2013 Executive Council Nomination Form

May 7, 2013

in Election, News

Nominations are now open for our Executive Council. The ACCA is seeking nominations for the following positions:

President-Elect (3 year term):

Preferred Qualifications: Demonstrated leadership in ACCA including serving on the ACCA Executive Council, as an ACCA Committee Chair, or in significant and active state division leadership.

Secretary (2 year term):

Preferred Qualifications: Demonstrated leadership in ACCA including active involvement at the state or national levels.

Member-at-Large (3 year term): Graduate student and new professional focus.

Preferred Qualifications: Demonstrated leadership in ACCA including serving on the ACCA Executive Council, as an ACCA Committee Chair, or in significant and active leadership role.

Download the Nomination Form (Word DOCX format)

Please fill out your nominations and return the form no later than June 15th to:

ACCA Nominations & Elections Chair, Dr. MJ Raleigh, mj.raleigh@uncp.edu


ACCA OFFICER EXPECTATIONS IF ELECTED
: During and throughout the elected term, each elected member of the ACCA Executive Council (EC) is expected to attend the annual ACA Conference (spring), the ACCA Executive Council Leadership Retreat (summer), the ACCA Conference (fall), and participate on scheduled EC conference calls. President-level positions are expected to participate in ACA COPARC duties, as assigned. Travel to these meetings is required and air travel is the expected norm unless alternative travel is deemed feasible (consult with the ACCA President in advance). Registration, travel, and lodging expenses are generally** reimbursed for required EC meetings and conferences (**costs saving practices limit some expenses). In addition to volunteering for projects as discussed by the EC, each elected position has assigned duties and it is expected these duties are carried out. Duties can be found in the ACCA Policies and Procedure Manual.



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Previous post:

Next post: