Achieving IACET Requirements

What's involved in your initial consultation
ID verification and participation monitoring are critical controls for delivering more secure continuing education and training programs. They're also an IACET requirement.

IACET's recent letter to members has raised concerns as to whether accredited organizations are meeting the appropriate standards and maintaining the integrity of their CEUs.

Integrity Advocate has partnered with IACET to provide vulnerability checks for accredited organizations. The process takes less than an hour — get started by submitting the form on this page.

Integrity Advocate Logo
Question mark icon

How Does It Work?

Your initial consultation will last between 45-60 minutes. In this time, we will: 

  • Review your current CE/T programs, and your ID verification/participation monitoring tools
  • Understand your typical learner needs and learning environment
  • Assess which, if any, standards you should be concerned with
  • Recommend a system of controls to mitigate risk

Every accreditation provider is different — getting a basic understanding of where you stand relative to IACET's requirements for ID verification and participation monitoring is a first step towards more secure CEUs.

Question mark icon

Why Do I Need This?

You may not. But not knowing is just as risky as deliberately compromising your CE/T programs. Organizations have been found criminally negligent for accidents caused by fraudulent training they administered. Increasingly, regulators such as ANSI are requiring tighter controls to prevent liability issues.

New tech just complicates things further. In our blog, we’ve written about Phoebe, a pug that has obtained over 100 professional certifications using an AI plugin. What does it say about the integrity of those certifications that a dog can easily bypass conventional security measures?

Bringing your CE/T programs in line with IACET requirements will help you manage these risks and prevent liabilities.