{"id":1244,"date":"2019-05-22T09:00:29","date_gmt":"2019-05-22T06:00:29","guid":{"rendered":"https:\/\/teolupus.com\/?p=1244"},"modified":"2023-10-25T17:55:55","modified_gmt":"2023-10-25T14:55:55","slug":"information-internal-control-2","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/information-internal-control-2\/","title":{"rendered":"Information-Communication : Principle 15 (External Communication) Focal Points"},"content":{"rendered":"\r\n<h2><b>Principle 15:\u00a0Communicates with External Parties<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The organization communicates with relevant external parties on matters affecting the functioning of internal control.<\/span><\/p>\r\n<h2><b>Focus Points:<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The following focal points highlight essential features of this principle.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Communicates to External Parties\u00a0\u2013\u00a0Processes are in place to communicate relevant information promptly to external parties, including shareholders, partners, business owners, regulatory authorities, customers, financial analysts, and other external parties.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Communication occurs not only with those within the organization but also with those outside the organization. With open external communication channels, meaningful information about the organization&#8217;s objectives can be made available to shareholders or other business owners, business partners, customers, regulatory authorities, financial analysts, government agencies, and other external parties.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">External communication is viewed as distinct from external reporting, as discussed in \u201cChapter 2: Objectives, Components, and Principles.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Technology and communication tools provide external parties access to public virtual forums to communicate and discuss an organization&#8217;s business, activities, and controls. In such cases, management develops and implements controls to guide expectations for the appropriate use of such forums not to compromise the organization&#8217;s objectives.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides Communication Within the Organization \u2013\u00a0Open communication channels; Allows input from customers, consumers, suppliers, external auditors, regulatory authorities, financial analysts, and others who provide relevant information to management and the board.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Messages from external parties also provide essential information about the functioning of the organization&#8217;s internal control system. For example, an independent auditor is a customer&#8217;s evaluation of the organization&#8217;s internal control over financial and non-financial reporting, such as feedback regarding product quality, improper charges, and missing or incorrectly issued receipts.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Communicates with the Board of Directors \u2013\u00a0Relevant information obtained from evaluations made by external parties is communicated to the Board of Directors.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Information obtained from evaluations made outside the organization about the organization&#8217;s internal control-related activities is evaluated by the management and, if relevant, forwarded to the board of directors.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">For example, The management has signed a contract allowing the organization to use technology services managed outside the organization instead of hiring new personnel to carry out the operations or purchasing and implementing additional hardware and software.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The organization uses sensitive customer data in some processes. To maintain compliance with the organization&#8217;s policies and external laws, regulations, and standards, the evaluation of internal control over the security and confidentiality of externally transmitted data (including data transmitted over the Internet) is performed by a third party\/entity.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Assessment results reveal internal control weaknesses that may affect the security and confidentiality of data. Management evaluates the materiality of vulnerabilities and reports the information necessary to enable the board of directors to fulfill its oversight responsibilities.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides Separate Communication Lines\u00a0\u2013\u00a0Separate communication channels, such as emergency\u00a0call lines, serve as fail-safe mechanisms that allow for non-ID or confidential communication when regular lines are down or ineffective.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Complexities and challenges in business relationships between the organization and external parties may arise from service providers and other outsourcing agreements, joint ventures and partnerships, and other transactions that create interdependence between parties. Such complexity may raise concerns about how the parties will carry out work.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">In this case, the organization allocates separate communication channels to customers, suppliers, and external service providers to enable customers, suppliers, and external service providers to communicate directly with management and personnel.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">For example, A customer of products developed through a joint venture may learn that one of the joint venture partners sells the products in a country outside the joint venture. Such a breach could impact the customer&#8217;s ability to use and resell the products in question, thereby affecting the customer&#8217;s business. The customer needs a communication channel to convey his concerns and problems to others in the organization without disrupting his ongoing activities.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Selects Appropriate Communication Method\u00a0\u2013\u00a0Communication method It considers the timing, target audience, type of communication, and the requirements and expectations arising from laws, regulations, and trust-based relationships.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">The method management uses to communicate with external parties ensures that key messages about the organization are received and understood and affects the ability to obtain needed information. Management considers a wide range of communication methods, considering the target audience, the type of communication, its timing, and the requirements of all laws and regulatory authorities.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">For example, customers who regularly access the organization&#8217;s information through a customer portal, through posts on the corporate website, and press and news releases published through investor or public relations channels are often effective in reaching a broad audience of external parties, ensuring the wide distribution of information and increasing the likelihood of its receipt.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Blogs, social media tools, electronic billboards (\u201cbillboards\u201d), and emails are also commonly used external communication tools because these tools can be tailored and explicitly directed to a particular group, can help control the information received by external parties, and can support expectations that information can be sent and received quickly with the increasing prevalence of mobile communication tools.<\/span><\/p>\r\n<h2><b>Resources of Internal Control Article\u00a0<\/b><\/h2>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, International Institute of Internal Auditors<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr. Davut Pehlivanl\u0131, Current Internal Audit Practices, Beta 2010<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof. Dr. Nejat Bozkurt, Accounting Audit, Alfa 1998<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof.Dr.Nejat Bozkurt, T\u00dcRMOB Independent Audit Training Lecture Notes, 2012<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr.\u00d6zg\u00fcr \u00c7at\u0131kka\u015f, KGK, Marmara University. Corporate Governance Lecture Notes, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u0130SMMMO-Practical Information for Internal Audit in SMEs, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Internal Audit Institute, www.tide.org.tr<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alp Buluch, Article, Internal Control, Hurses, 19 March 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Commercial Code No. 6102<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, www.theiia.org<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Treadway Commission Supporting Institutions Committee, Internal Control-Integrated Framework, 2013<\/span><\/li>\r\n<\/ul>\r\n","protected":false},"excerpt":{"rendered":"<p>Principle 15:\u00a0Communicates with External Parties The organization communicates with relevant external parties on matters affecting the functioning of internal control. Focus Points: The following focal points highlight essential features of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[845,842],"tags":[],"class_list":{"0":"post-1244","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-insights","8":"category-publications"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=1244"}],"version-history":[{"count":0,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/1444"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=1244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=1244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=1244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}