Attacks prohibited.

Checkout our iOS App for a better way to browser and research.

No direct or collateral attack on any program purported to be authorized or created in conformance with this chapter may be commenced more than thirty days after creation.

[ 2015 3rd sp.s. c 24 § 801.]

NOTES:

Construction—2015 3rd sp.s. c 24: See note following RCW 36.160.030.


Download our app to see the most-to-date content.