{"id":6257,"date":"2020-11-03T07:12:49","date_gmt":"2020-11-03T07:12:49","guid":{"rendered":"http:\/\/sigmify.com\/resources\/?p=6257"},"modified":"2023-05-19T06:00:27","modified_gmt":"2023-05-19T06:00:27","slug":"why-are-your-clients-interested-in-your-internal-control-processes","status":"publish","type":"post","link":"https:\/\/sigmify.com\/resources\/why-are-your-clients-interested-in-your-internal-control-processes\/","title":{"rendered":"Why are your clients interested in your Internal Control processes?"},"content":{"rendered":"<p>In the previous two blogs we saw how <a href=\"http:\/\/sigmify.com\/resources\/protection-of-rights-is-the-right-thing-to-do\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protection of Rights<\/a> and <a href=\"http:\/\/sigmify.com\/resources\/gaining-economic-efficiency-through-compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">Economic rationales<\/a>\u00a0 influence public policies and compliance regime.<\/p>\n<p>In addition to these two reasons, companies set certain internally designed business policies for the betterment of the business. An example to <strong>internal compliance<\/strong> is when the accounts department follows the company\u2019s policy and reconciles cash and bank accounts at the end of every month and reports to the internal auditor.<\/p>\n<p>In this write-up, I will touch upon this crucial piece of rationale which infuses the much needed strength in running a business in contemporary time with operational effectiveness and efficiency.<\/p>\n<p><u>Internal Control<\/u><\/p>\n<p><strong>Rationale 7: Safeguarding data and technology infrastructure through internal control<\/strong><\/p>\n<p>The proliferation of digital economy comes with security concerns with respect to valuable digital assets including data and technology infrastructure.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-6259 alignleft\" src=\"http:\/\/sigmify.com\/resources\/wp-content\/uploads\/2020\/11\/Control-300x184.png\" alt=\"\" width=\"300\" height=\"184\" srcset=\"https:\/\/sigmify.com\/resources\/wp-content\/uploads\/2020\/11\/Control-300x184.png 300w, https:\/\/sigmify.com\/resources\/wp-content\/uploads\/2020\/11\/Control.png 387w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Adherence to several security standards such as PCI-DSS, ISO 27001, <a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">MFA standards<\/a>, and internal controls such as <a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/soc-audit-reports\/\" target=\"_blank\" rel=\"noopener noreferrer\">SOC 1 &amp; SOC 2<\/a> have become norms to gain customer\u2019s confidence and trust.<\/p>\n<p>It\u2019s not surprising that companies give lot of weightage on these factors while choosing their partners, as breach of process and standards may bear wider repercussion and can even strain the relationship between partners.<\/p>\n<p>Can any company, in today\u2019s economy, think of expanding its global footprint without adhering to these standards?<\/p>\n<p>The fact remains, if you don\u2019t adhere to the standards driven by internal control, you may risk of losing potential business opportunities.<\/p>\n<p>Strong internal control and compliance would build the kernel, and enable companies to forge durable partnerships across boundaries.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Compliance is necessary for multiple reasons &#8211; Protection of Rights individuals and businesses, Economic reasons and Internal Control leading to best practices.<\/p>\n<p>You may be in any business, it may be manufacturing, healthcare, services, finance or other, you would be bounded by these rationales of compliance. And, some of the rationales cut across all industries. The best approach is to remain aware of the nuances of compliance requirements, and keep watch on their future developments which may have potential impact on your business.<\/p>\n<p><em>Research inputs by Manas Bairagi<\/em><\/p>\n<p><em>Following sources have been referred to write this blog series:<\/em><\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679<\/a><\/p>\n<p><a href=\"https:\/\/www.privacy-europe.com\/compliance.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.privacy-europe.com\/compliance.html<\/a><\/p>\n<p><a href=\"https:\/\/www.ericsson.com\/en\/future-technologies\/future-iot#:~:text=The%20future%20of%20IoT%20has,diverse%20use%20cases%20at%20hyperscale.\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ericsson.com\/en\/future-technologies\/future-iot#:~:text=The%20future%20of%20IoT%20has,diverse%20use%20cases%20at%20hyperscale.<\/a><\/p>\n<p><a href=\"https:\/\/get.fuelbymckinsey.com\/article\/sizing-up-the-subscription-e-commerce-market\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/get.fuelbymckinsey.com\/article\/sizing-up-the-subscription-e-commerce-market\/<\/a><\/p>\n<p><a href=\"https:\/\/undocs.org\/A\/RES\/68\/167\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/undocs.org\/A\/RES\/68\/167<\/a><\/p>\n<p><a href=\"https:\/\/saylordotorg.github.io\/text_microeconomics-theory-through-applications\/s21-11-efficiency-and-deadweight-loss.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/saylordotorg.github.io\/text_microeconomics-theory-through-applications\/s21-11-efficiency-and-deadweight-loss.html<\/a><\/p>\n<p><a href=\"https:\/\/scholar.harvard.edu\/files\/stantcheva\/files\/lecture8.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/scholar.harvard.edu\/files\/stantcheva\/files\/lecture8.pdf<\/a><\/p>\n<p><a href=\"https:\/\/www.parisschoolofeconomics.eu\/docs\/caillaud-bernard\/public-goods.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.parisschoolofeconomics.eu\/docs\/caillaud-bernard\/public-goods.pdf<\/a><\/p>\n<p>Chapter 14 of \u2018Managerial Economics and Busines Strategy\u2019 by Michael R. Baye<\/p>\n<p><a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf<\/a><\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/soc-audit-reports\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.infosecurity-magazine.com\/opinions\/soc-audit-reports\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the previous two blogs we saw how Protection of Rights and Economic rationales\u00a0 influence public policies and compliance regime. In addition to these two reasons, companies set certain internally designed business policies for the betterment of the business. An example to internal compliance is when the accounts department follows the company\u2019s policy and reconciles [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-6257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance-and-risk-management","category-governance","entry","has-media"],"_links":{"self":[{"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/posts\/6257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/comments?post=6257"}],"version-history":[{"count":5,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/posts\/6257\/revisions"}],"predecessor-version":[{"id":6402,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/posts\/6257\/revisions\/6402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/media\/6256"}],"wp:attachment":[{"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/media?parent=6257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/categories?post=6257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sigmify.com\/resources\/wp-json\/wp\/v2\/tags?post=6257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}