 certifications and operates with alignment to R2v3, NAID AAA, and e-Stewards as reference frameworks for downstream-handler accountability and certified data destruction. NIST SP 800-88 Rev. 2, HIPAA, GLBA, FTC Safeguards, FAR 52.204-21, and DFARS 252.204-7012 are operative baselines that certified IT asset disposition engagements are structured to satisfy.
Every engagement produces a documentation packet delivered through IT asset reporting: serialized asset list, chain-of-custody log, Certificate of Data Destruction per device, Certificate of Recycling, environmental disposition record, hazardous-waste manifest where applicable, and the contracted-service safeguard terms. The packet is structured for direct delivery to the Kansas AG, KDHE, HHS OCR, FTC, or counterparty audit without reformatting.
A regulated enterprise must satisfy the stricter of (1) Kansas statutes including § 50-7a02 (breach notice) and § 50-6,139b (security and disposal), (2) federal sector rules such as the HIPAA Security Rule and the FTC Safeguards Rule, and (3) customer or prime-contract clauses. The K.S.A. § 50-6,139b(b)(1) federal-law deeming clause makes federal compliance documentation directly relevant to the Kansas duty surface.
Yes. K.S.A. § 50-7a02 (Wayne Owen Act) covers unauthorized access to and acquisition of personal information which extends to physical loss of unencrypted media.
Yes. § 50-7a02 excludes encrypted data; NIST SP 800-88 Revision 2 verified sanitization removes personal information from the breach trigger.
Kansas IT asset retirement is a layered risk-management discipline, not a recycling transaction. Compliant retirement is the ability to prove, under scrutiny, that data was rendered unreadable or undecipherable before custody transfer, that breach notice surfaced in the most expedient time possible after determination, that downstream processing routed through KDHE-authorized channels, and that hazardous fractions were handled under the universal-waste rules. KCPA § 50-636 per-violation civil penalties, KDHE daily penalties, HIPAA federal overlay, FTC Safeguards Rule, and audit-driven counterparty review converge on the same set of records.
Kansas compliance is best treated as a continuous control posture rather than a periodic disposal event. All Green Recycling, LLC operationalizes that posture through IT asset disposition, secure data destruction, certified electronics recycling, secure equipment destruction, reverse logistics, and audit-ready reporting. Compliance, security, and procurement teams that need a Kansas-specific audit walkthrough or an RFP-ready compliance package reach the All Green Recycling response desk at (800) 780-0347.