Lakhasly

Online English Summarizer tool, free and accurate!

Summarize result (50%)

We understood how Shell is complying with those frameworks by making enquiries of management, internal audit, and those responsible for legal and compliance procedures.Where instances of risk behaviour patterns were identified through our data analytics, we performed additional audit procedures to address each identified risk.Our procedures involved journal entry testing, with a focus on journals meeting our defined risk criteria based on our understanding of the business; enquiries of legal counsel, group management, internal audit and all full and specific scope management; review of the volume and nature of complaints received by the whistleblowing hotline during the year; review of internal audit reports issued during the year; review of news releases published by external parties; and
?If any instances of non-compliance with laws and regulations were identified, these were communicated to the relevant local EY teams who performed sufficient and appropriate audit procedures, supplemented by audit procedures performed at the group level.We assessed the susceptibility of Shell's Consolidated Financial Statements to material misstatement, including how fraud might occur, by embedding forensic specialists into our group engagement team.??


Original text

We understood how Shell is complying with those frameworks by making enquiries of management, internal audit, and those responsible for legal and compliance procedures. We corroborated our enquiries through our review of Board minutes, papers provided to the Audit Committee and correspondence received from regulatory bodies and noted that there was no contradictory evidence.
▪ We assessed the susceptibility of Shell’s Consolidated Financial Statements to material misstatement, including how fraud might occur, by embedding forensic specialists into our group engagement team. Our forensic specialists worked with the group engagement team to identify the fraud risks across various parts of the business. In addition, we utilised internal and external information to perform a fraud risk assessment for each of the countries of operation. We considered the risk of fraud through management override and, in response, we incorporated data analytics across manual journal entries into our audit approach. We also considered the possibility of fraudulent or corrupt payments made through third parties and conducted detailed analytical testing on third party vendors in high risk jurisdictions. Where instances of risk behaviour patterns were identified through our data analytics, we performed additional audit procedures to address each identified risk. These procedures included the testing of transactions back to source information and were designed to provide reasonable assurance that the financial statements were free from fraud or error. We also conducted specific audit procedures in relation to the risk of bribery and corruption across various countries of operation determined on a risk-based approach.
▪ Based on the results of our risk assessment we designed our audit procedures to identify non-compliance with such laws and regulations identified above. Our procedures involved journal entry testing, with a focus on journals meeting our defined risk criteria based on our understanding of the business; enquiries of legal counsel, group management, internal audit and all full and specific scope management; review of the volume and nature of complaints received by the whistleblowing hotline during the year; review of internal audit reports issued during the year; review of news releases published by external parties; and
▪ If any instances of non-compliance with laws and regulations were identified, these were communicated to the relevant local EY teams who performed sufficient and appropriate audit procedures, supplemented by audit procedures performed at the group level.


Summarize English and Arabic text online

Summarize text automatically

Summarize English and Arabic text using the statistical algorithm and sorting sentences based on its importance

Download Summary

You can download the summary result with one of any available formats such as PDF,DOCX and TXT

Permanent URL

ٌYou can share the summary link easily, we keep the summary on the website for future reference,except for private summaries.

Other Features

We are working on adding new features to make summarization more easy and accurate


Latest summaries

التي يتم تجمع ت...

التي يتم تجمع تتعدد الخطوات التي يجب إتباعها في البحث العلمي ومن أهمها التعرف على أدوات جمع البيانات...

the aim is comb...

the aim is combating COVID-19 by spreading awareness of the situation, disseminating procedures and ...

النكبة مصطلح فل...

النكبة مصطلح فلسطيني يعبر عن المأساة الإنسانية المتعلقة بتشريد عدد كبير من الشعب الفلسطيني خارج ديار...

بعد العصر الحدي...

بعد العصر الحديث، العصر الذي ازدهرت فيه الدراسات النقدية العربية، وذلك يعود إلى الأصول والمبادئ التي...

سبب غزوة أحد ال...

سبب غزوة أحد السبب الرئيسي للغزوة لقد كان لغزوة بدر التي سبقت غزوة أحد أثرٌ كبيرٌ في نفوسِ المشركين،...

The use of radi...

The use of radiation for an individual patient should be justified before the examination. Here, the...

Global warming ...

Global warming is one of the most important issues related to the environment , driven by human acti...

إن كلمة دراما م...

إن كلمة دراما مشتقة من الفعل اليوناني القديم ( دراؤ ) بمعنى أعمل ، فهي تعني إذن عمل أو حدث سواء في ا...

التعاون : هذه ا...

التعاون : هذه الخصيصة تعود بفوائد كبيرة لكل من المدرس ، والطالب وولى الامر والمهتمين بالعملية التعلي...

‎ مكونات القطاع...

‎ مكونات القطاع العام ‎كما أسلفنا سابقا فأن القطاع العام هو المجموعة من المؤسسات والهيئات التي تملكه...

ولد الإمام تركي...

ولد الإمام تركي بن سعيد في المملكة العربية السعودية، حيث نشأ وتلقى تعليمه الشرعي والثقافي. تأثر بالق...

وبذلك تطور تاري...

وبذلك تطور تاريخ علم النفس مع تطور العلوم المتعددة التي انفصلت عن الفلسفة في نهاية القرن التاسع عشر ...