Certified Information Technology Professional
Home
About Us
Clients Online
Professional Clients
Business Clients
Litigation Support
Help For Families
Tax Information
Free Things
Certified IT Prof.
Clients Online
Home
Online Accounting
Software Links
Online Accounting
Software Links

AICPA Certified Information Technology Professional (CITP)

The CITP designation distinguishes CPAs who are involved in IT.  Jerry E. Bartram, CPA held this designation for a number of years.

Information Technology Strategic Planning

  • Determination of enterprise or business strategy
    • Answer the following questions about the business: what is the business' focus, what is the position of the business within its industry, what is the direction the business' strategy is taking, and what are the operational dynamics that influence the business
    • Develop questions about the company's business plan
    • Understand business processes as they relate to the strategic plan
    • Understand and apply this knowledge to the development of an IT strategic plan to support the business plan
  • Evaluation of IT environment
    • Determination of the current status of the following: hardware; software; standards; human resources, such as skill sets and staffing levels; infrastructure; service level out of IT shop; risk assessment with IT situation
    • Evaluation of quality of service including SWOT
  • Future IT
    • What are the business drivers that impact IT? e.g., scalability, right-sizing, flexibility of changes in technology or business, speed to market, cross-platform capability
    • Assessment of adaptability
  • Creation of a plan—how to get there and solution
    • Delineation of management's goals and objectives
    • Determination of overall feasibility and setting of scope
    • Identification of business constraints—quality, time, cost
    • Development of action plans and timelines
    • Identification of the elements of transition
    • Determination of the process for creating and executing a plan
  • Measurement
    • Enable implementation of strategy
    • Affordability; cost effectiveness
    • Critical success factors
    • Production per person
    • ROI
    • Determination of appropriate measurements for a given IT strategy 
    • Role of regulators
    • References
  • Partnering
    • Strategic alliance
    • Integration of joint efforts
    • Combination issues

Information Systems Management

  • Quality
  • Time
  • Cost
  • Legal
     
  •  Business Applications and E-business
  • Applications
    • Front office
    • Back office
    • Decision support systems
  • E-business vs. E-commerce
  • Legal issues
  • Servicing issues
  • Information collection
  • Business models
  • Revenue models
  • Web sites
  • Enabling technologies
  • Application integration
  • Impact of E-business
  • Trends in E-business
  • Security, Privacy, and Contingency Planning
  • Security
    • Threats
    • Security awareness/acceptable use policy
    • Risk analysis/vulnerability assessment
    • Assignment of liability (different security for different business delivery models, e.g., ASP vs. in-house)
    • Legal issues, e.g. when to report crime
    • Authentication/authorization concepts
    • Prevention strategies
    • Tools and techniques, e.g., sniffers, port scanners, probes, exploits
    • Third party services
    • Information Systems Security Standards
  • Privacy
    • Disclosure of policies on web site
    • Confidentiality/personal information protection
    • Intellectual property protection issues
    • Seal programs
      • BBB Online
      • TRUSTe
      • WebTrust
  • Contingency planning
    • Information resource classification
    • Risk analysis and vulnerability assessment
    • Establishing optimum mean time to recover
    • Backup/recovery policy
    • Disaster recovery vs. business continuity planning
    • Planning
    • Key and code escrow
    • Test plan

 System Development, Acquisition, and Project Management

  • Phases, steps, chronology of systems development process
  • Development tools and terminology
  • Documentation standards for IT
  • Simple vs. complex acquisition
  • Project management
     
  • Systems Auditing and Internal Control
  • Internal control
    • Objectives
    • Risk assessment
    • Internal control methods (preventive, corrective, detective)
    • Monitoring and feedback
  • Systems Audits
    • Risk assessment
    • Audit program development
    • Adequate resources, e.g., putting together the audit team
    • Evidence collection and evaluation methods, e.g., computer assisted audit techniques (CAATS)
    • Reporting to management (including regulatory requirements)
       
  • Databases and Data Base Management
  • Database definition
  • Database benefits
  • Database architecture
  • Database management systems (DBMS)
  • Database design

Yucaipa Office

35460 Beech Avenue

Yucaipa, CA  92399

Telephone  (909) 790-1583

Fax            (909) 790-3862

E-mail Please Call For Address

Want to Check on a Domain Name

Please contact our Web master with questions or comments.

Copyright 1999 Jerry E. Bartram, CPA  All rights reserved.

Web designed and authored by Jerry E. Bartram, CPA  Last Updated 08/20/12

"IRS Circular 230 disclosure: To ensure compliance with requirements imposed by the IRS, I inform you that any tax advice contained in this communication (including any attachments) was not intended or written to be used, and cannot be used, for the purpose of (i) avoiding tax-related penalties under the Internal Revenue Code or (ii) promoting, marketing or recommending to another party any matters addressed herein."