Handouts

Stipulations for Use of Circle of Security Materials

Thank you for your interest in attachment theory, affective neuroscience, and this particular approach to both. We are pleased you have found your way to this introduction to our work. We want this material to be shared and utilized with parents and professionals around the globe. Much of what you find here is available for free downloading and immediate use. We only ask that you follow the parameters regarding the sharing of this material described below.

For specific requests related to publishing Circle of Security materials, approval is given only to non-profit organizations and academic/professional publications upon review by the Circle of Security. Requests take approximately 4 weeks to review. We ask that you provide us with your organization’s non-profit status, a copy of the article to be published and a description of the targeted audience.

The Circle of Security gives permission to use the downloadable handouts from our web site for teaching to parents and mental health professionals with the following stipulations:

  • The name Circle of Security is trademarked and cannot be used in any promotional material. This no use clause includes program announcements, grant applications, treatment descriptions, program descriptions, business cards, stationary, etc. without the written permission from the COS originators.
  • When using COS handouts no claim is made that the recipient of the handout is participating in a Circle of Security program or in Circle of Security treatment. COS programs and treatment require formal training and supervision.
  • No claim is made by the giver of the handout regarding qualification or certification to provide Circle of Security intervention.
  • COS materials cannot be amended or altered in any way without the express written permission by the originators of COS.
  • Programs that use COS handouts cannot use terms like “Circle of Security informed” or “Circle of Security influenced” to describe the program.
  • Programs or individuals who use COS handouts can not claim their work is evidence-based because COS handouts are being used.
  • Because use of COS material without appropriate training and supervision may adversely impact the outcome of research data, the name Circle of Security cannot be used in any form within research projects without written permission of the COS originators.

These forms are in .pdf format. You will need a pdf reader to access them. We recommend Adobe Acrobat.

Confidentiality Form for ATP Exam Download Now
COS 25 Word or less Download Now
COS Attachment for Baby Download Now
COS Attachment Theory Download Now
COS In a Chaotic World Download Now
COS Original Circle Download Now
COS Circle of Repair Download Now
COS In Relationship to Adults Download Now
Note to Parents Download Now
Traveling around COS Download Now
COS Time In Download Now
Circle of Security – with formula – Spanish Download Now
Circle of Security – with formula – French Download Now
Circle of Security – with formula – Dutch Download Now
Circle of Security – with formula – German Download Now
Circle of Security – with formula – Russian Download Now
Circle of Security – with formula – Hebrew Download Now
Circle of Security – with formula – Swedish Download Now
Circle of Security – Luganda Download Now
Circle of Security – Italian Download Now
Circle of Security – Japanese Download Now
Circle of Security – Chinese Download Now
Circle of Security – Arabic Download Now

 

To view the content on this page you must agree to the Stipulations for Use

The Circle of Security gives permission to use the downloadable handouts from our website for teaching to parents and mental health professionals with the following stipulations:

  • The name Circle of Security is trademarked and cannot be used in any promotional material. This no use clause includes program announcements, grant applications, treatment descriptions, program descriptions, business cards, stationary, etc. without the written permission from the COS originators.
  • When using COS handouts no claim is made that the recipient of the handout is participating in a Circle of Security program or in Circle of Security treatment. COS programs and treatment require formal training and supervision.
  • No claim is made by the giver of the handout regarding qualification or certification to provide Circle of Security intervention.
  • COS materials cannot be amended or altered in any way without the express written permission by the originators of COS.
  • Programs that use COS handouts cannot use terms like "Circle of Security informed" or "Circle of Security influenced" to describe the program.
  • Programs or individuals who use COS handouts cannot claim their work is evidence-based because COS handouts are being used.
  • Because use of COS material without appropriate training and supervision may adversely impact the outcome of research data, the name Circle of Security cannot be used in any form within research projects without written permission of the COS originators.

Please select the "I agree" button if you agree with the above policy. You will be taken to our download page. Thank you.