{"id":354,"date":"2020-11-17T11:12:18","date_gmt":"2020-11-17T11:12:18","guid":{"rendered":"http:\/\/www.rnm.in\/blog\/?p=354"},"modified":"2025-01-30T10:55:45","modified_gmt":"2025-01-30T10:55:45","slug":"internal-audit-beyond-the-data","status":"publish","type":"post","link":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/","title":{"rendered":"Internal Audit &#8211; Beyond The Data"},"content":{"rendered":"\n<figure class=\"wp-block-table\"><table><tbody><tr><td>While data analytics serves as a powerful tool used in organization to gain insight into operations, they may also be a source of risk.   <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Feasibility\nto reveal secrets hidden in voluminous data makes use of the data analytics\ndifficult to resist. There are tools enabling the organization to bring\nefficiencies in operations, improve decision, enhance agility, identify market potential\netc.<\/p>\n\n\n\n<p>Internal\naudit is regular user of data analytics during the ordinary course of\ndischarging its responsibilities to the organization. Internal audit uses data\nanalytics for its own use as well reviews the data analytics done by functional\nunits.<\/p>\n\n\n\n<p>With\never-increasing volumes of data on hand and entity\u2019s dependency on that data, certain\nrelevant questions need to be answered.<\/p>\n\n\n\n<p><strong>Assessing the Risks<\/strong><\/p>\n\n\n\n<p>Existence\nof possibility of things going wrong justifies usage by internal audit function\nof the data analytics in the organization. Majority of chief audit executives\n(CAEs) opines that their organization&#8217;s net residual data analytics risks are \u2018moderate\u2019\nto \u2018extensive\u2019.What are these risks?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If the data\nunder consideration is erroneous, incomplete, disorganized, old, or inconsistent,\nthe conclusions based on itwouldn\u2019t serve the desired purpose for the entity. As\nsuch most worrisome is the completeness and accuracy of the data which is\npresented to management based on which strategic decisions are taken. Management\ngenerally takes the information presented on face value and without doubting the\naccuracy and completeness of data.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Thereis\nconcern about data quality which is addressed through audit. The auditor evaluates\nthe risks around the completeness, accuracy, integrity, and security of data.\nFor instance, since data warehouse is part of the data analytics process, look\nat risks and controls are seen in entirety around the path the data takes viz.\nsources of raw data, the methods and technology used of transferring the data\nto the WH, the controls over the warehouse, and the transfer to the end user. If\nthere are inaccuracies or issues with the data at any point along this path,\nthen the end result may be misleading and any decisions \/ inferences based on\nthis data may also be flawed. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Further, the\ndata may be sound, but the algorithms used to summarize it may be faulty. They\nmay require some additional activities like edit check, doing something unwarranted,\nwithout the business unit being aware. Though this may not necessarily influence\nthe result; then again, it might. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Additionally,\nconcerns are raised about the integrity of data collection process itself &#8211;\nethical; used for the purpose for which it was collected; anddata collected in\na way to provide objective results or to prove a point.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auditor\nneeds to be careful ofbiasedhandling the data andshouldn\u2019t be carried away by\nthe initial impressions while performing subsequent analysis and actions. If done,\nauditor may go down wrong path, getting a result that appears accurate while\nnot realizing we are unintentionally overlooking other data.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Higher the\nvolume of data the organization has, the greater is enticement it providefor\nhacker to prey into it and eventually compromising security and privacy. <\/li>\n<\/ul>\n\n\n\n<p><strong>Methodologies to be Used<\/strong><\/p>\n\n\n\n<p>While\ndealing with a diverse range of complex risks, certain tried and tested audit\napproaches shall provide best results. <\/p>\n\n\n\n<p>Generally,\nthe timing of analytical reviews depends on the nature of the data.If the data pertains\nto operational, technical, or regulatory risks, the frequency of reviews is taken\ninto consideration during audit planning process.<\/p>\n\n\n\n<p>The\ntechniques used to conduct the audit can also be standardized. Based on the\nsource of the data and it\u2019s usage, the auditors need to look at it, since management\nmay be making critical decisions based on it. Auditors rely on a structured\napproach to audit the data analytics process and reuses approaches that have\nworked well in different departments.<\/p>\n\n\n\n<p>A\ntraditional approach applies to the controls recommended to address various\nfindings like: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Input controls &#8211; completeness, accuracy, and\nreliability of the data; <\/li>\n\n\n\n<li>Processing controls &#8211; reconciliation of changes made\nto normalize\/filter the data; and <\/li>\n\n\n\n<li>Output controls &#8211; accuracy, based on inputs and\nprocesses. <\/li>\n<\/ul>\n\n\n\n<p>For\ninstance, the Data Warehouse (DW) has teams of personnel dedicated to operating\nand maintaining data.DW is installed with defined routes from the sources of\ndata to the warehouse and from the warehouse to the end users. It is advised to\nverify:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Employees \/ users possess required expertise to ensure the completeness, accuracy, integrity, and security of the data.<\/li>\n\n\n\n<li>Evidence of documentation and communication of processes and controls pertaining to the use and security of data.<\/li>\n\n\n\n<li>Evidence of testing the operating and design effectiveness of controls pertaining to appropriate and relevant access and change management.<\/li>\n\n\n\n<li>Changes to the control environment and supporting databases are tracked and monitored.<\/li>\n\n\n\n<li>The analyses are supported by built-in quality and effectiveness checks to ensure they (and the data) mirror the changes and evolution of the business. <\/li>\n<\/ul>\n\n\n\n<p>In\nrelation to data analytics, certain personnel oriented controls are critical \u2013\nespecially management oversight and user education. If users are intended to be\ngiven flexibility for creating their own reports\/analysis, they must understand\nhow to use the tools correctly to evaluate the inputs and outputs. They must be\nable to validate the date to verify its completeness and accuracy using data\nand tools.<\/p>\n\n\n\n<p><strong>Certain Finer Points<\/strong><\/p>\n\n\n\n<p>It\nis appropriate to use proven methodologies during the process of auditing the\nbusiness units&#8217; data analytics use.However, as each auditdo present their own\nunique challenges \u2013 their subtleties must be recognized, understood, and\nresolved. <\/p>\n\n\n\n<p>Business\nunits perform data analyses in different shapes and forms, using different\nalgorithms and basing their analyses on different assumptions. Riskis there when\nthe internal auditor or the business unit itself incompletely or incorrectly\nunderstands or agrees on such foundational issues. Here certain concerns needs\nto be addressed: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validity of the assumptions<\/li>\n\n\n\n<li>Perform integrity checks<\/li>\n\n\n\n<li>Age of review of algorithm.<\/li>\n\n\n\n<li>Influence of one data event on subsequent activity.<\/li>\n<\/ul>\n\n\n\n<p>(a). Internal auditors may commit a mistake if they do not validate key assumptions with facts (i.e., confirmation of key data points and the underlying assumptions) before continuing with testing. The auditor shall reach completely inaccurate conclusions by taking the wrong path early in testing. The root cause for the error in reporting mostly is &#8211; not sufficiently validating assumptions and initial results. The issue is a huge hit to the integrity of the testing and audit process.<\/p>\n\n\n\n<p>(b). Another challenge is in knowing exactly what to audit. On a micro level, the auditor may look at a specific department to understand the objectives of the deliverables\/reports, the sources of the data, and the distribution of the data. It is important to review the process undertaken to produce reports: how the data changes through the cycle and how the changes are accounted for. <\/p>\n\n\n\n<p>(c). Prioritization is important on a macro level. Every department <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generate, use and analyze data to produce a result, <\/li>\n\n\n\n<li>Has goals and objectives;<\/li>\n\n\n\n<li>Report on how it performs against those goals.<\/li>\n<\/ul>\n\n\n\n<p>Auditors\nhave to work with the departments to identify reports used in management&#8217;s\ndecision-making process. That will help in understanding which activities to\nreview and why.<\/p>\n\n\n\n<p>(d). Internal audit is rendered ineffective, if its findings cannot be explained in a way that resonates with the business unit that has been audited. Internal auditors must consider the learning modalities of their audit clients when discussing the findings; people hear, see, and experience things differently. <\/p>\n\n\n\n<p>The auditor may find it convenient to submit a simple\nwritten, text-heavy report, it may be more effective to use visually appealing,\nconcise images in support of the text. A verbal presentation\u2009\u2014\u2009in support of\nthe written report\u2009\u2014\u2009that includes concrete examples of the findings or the\nrisks that may accompany the findings is also likely to make a more lasting\nimpression. This gives clients multiple ways to absorb and understand the\nrecommendations, based on the way they process information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While data analytics serves as a powerful tool used in organization to gain insight into operations, they may also be a source of risk. Feasibility to reveal secrets hidden in voluminous data makes use of the data analytics difficult to resist. There are tools enabling the organization to bring efficiencies in operations, improve decision, enhance agility, identify market potential etc. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[17,14],"tags":[19,18,92,85],"class_list":["post-354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-assurance","category-general","tag-audit","tag-internal-audit","tag-risk-assessment","tag-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internal Audit: Going Beyond the Data - Rnm India<\/title>\n<meta name=\"description\" content=\"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internal Audit: Going Beyond the Data - Rnm India\" \/>\n<meta property=\"og:description\" content=\"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\" \/>\n<meta property=\"og:site_name\" content=\"RNM India Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T11:12:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-30T10:55:45+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rnm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rnm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\"},\"author\":{\"name\":\"Rnm\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/c803658b38f2490f6a75863d05644438\"},\"headline\":\"Internal Audit &#8211; Beyond The Data\",\"datePublished\":\"2020-11-17T11:12:18+00:00\",\"dateModified\":\"2025-01-30T10:55:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\"},\"wordCount\":1302,\"publisher\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg\",\"keywords\":[\"Audit\",\"Internal Audit\",\"Risk Assessment\",\"Risk Management\"],\"articleSection\":[\"Assurance\",\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\",\"url\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\",\"name\":\"Internal Audit: Going Beyond the Data - Rnm India\",\"isPartOf\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg\",\"datePublished\":\"2020-11-17T11:12:18+00:00\",\"dateModified\":\"2025-01-30T10:55:45+00:00\",\"description\":\"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage\",\"url\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg\",\"contentUrl\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg\",\"width\":2240,\"height\":1260,\"caption\":\"Internal Audit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rnm.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internal Audit &#8211; Beyond The Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#website\",\"url\":\"https:\/\/www.rnm.in\/blog\/\",\"name\":\"RNM India Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rnm.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#organization\",\"name\":\"RNM India Blogs\",\"url\":\"https:\/\/www.rnm.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo.png\",\"contentUrl\":\"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo.png\",\"width\":137,\"height\":72,\"caption\":\"RNM India Blogs\"},\"image\":{\"@id\":\"https:\/\/www.rnm.in\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/c803658b38f2490f6a75863d05644438\",\"name\":\"Rnm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/719d6dbaa9fb6a42b8e1c14dec8f0172?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/719d6dbaa9fb6a42b8e1c14dec8f0172?s=96&d=mm&r=g\",\"caption\":\"Rnm\"},\"url\":\"https:\/\/www.rnm.in\/blog\/author\/rnm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internal Audit: Going Beyond the Data - Rnm India","description":"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/","og_locale":"en_US","og_type":"article","og_title":"Internal Audit: Going Beyond the Data - Rnm India","og_description":"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.","og_url":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/","og_site_name":"RNM India Blogs","article_published_time":"2020-11-17T11:12:18+00:00","article_modified_time":"2025-01-30T10:55:45+00:00","og_image":[{"width":2240,"height":1260,"url":"http:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg","type":"image\/jpeg"}],"author":"Rnm","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rnm","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#article","isPartOf":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/"},"author":{"name":"Rnm","@id":"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/c803658b38f2490f6a75863d05644438"},"headline":"Internal Audit &#8211; Beyond The Data","datePublished":"2020-11-17T11:12:18+00:00","dateModified":"2025-01-30T10:55:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/"},"wordCount":1302,"publisher":{"@id":"https:\/\/www.rnm.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg","keywords":["Audit","Internal Audit","Risk Assessment","Risk Management"],"articleSection":["Assurance","General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/","url":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/","name":"Internal Audit: Going Beyond the Data - Rnm India","isPartOf":{"@id":"https:\/\/www.rnm.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage"},"image":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg","datePublished":"2020-11-17T11:12:18+00:00","dateModified":"2025-01-30T10:55:45+00:00","description":"Internal audit is not just about looking at data. It is also about understanding the context of the data and the risks that the organization faces.","breadcrumb":{"@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#primaryimage","url":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg","contentUrl":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2020\/11\/Internal-Audit-beyond-the-data.jpg","width":2240,"height":1260,"caption":"Internal Audit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rnm.in\/blog\/internal-audit-beyond-the-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rnm.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Internal Audit &#8211; Beyond The Data"}]},{"@type":"WebSite","@id":"https:\/\/www.rnm.in\/blog\/#website","url":"https:\/\/www.rnm.in\/blog\/","name":"RNM India Blogs","description":"","publisher":{"@id":"https:\/\/www.rnm.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rnm.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rnm.in\/blog\/#organization","name":"RNM India Blogs","url":"https:\/\/www.rnm.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rnm.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo.png","contentUrl":"https:\/\/www.rnm.in\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo.png","width":137,"height":72,"caption":"RNM India Blogs"},"image":{"@id":"https:\/\/www.rnm.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/c803658b38f2490f6a75863d05644438","name":"Rnm","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rnm.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/719d6dbaa9fb6a42b8e1c14dec8f0172?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/719d6dbaa9fb6a42b8e1c14dec8f0172?s=96&d=mm&r=g","caption":"Rnm"},"url":"https:\/\/www.rnm.in\/blog\/author\/rnm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/posts\/354"}],"collection":[{"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":3,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"predecessor-version":[{"id":1403,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/posts\/354\/revisions\/1403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/media\/361"}],"wp:attachment":[{"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rnm.in\/blog\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}