Application for CISA Certification
|
|
|
- Margaret Briggs
- 10 years ago
- Views:
Transcription
1 Application for CISA Certification 4/2015
2 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade on the CISA exam. A passing score on the CISA exam, without completing the required work experience as outlined below, will only be valid for five years. If the applicant does not apply or meet the CISA certification requirements within the five year period, the passing score will be voided. Important Note: Your completed CISA application for certification must be submitted within 5 years from the date of initially passing the examination. Retaking and re-passing the examination will be required if the (completed) application for certification is not submitted within five years from the passing date of the examination. 2. Submit payment for the CISA application processing fee of US $50 online at 3. Submit verified evidence of five years work experience in the fields of Information Systems Auditing, Control, Assurance or Security. Work experience must be gained within the ten year period preceding the application date for certification or within five years from the date of initially passing the exam. Substitutions and waivers of such experience, to a maximum of 3 years, may be obtained as follows: A maximum of one year of information systems OR one year of non IS auditing experience can be substituted for one year of information systems auditing, control, assurance or security experience; 60 to 120 completed university semester credit hours (the equivalent of a two year or four year degree), not limited by the ten year preceding restriction, can be substituted for one or two years, respectively, of information systems auditing, control or security experience. Even if multiple degrees have been earned, a maximum of 2 years can be claimed. A bachelor s or master s degree from a university that enforces the ISACA sponsored Model Curricula can be substituted for one year of information systems auditing, control, assurance or security experience. view a list of these schools, please visit This option cannot be used if three years of experience substitution and educational waiver have already been claimed; and A master s degree in information security or information technology from an accredited university can be substituted for one year of experience. Two year waiver for CIMA (Chartered Institute of Management Accountants) full certification. No waiver is provided for the CIMA Certificate in Business Accounting or the CIMA Advanced Diploma in Management Accounting, both earned en route to becoming fully qualified. (The CIMA full certification waiver is in lieu of the 2-year CISA waiver for a bachelor s degree. Those individuals who have a 2-year CISA waiver for their bachelor s degree cannot also claim the CIMA waiver.) Must provide a copy of CIMA certification as verification. Two year waiver for ACCA member status from the Association of Chartered Certified Accountants. Must provide copy of ACCA certification as verification. (Those individuals who have a 2-year CISA waiver for their bachelor s degree cannot also claim the ACCA waiver.) Exception: Two years as a full-time university instructor in a related field (e.g.; computer science, accounting, information systems auditing) can be substituted for every one year of information systems auditing, control or security experience. As an example, at a minimum (assuming a two-year waiver of experience by substituting 120 university credits) an applicant must have three years of actual work experience. This experience can be completed by: three years information systems audit, control, assurance, or security experience; OR two years information systems audit, control, assurance, or security experience and one full year non-is audit or information systems experience or two years as a full-time university instructor. 4. Agree to abide by the ISACA Code of Professional Ethics. Application for CISA Certification 5. Agree to abide with Information Systems Standards as adopted by ISACA, which can be viewed at 6. Agree to abide by the CISA Continuing Professional Education Policy, which can be viewed at ISACA Code of Professional Ethics ISACA sets forth this Code of Professional Ethics to guide the professional and personal conduct of members of the association and/or its certification holders. Failure to comply with this Code of Professional Ethics can result in an investigation into a member s and/or certification holder s conduct and, ultimately, in disciplinary measures. The ISACA Code of Professional Ethics can be viewed online at 2
3 Instructions for Completing and Submitting Your Application and Documentation Carefully follow the instructions to complete your application. Be sure to complete all appropriate sections and sign your application. Incomplete or unsigned applications will not be accepted. Instructions for Completion of the Application for CISA Certification Form 1. Application Page A-1. Complete with your details on page A-1. Read and review acknowledgement. Print and sign your name and enter date on form at bottom of page. 2. Submit payment for the CISA application processing fee of US $50 online at 3. Application Page A-2 SECTION A INFORMATION SYSTEMS AUDIT, CONTROL, ASSURANCE OR SECURITY EXPERIENCE For each employer/company (starting with the most current), enter the: Name of Employer/Company. Enter your employer/company name. s of Employment. range (month and year) of employment in IS auditing, control, assurance or security. Do not leave dates blank. If currently employed, include a date or current, now, present, etc. Duration of Experience. Enter number of years and months, by employer and in total, performing IS auditing, control, assurance or security service. Work experience must be gained within the ten year period preceding the application date for certification or within 5 years from the date of initially passing the exam. Work experience greater than 10 years cannot be claimed on your application. SECTION B EXPERIENCE SUBSTITUTION Non-IS audit/information systems: If substituting other audit experience (such as financial or operational auditing) or other types of information systems work experience (such as application programming or operations), there is a maximum limit of one FULL year for the audit or information systems work experience. Partial years do not apply. University Instructor: If substituting full-time university instructor experience in a related field (e.g.; information systems, accounting, information systems auditing) you must have two FULL years experience for each year of experience substitution. There is no limit on the number of year s experience substitution that may be claimed as a university instructor. No credit will be given for a partial year s experience. SECTION C EDUCATIONAL EXPERIENCE WAIVER Indicate an educational experience waiver by checking the appropriate box. confirm your degree status, include a copy of your transcript, degree, or letter from your college or university with your application or your verifier can verify this for you. If your verifier has knowledge of your Bachelor s degree and is willing to verify this for you, he may do so by answering the corresponding question on the verification form. For those claiming a CIMA or ACCA waiver, a copy of the certification is required for verification, those claiming 3 years for the Master s degree, a copy of the degree or transctipt is required. Note that with the exception of University Professor, between experience and educational substitutions no more than 3 years may be claimed as waivers/substitutions. SECTION D SUMMARY OF EXPERIENCE REQUIREMENTS Record the totals from sections A-C above. The line titled tal Work Experience should be the total number of years spent working in an information systems auditing, control, assurance or security function, plus any experience substitution and waivers. A minimum of five years is required to qualify for CISA Certification. No more than three years of experience substitution or educational waivers can be used towards your five year experience requirement, with the exception of those claiming the experience substitution of a university instructor. 4. Application Pages V-1 & V-2. Complete the top portion on the Verification of Work Experience forms (pages V-1 and V-2) and check the boxes on page V-2 of the verification form that indicate the tasks you performed that are being verified by each verifier. Give the form to each person(s) verifying your work experience; and a copy of your completed application. This person should be your immediate supervisor or a person of higher rank within the organization. The individual verifying the work experience must be an independent verifier and not of any relation to the applicant nor can the applicant verify his/her own work. If one person cannot verify all required experience for you to become a CISA, previous employers must be asked to complete this form. If you currently or once worked as an independent consultant, you can use a knowledgeable client or an individual certified as a CISA or CISM to perform this role. Please note that if year length of employment with your most recent company is less than three months, verification of work experience is required from previous employers. Two copies of the form are included. If additional copies are required, photocopy the forms. All Verification of Work Experience forms pages V-1 and V-2 must be signed by your verifier and submitted along with your application. reduce processing time, please send the completed verification forms with your application. 5. In order for your application to be efficiently processed, please collect all supporting documentation (verification of work experience form(s) and any applicable university degree, transcript or letter) and submit your completed Application for CISA Certification via fax, or mail to: Certification Coordinator ISACA 3701 Algonquin Road, Suite 1010, Rolling Meadows, IL USA [email protected] Telephone Number: Fax Number: Application for CISA Certification NOTE: Please allow approximately eight weeks for the processing of your completed Application for CISA Certification. Upon approval, you will receive a certificate package via mail containing a letter of certification and your CISA certificate. 3
4 Application for CISA Certification Page A-1 Name: Exam ID First Middle Initial Last/Family Maiden Name or Former Name(s) Preferred Mailing Address: Home ( ) Business ( ) Home Address: City: State/Country: Zip/Postal Code: Home Telephone ( ) Present Employer: Your Job Title: Business Name: Business Address: City: State/Country: Zip/Postal Code: Business Telephone ( ) Fax ( ) Immediate Supervisor: Name Title I hereby apply to Information Systems Audit and Control Association, Inc. (ISACA) for the Certified Information Systems Auditor (CISA) certification in accordance with and subject to the procedures and policies of ISACA. I have read and agree to the conditions set forth in the Application for Certification and the Continuing Professional Education (CPE) Policy in effect at the time of my application, covering the Certification process and CPE policy. I agree: to provide proof of meeting the eligibility requirements; to permit ISACA to ask for clarification or further verification of all information submitted pursuant to the Application, including but not limited to directly contacting any verifying professional to confirm the information submitted; to comply with the requirements to attain and maintain the certification, including eligibility requirements carrying out the tasks of a CISA, compliance with ISACA s Code of Ethics, standards, and policies and the fulfillment of renewal requirements; to notify the ISACA certification department promptly if I am unable to comply with the certification requirements; to carry out the tasks of a CISA; to make claims regarding certification only with respect to the scope for which certification has been granted; and not use the CISA certificate or logos or marks in a misleading manner or contrary to ISACA guidelines. I understand and agree that my Certification application will be denied and any credential granted me by ISACA will be revoked and forfeited in the event that any of the statements or answers provided by me in this application are false or in the event that I violate any of the examination rules or certification requirements. I understand that all certificates are owned by ISACA and if my certificate is granted and then revoked, I will destroy the certificate, discontinue its use and retract all claims of my entitlement to the Certification. I authorize ISACA to make any and all inquiries and investigations it deems necessary to verify my credentials and my professional standing. I acknowledge that if I am granted the Certification, my certification status will become public, and may be disclosed by ISACA to third parties who inquire. If my application is not approved, I understand that I am able to appeal the decision by contacting [email protected]. Appeals undertaken by a Certification exam taker, Certification applicant or by a certified individual are undertaken at the discretion and cost of the examinee or applicant. By signing below, I authorize ISACA to disclose my Certification status. This contact information will be used to fulfill my Certification inquiries and requests. By signing below, I authorize ISACA to contact me at the address and numbers provided and that the information I provided is my own and is accurate. I authorize ISACA to release confidential Certification application and certification information if required by law or as described in ISACA s Privacy Policy. learn more about how we use the information you have provided on this form, please read our Privacy Policy, available at I hereby agree to hold ISACA, its officers, directors, examiners, employees, agents and those of its supporting organizations harmless from any complaint, claim, or damage arising out of any action or omission by any of them in connection with this application; the application process; the failure to issue me any certificate; or any demand for forfeiture or redelivery of such certificate. Not withstanding the above, I understand and agree that any action arising out of, or pertaining to this application must be brought in the Circuit Court of Cook County, Illinois, USA, and shall be governed by the laws of the State of Illinois, USA. I UNDERSTAND THAT THE DECISION AS TO WHETHER I QUALIFY FOR CERTIFICATION RESTS SOLELY AND EXCLUSIVELY WITH ISACA AND THAT THE DECISION OF ISACA IS FINAL. I HAVE READ AND UNDERSTAND THESE STATEMENTS AND I INTEND TO BE LEGALLY BOUND BY THEM. Name Signature A-1
5 Work Experience Detail Application for CISA Certification Page A-2 Exam ID Name A. INFORMATION SYSTEMS AUDIT, CONTROL, ASSURANCE OR SECURITY EXPERIENCE List your most recent experience first. A candidate must have a minimum of two years of IS audit, control, assurance or security experience. Two years of experience is considered 4,000 actual hours, with the exception for full time instructors (see B. Experience Substitution below). Work experience must be gained within the ten year period preceding the application date for certification or within 5 years from the date of initially passing the exam. Do not leave dates blank. If currently employed, include a date or current, now, present, etc. Employer Name s of Employment in IS Audit, Control or Security tal number of years IS auditing, control, assurance or security experience (round down to whole year) Duration of Experience MM/YY MM/YY Years Months B. EXPERIENCE SUBSTITUTION A maximum of 1 year IS auditing, control, assurance or security experience may be substituted with either one FULL year of auditing experience OR one FULL year of information systems experience. No credit is given for a partial years experience. Experience used in Section A cannot be repeated in Section B. Company Name Non-IS audit/information sytems: s of Employment MM/YY MM/YY Type of Experience Number of Years of Substitution Non-IS Audit Information Systems University Name**: University Instructor* ** There is no maximum limitation for university instructor experience. However, two FULL years of university instructor experience in a related field is required for each one year of IS auditing, control or security experience substitution. C. EDUCATIONAL EXPERIENCE WAIVER If you are applying for any experience waivers, please include information on your degree below. Check the appropriate box. confirm your degree status, include with your application a copy of your degree, transcript or letter from your college or university. University Name Educational Degree Awarded Educational Field of Study Educational Experience Waiver (Check one which applies to the waiver you are claiming.) *Copy of degree required. One year substitution waiver for a 2-Year university degree or equivalent 60 semester credit hours. Two years substitution waiver for a Bachelor s, Master s, Ph.D. or equivalent 120 semester credit hours. Three years substitution waiver for a Bachelor s degree PLUS Master s in Information Security or Information Technology.* Three years substitution waiver for a Bachelor s or Master s degree from a university that enforces the ISACA sponsored Model Curricula.* OTHER WAIVERS (Must submit certificate as proof for waiver.) Two year educational waiver for CIMA Chartered Institute of Management Accountants, full certification, Two year educational waiver for ACCA member status from the Association of Chartered Certified Accountants D. SUMMARY OF EXPERIENCE REQUIREMENTS 1. tal number of years of information systems audit, control, assurance or security experience enter the total from Section A above (mimimum of 2 years required) If applying for an experience substitution, enter number of years being substituted in the box and complete Section B above (maximum of 1 year) If applying for an educational experience waiver, enter 1, 2 or 3 in the box as appropriate and complete Section C above... TOTAL WORK EXPERIENCE add boxes 1, 2 and 3 (boxes 2 and 3 cannot exceed 3 years) (must total five years or more to apply for CISA certification)... A-2
6 Verification of Work Experience (page 1 of 2) Exam ID Application for CISA Certificationn Page V-1 I,, am applying for certification through ISACA as a (Printed Name) Certified Information Systems Auditor. My work experience must be independently verified by my current and/or previous employer(s). The individual verifying the work experience must be an independent verifier and not of any relation to the applicant nor can the applicant verify his/her own work. If I currently or once worked as an independent consultant, I can use a knowledgeable client or an individual certified as a CISA or CISM to perform this role. I would appreciate your cooperation in completing this form, by verifying my IS auditing, control, assurance or security work experience as noted on my application form attached and as described by CISA job practice area and task statements (see page V-2). Please return the complete form to me for my submission to ISACA. If you have any questions concerning this form, please direct them to [email protected]. or Thank you Applicant s Signature Employer s Verification Please answer all five questions and sign and date the form. Verifier s Name: Company Name: Job Title: Address: STREET CITY STATE/PROVINCE/COUNTRY POSTAL CODE Company Telephone Number: Company I am attesting to/verifying the employment experience listed on page A-2. Enter employer/company name(s). List all that apply to this verification. 1. Have you functioned in a supervisory position to the applicant or am otherwise qualified to verify the experience as listed on page A-2? Yes No If no, please explain what qualifies you to verify this information? 2. Is the categorization and duration of the applicant s work experience, for your organization, as listed on the application for certification form, correct to the best of your knowledge? Yes No 3. Are you qualified and willing to verify the applicant s work experience prior to his/her affiliation with your company/organization? Yes No N/A 4. Are you qualified and willing to verify the applicant s educational experience waiver(s) claimed? Yes No N/A 5. Is there any reason you believe this applicant should not be certified as an information systems auditor? Yes No Verifier s Signature V-1
7 Application for CISA Certification Page V-2 Verification of Work Experience (page 2 of 2) Exam ID Applicant Name: Verifier Name: Applicant required to indicate with an (x) in each box the task they performed to be confirmed by the verifier. Description of CISA Job Practice Areas 1: The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems. Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included. Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization. Conduct audits in accordance with IT audit standards to achieve planned audit objectives. Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary. Conduct follow-ups or prepare status reports to ensure that appropriate actions have been taken by management in a timely manner. 2: Governance and Management of IT Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization s strategy. Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization s strategies and objectives. Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization s strategies and objectives. Evaluate the IT strategy, including the IT direction, and the processes for the strategy s development, approval, implementation and maintenance for alignment with the organization s strategies and objectives. Evaluate the organization s IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements. Evaluate the adequacy of the quality management system to determine whether it supports the organization s strategies and objectives in a cost-effective manner. Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization s policies, standards and procedures. Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organization s strategies and objectives. Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organization s strategies and objectives. Evaluate risk management practices to determine whether the organization s IT-related risks are properly managed. Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance. Evaluate the organization s business continuity plan to determine the organization s ability to continue essential business operations during the period of an IT disruption. 3: Information Systems Acquisition, Development and Implementation Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization s strategies and objectives. Evaluate the business case for proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives. Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization. Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate. Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization s policies, standards, procedures and applicable external requirements. Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization s requirements are met. Conduct postimplementation reviews of systems to determine whether project deliverables, controls and the organization s requirements are met. 4: Information Systems Operations, Maintenance and Support Provide assurance that the processes for information systems operations, maintenance and support meet the organization s strategies and objectives. Conduct periodic reviews of information systems to determine whether they continue to meet the organization s objectives. Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed. Evaluate third-party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider. Evaluate operations and end-user procedures to determine whether scheduled and nonscheduled processes are managed to completion. Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organization s objectives. Evaluate data administration practices to determine the integrity and optimization of databases. Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organization s objectives. Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner. Evaluate change, configuration and release management practices to determine whether scheduled and nonscheduled changes made to the organization s production environment are adequately controlled and documented. Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing. Evaluate the organization s disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster. 5: Protection of Information Assets Provide assurance that the organization s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets. Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices. Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information. Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization s policies, standards, procedures and applicable external requirements. Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded. Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data and softcopy media) to determine whether information assets are adequately safeguarded. Verifier s Signature V-2
8 Verification of Work Experience (page 1 of 2) Exam ID Application for CISA Certification Page V-1 I,, am applying for certification through ISACA as a (Printed Name) Certified Information Systems Auditor. My work experience must be independently verified by my current and/or previous employer(s). The individual verifying the work experience must be an independent verifier and not of any relation to the applicant nor can the applicant verify his/her own work. If I currently or once worked as an independent consultant, I can use a knowledgeable client or an individual certified as a CISA or CISM to perform this role. I would appreciate your cooperation in completing this form, by verifying my IS auditing, control, assurance or security work experience as noted on my application form attached and as described by CISA job practice area and task statements (see page V-2). Please return the complete form to me for my submission to ISACA. If you have any questions concerning this form, please direct them to [email protected]. or Thank you Applicant s Signature Employer s Verification Please answer all five questions and sign and date the form. Verifier s Name: Company Name: Job Title: Address: STREET CITY STATE/PROVINCE/COUNTRY POSTAL CODE Company Telephone Number: Company I am attesting to/verifying the employment experience listed on page A-2. Enter employer name(s). List all that apply to this verification. 1. Have you functioned in a supervisory position to the applicant or am otherwise qualified to verify the experience as listed on page A-2? Yes No If no, please explain what qualifies you to verify this information? 2. Is the categorization and duration of the applicant s work experience, for your organization, as listed on the application for certification form, correct to the best of your knowledge? Yes No 3. Are you qualified and willing to verify the applicant s work experience prior to his/her affiliation with your company/organization? Yes No N/A 4. Are you qualified and willing to verify the applicant s educational experience waiver(s) claimed? Yes No N/A 5. Is there any reason you believe this applicant should not be certified as an information systems auditor? Yes No Verifier s Signature V-1 (duplicate)
9 Application for CISA Certification Page V-2 Verification of Work Experience (page 2 of 2) Exam ID Applicant Name: Verifier Name: Applicant required to indicate with an (x) in each box the task they performed to be confirmed by the verifier. Description of CISA Job Practice Areas 1: The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems. Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included. Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization. Conduct audits in accordance with IT audit standards to achieve planned audit objectives. Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary. Conduct follow-ups or prepare status reports to ensure that appropriate actions have been taken by management in a timely manner. 2: Governance and Management of IT Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization s strategy. Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization s strategies and objectives. Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization s strategies and objectives. Evaluate the IT strategy, including the IT direction, and the processes for the strategy s development, approval, implementation and maintenance for alignment with the organization s strategies and objectives. Evaluate the organization s IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements. Evaluate the adequacy of the quality management system to determine whether it supports the organization s strategies and objectives in a cost-effective manner. Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization s policies, standards and procedures. Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organization s strategies and objectives. Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organization s strategies and objectives. Evaluate risk management practices to determine whether the organization s IT-related risks are properly managed. Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance. Evaluate the organization s business continuity plan to determine the organization s ability to continue essential business operations during the period of an IT disruption. 3: Information Systems Acquisition, Development and Implementation Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization s strategies and objectives. Evaluate the business case for proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives. Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization. Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate. Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization s policies, standards, procedures and applicable external requirements. Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization s requirements are met. Conduct postimplementation reviews of systems to determine whether project deliverables, controls and the organization s requirements are met. 4: Information Systems Operations, Maintenance and Support Provide assurance that the processes for information systems operations, maintenance and support meet the organization s strategies and objectives. Conduct periodic reviews of information systems to determine whether they continue to meet the organization s objectives. Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed. Evaluate third-party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider. Evaluate operations and end-user procedures to determine whether scheduled and nonscheduled processes are managed to completion. Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organization s objectives. Evaluate data administration practices to determine the integrity and optimization of databases. Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organization s objectives. Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner. Evaluate change, configuration and release management practices to determine whether scheduled and nonscheduled changes made to the organization s production environment are adequately controlled and documented. Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing. Evaluate the organization s disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster. 5: Protection of Information Assets Provide assurance that the organization s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets. Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices. Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information. Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization s policies, standards, procedures and applicable external requirements. Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded. Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data and softcopy media) to determine whether information assets are adequately safeguarded. Verifier s Signature V-2 (duplicate)
10 Telephone: Fax: Web site: DOC: CISA Application for Certification Version: V5 Update:
Application for CISM Certification
Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade
Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.
Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in
Updated: 2014 January. Continuing Professional Education (CPE) Policy
Updated: 2014 January Continuing Professional Education (CPE) Policy Table of Contents Overview... 2 CISA Certification Requirements... 2 General Requirements Annual and Three-year Certification Period
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
STATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS. BOARD OF ACCOUNTANCY 1511 Pontiac Avenue, #68-1 Cranston, Rhode Island 02920
BOARD OF ACCOUNTANCY Cranston, Rhode Island 02920 APPLICATON FOR CPA CERTIFICATE WITHOUT WRITTEN EXAMINATION To the Rhode Island Board of Accountancy: I hereby make application to be examined by the Rhode
Section 3 Examinees: Application Form, General Policies, Exam Results
The Certified Paralegal Program Section 3 Examinees: Application Form, General Policies, Exam Results Published by NALA, Inc. 7666 E. 61 st Street #315 Tulsa, OK 74133 June 2015 This information appears
Candidate s Guide to the CISM Exam and Certification
2013 Candidate s Guide to the CISM Exam and Certification CISM Exams 2013 Important Date Information Exam Date 8 June 2013 Early registration deadline: 13 February 2013 Final registration deadline: 12
252 CMR: BOARD OF REGISTRATION IN PUBLIC ACCOUNTANCY
252 CMR 2.00: REQUIREMENTS FOR CERTIFICATION Section 2.01: Eligibility of Candidates to Take Examination 2.02: Times and Places of Examinations 2.03: Administration and Grading of Examinations 2.04: Subject
C CISO Exam Eligibility Application Form
C CISO Exam Eligibility Application Form C CISO is the first of its kind certification that recognizes an individual s accumulated skills in developing and executing an information security management
REGULATION NO. 6 REGULATIONS GOVERNING THE LICENSING AND PRACTICE OF OCCUPATIONAL THERAPISTS
REGULATION NO. 6 REGULATIONS GOVERNING THE LICENSING AND PRACTICE OF OCCUPATIONAL THERAPISTS 1. APPLICATION FOR LICENSURE. Any person who plans to practice as a licensed occupational therapist or occupational
IAC 4/18/12 Professional Licensure[645] Ch 280, p.1 CHAPTER 280 LICENSURE OF SOCIAL WORKERS
IAC 4/18/12 Professional Licensure[645] Ch 280, p.1 SOCIAL WORKERS CHAPTER 280 CHAPTER 281 CHAPTER 282 CHAPTER 283 LICENSURE OF SOCIAL WORKERS CONTINUING EDUCATION FOR SOCIAL WORKERS PRACTICE OF SOCIAL
Administrative Rules for Social Workers Windows Draft for Public Review and Comments September 21, 2015. Table of Contents
Administrative Rules for Social Workers Windows Draft for Public Review and Comments September 21, 2015 Page 1 Table of Contents Part 1 General Information 1.1 Administrative Rules 1.2 General Definitions
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Section 5 Recertification Requirements
The Certified Paralegal Program Section 5 Recertification Requirements Published by NALA, Inc. 7666 E. 61 st St #315 Tulsa, OK 74133 February 2015 This information appears on the NALA website (www.nala.org)
State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO
Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an
IAC 7/2/08 Nursing Board[655] Ch 5, p.1. CHAPTER 5 CONTINUING EDUCATION [Prior to 8/26/87, Nursing Board[590] Ch 5]
IAC 7/2/08 Nursing Board[655] Ch 5, p.1 CHAPTER 5 CONTINUING EDUCATION [Prior to 8/26/87, Nursing Board[590] Ch 5] 655 5.1(152) Definitions. Approved provider means those persons, organizations, or institutions
DISTRICT OF COLUMBIA MUNICIPAL REGULATIONS for SOCIAL WORK
DISTRICT OF COLUMBIA MUNICIPAL REGULATIONS for SOCIAL WORK 5/4/12 1 CHAPTER 70 SOCIAL WORK Secs. 7000 General Provisions 7001 Term of License 7002 Educational and Training Requirements 7003 Applicants
ISACA. Trust in, and value from, information systems. www.isaca.org
ISACA Trust in, and value from, information systems www.isaca.org 2011 CISM Review Course Introduction ISACA Facts Founded in 1969 as the EDP Auditors Association More than 86,000 members in over 160 countries
Volunteer Driver Application Form
Road to Recovery Volunteer Driver Application Form Please Print Name: Street Address: City State Zip: Other Address Information/ Email: Home Phone: Work Phone: Date of Birth: Occupation: Emergency Contact
IAC 2/11/09 Professional Licensure[645] Ch 141, p.1 CHAPTER 141 LICENSURE OF NURSING HOME ADMINISTRATORS
IAC 2/11/09 Professional Licensure[645] Ch 141, p.1 NURSING HOME ADMINISTRATORS CHAPTER 141 CHAPTER 142 CHAPTER 143 CHAPTER 144 LICENSURE OF NURSING HOME ADMINISTRATORS RESERVED CONTINUING EDUCATION FOR
Tuition and Fees 2014-2015. Academic and Registration Info
Tuition and Fees 2014-2015 Academic and Registration Info North Idaho College 31 2014-2015 REGISTRATION Registration is the official process of enrolling in classes. NIC is on a 16-week Fall/Spring Semester,
ADMINISTRATIVE RULES FOR CLINICAL SOCIAL WORKERS TABLE OF CONTENTS
ADMINISTRATIVE RULES FOR CLINICAL SOCIAL WORKERS TABLE OF CONTENTS PART 1. GENERAL INFORMATION ON LICENSURE OF CLINICAL SOCIAL WORKERS 1.1 THE PURPOSE OF LICENSURE...1 1.2 BUSINESS LOCATION...1 1.3 ADVISORS
RULES OF DEPARTMENT OF COMMERCE AND INSURANCE DIVISION OF REGULATORY BOARDS TENNESSEE STATE BOARD OF ACCOUNTANCY CHAPTER 0020-05 CONTINUING EDUCATION
RULES OF DEPARTMENT OF COMMERCE AND INSURANCE DIVISION OF REGULATORY BOARDS TENNESSEE STATE BOARD OF ACCOUNTANCY CHAPTER 0020-05 CONTINUING EDUCATION TABLE OF CONTENTS 0020-05-.01 Definitions 0020-05-.05
Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification
Certified Information Security Manager 2011 Candidate s Guide to the CISM Exam and Certification 2 CISM Exams 2011 Important Date Information Exam Date 11 June 2011 Early registration deadline: 9 February
APPLICATION FOR ADDICTION COUNSELOR TRAINEE RECOGNITION OR ADDICTION COUNSELOR TRAINEE RENEWAL
Board of Addiction and Prevention Professionals (BAPP) 3101 West 41 st Street, Suite 205, Sioux Falls, SD 57105 Phone: 605-332-2645 Fax: 605-332-6778 Email: [email protected] Web: www.dss.sd.gov/bapp
CONSTRUCTION MANAGER CERTIFICATION INSTITUTE. Renewal Handbook
CONSTRUCTION MANAGER CERTIFICATION INSTITUTE Renewal Handbook CCM RENEWAL HANDBOOK Purpose Recertification is an integral part of the (CCM) program. Continuing education offers the practicing CM professional
IAC 1/21/15 Professional Licensure[645] Ch 240, p.1 CHAPTER 240 LICENSURE OF PSYCHOLOGISTS
IAC 1/21/15 Professional Licensure[645] Ch 240, p.1 PSYCHOLOGISTS CHAPTER 240 CHAPTER 241 CHAPTER 242 LICENSURE OF PSYCHOLOGISTS CONTINUING EDUCATION FOR PSYCHOLOGISTS DISCIPLINE FOR PSYCHOLOGISTS CHAPTER
STATE OF MAINE BOARD OF SOCIAL WORKER LICENSURE APPLICATION FOR LICENSED MASTER SOCIAL WORKER (LM)
STATE OF MAINE BOARD OF SOCIAL WORKER LICENSURE APPLICATION FOR LICENSED MASTER SOCIAL WORKER (LM) Department of Professional and Financial Regulation Office of Licensing and Registration 35 State House
KANSAS ADMINISTRATIVE REGULATIONS RULES AND REGULATIONS FOR LICENSURE OF KANSAS SPEECH LANGUAGE PATHOLOGISTS AND AUDIOLOGISTS
KANSAS ADMINISTRATIVE REGULATIONS RULES AND REGULATIONS FOR LICENSURE OF KANSAS SPEECH LANGUAGE PATHOLOGISTS AND AUDIOLOGISTS 28-61-1. DEFINITIONS. (a) American speech-language-hearing association means
MINNESOTA CERTIFIED PARALEGAL APPLICATION I. PERSONAL INFORMATION. Name: Former Name(s): Date of Birth: Mailing Address: City/State/Zip:
MINNESOTA CERTIFIED PARALEGAL APPLICATION I. PERSONAL INFORMATION Name: Former Name(s): Date of Birth: Mailing Address: City/State/Zip: Telephone Number: Email: II. Eligibility Requirements Grounds for
05-071 MAINE STATE BOARD OF EDUCATION Chapter 115: CERTIFICATION, AUTHORIZATION, AND APPROVAL OF EDUCATION PERSONNEL
05-071 MAINE STATE BOARD OF EDUCATION Chapter 115: CERTIFICATION, AUTHORIZATION, AND APPROVAL OF EDUCATION PERSONNEL SUMMARY: This rule contains the requirements for certification, authorization, and approval
STATE OF WISCONSIN PSYCHOLOGY EXAMINING BOARD
STATE OF WISCONSIN PSYCHOLOGY EXAMINING BOARD --------------------------------------------------------------------------------------------------------------------- IN THE MATTER OF RULEMAKING : PROCEEDINGS
05-071 MAINE STATE BOARD OF EDUCATION Chapter 115: CERTIFICATION, AUTHORIZATION, AND APPROVAL OF EDUCATION PERSONNEL
05-071 MAINE STATE BOARD OF EDUCATION Chapter 115: CERTIFICATION, AUTHORIZATION, AND APPROVAL OF EDUCATION PERSONNEL SUMMARY: This rule contains the requirements for certification, authorization, and approval
VETERINARY MEDICINE LICENSE APPLICATION INSTRUCTIONS AND INFORMATION
The Commonwealth of Massachusetts Division of Professional Licensure Board of Registration of Veterinary Medicine 1000 Washington Street, Suite 710 Boston, MA 02118-6100 Phone: (617) 727-3080 VETERINARY
MONTANA BOARD OF PUBLIC ACCOUNTANTS
MONTANA BOARD OF PUBLIC ACCOUNTANTS 301 South Park 4 th Floor PO Box 200513 Helena Mt 59620 0513 Phone: 406 841 2203 E mail: [email protected] Website: www.publicaccountant.mt.gov APPLICATION FOR ORIGINAL
Administrative Directive No. 4: 2011
Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements
State of Maine BARBERING & COSMETOLOGY LICENSING
State of Maine BARBERING & COSMETOLOGY LICENSING Application information to assist in completing your application. This information is not designed to include all information on laws and rules and it is
Illinois Cosmetology FAQ s
Illinois Cosmetology FAQ s Illinois Cosmetology License Renewal Barber licenses and barber teacher licenses expire on July 31 of each odd-numbered year, and licensees may renew within the month prior to
M E M O R A N D U M. TO: ALL Interior Designer applicants FROM: JEAN WILLIAMS, EXECUTIVE DIRECTOR
M E M O R A N D U M The Board of Governors of the Licensed Architects Landscape Architects and Registered Interior Designers of Oklahoma P. O. Box 53430 Oklahoma City, OK 73152 (405) 949-2383 TO: ALL Interior
Scholarship Handbook
Scholarship Handbook Dear Rodeo Scholar, This handbook is designed to help you maintain your Houston Livestock Show and Rodeo Scholarship. It is imperative that you read and retain this handbook. Please
Title 10 DEPARTMENT OF HEALTH AND MENTAL HYGIENE
10.57.02.00 Title 10 DEPARTMENT OF HEALTH AND MENTAL HYGIENE Subtitle 57 BOARD FOR CERTIFICATION OF RESIDENTIAL CHILD CARE PROGRAM PROFESSIONALS Chapter 02 Certification Residential Child Care Program
Company-wide Credit Card Policy
Company-wide Credit Card Policy Department: Corporate Finance Policy Number: CW-FIN-001-2008-11 Subject: Corporate Credit Cards Effective Date: 11/05/2008 Document Owner: Drew Hurt Title: Corporate Credit
Health Authority Abu Dhabi. HAAD Standard for the Allocation of Physicians in Residency Training Programs in the Emirate of Abu Dhabi (TANSEEQ)
Health Authority Abu Dhabi HAAD Standard for the Allocation of Physicians in Residency Training Programs in the Emirate of Abu Dhabi (TANSEEQ) 1. Purpose 2. Scope 1.1 The Health Authority - Abu Dhabi encourages
APPLICATION FORM THE CANADIAN PARKING ASSOCIATION SCHOLARSHIP PROGRAM 2016-2017
Administered by Universities Canada APPLICATION FORM 1. APPLICANT INFORMATION Name Mr. Ms. Last First Middle Permanent Address Street Apt. Telephone 2. GUIDELINES City Province Postal Code Email* * Mandatory:
FLORIDA REGISTERED PARALEGAL APPLICATION CHAPTER 20, RULES REGULATING THE FLORIDA BAR
FLORIDA REGISTERED PARALEGAL APPLICATION CHAPTER 20, RULES REGULATING THE FLORIDA BAR I. PERSONAL INFORMATION Please Type or Print 1. Name: Please complete the information in Item 1 as you wish it to appear
Scholarship Handbook
Scholarship Handbook Dear Rodeo Scholar, This handbook is designed to help you maintain your Houston Livestock Show and Rodeo Scholarship. It is imperative that you read and retain this handbook. Please
THE KENTUCKY PARALEGAL ASSOCIATION PROFESSIONAL STANDARDS AND CERTIFICATION PROGRAM
THE KENTUCKY PARALEGAL ASSOCIATION PROFESSIONAL STANDARDS AND CERTIFICATION PROGRAM Adopted by the KPA August 2010; Amended October 2014 PART ONE: INTRODUCTION.................................................
Certified Florida Community Service Provider (CFCSP)
Certified Florida Community Service Provider (CFCSP) APPLICANT INFORMATION Thank you for your interest in becoming a Certified Florida Community Service Provider (CFCSP) and member of Florida Community
BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:
BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:, City State Zip This Business Associate and Data Use Agreement ( Agreement ) is effective
Athletic Trainer License Application Methods
Athletic Trainer License Application Methods Please read carefully to determine the application method for which you are qualified Indicate the appropriate method on the application and submit the required
EXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor The objective of the Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses the needed expertise to audit a Quality
STATE OF MAINE BOARD OF SOCIAL WORKER LICENSURE APPLICATION FOR LICENSURE MASTER SOCIAL WORKER CONDITIONAL CLINICAL (MC)
STATE OF MAINE BOARD OF SOCIAL WORKER LICENSURE APPLICATION FOR LICENSURE MASTER SOCIAL WORKER CONDITIONAL CLINICAL (MC) Department of Professional and Financial Regulation Office of Licensing and Registration
IAC 8/11/10 Accountancy[193A] Ch 10, p.1. CHAPTER 10 CONTINUING EDUCATION [Prior to 7/13/88, see Accountancy, Board of[10]]
IAC 8/11/10 Accountancy[193A] Ch 10, p.1 CHAPTER 10 CONTINUING EDUCATION [Prior to 7/13/88, see Accountancy, Board of[10]] 193A 10.1(542) Scope. The right to use the title Certified Public Accountant and
CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES
(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES 2015 (ISC)² CPE Policies & Guidelines (Rev. 10, April 21, 2015) 2015 International Information Systems Security Certification Consortium,
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Guidelines for the Award of Degrees for Master s and PhD s Programs
Guidelines for the Award of Degrees for Master s and PhD s Programs Approved by the second session of the Academic Affairs Committee in the Academic Year 2008/2009 on January 8, 2009 Approved by the Ministry
How to Use the Continuing Certification Requirements (CCR) Handbook... 3 CCR Program Overview... 4 CCR Requirements... 4 CCR Process...
Table of Contents How to Use the Continuing Certification Requirements (CCR) Handbook... 3 CCR Program Overview... 4 CCR Requirements... 4 Education... 5 Giving Back to the Profession... 6 CCR Process...
CHAPTER II. To regulate the qualifications of:
CHAPTER II LICENSURE REQUIREMENTS FOR REGISTERED PROFESSIONAL NURSES and LICENSED PRACTICAL NURSES and CERTIFICATION REQUIREMENTS FOR NURSING ASSISTANTS/NURSE AIDES Section 1. Statement of Purpose. These
GOVERNMENT OF THE DISTRICT OF COLUMBIA Department of Health Health Professional Licensing Administration
GOVERNMENT OF THE DISTRICT OF COLUMBIA Department of Health Health Professional Licensing Administration APPLICATION INSTRUCTIONS AND FORMS FOR A LICENSE TO PRACTICE PSYCHOLOGY IN THE DISTRICT OF COLUMBIA
OHIO DEPARTMENT OF PUBLIC SAFETY DIVISION OF EMERGENCY MEDICAL SERVICES FIRE CHARTER APPLICATION
OHIO DEPARTMENT OF PUBLIC SAFETY DIVISION OF EMERGENCY MEDICAL SERVICES FIRE CHARTER APPLICATION RETURN COMPLETE APPLICATION TO: OHIO DEPARTMENT OF PUBLIC SAFETY DIVISION OF EMERGENCY MEDICAL SERVICES
SUPERVISORY AGREEMENT FORM INSTRUCTIONS (for the requirements towards LMFT licensure by an LMFT Associate) Instructions
FORM III Page 1 of 11 Instructions and Form III TEXAS STATE BOARD OF EXAMINERS OF MARRIAGE AND FAMILY THERAPISTS SUPERVISORY AGREEMENT FORM INSTRUCTIONS (for the requirements towards LMFT licensure by
Forward (300 Hour Graduate Neurology Programs) Commission for Graduate Education in Neurology (CAGEN) is a post- doctoral educational accreditation
Forward (300 Hour Graduate Neurology Programs) Commission for Graduate Education in Neurology (CAGEN) is a post- doctoral educational accreditation body autonomous from all education entities and affiliated
OKLAHOMA ACCOUNTANCY BOARD ( OAB ) QUALIFICATION APPLICATION AND INSTRUCTIONS
OKLAHOMA ACCOUNTANCY BOARD ( OAB ) QUALIFICATION APPLICATION AND INSTRUCTIONS Prior to completing and submitting the Qualification Application to the OAB, we suggest that you download the Eligibility Checklist
https://sjobs.brassring.com/tgwebhost/jobdetailpreview.aspx?partnerid=25082&siteid=5045&pid=^...
Page 1 of 5 Close Bulletin Number Type of Recruitment Position Title Rebulletin Exam Number Filing Type 19125BR Open Competitive Job Opportunity Human Resources Countywide Exams INFORMATION SYSTEMS ANALYST
AIT APPLICATION PACKAGE FOR REGISTRATION AS A PSYCHOLOGIST OR PSYCHOLOGICAL ASSOCIATE Version 2010-1
THE PSYCHOLOGICAL ASSOCIATION OF MANITOBA 162-2025 Corydon Ave., Box # 253, Winnipeg, Manitoba R3P 0N5 Phone: (204) 487-0784 Fax: (204) 489-8688 Email: [email protected] Website: www.cpmb.ca AIT APPLICATION
Policies and Guidelines for Obtaining and Maintaining CFP Certification and FPSC Level 1 Certification in Financial Planning
Policies and Guidelines for Obtaining and Maintaining CFP Certification and FPSC Level 1 Certification in Financial Planning Version 3.0 December 7 2015 Table of Contents A. Routes to CFP Certification
26-39-500. Definitions. Each of the following terms, as used in K.A.R. 26-39-500 through
26-39-500. Definitions. Each of the following terms, as used in K.A.R. 26-39-500 through 26-39-506, shall have the meaning specified in this regulation: (a) Accredited college or university means a college
DISTRICT OF COLUMBIA MUNICIPAL REGULATIONS for PSYCHOLOGY
DISTRICT OF COLUMBIA MUNICIPAL REGULATIONS for PSYCHOLOGY Updated May 16, 2014 1 CHAPTER 69 PSYCHOLOGY Secs. 6900 General Provisions 6901 Term of License 6902 Educational and Training Requirements 6903
EDUCATOR LICENSURE CHAPTER 0520-02-03 RULES OF THE STATE BOARD OF EDUCATION CHAPTER 0520-02-03 EDUCATOR LICENSURE TABLE OF CONTENTS
RULES OF THE STATE BOARD OF EDUCATION CHAPTER 0520-02-03 EDUCATOR LICENSURE TABLE OF CONTENTS 0520-02-03-.01 General Information and Regulations 0520-02-03-.07 Other Special Cases 0520-02-03-.02 Teacher
EXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate has the knowledge and the skills to
APPLICATION FOR ELECTRICIAN'S LICENSE IOWA ELECTRICAL EXAMINING BOARD
APPLICATION FOR ELECTRICIAN'S LICENSE IOWA ELECTRICAL EXAMINING BOARD SUBMIT TO: ELECTRICAL EXAMINING BOARD 215 EAST 7 TH STREET DES MOINES, IA 50319 APPLICABLE LICENSE FEE PAYABLE TO IOWA ELECTRICAL EXAMINING
CERTIFIED PUBLIC ACCOUNTANT LICENSING ACT
CERTIFIED PUBLIC ACCOUNTANT LICENSING ACT 58-26a-101. Short title. This chapter is known as the "Certified Public Accountant Licensing Act." 58-26a-102. Definitions. In addition to the definitions in Section
An Equal Opportunity Employer
An Equal Opportunity Employer Federal, State and Local Laws prohibit discrimination because of race, color, sex, age, national origin, ancestry, handicap or veteran status. APPLICATION FOR EMPLOYMENT (Please
How To Get A Mental Health License In Massachusetts
The Commonwealth of Massachusetts Division of Professional Licensure Board of Allied Mental Health and Human Services Professions 1000 Washington Street, Suite 710 Boston, MA 02118-6100 APPLICATION INFORMATION
PLEASE READ BEFORE COMPLETING APPLICATION
PLEASE READ BEFORE COMPLETING APPLICATION Information for Licensure: SOCIAL WORKER (LSW) Each item on the enclosed application must be completed. Allow 30 days for processing of the application. Failure
Certification. Septic Tank Contractors
Certification I. Certification Required Chapter 290-5-26-.17 provides for certification and de-certification of septic tank contractors, inspection personnel, pumpers, soil scientists and maintenance personnel.
Society of Cable Telecommunications Engineers (SCTE) Certification Program Rules
Society of Cable Telecommunications Engineers (SCTE) Certification Program Rules 1. Program Administration 1.1. The Certification Subcommittee of the Professional Development Committee administers the
Illinois Real Estate License Act - Administrative Rules
Illinois Real Estate License Act - Administrative Rules ILLINOIS REGISTER 5428 Effective March 21, 20 TITLE 68: PROFESSIONS AND OCCUPATIONS CHAPTER VIII: SUBCHAPTER b: PROFESSIONS AND OCCUPATIONS Section
DEPARTMENT OF ENVIRONMENTAL PROTECTION Bureau of Point and Non-Point Source Management
DEPARTMENT OF ENVIRONMENTAL PROTECTION Bureau of Point and Non-Point Source Management DOCUMENT NUMBER: 385-2314-002 TITLE: EFFECTIVE DATE: AUTHORITY: POLICY: PURPOSE: APPLICABILITY: DISCLAIMER: Sewage
Match Participation Agreement For Applicants and Programs For the 2015 Main Residency Match
Match Participation Agreement For Applicants and Programs For the 2015 Main Residency Match Terms and Conditions of the Match Participation Agreement Among Applicants, the NRMP, and Participating Programs
Admission to the College of Graduate Studies
30 Admission to the College of Graduate Studies Admission to the College of Graduate Studies The University welcomes applications from individuals qualified for graduate study. Admission to graduate studies
IMPORTANT NOTICE *** PLEASE READ CAREFULLY ***
EDUCATIONAL COMMISSION FOR FOREIGN MEDICAL GRADUATES 3624 Market Street Philadelphia PA 19104-2685 USA 215-386-5900 215-387-9963 Fax www.ecfmg.org IMPORTANT NOTICE *** PLEASE READ CAREFULLY *** World Directory
RULES GOVERNING THE CERTIFICATION OF Cross-Connection Control Program Specialists
RULES GOVERNING THE CERTIFICATION OF Cross-Connection Control Program Specialists Approved 2002 1 Definitions The terms defined hereby apply explicitly to the California-Nevada Section, American Water
CHAPTER 20. FLORIDA REGISTERED PARALEGAL PROGRAM 20-1. PREAMBLE RULE 20-1.1 PURPOSE
CHAPTER 20. FLORIDA REGISTERED PARALEGAL PROGRAM 20-1. PREAMBLE RULE 20-1.1 PURPOSE The purpose of this chapter is to set forth a definition that must be met in order to use the title paralegal, to establish
Certified Housekeeping Manager
CHM APPLICATION FORM Certified Housekeeping Manager Promo Code: SECTION 1 You may apply for certification under one of three different plans. Check the plan that applies to you and be sure to read each
Recertify your CMA (AAMA) credential
APPLY ONLINE! Eligibility rules apply Advance your professional knowledge Recertify your CMA (AAMA) credential CMA (AAMA) Recertification by Continuing Education Application Conducted by the Certifying
National Registry of Environmental Professionals Certification Application
National Registry of Environmental Professionals Certification Application This form may be used to apply for any NREP credential EXCEPT the Registered Environmental Manager (REM) For: (please check one)
