Skip to main content

H-1B签证期限

H- 1B持证者每次可申请延期停留3年,在美最长停留为6年期限,期满后持证人必须回国一年,才能再次申请同类(H)签证来美。H-1B之延期应在美国停留期 限到期之前至少45天,由美国雇主为其填妥“非移民雇员申请表”(I-129)及H类补充表格,附上原签证移民局批准书(I-797表)、I-94入境卡 原件、说明延期理由的雇主信函和相关的辅助文件等,一起向就近的美国移民局提出申请。眷属H-4签证之停留延期应填写I-539延期申请表。如果I- 129或I-539延期批准后,其I-797表格和I-94卡上会有新签发的停留期限,申请人可持批准后的I-797表再向国务院签证办公室提出签证加签 的申请或向海外美国领事馆提出签证延期的申请。
H-1B身份入境后,不可以转换雇主,必须到为申请人担保的美国雇主公司工作。在美期间如申请人要转换新的工作,必须由新雇主为其向移民局提出新的申请,包括重新向劳工部申报“劳工情况申请表”,获得移民局批准才能保持申请人在美国的合法身份。
申请人以H-1B非移民身份在美国临时性,如要调整为职业移民身份,首先要由雇主向劳工部为其申请永久性劳工证“外 国人工作证明”(ETA-750 Alien Employment Certification)。在获得永久性劳工证后,雇主才能向移民局提出“职业移民”(I-140 Immigrant Petition for Alien Worker)申请。获准职业移民申请后,申请人即可申请调整身份(I485 Application to Register Permanent Residence or Adjust Status)。
持证人如以其他类非移民签证身份合法进入美国,需要转换成H-1B签证身份,申请人首要条件是在美国没有非法工作记录,在I-94出入境记录卡上没有失效前,被美国雇主所聘用。申请人转换身份的申请与非移民雇员的申请,应由美国雇主一并向移民局提出。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...