Trust In, and Value From, Information Systems
  • English
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Deutsch
  • Espanol
  • Francais
  • Hebrew
  • Italiano
  • Japanese
  • Korean
  • Nederlands
  • Polski
  • Portuguese
Go SearchAdvanced Search
  • ABOUT
  • Membership
  • CERTIFICATION
  • Education
  • COBIT
  • Knowledge & Insights
  • Journal
  • Bookstore
  Bylaws and
  Articles of
  Incorporation
  Annual Report
  History
  What We Offer &
  Whom We Serve
  @ISACA
  Newsletter
  Our Purpose
  and Promise
  Licensing and
  Promotion
  Press Room
  Volunteering
  Contact Us
  Advocacy
  Careers at ISACA
  ISACA TV
Professional Membership
Recent Graduate Membership
Student Membership
Member Benefits
NEW! Partner Content Featuring MIT’s Center for Information Systems Research
Local Chapter Information
  Join Today
Professional Growth
Global Community
Advance Your Career
What is CISA What is CISM What is CGEIT What is CRISC
Benefits of CISA Benefits of CISM Benefits of CGEIT Benefits of CRISC
How to Become
Certified
How to Become
Certified
How to Become
Certified
How to Become
Certified
February-May Exam Window Information February-May Exam Window Information February-May Exam Window Information February-May Exam Window Information
June-September Exam Window Information June-September Exam Window Information June-September Exam Window Information June-September Exam Window Information
Apply for Certification Apply for Certification Apply for Certification Apply for Certification
Maintain Your CISA Maintain Your CISM Maintain Your CGEIT Maintain Your CRISC


 
Why Certify
How to Earn CPE
Maintain Your Certification Write an Exam Question
 
US DoD Information
Exam Registration
CONFERENCES
TRAINING
ONLINE EVENTS
North America CACS Interactive Training Tool Webinars
CSX North America Training Week Virtual Conferences
CSX Europe Exam Review Courses Virtual Training
EuroCACS Enterprise Training (On-Site) Virtual Summit
Africa CACS   Virtual Event
Governance,
Risk and Control
CERTIFICATION TRAINING
& EDUCATION
ON-DEMAND LEARNING
Oceania CACS
Latin CACS
Capability Counts Conference  COBIT EDUCATION  
   

  

Call for Speakers
  

Browse All Events
  

Sponsorship Opportunities
 
   COBIT 5 Home
   Publications Directory
   COBIT Online
   COBIT Conference North America
   Training & Accreditation
   Licensing
   Join the Conversation
   News
   Recognition
   FAQs
   COBIT Focus
   COBIT 20th Anniversary
  
new research
Implementing the General Data Protection Regulation
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
COBIT 5
Cybersecurity Nexus (CSX)
GDPR
Privacy
White Papers
Research (projects/publications)
Communities
IS Audit & Assurance
Academia
NEW! Partner Content Featuring MIT’s Center for Information Systems Research
Career Centre
Glossary
ISACA TV
ISACA Podcast
The Nexus Articles
  
Current Issue
  
  
  
  
  
  
Archives
Journal Blog
CPE Quizzes
Submit an Article
Advertise
Editorial Calendar
Implementing the General Data Protection Regulation
Implementing the General Data Protection Regulation
Implementing the NIST Cybersecurity Framework
Advanced Persistent Threats: How to Manage the Risk to Your Business
Advanced Persistent Threats: How to Manage the Risk to Your Business
  
  
Search
Top Sellers
CISA Review Manual, 26th Edition
CISA Review Questions, Answers & Explanations Database - 12 Month Subscription
CSX Cybersecurity Fundamentals Study Guide, 2nd Edition
CISM Review Questions, Answers & Explanations Database – 12 Month Subscription
  • ISACA
  • My ISACA
  • Support
  • Shopping Cart
  • Join ISACA
  • Reinstate
Sign In
  • Email
    Stumbleupon Digg Reddit Delicious Tumblr
  • Bookmark
Skip Navigation LinksISACA > About ISACA > Bylaws and Articles of Incorporation

Bylaws and Articles of Incorporation 

 
  • About ISACA
    • ISACA Acquires CMMI Institute
    • Bylaws and Articles of Incorporation
    • Annual Report
    • Annual General Meeting
    • History
    • What We Offer & Whom We Serve
    • @ISACA Newsletter
    • Licensing and Promotion
    • Press Room
    • Volunteering
    • IT Governance Institute
    • Contact Us
    • Advocacy
    • Careers At ISACA
    • Our Purpose and Promise
Edit

Quick Links

  • I want to...
  • My Bookmarks
  • Saved Searches
Access press releases and fact sheets
Learn about ISACA
Learn about licensing and promotion
Subscribe to @ISACA
View ISACA boards and committees
Visit the IT Governance Institute
Please Login to View Your Quick Links.
Please Login to View Your Quick Links.

  ISACA Bylaws 
  ISACA Articles of Incorporation

THIS WEBSITE USES INFORMATION GATHERING TOOLS INCLUDING COOKIES, AND OTHER SIMILAR TECHNOLOGY.
BY USING THIS WEBSITE, YOU CONSENT TO USE OF THESE TOOLS. IF YOU DO NOT CONSENT, DO NOT USE THIS WEBSITE. USE OF THIS WEBSITE IS NOT REQUIRED BY ISACA. OUR AD AND COOKIE POLICY IS LOCATED HERE.
© 2018 ISACA. All Rights Reserved
  • Site Map
  • Contact Us
  • Press Room
  • Terms of Use
  • ISACA PRIVACY POLICY – YOUR PRIVACY RIGHTS
  • Ad and Cookie Policy
  • IP Guidelines