ࡱ>  `bWXYZ[\]^_ bjbj$$ $F|F||v v v  8 D# '("(((*/*/*/TVVVVVV!$Vv */T.*/*/*/V((s666*/l(v (T6*/T66 J ,J (p<0*@0z w%3lw%LJ J Jw%v 6*/*/*/VVZ56*/*/*/*/*/*/*/w%*/*/*/*/*/*/*/*/*/ :  HEALTH CARE EMERGENCY CODES A GUIDE FOR CODE STANDARDIZATION       TABLE OF CONTENTS Page Acknowledgements 3 Introduction 5 Background 5 Code Blue: Medical Emergency (Adult) 6 Code Gray: Combative Person 9 Code Green: Patient Elopement 12 Code Orange: Hazardous Material Spill/Release 16 Code Pink: Infant Abduction 21 Code Purple: Child Abduction 29 Code Red: Fire 35 Code Silver: Person with a Weapon, Active Shooter, and/or Hostage Situation 39 Code Triage: Alert / Internal Emergency / External Emergency 45 Code White: Medical Emergency (Pediatric) 51 Code Yellow: Bomb Threat 54 ACKNOWLEDGEMENTS The following members, consultants and staff of the HASC Safety and Security Committee devoted considerable personal time and effort to this project. Without their knowledge, expertise, dedication and contributions, this publication would not have been possible. HASC SAFETY AND SECURITY COMMITTEE Darren Morgan, Chair Corporate Director of Security Citrus Valley Health Partners Covina, CA 91722Joseph Henry, Vice Chair Emergency Preparedness Planner Kaiser Permanente Orange County Anaheim, CA 92807Daniel J. Holden, MBA, CPP, CEM, Immediate Past Chair Director, Healthcare Services, Southwest Region AlliedBarton Orange, CA 90602Pat Wall, CAE Vice President, Membership & Education Services Hospital Association of Southern California Los Angeles, CA 90071 Ed Aguilar Manager, Security/Parking/Emergency Management Hoag Memorial Hospital Presbyterian Newport Beach, CA 92658Kirk Brantley Director, Plant Services St. Joseph Hospital Orange, CA 92868Roxanna Bryant Director, Corporate Facility Services Hoag Memorial Hospital Presbyterian Newport Beach, CA 92658Ryan Burgess Hospital Preparedness Coordinator California Hospital Association Sacramento, CA 95814Santiago Chambers Manager, Safety/Security Children's Hospital Los Angeles Los Angeles, CA 90027Cindy Conner Lieutenant LA County Sheriffs Department County Services Bureau Los Angeles, CA 90063 George Diaz Manager, Safety & Emergency Management Methodist Hospital of Southern California Arcadia, CA 91007 Randy Easterling Director, Security Services Kaiser Permanente Orange County Anaheim, CA 92806David 'Kawika' Feltman Disaster Coordinator/Manager, Safety/Security Antelope Valley Hospital Lancaster, CA 93534Luis Gonzales Security Manager for Cottage Health System Cottage Health System Santa Barbara, CA 93102Louie Hernandez Director, Security Pomona Valley Hospital Medical Center Pomona, CA 91767Rito Hernandez Manager of Security St. Vincent Medical Center Los Angeles, CA 90057 Chris Riccardi Coordinator, Emergency Preparedness/Supervisor, Security Providence Little Company of Mary Medical Center - San Pedro San Pedro, CA 90732Darryl Ruiz Security Manager San Antonio Community Hospital Upland, CA 91786Kurt Sawatzky Supervising Security Tech Arrowhead Regional Medical Center Colton, CA 92324Christopher Scott Assistant Director, Security Torrance Memorial Medical Center Torrance, CA 90505Susanna Shaw Director, Security/Environmental Safety Cottage Health System Santa Barbara, CA 93102Terry Stone Manager, Disaster Planning Henry Mayo Newhall Memorial Hospital Valencia, CA 91355Steven Storbakken Director, Environmental Safety/Emergency Preparedness Pomona Valley Hospital Medical Center Pomona, CA 91767Michael Tutko Kaiser Permanente Woodland Hills Director, Security Operations/Environmental Health/Safety/Communications/Parking Facilities Woodland Hills, CA 91367Shannon McDougall Director, Telecom/Disaster St. Jude Medical Center Fullerton, CA 92835 INTRODUCTION The HASC Security and Safety Committee completed a revision of the Health Care Emergency Codes in May 2014. We invite your updates and suggestions to this document at any time. These guidelines offer a flexible plan in responding to emergencies, allowing only those functions or positions that are needed to be put into action. Additional customization of these guidelines must be made to make them applicable to a specific facility. All information being provided to facilities is for their private use. These guidelines can be used in many ways to assist healthcare facilities in the development of their own specific policies and procedures. The information contained in this document is offered solely as general information, and is not intended as legal advice. BACKGROUND In December 1999, the Hospital Association of Southern California (HASC) established a Safety and Security Committee comprised of representatives from member hospitals with expertise in safety, security, licensing and accreditation. The committees mission is to address issues related to safety and security at healthcare facilities. One major issue the committee has tackled concerns the lack of uniformity among emergency code systems utilized at different healthcare facilities. Adopting code uniformity enables the numerous individuals who work across multiple facilities to respond appropriately to specific emergencies, enhancing their own safety, as well as the safety of patients and visitors. To facilitate code uniformity, the committee developed a standardized set of uniform codes and guidelines that can be adopted by all healthcare facilities. In July 2000, the committee adopted the following standardized code names: w BLUE for adult medical emergency w GRAY for a combative person w GREEN for patient elopement w ORANGE for a hazardous material spill/release w PINK for infant abduction w PURPLE for child abduction w RED for fire w SILVER for a person with a weapon and/or active shooter and/or hostage situation w TRIAGE INTERNAL for internal disaster w TRIAGE EXTERNAL for external disaster w WHITE for pediatric medical emergency w YELLOW for bomb threat The codes were previously reviewed in 2008, 2009, 2011 and 2014. Hospital Association of Southern California May 2014 Los Angeles, California For additional information regarding this publication, please contact: Pat Wall, (213) 538-0715,  HYPERLINK "mailto:pwall@hasc.org" pwall@hasc.org CODE BLUE: MEDICAL EMERGENCY (ADULT) Facilities should define the classification between adult (Code Blue) and pediatric (Code White) patients. Whatever definition is chosen should be clear to staff. PURPOSE To provide an appropriate response to a suspected or imminent cardiopulmonary arrest or a medical emergency for an adult or pediatric patient. POLICY Code Blue is called for patients who do not have an advance healthcare directive indicating otherwise. Code Blue is initiated immediately whenever an adult is found in cardiac or respiratory arrest (per facility protocol). In areas where adult patients are routinely admitted there should be an adult crash cart available. If a Code Blue is called in an area without a crash cart, the designated response team will bring a crash cart. If the patients weight does not meet the expected developmental growth, consider a response based on the appropriate protocol (e.g., ACLS/PALS). PROCEDURES Code Blue teams should not enter an area where a Code Silver was called until the area has been determined by law enforcement to be safe. Code Blue team members function within their respective scopes of practice and utilize guidelines set by the American Heart Association on Advanced Cardiac Life Support. The members perform functions that include, but are not limited to, the following: Response Person discovering an adult/child in cardiopulmonary arrest: Assesses patients airway, breathing and circulation; Calls for help. Initiates CPR and notes time. Does not leave the patient. First responding physician: Assume the role of Code Blue team leader. Initiate direct emergency orders, as appropriate. May transfer responsibility of team leader to attending physician or emergency department physician. Team leader signs the Code Blue record. Personnel from department calling the Code Blue/Code White: Initiate Code Blue per facility protocol. Assess patient and begin procedures to open airway, begin rescue breathing and/or initiate CPR, as indicated. Obtain crash cart. Attach monitor leads. Assume compressions and/or ventilation until the Code Blue response team arrives. Nurse assigned to patient: Provide most recent data on the patient, including the pertinent history and vital signs. Bring chart and Kardex to room and act as information source. Take responsibility for completion of the Code Blue record, other facility designated forms, and distribution of forms to appropriate departments. Mark and maintain monitor strips. Sign Code Blue record. Designated nurse with appropriate training (e.g., ACLS/PALS), two (2) every shift, to be determined by policy: Respond to area/department where Code Blue is called. Ensure placement of cardiac monitor and assesses initial rhythm. Direct and delegates code responsibilities to nursing and other personnel. Direct Code Blue until physician arrives. Perform ongoing evaluation of patient status. Monitor and evaluate CPR procedures. Establish IV line and administer medications according to appropriate guidelines (e.g., ACLS/PALS or other approved protocol) or as ordered. Interpret EKG rhythm and defibrillate according to appropriate guidelines (e.g., ACLS). Sign Code Blue record. Respiratory Therapy personnel: Assume ventilation responsibilities upon arrival. Assist with intubation and obtaining blood gases when needed. Stay with patient through transport. Sign Code Blue record. Department clinical coordinator or charge nurse/ACLS (administrative supervisor, after hours): Record pertinent data on Code Blue record. Act as communication liaison to attending physician, family and pastoral care. Support family members present during event. Act as a resource and help coordinate Code Blue/Code White. Coordinate and review interdisciplinary Code Blue team. Assist staff in evaluation of performance during code event. Pharmacist: Exchange the used medication tray immediately after Code Blue to ensure readiness of the cart. After hours, administrative supervisor is responsible for replacing the medication tray. Mix medication, solutions and label medication during code. Calculate drip rates and dosages. Act as a resource. Sign the Code Blue record. Central Service or other responsible department staff member: Respond to each Code Blue with replacement cart. After hours, the administrative supervisor will replace cart. Operator: Voice page Code Blue and location three (3) times when notified. Use pager system to notify appropriate interdisciplinary Code Blue team. Chaplain/Social Worker (if requested): Support the family. Support the staff as needed. Security: Coordinate necessary movement of other patients and visitors. Manage crowd control. Training and Education All direct patient care personnel will re-certify in BCLS annually. Specialized cardiac life support training (e.g., ACLS) is provided for physicians and nurses as required. A program offering an interdisciplinary approach to managing Code Blue events provides opportunities for the purpose of enhancing clinical skills, including team training. Training of personnel follows the guidelines of the American Heart Association on Advanced Cardiac Life Support. Education includes review of all policies, procedures, and regulatory standards. Verbal or written test. REFERENCES Advanced Cardiac Life Support (ACLS) and Pediatric Advance Life Support (PALS) certification courses, American Heart Association. California Code of Regulations, Title 22, 70405(g), 70743. Consent Manual 2007, 27th Edition, Sacramento, CA, CH 3; The California Healthcare Association. Guidelines for Cardiopulmonary Resuscitation and Emergency Cardiac Care, Emergency Cardiac Care Committee and Subcommittees, American Heart Association, Part IX; Ensuring Effectiveness of Community-Wide Emergency Cardiac Care, 1992; JAMA, 28;268 (16), pp. 2289-95. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, ; HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\JointCommission-Requirements"www.jcrinc.com/JointCommission-Requirements. CODE GRAY: COMBATIVE PERSON PURPOSE To provide an appropriate response to situations involving an aggressive, hostile, combative or potentially combative persons. POLICY Aggressive, combative or abusive behavior can be displayed by anyone: a patient or a patients family member; staff or a member of the staffs family: acquaintances of patients and staff; vendors and contractors; or the general public. Aggressive, combative or abusive behavior may quickly escalate into a more violent episode. Staff will take responsible and proactive measures to ensure the safety and security of all persons on hospital property by effectively responding to an event and minimizing the number of assault victims and their potential injuries. When staff is concerned about their own safety and the safety of others due to abusive or assaultive behavior, they should initiate a Code Gray. Any assault or battery that results in an injury to a staff member or patient must be reported to law enforcement within 72 hours. Each department with a specific role in a Code Gray is to develop an emergency-specific plan. Any Code Gray response should be in accordance with this procedure and those developed by each department. PROCEDURES Prevention & Education A written policy makes clear the facilitys commitment to promote workplace safety, prohibit threats and violence of any kind, require immediate reporting of any incident that causes a concern for safety, and require discipline of offenders. Recognizing early warning signs: No single sign alone should cause concern, but a combination of any of the following signs should be cause for concern and action. Direct or verbal threats of harm. Intimidation of others by words and or actions. Refusal to follow policies. Carrying a concealed weapon or flashing a weapon to test reactions. Hypersensitivity or extreme suspiciousness. Extreme moral righteousness. Inability to take criticism regarding job performance. Holding a grudge, especially against a supervisor. Often verbalizing hopes that something will happen to the other person against whom the individual has the grudge. Expression of extreme desperation over recent problems. Intentional disregard for the safety of others. Destruction of property. Management of aggressive behavior training (MOAB). Only trained and certified personnel should be assigned to respond to minimize potential acts of aggressive behavior or violence. Response (Code Gray) Any staff member confronted with or witnessing a combative situation should initiate a Code Gray. Verbal Abuse Personnel should provide assistance to the victim(s). Assist in attempts to verbally de-escalate the assailant. Call in a second person to take over. Add distance/barriers between victim and assailant. Physical Battery Prepare to provide assistance to the victim(s) by: Protecting self and others by assisting victim to stop/deflect blows by the assailant. Creating a diversion by putting distance/barrier between victim and assailant. Getting medical assistance if needed. Assault with a weapon Refer to Code Silver: Person with a weapon /hostage situation policy. Any employee who hears the request to initiate a Code Gray should contact the operator and state that a Code Gray is in progress by giving the location and nature of the incident. The operator will contact the Code Gray Strike Team. The Code Gray Strike Team is a pre-designated, security response team consisting of staff trained in the management of aggressive behavior. The Hospital Incident Command System (HICS) will be used as the incidents management structure. Strike Team members may include representatives from nursing, security, and other departments. The Strike Team leader shall be the assigned patient care nurse or designated charge nurse if patients are involved. If no patients are involved, the team leader may be the ranking security representative. The Strike Team shall perform as instructed by the Strike Team leader in support of the incident objectives. The incident action plan (IAP) objectives may include: Initial Incident Objectives%Identify potentially violent persons.%Separate potentially violent persons to protect visitors, staff, and patients.%De-escalate potentially violent behavior.%Coordinate response with law enforcement, if appropriate. The Code Gray Strike Team responds to the incident location. The Strike Team leader briefs the strike team members and coordinates the response. If the situation cannot be resolved using the Code Gray Strike Team, law enforcement is contacted for assistance. When the Code Gray has been resolved, the Strike Team leader will call the operator to request an all clear message be broadcast All personnel resume their normal duties. Documentation of the incident should follow the facilitys policy and procedure for documentation of such an event. Any assault or battery that results in an injury to a staff member or patient must be reported to law enforcement within 72 hours. Management conducts a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements. Training and Education Staff members and other personnel regularly assigned to departments with a known risk for violent behaviors from patients or others should, as appropriate to their job responsibilities and relative risk of violence, receive education and training on a continuing basis relating to at least the following: General safety measures. Personal safety measures. The assault cycle. Aggression and violence predicting factors. Obtaining patient history from a patient with violent behavior. Characteristics of aggressive and violent patients and victims. Verbal and physical maneuvers to diffuse and avoid violent behavior. Strategies to avoid physical harm. Restraining techniques. Appropriate use of medications as chemical restraints. Any resources available to employees for coping with incidents of violence, including, but not limited to, critical stress debriefing and/or employee assistance programs. REFERENCES California Code of Regulations, Title 22, 70743, 70746. California Health and Safety Code, Chapter 2, Article 1, 1257.7, 1257.8, http://leginfo.ca.gov. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission,  HYPERLINK "file:///C:\\Users\\Hollywood\\Documents\\-%20Security%20and%20Emergency%20Management\\HASC\\-%20Standardize%20Emergency%20Codes\\2014%20Codes\\standardized%20codes\\Code%20Revisions\\www.jcrinc.com\\Joint-Commission-Requirements" www.jcrinc.com/Joint-Commission-Requirements. CODE GREEN: PATIENT ELOPEMENT PURPOSE To provide an appropriate response in the event of a missing or eloping patient who is determined to be a danger to himself, herself others or who is identified a safety risk. DEFINITIONS High-Risk Patient for Elopement / Patient Elopement: A patient who fits the following criteria or who leaves the patient care unit without permission who is: On a legal hold (danger to themselves or others). Having active suicidal/homicidal ideation and may be on a voluntary status. Gravely disabled unable to provide food, shelter or clothing. On a patient watch or has a safety attendant/sitter. Confused, disoriented or otherwise appearing to lack mental capacity. On Lanterman Petris-Short (LPS) conservatorship. POLICY All reasonable measures are taken to prevent the elopement of high-risk patients from the hospital. The hospital take all reasonable steps necessary to safely retrieve or locate an eloped patient as quickly as possible. At no time during an elopement anyone without a valid need to know is informed of the incident. No hospital employee or volunteer is authorized to make a public statement concerning this incident or communicate with the news media or any other public agency. The hospitals response is limited to the hospital campus as defined by policy. Law enforcement is notified for assistance beyond the hospital campus. Patients, other than those that are involuntary patients, have the right to leave the hospital against medical advice. Theorganization ensure the patient is safely discharged. PROCEDURES Upon discovery of a patient who is missing or suspected of elopement: Staff notify the operator immediately and provide the following information: Patient care unit where the patient was assigned. Description of the eloped patient. Time and location the patient was last seen. The operator will announce a Code Green via the overhead paging system and ensure notifications are made to the administrator-in-charge, security and risk management. If a patient is missing from the patient care area and does not meet the criteria of a missing or eloping patient, the charge nurse and security services are notified to assist with locating the patient. Code Green Response Code Green Task Force The Hospital Incident Command System (HICS) is used as the incidents management team structure. By policy the administrator-in-charge assumes the role of the incident commander or delegates the responsibility to the most qualified individual. A pre-designated, multi-disciplinary patient elopement response team (Code Green Task Force) receives a patient elopement notification via overhead page. Task Force members may include security, risk management and nursing. The most qualified member of the Task Force will assume the role of the team leader and will coordinate with the senior member of the patient care unit from which the patient eloped and the incident commander. Each Task Force member performs specific functions assigned by the team leader in support the incident objectives. The incident action plan objectives may include: Initial Incident Objectives%Conduct a facility-wide search.%Make appropriate notifications.%Locate the eloped patient. The Code Green Task Force conducts a campus-wide search for the missing patient. Law enforcement is notified for assistance beyond the hospital campus. Security Secure hospital perimeter utilizing access control system, if applicable. Secure video, if applicable. Initiate continuous searches of campus [name all locations/adjoining buildings or facilities within campus jurisdiction] until missing/eloping patient is located. Officers may be required to leave property in order to facilitate patient retrieval. Provide further information regarding the incident including detailed description of patient clothing, medical conditions relevant to their safety or safety of others, other parties involved, and any other pertinent information. Announce the missing/eloping patient description to the checkpoint screeners and hospital staff. All surrounding entrances and exits to the hospital are monitored until the situation has been resolved or unless otherwise directed by incident commander and/or law enforcement. Notify law enforcement, if applicable. Risk Management Risk Manager serves to advise, coordinate, and act as a liaison with administration as well as regulatory agencies. Notify family in collaboration with incident commander and patient care staff. Patient Care Staff All relevant medical information pertaining to the subject(s) is made available to appropriate persons at the command post or as authorization allows. The patient care staff notifies the attending physician of the incident. Public Information Officer Draft a press release for approval by the incident commander and chief operating officer. Establish a media briefing area and briefing time, if appropriate. Coordinate with law enforcement regarding the type of information that can be released to the news media, and when it is appropriate to do so. All Personnel Upon hearing Code Green, monitor all points of exit and surrounding area in their vicinity for persons appearing to be a patient from another unit leaving the facility. Communicate any suspicious activity to security immediately. Recovery The Risk Manager/security and law enforcement (if applicable) determine when the Code Green event is concluded and then release the site to resume normal operations. The Incident Command Center will notify the operator to page, Code Green, all clear three (3) times. Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Training and Education Patient care staff receive appropriate orientation and training relative to working with high-risk elopement patients. The Code Green Task Force members also receive training specific to their respective roles in a Code Green response. REFERENCES The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. CODE ORANGE: HAZARDOUS MATERIAL SPILL/RELEASE PURPOSE To provide an appropriate response to an actual or suspected hazardous material spill or release in a manner that is safe for staff, patients and visitors. DEFINITION OF TERMS: Hazardous Material Spill or Release: A spill or release of a substance that is likely to cause injury or illness, may result in exposure that exceeds federal or state limits, or may harm the environment. POLICY Employees are familiar with the products they are using, know how to use the product and know the spill precautions taken. Each department will maintain appropriate Material Safety Data Sheets (MSDS) in an easily accessible location for all products used within the department. This may include access by computer. The clean-up of a hazardous material spill is only conducted by knowledgeable and experienced personnel who have received proper training (e.g., spill response team, fire department HAZMAT team). Each department develops individual protocols that support the organizations overall Code Orange response. In coordination with the hospital safety officer, the department management assures the department has the proper clean-up and personal protective equipment available for use in a response to a hazardous spill/release, including spill kits with instructions, absorbents, reactants and protective equipment. In coordination with the hospital safety officer, the department managers determine the appropriate level of response to decontaminate the spill/release. Level I The department is capable of decontaminating the spill/release themselves. Level II The department requires assistance from the Code Orange Task Force to adequately respond. Level III The Code Orange Task Force requires assistance from outside resources to adequately respond. PROCEDURES Discovery of a Hazardous Material Spill/Release If an employee spills, releases or discovers the spill or release of a potentially hazardous substance, he/she notifies their supervisor immediately. In coordination with the hospital safety officer, the department manager will determine the appropriate level of response based on the identification of the substance and information available in the MSDS. Level I: In coordination with the hospital safety officer, the department controls and removes the product using existing spill containment supplies. This response includes contacting environmental services to remove the product using a mop and rinse water as long as the product is legally permissible to be discarded through the sewer system. Follow departmental procedures. Notify the department manager, designee, or supervisor. Alert people in the immediate area of the spill and advise them to keep away. Do not touch the material nor walk into it. Isolate the area or make the area inaccessible. Confine the spill in a safe manner to minimize its spread. Determine if available staff can safely clean up the spill or if emergency personnel should be notified. Engineering controls are implemented as appropriate (e.g., increase ventilation). Read the Material Safety Data Sheet (MSDS) for precautions. Work with a partner, and use spill kit to clean up. As appropriate, exposed staff will utilize eye wash stations, showers, etc., to clean the chemical from eyes, skin and clothing Call engineering or environmental services for disposal of chemical and all contaminated material Document all actions. Level II: In coordination with the hospital safety officer, the department needs assistance from the Code Orange Task Force for spill control due to the volume of the product spilled, the need for a large spill kit, or because the product requires special attention due to its hazards. Activate a Code Orange and notify the administrator-in-charge and the safety officer. Code Orange Task Force or qualified individual conducts an internal assessment of the type and scope of the spill. Follow departmental procedures. Alert people to evacuate the area if necessary and secure the area. If the person is contaminated with toxic materials, they should stay in place to be assessed by a HAZMAT Response Team. Follow Decontamination Policy & Procedure. ONLY if personal exposure is unlikely, attend to injured or contaminated victims and remove them from exposure, Engineering controls are implemented as appropriate (e.g., increase ventilation). Use the MSDS to assist with remedial actions. Assist the HAZMAT Response Team as directed. Complete an incident report and document all actions. Level III: The Code Orange Task Force needs assistance from an outside agency or company to assist with the hazardous spill. Notify the administrator-on-call/Safety Officer and activate a Code Orange, if not already completed. Conduct internal assessment by HAZMAT team or qualified individual. Call the fire department or contracted HAZMAT company. Coordinate spill clean-up with appropriately licensed and trained third party agency. (It is recommended that this arrangement be coordinated in advance.) Follow departmental procedures. Alert people to evacuate the area if necessary and secure the area. If a person is contaminated with toxic materials, they should stay in place to be assessed by a HAZMAT Response Team. Follow Decontamination Policy & Procedure. ONLY if personal exposure is unlikely, attend to the injured or contaminated persons and remove them from exposure, Engineering controls will be implemented as appropriate (e.g., increase ventilation). Use the MSDS to assist with remedial actions. Assist the HAZMAT team as directed. Complete an incident report and document all actions. Code Orange Task Force The pre-designated, multi-disciplinary hazard materials response team (Code Orange Task Force) receives a hazardous spill notification via the overhead page. The Hospital Incident Command System (HICS) is used as the incidents management team structure. Task Force members may include security, engineering, environmental services, respiratory and nursing. The most qualified member of the Task Force will assume the role of the team leader and will coordinate with a senior member of the department where the response is occurring, if applicable. Each Task Force member shall perform specific functions assigned by the team leader and in support the incident objectives. The Task Force Leader will report to the administrator-in-charge (incident commander) until directed otherwise. The incident action plan objectives may include: Initial Incident Objectives%Isolate the contaminated area(s).%Identify the hazardous material(s).%Provide patient triage and medical management, if needed.%Protect patients, staff and visitors. The Code Orange Task Force responds to the hazardous material location. The Task Force will conduct an assessment of the spill to determine whether an actual hazardous material spill has occurred or is occurring. If no spill of hazardous material has occurred and it is deemed a false alarm, or if a hazardous material spill has occurred, but has been appropriately cleaned up, the team leader will declare an all clear and will document as appropriate. If an active hazardous material spill is occurring, the team leader initiates an appropriate response, such as notifying the administrator-in-charge or house supervisor. Code Triage: Internal Hazard Spill/Release Incident Response By policy the administrator-in-charge initiates a Code Triage: Internal and assumes the role of the incident commander or delegates the responsibility to the most qualified individual. The incident commander appoints the appropriate command and general staff positions. The incident commander activates the Hospital Command Center (HCC), as appropriate. If the incident commander works outside of the Incident Command Post (ICP), a deputy incident commander is appointed within the Hospital Command Center (HCC). If the incident commander works inside the Hospital Command Center (HCC), a liaison officer is posted at the fire departments Incident Command Post (ICP). A unified command with the responding agencies is established. The need for additional evacuation is considered. Evacuation and relocation of staff, patients, and/or visitors is undertaken only at the direction of the incident commander. Patient records and medications are transferred with the patient upon evacuation or transfer. Account for all on-duty staff and recall additional staff as necessary. Ensure the accurate tracking of patients and the appropriate notifications. Consider establishing a media staging area. All Clear The incident commander issues an all clear notification to the operator to initiate the termination of response operations when appropriate. The operator shall announce, Code Orange, all clear three (3) times via overhead page system. All employees are to return to normal work duties. Recovery Notify all responding agencies and personnel of the termination of the response and demobilize as appropriate. Any recovery activities should be coordinated through engineering/facilities and the department(s) affected. Track all related incident costs and claims Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Refer to the Hospital Incident Command System (HICS) planning and response guides for additional guidance. Documentation and Reporting Documentation should be reviewed and retained indicating information about the activation. This may be completed through an event or incident report, security report, or other reporting method. Training and Education All staff that may use or otherwise come into contact with hazardous materials should be trained annually. Training should include the following safe handling procedures for hazardous materials: Personal protective equipment training. Hazardous communication procedures. Material Safety Data Sheets (MSDS). Spill clean-up procedures. Review of all policies, procedures, and regulatory standards. Verbal or written test. The Code Orange Task Force receives annual training specific to their response procedures, including additional training for the potential team leaders. REFERENCES California Code of Regulations, Title 22, 70743, 70746. California Code of Regulations, Title 19, 4. California Code of Regulations, Title 26, 19.1. California Code of Regulations, Title 27, 27.1-4. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission,  HYPERLINK "file:///C:\\Users\\Hollywood\\Documents\\-%20Security%20and%20Emergency%20Management\\HASC\\-%20Standardize%20Emergency%20Codes\\2014%20Codes\\standardized%20codes\\Code%20Revisions\\www.jcrinc.com\\Joint-Commission-Requirements" www.jcrinc.com/Joint-Commission-Requirements. CODE PINK: INFANT ABDUCTION Facilities should define the classification between Code Pink and Code Purple. Some facilities choose to define by age (e.g. Code Pink for infants up to six months of age, and Code Purple for infants/children from six months to 13 years of age), by location of abduction (e.g., newborn nursery versus pediatrics unit), or by some other characteristic (e.g., Code Pink for babies that cannot walk and Code Purple for any child that is able to walk). Whatever definition is chosen should be clear to staff. PURPOSE To provide an appropriate response in the event an infant is abducted from the facility. DEFINITIONS Typical Abductor: The following are characteristics of a typical abductor as identified by the National Center for Missing and Exploited Children (NCMEC). However, there is no guarantee an infant abductor will fit this description and anyone acting suspiciously in areas of risk for abductions should be reported immediately. Female of childbearing age (range from 12-50), often overweight. Most likely compulsive; most often relies on manipulation, lying, and deception. Frequently indicates that she has lost a baby or is not capable of having one. Often married or cohabitating; companions desire for a child or the abductors desire to provide her companion with his child may be the motivation for the abduction. Usually lives in the community where the abduction takes place. Frequently initially visits the nursery and maternity units at more than one healthcare facility prior to the abduction; asks detailed questions about procedures and the maternity floor layout; frequently uses a fire exit stairwell for escape. May also try to abduct from the home setting. Usually plans the abduction, but does not necessarily target a specific infant; frequently seizes on a target of opportunity present. Frequently impersonates a nurse or other allied healthcare personnel. Often becomes familiar with healthcare staff, staff work routines, and the victims parents. Demonstrates a capability to provide good care to the baby once the abduction occurs. May remove the newborn by carrying the infant, carrying a bag large enough to hold an infant, covering the infant with coat/baby blanket, or may be in healthcare uniform/scrubs carrying the infant. POLICY Reasonable measures are taken to prevent the abduction of an infant from the hospital. Employees receive appropriate education and training relative to their response roles. Each department develops individual protocols that support the organizations overall Code Pink response. PROCEDURES Safeguarding Infants Safeguarding infants requires a comprehensive program that involves extensive staff and physician education and collaboration, and often requires the use of physical and/or electronic security measures based on ongoing risk assessments completed by the facility. General Responsibilities Ensure that this or similar written proactive prevention plans are further customized, developed and augmented by the facility. Develop a written assessment of the risk potential for infant abduction, and update annually as needed. Annually review the prevention and response plan. Have every department develop a written, response plan in support of the facilitys Code Pink response plan. Ensure proactive interaction with the mother (and/or the infants legal guardian) to determine if any threats (domestic situations, etc.) exist that could create a security problem for the infant. Train staff to protect infants from abduction (see: Orientation and Education below). Establish an access-control policy for the maternal-child health nursing unit. In situations involving a legal guardian or child protective services, routine pediatric procedures should be carried out, and, based upon maternal/child assessment, supervised parental visits may be recommended. Infant Identification Immediately after the birth of an infant, ensure there is a defined process to identify and/or band infants and their parents/guardians. As soon as possible after the birth: Footprint the baby. Take color photograph of the baby. Perform and record full physical assessment of baby. Ensure that cord blood is kept in lab for two weeks. Note all items in the chart. Require the parent(s)/guardian(s) taking the infant home from the healthcare facility to show their ID wristband(s), and match their band(s) to the bands on the wrist and ankle of the infant. Require all healthcare personnel to wear up-to-date, conspicuous color photo ID badges. Facilities may utilize an identifier or special access badge that indicates personnel that have direct contact with infants and children are authorized to access those areas. Patient Education Distribute guidelines for parents on preventing healthcare facility abductions. Common means of distribution can be through childbirth classes, pre-natal classes, during pre-admission tours, upon admission, and at postpartum instruction. Guideline information covers all relevant healthcare facility identification procedures, and outlines standard nursery procedures, visitation policies and the importance of never leaving the infant unattended. Hospital discharge parent education includes guidelines for prevention of infant abduction in the home and community. Parent(s)/guardian(s) are encouraged to ask questions when their infants are taken from them while in the healthcare facility. Staff Procedures and Education When infants are transported within the facility; Only authorized staff members are allowed to transport the infant. The only authorized non-staff individuals allowed to transport the baby out of the room are the banded parent or guardian. Infants are taken to mothers one at a time. Infants are never carried, but instead are always pushed in a bassinet. An infant is never left out of direct line-of-sight supervision. When in the mothers room: Bassinets are placed near the mother and, when possible, the mothers bed is between the bassinet and the doorway. Instruct the mother to alert nurses if/when she is unable to supervise the infant, such as when she is in the shower or attending to other personal needs. Do not post the mothers or infants full name or identify the sex of the infant where it will be visible to visitors. Establish an access-control policy for the nursing unit (nursery, maternity, neonatal-intensive care, and pediatrics). This may include check-in for visitors at a lobby or entrance. Have the patients nurse introduce each additional healthcare provider to the patient. No home address or other unique information that could put the infant and family at risk after discharge is divulged to the public in birth announcements. All departments (e.g., medical records, information systems, baby photography) are included in this policy. In situations involving a legal guardian or child protective services, routine nursery procedures are carried out, and, based upon maternal/neonatal assessment, supervised parental visits may be recommended. If/when providing home visitation services, personnel entering patients homes need to wear a unique form of ID used only by them which is strictly controlled by the facility and known to the parents. Conduct Code Pink drills facility-wide and in the MCH units per facility recommendations. Physical Security / Infant Security Systems Below are potential physical and electronic security safeguards that facilities may consider as part of their plan for prevention of infant abductions. A documented infant security assessment should be completed. An alarm system with alarms on stairwells and exit doors on the perimeter of the maternity, nursery, neonatal intensive care and pediatric units should be in place. Whenever an alarm is sounded, an immediate investigation to determine the cause of the alarm is conducted. If it is verified that no infant was taken, then a charge nurse or one of the security personnel (or as per facility policy) may silence and reset/rearm the system. Call an All Clear. All nursery doors have self-closing hardware and remain locked to prevent unauthorized access at all times. Alarmed panic bars should allow egress in the event of an emergency. All doors to lounges or locker rooms where staff members change/leave clothing has self-closing hardware and are under strict access control. Installation of a security-camera system that continuously records all activities should be considered. If there are cameras in the units, position them so that they will capture the faces of all persons entering the maternal-child-care unit. Camera video recordings should be archived for a minimum of 30 days before being re-used or purged. Protocols for maintenance of quality and reliability of the system are established. Response Code Pink Alarm Upon receipt of an infant abduction alarm or the confirmation of a missing infant, the nurse will notify the operator and state the location of the patient care unit, the description of the missing infant, and the place and time the infant was last seen. The operator will announce a Code Pink for the missing infant via the overhead paging system. The operator provides the responding personnel with the relevant supporting information (e.g., the infants description, the abductors description, the location or unit where the child was last seen) as it becomes available. Code Pink Alarm Response Code Pink Task Force The pre-designated, multi-disciplinary response team (a.k.a. Code Pink Task Force) receives a Code Pink alarm notification (via overhead page). The Hospital Incident Command System (HICS) is used as the incidents management team structure. Task Force members may include personnel from maternal-child health, security, engineering, environmental services, respiratory and nursing. The Task Force team leader is the assigned patient care nurse or designated charge nurse of the department where the alarm is occurring, if applicable. If no patients are involved (ie.,the infant is a visitor), the team leader is the ranking security representative. Each Task Force member performs specific functions supporting the incident objectives and assigned by the team leader. The initial Incident Action Plan (IAP) objectives may include: Initial Incident Objectives%Establish a security perimeter around the alarm area.%Determine if abduction has actually occurred.%Identify the infant and abductor, if applicable.%Recover the infant, if applicable.%Communicate situation to staff/patients as necessary.%Investigate and document incident details. Maternal-Child Health Patient Care Staff Immediately search the entire unit. Staff members are assigned to search staff locker room, examination and equipment rooms, staff restrooms, public restrooms, waiting rooms, and empty rooms on unit, and report back with results of searches to charge nurse or team leader for Infant Abduction Task Force. Communication between nursing staff, security and others via hand-held radios facilitates transmission of information and coordination of the response effort. Security Staff Immediately and simultaneously activate a search of the entire healthcare facility, both interior and exterior. If possible, close exits to parking lots (e.g., gate arms, doors) and record the license plate numbers of any vehicles leaving the premises. Assist nursing staff in establishing and maintaining security in the unit. Establish a security perimeter around the facility until the possible abduction can be confirmed. Contact local law enforcement. All personnel Upon hearing that a Code Pink has been called, all healthcare facility personnel are to immediately stop all non-critical work. Cover all interior stairwell doors, elevator areas and doors that exit anywhere near their area. Staff members who are outside their own department area are to go to the nearest exit way. When a second person reaches an exterior door, one of them is to exit the facility to watch for suspects leaving the facility grounds or entering a car. Actual Infant Abduction Upon the discovery of a missing infant, the Code Pink team leader contacts the administrator-in-charge and reports the actual abduction of an infant. The following procedures are implemented in order to provide a systematic response to an infant abduction. Incident Commander The administrator-in-charge, by policy, assumes the role of incident commander or delegates the responsibility to the most qualified individual. The incident commander appoints the appropriate command and general staff. The incident commander activates the Hospital Command Center (HCC), as appropriate. Call National Center for Missing and Exploited Children (NCMEC) at 1-800-THE-LOST (1-800-843-5678) for additional assistance in handling ongoing crisis management. The Public Information Officer (PIO) ensures all information about the abduction is cleared by the incident commander and law-enforcement authorities before being released to staff members, family, friends and the media. Protect the crime scene Maternal Child-Health Staff Team leader obtains all pertinent information regarding the description of the alleged kidnapper and infant and the situation in the unit at the time of the kidnapping and reports it to the incident commander. A facility-developed infant abduction form should include the following documentation: a description of the infant, the kidnapper, and any person(s) with the kidnapper. It should also document all information from witnesses regarding the occurrence. The parents of the abducted infant are moved to a private room off the maternity floor (but not their belongings, as they are part of the crime scene and must be protected throughout the investigation.) Notify the involved pediatrician and obstetrician. The nurse assigned to the mother and infant continues to accompany the parents at all times. All records/charts of the mother and infant are secured. The lab is notified to place STAT hold on infants cord blood or other blood samples. Designate a room where other family members can wait and have easy access to any updates in the case, while offering the parents some privacy. Contact social services and/or pastoral services to assist as needed by activating their own response plans. Team leader briefs all staff on the unit and reinforces confidentiality of incident. Nurses should explain the situation to all of the other mothers on the unit, preferably while each mother and her infant are together. After the mother is discharged from the facility assign one staff person to be the single liaison (i.e., social services, risk management or nursing) between the parents and the facility. Hold a group debriefing/discussion session(s) as soon as possible, requiring all personnel affected by the abduction to attend. Security Immediately call local law enforcement. Consider calling the local FBI office requesting the Crimes against Children (CAC) coordinator. Assume control and protect the crime scene until law enforcement arrives. Notify newborn nurseries, postpartum and pediatric units, emergency rooms, and outpatient clinics at other local healthcare facilities about the incident, and provide a full description of the baby and the suspected abductor (if known). Demobilization & Recovery When the Code Pink incident has been resolved, the incident commander shall issue an all clear notification to staff to terminate the response operations. To do so, the operator announces Code Pink, all clear three (3) times. All employees are to return to their normal work duties. Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Training and Education Staff members who deliver care to infants are educated regarding infant security issues upon their initial orientation to the unit and on a quarterly basis. This can be achieved through a number of different methods, including but not limited to: a. NCMEC literature. b. Infant security videos. c. Review of all policies, procedures, and regulatory standards. d. Review of case studies and any possible attempt scenarios. e. Verbal or written test. f. Additionally, ancillary staff members should be in-serviced upon initial orientation and as needed. It is recommended that the following departments be included: security, housekeeping, laboratory, radiology, and auxiliary staff. Members of the Code Pink Task Force receive appropriate training and conduct periodic response exercises to ensure a coordinated response. REFERENCES An Analysis of Infant Abductions, July 2003; National Center for Missing and Exploited Children. California Code of Regulations, Title 22, 70547(b)(21), 70717(g)(h), 70737(d), 70738, 70743(b). California Health and Safety Code, Section 1276, 208(a), 1275. For Healthcare Professionals: Guidelines on Prevention of and Response to Infant Abductions. Eighth Edition, 2005; National Center for Missing and Exploited Children. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. Preventing and Responding to Infant Abductions, 1996; Emergency Care Research Institute (ECRI). CODE PURPLE: CHILD ABDUCTION Facilities should define the classification between Code Pink and Code Purple. Some facilities choose to define by age (e.g., Code Pink as up to six months of age, and Code Purple as six months to 13 years of age), by location of abduction (e.g., newborn nursery versus pediatrics unit), or by some other characteristic (e.g., Code Pink for babies that cannot walk and Code Purple for any child that is able to walk). Whatever definition is chosen should be clear to staff. PURPOSE To provide an appropriate response in the event of the abduction of a child from the facility. DEFINITIONS The following are characteristics of a possible child abductor that should be considered. However, it is important to note that abductor characteristics are not limited to this list, and anyone acting suspicious in areas of risk for abductions should be reported immediately. A. The abductor can be a stranger to the child, or a family member, such as a non-custodial parent. B. Children can often verbally let someone know when they face a threatening situation, however, some factors, such as domestic situations and wandering, create a need for an expansion of the infant monitoring system into the pediatric unit. Staff should not rely on the child to verbally indicate that they are in a threatening situation. POLICY All reasonable measures are taken to prevent the abduction of a child from the hospital. In the event of a missing child or child abduction, the following Code Purple response procedures are implemented. All employees receive appropriate education and training relative to their response roles. Each department develops individual protocols that support the organizations overall Code Purple response. PROCEDURES Safeguarding Children Safeguarding children requires a comprehensive program involving extensive staff and physician education and collaboration, and often requires the use of physical and/or electronic security measures based on ongoing risk assessments completed by the facility. General Responsibilities Ensure that this or similar written proactive prevention plans are further customized, developed and augmented by the facility. Develop a written assessment of the risk potential for child abduction, and update annually as needed. Annually review the prevention and response plan. Have every department develop a written response plan in support of the facilitys Code Purple response plan. Establish a defined process to identify and/or band children and their parents/guardians, i.e., color photographs of both child and parents and full physical assessment of the child. Ensure proactive interaction with the childs parents or legal guardian to determine if any threats (domestic situations, etc.) exist which could create a security problem for the child. Train staff to protect children from abduction (see: Orientation and Education below). Establish an access-control policy for the pediatric nursing unit. Instruct healthcare facility personnel to ask visitors which child they are visiting. In situations involving a legal guardian or child protective services, routine pediatric procedures are carried out, and, based upon maternal/child assessment, supervised parental visits may be recommended. Patient Education Distribute guidelines for parents on preventing healthcare facility abductions. Information covers relevant healthcare facility identification procedures, visitation policies, and the importance of never leaving the child unattended without notifying staff. Hospital discharge parent education includes guidelines for prevention of child abduction in the home and community. Parent(s)/guardian(s) are encouraged to ask questions when their children are taken from them while in the healthcare facility. Physical Security Safeguards Develop written assessment of the risk potential for child abduction and update annually or as needed. Conduct annual self-assessment reviews within each department on the prevention and response plan. Conduct Code Purple drills, facility-wide and in the pediatric units, per facility recommendations. Install alarms on all stairwell and exit doors on the perimeter of the pediatric unit. Whenever an alarm is sounded, an immediate investigation is done to determine the cause of the alarm. If it can be verified that no child was taken, then a charge nurse or one of the security personnel can silence and reset/rearm the system and call an All Clear. All pediatric unit doors have self-closing hardware and remain locked to prevent unauthorized access at all times. Alarmed panic bars should allow egress in the event of an emergency. All doors to lounges or locker rooms where staff members change/leave clothing have self-closing hardware and are under strict access control. Document an assessment of the need for an electronic-asset-surveillance (EAS) detection system tied to video recording of the incident and alarm activation. Installation of a security camera system that continuously records all activities should be considered. If there are cameras in the units, position them so they will capture the faces of all persons utilizing all entrances and exits of the pediatric unit. Camera video recordings should be archived for a minimum of 30 days. Protocols for maintenance of quality and reliability of the system are established. Response Code Purple Alarm Upon receipt of a child abduction alarm or the confirmation of a missing child, the nurse will notify the operator and state the location of the patient care unit, the description of the missing child, and the place and time the child was last seen. The operator will announce a Code Purple for the missing child via the overhead paging system. The operator provides the responding personnel with the relevant supporting information (i.e., the childs description, the abductors description, the location of unit where the child was last seen, etc.) as it becomes available. Code Purple Alarm Response Code Purple Task Force The pre-designated, multi-disciplinary response team (Code Purple task force) receives a Code Purple alarm notification (via overhead page). The Hospital Incident Command System (HICS) is used as the incidents management team structure. Task force members may include personnel from pediatrics, maternal-child health, security, engineering, environmental services, respiratory and nursing. The Task Force team leader is the assigned patient care nurse or designated charge nurse of the department where the alarm is occurring, if applicable. If no patients are involved (i.e., the child is a visitor), the team leader is the ranking security representative. Each Task Force member performs specific functions supporting the incident objectives and assigned by the team leader,. The initial Incident Action Plan (IAP) objectives may include: Initial Incident Objectives%Establish a security perimeter around the alarm area.%Determine if an abduction has actually occurred.%Identify the child and abductor, if applicable.%Recover the child, if applicable.%Communicate situation to staff/patients as necessary.%Investigate and document incident details. Pediatric Staff Immediately search the entire unit. Staff members are assigned to search staff locker room, examination and equipment rooms, staff restrooms, public restrooms, waiting rooms, empty rooms on unit, and report back with search results to the Code Purple Task Force team leader. Communication between nursing staff, security and others via hand-held radios facilitates transmission of information and coordination of the response effort. Security Staff Immediately and simultaneously activate a search of the entire healthcare facility, interior and exterior. If possible, close exits to parking lots (i.e., gate arms, doors) and record the license number of any vehicles leaving the premises. Assist nursing staff in establishing and maintaining security in the unit. Establish a security perimeter around the facility until the possible abduction can be confirmed. Notify local law enforcement. All personnel Upon hearing that a Code Purple has been called, all healthcare facility personnel are to immediately stop all non-critical work. Cover all interior stairwell doors, elevator areas and doors that exit anywhere near their area. Staff members who are outside their own departments are to go to the nearest exit way. When a second person reaches an exterior door, one of them is to exit the facility to watch for suspects leaving the facility grounds or entering a car. Actual Child Abduction Upon the discovery of a missing child, the team leader contacts the administrator in-charge and reports the actual abduction of the child. The following procedures are implemented in order to provide a systematic response to child abduction. Incident Commander The administrator-in-charge, by policy, assumes the role of incident commander or delegates the responsibility to the most qualified individual. The incident commander appoints the appropriate command and general staff. The incident commander activates the Hospital Command Center (HCC), as appropriate. Call the National Center for Missing and Exploited Children (NCMEC) at 1-800-THE-LOST (1-800-843-5678) for additional assistance in handling ongoing crisis management. The Public Information Officer (PIO) ensures all information about the abduction is cleared by the incident commander and law enforcement authorities before being released to staff members, family, friends and the media. Protect the crime scene. Pediatric Staff Team leader obtains all pertinent information regarding the description of the alleged kidnapper and child, and the situation in the unit at the time of the kidnapping and reports it to the incident commander A facility-developed child abduction form should include the following documentation: a description of the child, the kidnapper, and any person(s) with the kidnapper. It should also document all information from witnesses regarding the occurrence. The parents of the abducted child are moved to a private room off the pediatric unit (but not their belongings, as they are part of the crime scene and must be protected throughout the investigation). Notify the involved pediatrician. The nurse assigned to the child accompanies the parents at all times. All records/charts of the child are secured. Designate a room where other family members can wait and have easy access to any updates in the case, while offering the parents some privacy. Contact social services and/or pastoral services to assist as needed by activating their own response plan. Nurse manager/supervisor briefs all staff on the unit and reinforces confidentiality of the incident. Nurses should then explain the situation to all of the other parents/guardians on the unit, preferably while the parent/guardian and child are together. Assign one staff person to be the single liaison (i.e. social services, risk management or nursing) between the parents/guardian and the healthcare facility. Hold a group debriefing/discussion session(s) as soon as possible, requiring all personnel affected by the abduction to attend. Security Immediately call local law enforcement. Consider calling the local FBI office requesting the Crimes against Children (CAC) coordinator. Assume control and protect the crime scene until law enforcement arrives. Notify pediatric units, emergency rooms, and outpatient clinics, and other local healthcare facilities about the incident, and provide a full description of the child and the suspected abductor (if known). Demobilization & Recovery When the Code Purple incident has been resolved, the incident commander shall issue an all clear notification to staff to terminate the response operations. To do so, the operator shall announce, Code Purple, all clear three (3) times via the overhead paging system. All employees are to return to normal operations. Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Training and Education Staff members who deliver care to infants/children are educated regarding infant/child security issues upon their initial orientation to the unit and on a quarterly basis. This can be achieved through a number of different methods, including but not limited to: NCMEC literature. Infant security videos. Review of all policies, procedures, and regulatory standards. Review of case studies and any possible attempt scenarios. Verbal or written test. Additionally, all staff members should be in-serviced upon initial orientation and as needed. Members of the Code Purple Task Force receive the appropriate training and conduct periodic response exercises to ensure a coordinated response. REFERENCES An Analysis of Infant Abductions, July 2003; National Center for Missing and Exploited Children. California Code of Regulations, Title 22, 70547(b) (21), 70717(g) (h), 70737(d), 70738, 70743(b). California Health and Safety Code, Section 1276, 208(a), 1275. For Healthcare Professionals: Guidelines on Prevention of and Response to Infant Abductions. Eighth Edition, 2005; National Center for Missing and Exploited Children. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. Preventing and Responding to Infant Abductions, 1996; Emergency Care Research Institute (ECRI). CODE RED: FIRE PURPOSE To provide an appropriate response in the event of a suspected or actual smoke condition or fire in order to protect life, property and vital services. POLICY All employees have a responsibility to respond quickly to a suspected or actual fire. Code Red are immediately initiated whenever the following is observed: Seeing smoke, sparks or a fire. Smelling smoke or other burning material. Feeling unusual heat on a wall, door or other surface. In response to any fire/life safety system alarm. The Code Red Task Force performs only basic fire response operations for beginning stage fires that can be controlled or extinguished by portable fire extinguishers without the need for protective clothing or self-contained breathing apparatus. All employees complete an annual safety training that includes appropriate fire life safety procedures. The Code Red Task Force completes appropriate annual training in accordance with their duties. Each department develops individual protocols that support the organizations overall Code Red response. PROCEDURES Upon discovery of smoke condition or fire (suspected or actual) At origin: R.A.C.E. Remove patients, visitors and personnel from the immediately affected area. Consider removing patients and staff from the adjoining rooms/floors. Disconnect exposed oxygen lines from wall outlets. Activate the fire alarm and notify others in the affected area to obtain assistance. Follow your organizations emergency reporting instructions. Contain the fire and smoke by closing all doors Extinguish the fire if it is safe to do so. (see P.A.S.S.) S.A.F.E. Safety of life Activate the alarm Fight fire (if it is safe to do so) Evacuate (as necessary or instructed) P.A.S.S. Proper use of the fire extinguisher: Pull the pin Aim the nozzle of the extinguisher at the base of the fire Squeeze the trigger Sweep the extinguishers contents from side to side Away from origin: Listen to overhead paging system. Prepare to implement Code Red response plan for your department or location, as needed. Do not automatically evacuate unless there is an immediate threat to life. Wait for instructions. Nursing personnel return to their assigned units if safe to do so. Code Red Task Force The pre-designated, multi-disciplinary fire response team (a.k.a.: Code Red Task Force) receives a fire alarm notification (either via overhead page or directly from the fire system). The Hospital Incident Command System (HICS) will be used as the incidents management team structure. Task Force members may include security, engineering, environmental services, respiratory and nursing. The most qualified member of the Task Force assumes the role of the team leader and, if possible, coordinates with a senior member of the department where the alarm is occurring. Each Task Force member performs specific functions as assigned by the team leader in support of the incident objectives. The incident action plan objectives may include: Initial Incident Objectives%Determine if fire is an actual fire or a false alarm.%Rescue and protect patients and staff.%Confine the fire/reduce the spread of the fire.%Implement partial/full evacuation.%Communicate situation to staff, patients, and the public.%Investigate and document incident details. The Code Red Task Force responds to the fire alarm location. The Task Force coordinates with a senior member of the department where the alarm is occurring and conducts an assessment of the alarm to determine whether an actual fire has occurred or is occurring. If no fire has occurred and it is deemed a false alarm or if a fire has occurred, but has been extinguished the team leader declares an all clear if it is safe to do so and documents as appropriate. If an active fire is occurring, the team leader initiates an appropriate response, such as notifying the house supervisor or administrator-on-call, or initiating a house-wide Code Triage: Internal. The Task Force members address the fire situation as per their training and communicates situation to team leader and responding Fire Department personnel. Code Triage: Internal Fire Incident Response: By policy, the administrator-in-charge initiates a Code Triage: Internal and assumes the role of the incident commander. The incident commander appoints the necessary command and general staff positions. The incident commander activates the Hospital Command Center (HCC), as appropriate. If the incident commander works out of the Incident Command Post (ICP), appointing a deputy incident commander within the Hospital Command Center (HCC) should be considered. If the incident commander works out of the Hospital Command Center (HCC), a liaison officer is posted at the Fire Departments Incident Command Post (ICP). Consider establishing a Unified Command with the responding agencies. Consider the need for additional evacuation. Evacuation and relocation of staff, patients, and/or visitors is undertaken only at the direction of the incident commander and only when in agreement with the Fire Departments incident commander. Horizontal evacuation of patients and staff to surrounding smoke compartments is preferred in most cases. Vertical evacuation of patients and staff is completed if necessary. Patient records and medications are transferred with the patient upon evacuation or transfer if it is safe to do so. If waiting for patient records or medications will jeopardize patient or staff safety, they should evacuate to safety first. Medical records and medications will follow the patient when it is safe. As oxygen can promote the spread of fire and is found in most patient care areas, consider shutting off medical gases to the affected area(s) after proper coordination with engineering, nursing, anesthesia, and pulmonary/ respiratory. Do not use elevators in areas near a Code Red event; use the stairs instead. Elevators can increase the spread of smoke from floor to floor. Utilize evacuation equipment to move non ambulatory patients down stairs. Account for all on-duty staff and recall additional staff as necessary. Ensure accurate tracking of patients and appropriate notification to families and other agencies if needed. Consider establishing a media staging area. Recovery: Notify all responding agencies and personnel of the termination of the response and demobilize as appropriate Consider providing mental health support for staff. Track all related incident costs and claims. 3. All Clear: a The incident commander after consultation with the fire department, if applicable issues an all clear notification to the operator to indicate the termination of response operations. b. The operator shall announce Code Red, all clear three (3) times via the overhead paging system. c. All employees return to normal operations. 4. Refer to the Hospital Incident Command System (HICS) planning and response guides for additional guidance. Documentation and Reporting Documentation containing information about the activation is reviewed and retained. Reporting of the incident may be completed through an event report, security report, fire activation report, or other reporting method. Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Training and Education All employees are expected to be familiar with the basic Code Red response plan and know the location(s) of the nearest fire alarm pull stations and fire extinguishers. Employees working in areas with specialized extinguishers or extinguishing systems (e.g., Halon, FM-200, non-magnetic) should receive specific training for those devices. The Code Red Task Force receives annual training specific to their response procedures, including additional training for the potential team leaders. REFERENCES California Code of Regulations, Title 22. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. National Fire Protection Association (NFPA) 101 and 99, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.NFPA.org"www.NFPA.org. Occupational Health and Safety Administration, (OSHA) 29 CFR 1510, 1910, 1915 The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. CODE SILVER: PERSON WITH A WEAPON, ACTIVE SHOOTER AND/OR HOSTAGE SITUATION PURPOSE To provide an appropriate response in the event of an incident involving a person with a weapon, an active shooter or a hostage situation within the facility. DEFINITIONS Weapon: Any firearm, knife or instrument that can cause bodily harm or injury Active Shooter: Person discharging a weapon Hostage: Any person being threatened or held against their will POLICY The hospital will take all reasonable measures to minimize the negative impact of a situation involving a person with a weapon, an active shooter or a hostage. PROCEDURES Discovery Anyone encountering a person brandishing a weapon should: Seek cover and warn others of the situation. Clear immediate danger area of all personnel and patients, if it is safe to do so. Notify the operator of the incident with all known information. Location - building, area, floor and room number. Suspects - number and any physical descriptions. Any known hostages or victims. Any other relevant information (e.g., weapons, demands). Law enforcement personnel authorized to carry a weapon should be identified if they are not in a distinctive uniform. The operator will: Notify the hospital via a public announcement of Code Silver or Code Silver Active Shooter with location. Notify the administrator-in-charge and the Security department of the incident. Notify staff of the event via pager, e mail, mass notification system other communication methods available to the facility. Due to the nature of this incident, the operator will generally initiate a Code Silver and notify law enforcement via 9-1-1 without first seeking approval from the administrator-in-charge. Response (Code Silver) Code Blue and Code White teams should not enter an area where a Code Silver was called until the area has been determined by law enforcement to be safe. Any staff members in the area specified by a Code Silver should: Warn others of the situation Evacuate if it is safe to do so. Seek cover/protection, Assist patients in seeking shelter/protection, if it is safe to do so Remain calm and stay alert. If at all possible, dont make contact with the perpetrators. Patients in the area specified by a Code Silver should be instructed: to remain calm and stay alert. not to make contact with the shooter. evacuate, if possible and safe to do so, at the direction of area staff members. if unable to evacuate and safe to do so, staff will close doors and turn lights off in the patients room. Any staff members in an area distant from the Code Silver location should: Stay away from the location specified in the Code Silver. This is an extremely dangerous and sensitive situation that should only be handled by trained authorities. Close all patient and unit exit doors. Take cover behind locked doors if possible. Provide assistance as requested by an authorized person. The Code Silver Strike Team is a pre-designated security response team consisting of staff trained in the response to violent situations. It is important to remember that a Code Silver is primarily a law enforcement event, and should be addressed by trained law enforcement officials. Hospital staff should take direction from local responding law enforcement officers The Hospital Incident Command System (HICS) is used as the incidents management structure. Strike Team members may include representatives from security, administration, nursing, and other departments. The Strike Team leader is the ranking security representative. The Strike Team shall perform as instructed by the Strike Team leader in support of the incident objectives. The Strike Team leader reports to the incident commander until directed otherwise. The incident action plan (IAP) objectives may include: Initial Incident Objectives%Identify the location of the incident.%Establish a perimeter.%Clear the area of all possible bystanders.%Gather intelligence from witnesses.%Coordinate the response with law enforcement. The Code Silver Strike Team respond to the general area of the incident location. The Strike Team leader will brief the team and coordinate the response. If it is safe to do so, the Code Silver Strike Team will: Establish a perimeter around the affected area. Clear the area of bystanders from the surrounding area to protect them from danger. Close and secure the entrances and exits to the facility, and not allow anyone to enter or exit until the situation has been resolved or until directed by law enforcement. Interview witnesses to determine the exact location, number and identities of the hostages, and the number of perpetrators/abductors, including how they are armed, their apparent motivation and any demands made. Maintain communications with the HCC and or responding law enforcement. The Code Silver Strike Team will not: Bargain with or make any promises to the person(s) with a weapon or hostage taker(s). Engage in any rescue attempts. Triage Response 1. Wait for law enforcement to declare the scene safe for triage before any clinical personnel enter to triage patients/victims. 2. If staff or physicians MUST enter or leave the building or a patient has an emergency that requires movement of the patient (e.g., Code Blue), law enforcement must be notified. If appropriate, an armed escort by law enforcement should be provided Hospital Command Center (HCC) The administrator-in-charge, by policy, assumes the role of the incident commander or delegates the responsibility to the most qualified individual. The incident commander activates the Hospital Command Center (HCC) in a location not affected by the incident. If the incident commander works outside of the Incident Command Post (ICP), a deputy incident commander is appointed within the HCC. If the incident commander works inside of the HCC, a liaison officer is assigned to the Law Enforcements Incident Command Post (ICP). A Unified Command with the law enforcement incident commander is established. The incident commander appoints the appropriate command and general staff, who will, in turn, assign appropriate personnel to HICS positions needed to accomplish the incidents objectives. All incoming patients should be routed other appropriate areas within the hospital or to other nearby healthcare facilities for medical care until the Code Silver event has been cleared. These facilities should be notified about the situation. Law Enforcement Arrival When law enforcement arrives, the Code Silver becomes a law enforcement incident and they assume full responsibility for managing the situation. Law enforcement will request and expect cooperation and assistance from the staff. Law enforcement will need a copy of the facilitys layout, indicating rooms, exits, windows, utility access, keys and access cards and a hospital 2-way radio, if such communications are utilized by security within the hospital. Law enforcement will establish an incident command post in a location of their choosing, most likely outside the facility and away from the incident. Response: It is important for anyone in the affected area to show their hands at all times when law enforcement is on scene. This helps law enforcement officers to identify who may or may not be armed with a weapon. Follow law enforcement instructions as they are given. Understand that law enforcement officers may be yelling and may seem aggressive. Verbally identify yourself. If you are injured, tell law enforcement you are injured and state whether or not you require immediate medical attention. Leave all personal belongings during the evacuation process. It is more important to get to safety first Media The Public Information Officer (PIO) will contact families of identified hostages, in conjunction with Law Enforcement, and serve as a liaison with the media. Law enforcement will request that any and all official statements of the facility be discussed with the designated law enforcement representative before being released. All media coverage is directed by the PIO. Staff must avoid giving out any information to the media. Media representatives may be quite assertive and some may not display official identification. The incident should not be discussed openly among the staff. Protection of privacy is extremely important. All Clear After consultation with law enforcement the incident commander authorizes an all clear notification to the operator indicating the termination of response operations. The operator announces Code Silver, all clear three (3) times via the overhead paging system, mass notification system or other approved notification system. All employees are to return to normal operations. After Action Report Be prepared to spend time with the law enforcement authorities to review the incident in detail. Provide details of the perpetrators, victims, incident scene and events leading up to the initial trigger point of the incident. Facility administrators, staff and public safety first responder groups must meet within a 24-48 hour time frame after the conclusion of the incident to review the incident from start to finish. The goal of the debriefing is to determine what actions, policies and procedures could be enhanced to better respond to a future Code Silver incident. This debriefing is to determine the how and why, not to assign blame. The goal is to understand what happened and how to be better prepared to respond to any future event. Management conducts a root cause analysis or similar review of the incident to identify areas for improvement and then implement those action items Mental Health Considerations Mental health evaluations for employee & non-employee victims: Post Traumatic Stress Disorder (PTSD) is a significant and debilitating disorder that affects victims of and responders to violent events such as an active shooter or hostage event. It is strongly recommended that all affected persons be required to complete an initial PTSD evaluation by a mental health professional to determine if continued therapy is required and for what duration of time the therapy is to continue. The evaluation will also include a physical component to determine what effect if any the stress is having on the persons physical well-being. All persons involved in the event should be provided a written evaluation with the mental health professionals recommendation for a return to duty date. Education and Training 1. Training and education ensure that all staff is aware of potential security hazards and how to protect themselves and their co-workers through established policies and procedures. 2. Specific training should be provided to the Code Silver Strike Team members as to their specific roles and responsibilities during a variety of scenarios. 3. Training for staff includes what to do when they become a hostage or victim such as the following: Remain calm and be patient. Time is on your side. Avoid drastic action. The captors in all probability do not want to harm persons held by them, however such direct challenges may cause the captor to escalate his actions. The initial 45 minutes are the most dangerous. Follow instructions, be alert. Your focus is on staying alive. Dont make mistakes that could hazard your well-being. Dont speak unless spoken to and only when necessary. If it is necessary to speak with the captors, avoid appearing hostile, avoid arguments and dont talk down to him or her. Maintain eye contact with the captor but do not stare. If medications, first aid or restroom privileges are needed by anyone, say so. Be Compliant. Treat the captor like royalty. Comply with instructions the best you can. Expect the unexpected. Displaying a certain amount of fear can possibly work to your advantage. Be Observant. When you are released, or when you escape, the personal safety of others may depend on what you remember about the situation. REFERENCES California Code of Regulations, Title 22, 70743 (a)(b)(c)(d). 70746. Guidelines for Preventing Workplace Violence for Health Care and Social Service Workers, 3148 (1998); U.S. Department of Labor, Occupational Safety and Health Administration (OSHA). The Hospital Incident Command System (HICS) Guidebook, accessible via the Internet at www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. Department of Homeland Security (DHS) Independent Study Course: Active Shooter, What can you do (IS907), accessible via the Internet at http://training.fema.gov/EMIWeb/IS/IS907.asp CODE TRIAGE ALERT, INTERNAL and EXTERNAL PURPOSE To provide an appropriate response to all hazards and events that may potentially have a significant impact on the normal operation of the facility. DEFINITIONS All-hazards plan basic framework for response to a wide variety of events Code Triage: Alert informs appropriate staff that an event has occurred, or may occur, that could potentially impact the facility. Code Triage: Internal is the activation of the organizations Emergency Operations Plan (EOP) to respond to an event that has occurred within the facility. Code Triage: External is the activation of the organizations Emergency Operations Plan (EOP) to respond to an external event that has disrupted, or may disrupt, the facilitys normal operations. POLICY The organization has an established Emergency Operations Plan (EOP) that addresses all hazards emergencies in accordance with state and federal laws, the National Incident Management System (NIMS), the California Standardized Emergency Management System (SEMS), The Joint Commission accreditation standards, the Occupational Safety and Health Administration (OSHA), and/or other regulatory agencies. The Hospital Incident Command System (HICS) is used as the structure for the organizations incident management system. Each department develops individual protocols that support the organizations overall Code Triage response. A Code Triage is implemented when an incident occurs, or is anticipated or imminent to occur, that may significantly impact normal operations and/or require resources not readily available to appropriately respond to the incident. It is assumed that a Code Triage: Internal is automatically activated during an obvious incident that might impede communications, such as a large earthquake where power has been lost. PROCEDURES Incident Recognition The facility may receive a warning or pre-incident intelligence that an incident that can significantly impact normal business operations is likely to occur is occurring, or has occurred without warning The administrator-in-charge is informed of any incident that is determined to be potentially disruptive to normal hospital functions. Response Code Triage Alert A Code Triage: Alert is given when a response is likely or imminent and should prompt an elevated level of preparedness. The administrator-in-charge, by policy, assumes the role of incident commander or assigns the duties to a qualified individual. The incident commander will notify key personnel by contacting the operator to initiate a Code Triage: Alert. The operator will announce the code via multiple communication systems (e.g., overhead page, mass notification system, telephone, pagers, radio, runners). The activation of a Code Triage: Alert should result in the following: The response of pre-designated key personnel to respond to the Hospital Command Center (HCC) for an incident briefing and planning meeting. The nature and severity of the incident will determine if the Hospital Command Center (HCC) will be partially or fully activated. Code Triage Internal or External A Code Triage: Internal / External activation is initiated when an organizational response is required. The administrator-in-charge or the most qualified person assumes the role of incident commander or assigns the duties to a qualified individual. The incident commander notifies all personnel that the Emergency Operations Plan (EOP) has been activated by contacting the operator to initiate a Code Triage: Internal or External. The operator will announce the code via multiple communication systems (e.g., overhead page, mass notification system, telephone, pagers, radio, runners). The activation of a Code Triage: Internal or External should result in the following actions: The incident commander assigns the initial incident management positions needed to develop the initial Incident Action Plan (IAP) based on the incident objectives. An assessment of the operational status and resources of all departments is reported to the HCC (usually on a standardized form or checklist). The incident commander or his/her designee immediately opens the Hospital Command Center (HCC). Incident Action Plan (IAP) As soon as possible after the Code Triage activation, the incident commander conducts a briefing and planning meeting with the initial incident management team to develop the Incident Action Plan (IAP) based on the incident objectives. The incident commander establishes an operational period based on the incident, usually set in terms of hours, to accomplish a given set of tactical actions. The IAP should be updated for each operational period. The incident commander establishes the incidents control objectives to define where the organization wants to be at the end of the response. These broad objectives are foundational and will not change over the course of the incident. The incident commander establishes operational objectives to achieve the control objectives. These are steps or actions to be accomplished during the defined operational period. The operational objectives are simple, measurable, achievable and realistic and time sensitive. The IAP identifies the needed resources to meet the objectives, including personnel, equipment, supplies, pharmaceuticals and vehicles. The IAP should be formally documented on the appropriate HICS forms. Building the Incident Management Team Once the incident objectives and needed resources are identified, the incident management team positions are assigned to accomplish those objectives. The incident commander is responsible for assigning the command and general staff positions, while the general staff section chiefs are responsible for assigning the needed positions within their respective sections. Only those personnel who have completed the required incident command training specified by the National Incident Management System (NIMS) and other hospital or corporate requirements are appointed to command positions. Hospital Command Center (HCC) An area should be established where HCC materials and supplies are readily available. The HCC is located away from the areas impacted by the incident and is easily accessible. A nearby location is identified for briefings. A secondary HCC location is ready to be utilized in case the primary location has been impacted and is not usable. The HCC has available all possible lines of communication, such as telephone with fax, cell phone, hand-held radio, and HAM radio reception. Hospital Command Center (HCC) Activities The incident commander conducts a planning meeting with the initial incident management team to confirm/develop the strategy/tactics. The IAP is prepared and approved. The incident commander conducts an operations briefing to brief the operational leaders on the action plan. The operational leaders then implement the action plan. Periodic management meetings are held to evaluate and revise the incident objectives, as needed. The incident commander briefs Administration and/or the Board of Directors (Agency Executives) as appropriate. Documentation of all incident planning, interventions, response activities, resource requests, and outcomes are completed in accordance with HICS Guidelines. Demobilization Demobilization planning begins at the outset of the incident and is included as part of the Incident Action Plan. Demobilization of positions/roles and resources occurs as incident objectives are met. When the decision to demobilize has been made, it is communicated in a timely and effective manner to the hospital staff and appropriate external agencies. Management of the publics perception throughout the demobilization protects the facilitys reputation and informs the public of the facilitys recovery and return to normal business operations. Recovery All Clear The incident commander shall issue an all clear notification to the operator to indicate the termination of the response operations after consultation with appropriate agencies and staff The operator shall announce, Code Triage, all clear three (3) times via the overhead paging system and via any other communication mediums used. All employees are to return to normal operations. System Recovery The transition from response to recovery operations is rarely obvious. Staffing levels, functions, activities and resources return to their normal or new normal levels. Recovery operations may continue for weeks or even years after incident response operations have terminated. The recovery phase may be managed by utilizing incident management concepts. The command and general staff positions may be fulfilled by different hospital staff than those during the response phase Address any other personnel issues, such as: Those who wore PPE complete medical surveillance forms and receive an appropriate health debriefing which covers signs and symptoms of potential after affects. Financial, psychological and medical care issues of any staff member who became ill or injured during the response are addressed. Formal and informal recognition of individuals and hospital unit. Training and Education All personnel receive an initial orientation to the facilitys Emergency Operations Plan (EOP) and annual refresher training as appropriate. Specific training (e.g., NIMS, HICS, TJC, OSHA) may be required for individual positions and responsibilities. Annual functional exercises are conducted based on requirements and standards to test the facilitys response to an all-hazards incident. Refer to the Hospital Incident Command System (HICS) Guidebook for more information. Documentation & Reporting After Action Report (AAR) Immediately following any incident, including field and tabletop exercises, the incident commander ensures the planning section gathers and consolidates all relevant incident documentation and evaluations to publish an After Action Report (AAR). The AAR is a record of what worked well and what needs improvement. The draft AAR should be submitted to the appropriate authority (e.g., emergency management or safety committee) with recommendations for improvement. Corrective Action Plan (CAP) The appropriate authority (e.g., emergency management or safety committee) should approve relevant recommendations and track the implementation of the approved corrective actions. Make changes to the Emergency Operations Plan (EOP) in accordance with the approved recommendations. REFERENCES The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements. CODE WHITE: MEDICAL EMERGENCY (PEDIATRIC) Facilities should define the classification between adult (Code Blue) and pediatric (Code White) patients. Whatever definition is chosen should be clear to staff. PURPOSE To provide an appropriate response to a suspected or imminent cardiopulmonary arrest or a medical emergency for an adult or pediatric patient. POLICY Code White is called for patients who do not have an advance healthcare directive indicating otherwise. Code White is to be initiated immediately whenever a patient fitting the criteria for a pediatric patient is found in cardiac or respiratory arrest (per facility protocol). In areas where pediatric patients are routinely admitted there should be a pediatric crash cart available. If a Code White is called in an area without a pediatric crash cart, the designated response team will bring a crash cart with pediatric equipment. If the patients weight does not meet the expected developmental growth, consider a response based on the appropriate protocol (e.g., ACLS/PALS). PROCEDURES Code White teams should not enter an area where a Code Silver was called until the area has been determined by law enforcement to be safe. Code White team members function within their respective scopes of practice and utilize guidelines set by the American Heart Association on Advanced Cardiac Life Support. The members perform functions that include, but are not limited to, the following: Response Person discovering an adult/child in cardiopulmonary arrest: Assesses patients airway, breathing and circulation; Calls for help. Initiates CPR and notes time. Does not leave the patient. First responding physician: Assume the role of Code White team leader. Initiate direct emergency orders, as appropriate. May transfer responsibility of team leader to attending physician or emergency department physician. Team leader signs the Code White record. Personnel from department calling the Code White: Initiate Code White per facility protocol. Assess patient and begin procedures to open airway, begin rescue breathing and/or initiate CPR, as indicated. Obtain crash cart. Attach monitor leads. Assume compressions and/or ventilation until the Code White response team arrives. Nurse assigned to patient: Provide most recent data on the patient, including the pertinent history and vital signs. Bring chart and Kardex to room and act as information source. Take responsibility for completion of the Code White record, other facility designated forms, and distribution of forms to appropriate departments. Mark and maintain monitor strips. Sign Code White record. Designated nurse with appropriate training (e.g., ACLS/PALS), two (2) every shift, to be determined by policy: Respond to area/department where Code White is called. Ensure placement of cardiac monitor and assesses initial rhythm. Direct and delegates code responsibilities to nursing and other personnel. Direct Code White until physician arrives. Perform ongoing evaluation of patient status. Monitor and evaluate CPR procedures. Establish IV line and administer medications according to appropriate guidelines (e.g., ACLS/PALS or other approved protocol) or as ordered. Interpret EKG rhythm and defibrillate according to appropriate guidelines (e.g., ACLS). Sign Code White record. Respiratory Therapy personnel: Assume ventilation responsibilities upon arrival. Assist with intubation and obtaining blood gases when needed. Stay with patient through transport. Sign Code White record. Department clinical coordinator or charge nurse/ACLS (administrative supervisor, after hours): Record pertinent data on Code White record. Act as communication liaison to attending physician, family and pastoral care. Support family members present during event. Act as a resource and help coordinate Code White. Coordinate and review interdisciplinary Code White team. Assist staff in evaluation of performance during code event. Pharmacist: Exchange the used medication tray immediately after Code White to ensure readiness of the cart. After hours, administrative supervisor is responsible for replacing the medication tray. Mix medication, solutions and label medication during code. Calculate drip rates and dosages. Act as a resource. Sign the Code White record. Central Service or other responsible department staff member: Respond to each Code White with replacement cart. After hours, the administrative supervisor will replace cart. Operator: Voice page Code White and location three (3) times when notified. Use pager system to notify appropriate interdisciplinary Code White team. Chaplain/Social Worker (if requested): Support the family. Support the staff as needed. Security: Coordinate necessary movement of other patients and visitors. Manage crowd control. Training and Education All direct patient care personnel will re-certify in BCLS annually. Specialized cardiac life support training (e.g., ACLS) is provided for physicians and nurses as required. A program offering an interdisciplinary approach to managing Code White events provides opportunities for the purpose of enhancing clinical skills, including team training. Training of personnel follows the guidelines of the American Heart Association on Advanced Cardiac Life Support. Education includes review of all policies, procedures, and regulatory standards. Verbal or written test. REFERENCES Advanced Cardiac Life Support (ACLS) and Pediatric Advance Life Support (PALS) certification courses, American Heart Association. California Code of Regulations, Title 22, 70405(g), 70743. Consent Manual 2007, 27th Edition, Sacramento, CA, CH 3; The California Healthcare Association. Guidelines for Cardiopulmonary Resuscitation and Emergency Cardiac Care, Emergency Cardiac Care Committee and Subcommittees, American Heart Association, Part IX; Ensuring Effectiveness of Community-Wide Emergency Cardiac Care, 1992; JAMA, 28; 268 (16), pp. 2289-95. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\JointCommission-Requirements"www.jcrinc.com/JointCommission-Requirements. CODE YELLOW: BOMB THREAT PURPOSE To provide an appropriate response in the event of a bomb threat or the discovery of a suspicious device or item. DEFINITIONS Bomb Threat: A bomb threat exists when any communication is received that a bomb or other explosive device has been placed or secreted in any public or private place. Device/Package: A known or suspected explosive device/package (e.g., bomb, backpack). POLICY Bomb threats do occur in healthcare facilities; however, the motive for making a bomb threat is primarily to disrupt business operations or to threaten harm or the loss of life. The director of security and the administrator-in-charge coordinate the bomb threat response procedures. Department managers are responsible for thoroughly acquainting themselves with the plan and using their own judgment regarding the personnel in their departments who need to be informed on bomb threat procedures. The decision to evacuate is resolved through consultation between law enforcement and the administrators of the healthcare facility to balance the risk of a potential explosive versus the risk of moving patients. Do not touch or move a bomb or suspicious item. PROCEDURES The Threat Threats may be communicated verbally, in writing or as a package. Any location within the facility may receive the threat. It is also possible that a potential explosive device may be discovered on the premises without the facility receiving a previous call or warning. While the majority of bomb threats received are usually hoaxes made in an attempt to disrupt normal business operation it is important to take every threat seriously and never disregard a bomb threat. If you receive a bomb threat by telephone: Remain calm. Do not hang up. Take note of the callers exact words. Try to prolong the conversation and get as much information as possible. Use a Bomb Threat Checklist as a guide to record the details of the threat. Attempt to ascertain when the bomb will detonate, where the device is located, what it looks like, and why it was placed at this location. When the call is over, notify your supervisor and security immediately and complete the Bomb Threat Checklist or similar documentation immediately. Stand by for further instructions. If it is deemed necessary to search your area or to evacuate, you will be notified by your supervisor or via the overhead paging system. If you receive a written threat: Gather all materials as evidence, including any envelopes or containers. Avoid further handling to prevent the contamination of evidence. Notify your supervisor or security immediately. If a suspicious letter/package is received by mail: Do not accept unsolicited packages. If a package is delivered under unusual circumstances, or is unexpected, the authenticity of the delivery should be verified with the sender, delivery person or service. If any doubts exist about a letter or package, treat it as a suspicious package. Mail bombs have been contained in letters, books, and parcels of varying sizes, shapes, and colors. When examining suspicious packages, look for the following characteristics of a letter bomb: No return address sender is unknown. Restrictive markings such as Confidential, Personal, Private, etc. Endorsed with Fragile Handle with Care or Rush Do Not Delay. Excessive postage. Foreign mail, air mail or special delivery. Misspelled words. Handwritten or poorly typed addresses. Addressed to title only, without specific names. Incorrect titles with name. Oily stains, discoloration, or crystallization on wrapper. Excessive weight. Rigid or bulky envelope. Lopsided or uneven envelope. Protruding wires or tinfoil. Visual distractions. Excessive securing material, such as masking tape, string, etc. Strange odor. Package makes a buzzing, ticking, or sloshing sound. If you have a suspicious package as described above and are unable to verify the contents: Handle the item with care. Do not shake or bump. Do not open, smell or taste the article. Isolate the mailing and secure the immediate area. Do not put in water or in a confined space, such as a desk drawer or filing cabinet. If possible, open windows in the immediate area to assist in venting potential explosive gasses. Contact security immediately. If you receive a suspicious package containing an unidentified substance: Do not handle the item. Do not open, smell or taste the article. Isolate the mailing and secure the immediate area. Call security immediately. Ensure that all persons who have touched the item wash their hands with soap and water. List all persons who have come into contact with the item. Include contact information and provide the list to authorities. Place all items worn when in contact with the suspected item in plastic bags and have them available for authorities. As soon as practical, shower with soap and water. If a letter or package is received that is not expected by the addressee and whose origin cannot be identified, but otherwise does not meet the characteristics of a suspicious package, the item should be referred to as Mystery Mail. Once you identify mystery mail: Isolate the item(s) from the building, its air supply, and critical areas. Carefully open the item(s) and based on the mail contents; throw away, deliver, or treat as suspicious. The Evaluation of the Threat Most bomb threat calls are hoaxes, and, in most cases, the objective of the person who calls in a bomb threat is to disrupt business activity. Consequently, the philosophy in dealing with a threat is aimed at analyzing the threat rather than reacting to it. Aside from the disruption, loss of productivity and safety issues involved in the evacuation of patients/employees/visitors, a hasty evacuation almost always results in a rash of subsequent threats. There are generally only two reasonable explanations for reporting that a bomb will off at a particular location: The caller has definite knowledge or believes that an explosive or incendiary device has been or will be placed and wants to minimize personal injury or property damage. The caller wants to create an atmosphere of anxiety and panic, which, in turn, possibly results in the disruption of normal activities at the location where the device is purportedly located. The following threat categories have been established to assist management in assessing the risk of the threat based on the information received. These threat categories should be used only as a guide, and not as a steadfast rule: Category I Non-specific Threats: Category I threats are non-specific (e.g., Im going to blow you up!). This corresponds to a caller who wishes to disrupt normal business rather than one who wants to minimize injury or damage. Recommendation: Dont evacuate conduct a discreet search. Category II General Threats: Category II threats are general in nature (e.g., Im going to blow up your facility next week!). These types of threats are also intended to disrupt normal business operations. Recommendation: Dont evacuate conduct a discreet search. Category III Specific Threats: Category III threats are specific (e.g., A bomb is going to go off in your Emergency Room today at 12:00 noon.). This type of bomb threat may be indicative of a suspect who wishes to minimize the loss of life by giving a warning. Recommendation: Initiate a Code Yellow and conduct a thorough search. Consider evacuation based on the information available. The security supervisor notifies the security director and the administrator- in-charge and informs them of the threat. The security director will evaluate the threat based on all of the information available and recommend a course of action to the administrator-in-charge. Should the security director be unavailable, the administrator-in-charge will direct the operator to contact law enforcement and request immediate assistance. If the threat analysis results in a decision to search the premises or to evacuate, a Code Yellow may be declared. Code Yellow Alerting and Notification Should a search of the premises be warranted, or if a suspected explosive device is found, the administrator-in-charge or security director will instruct the operator to announce Code Yellow three (3) times over the page system and through the department notification procedure. The page will be repeated every three (3) to five (5) minutes. The administrator-in-charge will initiate the facilitys Emergency Operations Plan (EOP) and establish the Hospital Command Center (HCC). Ensure the HCC location is searched before setting up operations. The administrator-in-charge, by policy, will assume the role of incident commander or will delegate the responsibility to the most qualified individual. Each department will report in to the HCC and accept duties as delegated by the incident commander. The incident action plan (IAP) objectives may include: Initial Incident Objectives%Evaluate the threat.%Determine if an actual device is present.%Protect all staff, patients and visitors. All personnel are to be on alert for persons acting in a suspicious manner and for any suspicious objects and report them to security immediately. Searches During the search for a potential explosive device, it is recommended that a low profile be maintained because it can be potentially dangerous to unnecessarily alarm people. A discreet search can be accomplished by management without evacuating the facility. If a Code Yellow was declared, or if the facility was evacuated prior to the search, the building should be systematically and cautiously searched beginning with exterior and public areas. When possible, persons familiar with the area should conduct the search accompanied by security or law enforcement. Search teams will vary in size depending on the number appropriate for the area being searched. (Two [2] person teams minimum). If the security department has a trained explosives detection K-9 team on staff, they should be used in the search process. If the K-9 team is used, the K-9 handler must give direction regarding the mechanics of the search. Department management is responsible for searching their entire area as well as any areas assigned. Available security officers and other personnel will be assigned to help search public access areas and any other areas as assigned. The incident commander may request that security restrict building entry points with additional personnel posted to screen anyone entering with a package. If a suspected device is located, the incident commander may request a complete hospital lockdown until the device is rendered safe. Teams entering areas to be searched should stop, look and listen. By remaining quiet and listening for audible sounds, they may hear a timing device. All machinery which could create extraneous sounds should be shut off (computers, copy machines, electric typewriters, etc.). A visual examination can also reveal any items that are foreign to a particular area which should be considered suspect. The room should be mentally divided for search purposes. Search the room one level at a time. The first level should include the floor, rug, furniture, etc., to a level reaching the waist of the searcher. The next level of the search should be any area or item that is present in the room from the waist of the searcher to the top of their head. The next level of the search should be any area or item on a level from the top of the head of the searcher to the ceiling and above. The ceiling panels should be checked to ensure no false ceiling is present and that no foreign item has been hidden in the ceiling space. The search should begin at one side of the room and work toward the center. Inspect furniture, cabinets, closets, clocks and wall fixtures, sinks and other lavatory facilities, loose clothing, light fixtures, water coolers, trash receptacles, refreshment canteen machines, public telephone booths, and window coverings, such as venetian blinds and drapery fixtures. Anyone involved in the search must be admonished NOT to handle, move, or disturb objects suspected of being bombs, or activate light switches, thermostats or other mechanisms that might trigger an explosive device. This includes any unfamiliar or out-of-place objects. If Nothing Out Of The Ordinary Was Found: If NO device is located, all parties who are aware of the search should be notified that a device was NOT found, especially the incident commander. Appropriate hospital management should tell the parties involved that NOTHING OUT OF THE ORDINARY WAS FOUND. Do not tell the parties that the location is safe. An incident report should also be completed to document the event. If the area is clear, contact the Hospital Command Center (HCC) immediately, and inform the incident commander that the area is clear. The appropriate security authority and the incident commander will assess the situation and make a decision about whether to evacuate. If A Suspicious Device is Located: If a device or suspect device is located do not touch it! Note its location, description and proximity to utilities, gas lines, water pipes and electrical panels. Report this information to the Hospital Command Center (HCC) then clear and secure area. Call 911. Law enforcement will take charge of the area and direct any needed evacuation. The decision to evacuate should be made through a unified command consisting of the hospitals incident commander and law enforcements incident commander. A discovery of one suspected device does not end the search. More devices may be present and search efforts should continue until the entire facility has been checked. EVACUATION The most serious decision management must make in the event of a bomb threat is whether or not to evacuate the building. Evacuating when the threat is a hoax can result in serious implications to patient care and can be very costly especially if employees learn that they can leave early every Friday afternoon if they call in a bomb threat. Choosing not to evacuate the building then learning that a device was present could be even more costly. An evacuation decision should be made only if an actual device has been located or substantiated through clear and reliable information provided by   ABCGIJMʹʥ~iaVDV9D9hhuh)56]#jhhuh}5UmHnHuhhuhw356]h_Dfhw35)hXnhw356B*CJZ\]aJZph3f#hXnhw356B*CJZaJZph3f)hXnh_Df56B*CJZ\]aJZph3f&hXnh_Df56B*CJZ\aJZph3f hu.L56B*CJZ\aJZph3f&hXnhw356B*CJZ\aJZph3f hXn56B*CJZ\aJZph3f hXn56B*CJ(\aJ(ph3f ABDEFGHIKLMOPQTVWX$a$gd2O$a$gd2O $ #a$gd2O $a$gdt $dha$gdXn dh^gdXnMNOPQRSTUWXYZ[\]^_qyǵ٭蓞螈}}yryryrnh hhuht:h~ hhuhUhUh) hhuh+h h/62h)hPhQ hhuhw3hhuhw35#jhhuh}5UmHnHu#jhhuh2O5UmHnHu hhuh}hhuh5 hhuh) jhhuh}UmHnHu)XYZ\]_qwxy  $ dhgd+ !$ dhgd+ $ dhgd+ (# d $dgd/62 $ha$gd/$a$gdP$a$gd}$a$gd}$a$gd2O     > ? A B K L ] _ ` a b ~  ! " # $ M N O Q R j k l m o p q | »ͻ߷ͷͯ߫ߕ hP5 hhuh3 hhuhYM(hh hhuh4+h4+h~hvlha1h T hhuh` hhuh<\h h`h`h` hhuht: hhuh)hPh hhuh+h; ht:ht:5 B b $ R n o p q r s t u v w x y z { | $a$gdP (# d $ dgd+ $ dgd+ $ dhgd+|   ! " . 0 : ; ~pg[O[g[~Op[h?dwhP6CJaJhLhP6CJaJhP6CJaJhUhP56CJaJhU56CJaJhLhP56CJaJh?hPCJaJheM1hPCJaJhPCJaJhOhP5CJaJhOhP56hPhPCJ aJ hPhPhP5CJaJhP5CJaJhOhP5h{hP5|  " ; Z | $  _  f!0*$Ifa$gdIu $IfgdIu$a$gdP$a$gdO .dkd$$IflU0R&rV t(644 lapytU $IfgdIudkd$$Ifl/0R&rV t(644 lapytIu     # $ 4 S T ¶sgcXJhHhP56CJaJhP56CJ aJ hPh?dwhP6CJaJhvWhvW6CJaJhvW6CJaJh?dwhP56CJaJhP56CJaJhLhP6CJaJhU6CJaJhUhP6CJaJhUhU6CJaJhLhPCJaJhLhP56CJaJhLhPCJ aJ hLhP56CJ aJ    $ T dkd$$IflX0R&rV t(644 lapytIu $IfgdIu  9M^ $IfgdIudkd$$Ifll0R&rV t(644 lapytIu  89L]^_abq"678:;Mef7tu̾Ъ̾̾ޜhCbhP6CJaJhCbhP56CJaJhU6CJaJhLhPCJ aJ hLhP56CJ aJ hPhHhP56CJaJhLhP6CJaJhP6CJaJhHhP6CJaJ8^_`abq0bkd$$Ifl0R&rV t(644 lapytIu $IfgdIudkd $$Ifl0R&rV t(644 lapytIuq"789:dkd$$IflX0R&rV t(644 lapytIu $IfgdIu :;Mf $IfgdIubkd$$Ifl0R&rV t(644 lapytIu 0bkd$$Ifl0R&rV t(644 lapytIu $IfgdIudkd$$Iflf0R&rV t(644 lapytIu8budkd$$Ifl0R&rV t(644 lapytIu $IfgdIu IWXbdefhiʿʳʜuiui`UuUhLhCJ aJ h6CJaJhCbh6CJaJh56CJaJhCbh56CJaJhLhP56CJ aJ hP56CJaJhCbhP6CJaJhCbhq6CJaJhLhPCJ aJ hCbhP56CJaJhPhP56CJ aJ hPhLhP6CJaJhP6CJaJ6JX $Ifgdq $IfgdIudkd$$Ifl0R&rV t(644 lapytIu .dkd$$Ifl0R&rV t(644 lapytIu $IfgdIudkd$$Ifl0R&rV t(644 lapytIu2Mcdefgh $IfgdIudkd$$Ifl0R&rV t(644 lapytIu $IfgdWJ hix ?P $IfgdUdkd$$Ifl0R&rV t(644 lapytIu iowx >OPQV^_!vwYZaҬ҇ġ||Ҹ||hLhUCJ aJ hCbh6CJaJh?ThU56CJaJhLhCJ aJ hh6CJaJh?ThU6CJaJhCbh56CJaJhU6CJaJhCbhU6CJaJhCbhU56CJaJhU56CJaJ0PQ_y $IfgdUdkd$$$Ifl0R&rV t(644 lapytIu .dkd* $$Ifl0R&rV t(644 lapytIu $IfgdIudkd$$Ifl0R&rV t(644 lapytIu!I_w $IfgdIudkd $$Ifl0R&rV t(644 lapytIu $IfgdTC $IfgdU #IZh $IfgdTCdkd0 $$Ifl0R&rV t(644 lapytU .dkd6 $$Ifl0R&rV t(644 lapytIu $IfgdIudkd $$Ifl0R&rV t(644 lapytIu \]^_abefrs'jv*WZrsxy,>kyrngr hhuhh hhuh 3 hhuh! hhuh)hOhO5hO hhuhO hO\hOhO\ h)5\h/62h)5\hhuh!\hPhLhUCJ aJ h?ThU6CJaJhCbhU6CJaJhCbhU56CJaJhU56CJaJ&1I]^_`adkd $$Ifl0R&rV t(644 lapytIu $IfgdIu $IfgdUabcdes'yi{qg]] $a$gd+ $a$gdO $a$gdOgdO $a$gd/62 $ha$gdPgdPdkd< $$Iflu0R&rV t(644 lapytIu k{|}~%<Qdhiqsw$+.6;Cjrsz|~ DhBhnh)5\hhuh)OJQJ^J hhuh 3 hhuhU3 hhuhTahU3hZY hhuhsfhsf hhuh hhuh)hhU~hTa@/FVT D!v!x!!)"2"J"K"""$a$gdKG!$a$$a$gd/62 $a$gd+``gdC`gdO $xa$gd_DFHJR "*VXZfR T V X v !B!D!F!H!T!v!x!!¸«¸ɤɤɤ褍hUmH nH uha1hBhnh)5\ hhuh)hhuhCOJQJ^JhBhnhC5\ hhuhChhuh)OJQJ^JhOhO5hBhnhO5\ hhuhOhhuhOOJQJ^JhO4!!!!!!!!")"1"2"""""""""""""""""##üyk\MhchKG!B* CJ$aJ$phhvhKG!B* CJ$aJ$phhKG!5B*CJ$aJ$ph hhuh+5B*CJ$aJ$phh08Ah]Th0J h]Thh]Thjh]ThUhTahy~ hhuhYM(h]Th hhuh 3 hhuh)hUmH nH uhPmH nH uhOmH nH uhhuhmH nH uh2"RmH nH uhhuh2"RmH nH u"###B$J$$&&&('&(/(l(((( $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $^a$gdKG! $ & Fa$gdKG! $a$gdKG! $ $xa$gdKG!#H######$ $ $@$A$B$J$T$$$$$%%%%&&&&!&S&U&g&v&&&&&2'''''((.(/(E(Q(j(k(|(}((((((((((())))ҿʿʿݻʴݻhhuhKG!\h_hKG!5\ hhuhKG!hKG!hhuhKG!B*phhKG!B*phhvhKG!B*ph hwohKG!h6[phKG!5hvhKG!56hcQhKG!56@(()2)d)))-*W****@+[+++ $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG!))%)&)*)+)0)1)b)c)))))))))))))))))))))*+*,*-*6*@*M*V*******+)+2+Y+Z+++++++,',(,,,,,,,,,,,,-.-P-Z-c-d-e-------- h+)YhKG!hhuhKG!\hKG!B*phhhuhKG!B*phhKG! hKG!\ hhuhKG!Q+,,,/-e---.I.n..S/j////0 $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG!---...G.H.l.m......././L/P/R/X/b/j/v/w//////////00$0.060A0B0J0K0Y0Z0`0a0l0m0{0|000000011 1 1 111:1;1b1v1w111111111111-272V2W2hhuhKG!\hKG!B*phhhuhKG!B*ph hKG!\hKG! hhuhKG!T060001<1x1111X2223"3=3{3 $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG!W222222 33 3!3+363=3P3Q3V3W3b3c3l3z33333333 434445484I4P4n4x4y4~44444444444445545A55555555566@6N6O66666666hhuhKG!B*ph3fhKG!56B*phhhuhKG!56B*ph hKG!\hKG!B*phhhuhKG!B*phhKG! hhuhKG!I{333354~44444545K55v $ & Fxa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! 5567g7777 8L889::::;$a$gdKG!$a$gdKG!gdKG!^`gdKG! x^gdKG!x^`gdKG! $ & Fa$gdKG! $x^a$gdKG! $ & Fxa$gdKG! $ & Fxa$gdKG!6667A7K7Q7~77777 8 8+8,8L8_8`8a8m8o8y88888888C9E9L9O9X9Y9i9j9r9t9x9y999999999999999::ƿ h>NhKG!h_DhKG!>*B*ph hdhKG!hdhKG!>* hhKG!h!hKG!>*hhKG!B*phhKG!B*phhdhKG!>*B*ph hwohKG!hKG! hhuhKG!9:::::::::::::;;;;";;;=;>;T;j;;;;;;;;;;;; < <<%<*<,<3<4<F<<<<<᳥}}}vvvvvvvvvvvvv hhuhKG!hhuhKG!B*ph hbY hKG! hUhKG!hUhKG!B*CJ$\ph333hKG!5B*CJ$aJ$phhKG!jhKG!0JUhThKG!0Jj hWJUhWJjhKG!UhKG!B*phhKG!>*B*phh!hKG!>*B*ph.;;;;;<=b>>C????@@fA $^a$gdKG! $ & F!a$gdIu $ & F!a$gdIu $ & Fa$gdKG! $ & Fa$gdKG! $^a$gdKG!$ ^a$gdKG! $ & F a$gdIugdKG!<<<<==}====E>K>W>`>a>>>?(?)?*?4?????????@@@@@@8A>AAA}BBBBBBBBCCCCCtDuDDDDDD0EPFSFFFG3GBGKGXGpGHHHH@IAIIIJInIoIuIwII hKG!\ h2hKG! hg??hKG! hbY hKG!hhuhKG!\ hhuhKG!hKG!SfAAAABDBaBBB>CvCCCuDDD1EkE $ & F+a$gdIu$ & F! ppx^pa$gdIu $ & F!a$gdIu $ & F!a$gdIu $ & F!a$gdIu $ & F*a$gdIu $ & F*a$gdIu $ & F*a$gdIukEEE FbFFF5GGHH IjIll$ & F px^pa$gdKG! $ & F!xa$gdIu $ & F!a$gdIu$ & F! pp^pa$gdIu$ & F, ^ a$gdIu$ & F, ^ a$gdIu$ & F! ppx^pa$gdIu $ & F+a$gdIu $ & F+a$gdIu IIJJ J JxJzJJJJJJJJJKKKKBLDLHLlLpLLLL@MBMFMMMMNN N!N'N(N,N-N8N9N>NENJNRN`NaNNNNN O OOOOO-O5O9OAODOdOOOOOP¸¸hKG!@B*phhhuhKG!@B*phhhuhKG!B*CJ aJ ph h_hKG!h9klhKG!5@B*\ph hhuhKG!hKG!FjIpJJKKKKKG7$<<$Ifa$gdKG!|kd $$Ifl4y!  t 0p 644 lapf4p ytKG! <<$IfgdKG!$ & F p^pa$gdKG!$ & F px^pa$gdKG!KBLDLHLLrb$<<$Ifa$gdKG!kd$$Ifl40 !P8 t0p 644 lapf4ytKG! <<$IfgdKG!LLL@Mqd <<$IfgdKG!$<<$Ifa$gdKG!~kd\$$Ifl40 !P8 t0p 644 lapf4ytKG!@MBMFMMqd <<$IfgdKG!$<<$Ifa$gdKG!~kd($$Ifl40 !P8 t0p 644 lapf4ytKG!MMMNpNNeOOPuhhhhh[ $ & F!a$gdIu $ & F!a$gdIu $p^pa$gdKG!~kd$$Ifl40 !P8 t0p 644 lapf4ytKG!PP$QAQQQRR)R*R}R~RRRRRSSTTTT U*UJUTUUUVUkUlUmUUUUUUUUVVVVVVͿ͐}jhKG!0JUh>7hKG!0JjhKG!Uh_DhKG!>*B*ph hKG!>*hhuhKG!>*]hKG!>*B*]phh /hKG!>*B*]phhKG!B*phhKG!>*B*phhhuhKG!>* hbY hKG! hhuhKG!hKG! hu:hKG!+PQQ3QdR~RRRRS\SSSSTTTT $ & F a$gdIu $a$gdKG!$ & F p$ 2 2 >^2 `>a$gdKG! $^a$gdKG! '$^a$gdKG!'$ & F!a$gdIum$T UmUUVVWWWWuXXX3YjYY $ & F `x1$a$gdKG! $ & F `1$^a$gdKG!  & FgdKG! $ $a$gdKG!gdKG!^`gdKG! x^gdKG! $x^a$gdKG!VVVVWWWW>WOWPWWW[WoWqWWWWWWWX XuXXXXXXXXXXYY%Y(Y1Y2Y3Y9YFYHYKYNYaYẳ|thLhKG!6 hKG!6hKG!hKG!OJQJhhuhKG!OJQJhKG!B*OJQJphho&4hKG!B*OJQJph hKhKG!h&ThKG!B* CJ$aJ$ph3hKG!B* CJ$aJ$ph3hKG!B* CJ$aJ$phhN)hKG!B* CJ$aJ$phh9*hKG!B*CJ$aJ$ph3f-aYiYjYYYYYYYYYYZZZZ[ [#[$[[[[[[\'\(\*\_\g\\\\\\\\\\]]]]]]"]&]b]c]}]]^*_J_a_b_j_k_s_______ûûûôhAkhKG!hhKG! hAkhKG!hhuhKG!h hKG!h hshKG!hAkhKG!OJQJhvhKG!OJQJhLhKG!5hhuhKG!OJQJhKG!OJQJAYYYLZZ$[[_\]]c]]]^2^$ & F7$8$a$gdKG!$ & Fx7$8$a$gdKG!$ & Fx7$8$a$gdKG! & F7$8$gdKG!  & FgdKG! $ & F `1$a$gdKG! & FgdKG! $ & F `1$a$gdKG!2^^___0``]aaubbc5c  $IfgdKG!$ & Fx7$8$a$gdKG! $ & Fxa$gdKG!$ & Fx7$8$a$gdKG!$ & Fx7$8$a$gdKG!$ & F7$8$a$gdKG! ___`/`0`]afaaaaaaaaaaab)btbzbbbbbbbbbbbbcccc5cddBdDdFdJddddddddd eŶh|hKG!B*OJQJph hhuhKG!hhuhKG!@B*phhKG!@B*phhhuhKG!B*CJ aJ ph hkhKG!h9klhKG!5@B*\phh|hKG!B*ph hKG!hhKG!B*phhhuhKG!B*ph45c6cdDdre <<$IfgdKG!$<<$Ifa$gdKG!|kd$$Ifl4pr  t 0 644 lapf4p ytKG!DdFdJddob <<$IfgdKG!$<<$Ifa$gdKG!kdw$$Ifl40 r t0 644 lapf4ytKG!ddddqd <<$IfgdKG!$<<$Ifa$gdKG!~kdG$$Ifl40 r t0 644 lapf4ytKG!dddefQfnfggr_O???$ & Fx7$8$a$gdKG!$ & F7$8$a$gdKG! $ & F `1$a$gdKG!$pd\$^pa$gdKG!~kd$$Ifl40 r t0 644 lapf4ytKG! eeneeeefmfnfffffgggg%h&hhhi)i5i6i>i?iEiGigiviiiiiiiii/j0j8j9jjjk kkk k#khkkkkkkllll$lllllllll mĽĽĽı̱̱̱hhuhKG!hhKG! hAkhKG!hAkhKG!h hKG!hhKG!OJQJh|hKG!OJQJh|hKG!B*OJQJphhKG!B*OJQJphFggLhh`iii jZjmjkMkhkklllKmmm7n & Fx7$8$gdKG! & F7$8$gdKG!$ & F7$8$a$gdKG!$ & F7$8$a$gdKG!$ & Fx7$8$a$gdKG! m4mImKmommmmmmmmmmmmmmmmn n6n7nlnonunvn{nnnnnn6ooo9pDpzp{ppppppLqMqNqzq{q}q~q滳jhKG!0JUh>7hKG!0JjhWJUhWJjhKG!UhKG!B*phhKG!>*B*phh_DhKG!>*B*ph hKG!>* hshKG!hRhKG!hhKG!hAkhKG!hhhuhKG!h hKG!h47nn6oMoo9pDpp}q~qqqqq $ $a$gdKG!gds ^`gds$a$gdKG!gdKG!^`gdKG! x^gdKG!  & FgdKG! & FgdKG! & FgdKG! $ & Fa$gdKG! & F7$8$gdKG! ~qqqqqqqqTrirrrrrrrrr5s3hKG! hKG!\hhuhKG!\ hKG!6\hhuhKG!6\hKhKG!5\hKG! hhuhKG! hKhKG!hshKG!B*CJ$aJ$phfhP hhuhP hKG!5B*CJ$aJ$ph;qqqTrir5skn ~z|_`deԉՉۉ *-.13⿸ hkhKG!h9klhKG!5@B*\phhChKG!B*phhKG!B*phhhuhKG!B*phhKhKG!5 hhuhKG!hKG!BN։RŠ[|kd$$Ifl4pps  t 0~ 644 laf4p ytKG!  $IfgdKG! $ & F"xa$gdIu $ & F"xa$gdIu HJNbkd$$Ifl40p s)_ t0~ 644 laf4ytKG! <<$IfgdKG!$<<$Ifa$gdKG!HJN bdʎˎ׎؎#3489OPYZɏʏfopqtʐːӐԐܐ#$,-=>OPWdiǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿǿhKG!B*phhhuhKG!B*phhKG!@B*ph hhuhKG!hhuhKG!@B*phhhuhKG!B*CJ aJ phKqd <<$IfgdKG!$<<$Ifa$gdKG!~kd$$Ifl40p s)_ t0~ 644 laf4ytKG!bqd <<$IfgdKG!$<<$Ifa$gdKG!~kdO$$Ifl40p s)_ t0~ 644 laf4ytKG!bdf}'qddWJ $ & F"a$gdIu $ & F"xa$gdIu $ & F"xa$gdIu$ @ ^a$gdKG!~kd$$Ifl40p s)_ t0~ 644 laf4ytKG!'TftȑgDvR $ & F"a$gdIu $ & F.a$gdIu $ & F/xa$gdIu $ & F/a$gdIu$ & F" xa$gdIu $ & F"a$gdIu $ & F.xa$gdIu $ & F-xa$gdIu $ & F$a$gdIuirxyϑБّؑ -<Hadenowxْ͒ؒ3BDEftߓR hhuhKG!hjxB*phh5hKG!B*phh]JhKG!B*phhhuhKG!B*phhKG!B*phJ >G#ORn1H 4X| $ & Fa$gdKG! $ & Fxa$gdKG! $^a$gdKG! $ & F$a$gdIu $ & F-a$gdIu$ & F@^a$gdIu $ & F@a$gdIu $ & F-xa$gdIu $ & F"a$gdIu!"#NOR1>H˙̙ۙ szԚ˛̛!#%+IQSW]^_ƿڸڿڿڿڿڿڱکڿڿکڿکڿڿڤڗڍhKG!>*B*phh_DhKG!>*B*ph hKG!>*hhuhKG!>* hKhKG! hThKG! hhuhKG!hhuhKG!\ hKG!\ hoohKG!hKG!hKG!B*phhhuhKG!B*phhhuhKG!h1r\B*ph7|՚̛+_ $ Za$gdKG!$a$gdKG!gdKG!^`gdKG! x^gdKG! $x^a$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG!œÜ8am}ɪNW?@vVbdh뭨{{{{{ hKG!@hKG!CJ aJ h9klhKG!5@\ h?2hKG! hEhKG! hKG!\ hKG!6 hKG!5h FhKG!6 h3 hKG!hKG!B*CJ$phh3 hKG!B*CJ$phjhKG!0JUh>7hKG!0JhKG!jhKG!UhKG!B*ph0amHA*pΥ&$8^8`a$gdKG! $ & FAa$gdIu $ & FAxa$gdIu $ & FAxa$gdIu $x^a$gdKG! $ & F5a$gdIu $^a$gdKG! $ & F5a$gdIuL .5Nҩ:looo$ & F7 p^a$gdIu$ & F7 bbx^ba$gdIu $^a$gdKG!$ & F7 ^a$gdIu $ & F5a$gdIu & F6gdIu & F6xgdIu $ & F5a$gdIu$8^8`a$gdKG! lڪH5Oa$ & F7  z z ^z a$gdIu$ & F7 p^a$gdIu$ & F7 bbx^ba$gdIu$ & F7 p^a$gdIu$ & F7 p^a$gdIu$ & F7 p^a$gdIuai{i;0OijAmm$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7 p^a$gdIu$ & F7 p^a$gdIu$ & F7 bbx^ba$gdIu$ & F7 p^a$gdIu$ & F7 p^a$gdIu mM}Fk$ & F7 p^a$gdIu$ & F7 px^a$gdIu$ & F7  z z x^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7 p^a$gdIu$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu кKr& _hxw$ & F7 px^a$gdIu$ & F7 ^a$gdIu$ & F7 p^a$gdIu$ & F7 px^a$gdIu $^a$gdKG!$ & F7 bb^ba$gdIuwfrTV{m $p^pa$gdKG!$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7  z z x^z a$gdIu$ & F7 px^a$gdIu$ & F7 bbx^ba$gdIu$ & F7 p^a$gdIu VqaT <<$IfgdKG!$<<$Ifa$gdKG!|kd$$Ifl4p t"  t 0V 644 la@ f4p ytKG! <<$IfgdKG!bob <<$IfgdKG!$<<$Ifa$gdKG!kd$$Ifl40 t"n t0V 644 la@ f4ytKG!bdhqd <<$IfgdKG!$<<$Ifa$gdKG!~kdn$$Ifl40 t"n t0V 644 la@ f4ytKG!qd <<$IfgdKG!$<<$Ifa$gdKG!~kd:$$Ifl40 t"n t0V 644 la@ f4ytKG!qd <<$IfgdKG!$<<$Ifa$gdKG!~kd$$Ifl40 t"n t0V 644 la@ f4ytKG!qd <<$IfgdKG!$<<$Ifa$gdKG!~kd$$Ifl40 t"n t0V 644 la@ f4ytKG!ir/1:<ovx&'(+]^_}qh>hKG!B* CJ$aJ$phh?hjhKG!0JUh>7hKG!0JjjhWJUhWJjhKG!UhKG!B*phhKG!>*B*phh_DhKG!>*B*ph hKG!>* h-hKG!h-hKG!>*hphKG!5 hKG!\ hKG!@hKG!CJ aJ hKG!+:s]I5$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7 px^a$gdIu $ x^ a$gdKG!~kd$$Ifl40 t"n t0V 644 la@ f4ytKG!m|y'FGU6*$ & F7  z z ^z a$gdIu $`a$gdKG!$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7 px^a$gdIu$ & F7  z z ^z a$gdIu *BCV2*; q$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu$ & F7 px^a$gdIu $x^a$gdKG!$ & F7 bbx^ba$gdIu eF $ & F7  z z ^z a$gdIu$ & F7 px^a$gdIu$^`a$gdKG!$ & F7  z z ^z a$gdIu$ & F7  z z ^z a$gdIu/o~llll$ x^a$gdKG!$ @ x^a$gdKG!$ & F5 bb>x^b`>a$gdIu$ & F7 ^a$gdIu$ & F7 p^a$gdIu$ & F7 p^a$gdIu$ & F7 bbx^ba$gdIu yp]^_}Y $a$gdKG! $ #a$gdKG!$a$gdKG!^`gdKG! x^gdKG! $ & F5a$gdIu$ & F5 bb>^b`>a$gdIu$ ^`a$gdKG!}XYaAL>I~Yunprv<>@D+/ N m     =   d|Jjluw7Xſſſſ뢝 hKG!>* h-hKG!h-hKG!>* h]ThKG! h~'hKG! hKG!@hKG!CJ aJ h9klhKG!5@\ hKG!\ hKG!5hKG!B*phhKG!h;QhKG!6h]ThKG!6>YaJKw> $ & F:a$gdIu $ & F:xa$gdIu & F9gdIu ^`gdKG!gdKG!^gdKG!gdKG! & F3 `gdIu $^a$gdKG! $ & F8a$gdIu>?@ALcgk qB$ & F< a$gdIu $ & F<a$gdIu$ & F< a$gdIu $ & F<xa$gdIu $^a$gdKG! $ & F;a$gdIu & F9gdIu $a$gdKG!BCUYNOl6HM*$ & F< a$gdIu$ & F< a$gdIu$ & F< a$gdIu$ & F< a$gdIu $ & F<xa$gdIu $xa$gdKG!*~Y $ & F=a$gdIu $ & F=xa$gdIu $ & F=xa$gdIu$ & F= a$gdIu$ & F= xa$gdIu $ & F=xa$gdIu $ & F;a$gdIu$ & F< a$gdIuYuvpqaT <<$IfgdKG!$<<$Ifa$gdKG!|kd $$Ifl4p t"  t 0V 644 la@ f4p ytKG! <<$IfgdKG!prvob <<$IfgdKG!$<<$Ifa$gdKG!kd>!$$Ifl40 t"n t0V 644 la@ f4ytKG!>qd <<$IfgdKG!$<<$Ifa$gdKG!~kd"$$Ifl40 t"n t0V 644 la@ f4ytKG!>@Dqd <<$IfgdKG!$<<$Ifa$gdKG!~kd"$$Ifl40 t"n t0V 644 la@ f4ytKG!qd <<$IfgdKG!$<<$Ifa$gdKG!~kd#$$Ifl40 t"n t0V 644 la@ f4ytKG!+qd <<$IfgdKG!$<<$Ifa$gdKG!~kdr$$$Ifl40 t"n t0V 644 la@ f4ytKG!+,-=aPsf[PCf $ & F=a$gdIu $ & F=a$gdIu $ & F=a$gdIu $ & F=xa$gdIu $px^pa$gdKG!~kd>%$$Ifl40 t"n t0V 644 la@ f4ytKG!i:KI     $ & F>a$gdIu $x^a$gdKG! $ & F=xa$gdIu $ & F=a$gdIu $ & F=xa$gdIu $`a$gdKG! $ & F=a$gdIu $ & F=a$gdIu m   g a *LO!Yk $`a$gdKG! $ & F=a$gdIu $ & F=a$gdIu $ & F=xa$gdIu $ & F>a$gdIu $ & F>a$gdIuw8P?}$ & F p$ 2 $ ^$ `a$gdKG!$ & F p$ 2 $ ^$ `a$gdKG! $ & Fa$gdKG! $ & F;a$gdIu $ & F=a$gdIu $ & F=a$gdIu $ & F=a$gdIu $ & F=a$gdIu?JXN:LS $ & Fa$gdKG!d^gdKG!  & FgdKG!$a$gdKG!xgdKG!x^`gdKG! $x^a$gdKG! x^gdKG! $ & F9a$gdIuX78LNcde   78:hLĹȰujYKYKYhKG!B*mH nH phu hhuhKG!B*mH nH phuh9ChKG!B*phhcQhKG!B*CJ$aJ$phhKG!B*CJ$aJ$phh3 hKG!0J,B*CJ$ph h0BhKG!jhKG!0JUh>7hKG!0Jj &hWJUhWJjhKG!UhKG!B*phhKG!>*B*phh_DhKG!>*B*phhKG! h-hKG! hKG!>*LSV89op$NRxy       ' ) * c e f n      ]!^!!!!!!ὶhchKG!>*B*\phhKG! hhuhKG!hchKG!>*\hchKG!5B*phhhuhKG!B*\phhhuhKG!B*phhKG!B*phh9ChKG!B*ph>:qa  )  !!$$ L^$ `La$gdKG! & FgdKG! & FxgdKG! & F gdKG!  & FgdKG! $ & Fa$gdKG! & FgdKG! & FgdKG! $ & Fa$gdKG!!!!!!!!!!!""""""""" "=">"c"j""""""""""""""##-#.#U#V#b##$$B$S$$$$$$$i%j%%%%%%%%%%%%%%%!&"&hchKG!>*B*\phhchKG!5B*phhKG!B*phhhuhKG!6B*phhhuhKG!B*phhchKG!>*B*phH!!!!""="c"""""##5#W#$U$i$ & F gdKG! & F @ gdKG! & F @ gdKG! & F pgdKG! p^pgdKG!p^pgdKG! & FgdKG!$$ L^$ `La$gdKG!i$!%%%&'N'j'k'P|kd''$$Ifl4p  t 0V 644 lapf4p ytKG!  $IfgdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fxa$gdKG!"&3&4&8&9&G&P&[&\&&&&&&'N'j'((l(n(p(r(v((((((&)()*),)0)r)t)v)x)|))))))$*%*&*'*G*H*~******Y+Z+e+i++++++++칲ƹ칲ƹƹƹhKG!@B*ph hhuhKG!hhuhKG!@B*phhhuhKG!B*CJ aJ ph h_hKG!h9klhKG!5@B*\phhKG!B*phhhuhKG!B*phBk'(p(r(v((j] dd$IfgdKG!kd'$$Ifl40 n t0V 644 lapf4ytKG! $IfgdKG! $$Ifa$gdKG!(((*)uh dd$IfgdKG! $$Ifa$gdKG!~kd($$Ifl40 n t0V 644 lapf4ytKG!*),)0)v)uh dd$IfgdKG! $$Ifa$gdKG!~kdz)$$Ifl40 n t0V 644 lapf4ytKG!v)x)|))uh dd$IfgdKG! $$Ifa$gdKG!~kdF*$$Ifl40 n t0V 644 lapf4ytKG!)))&*uh dd$IfgdKG! $$Ifa$gdKG!~kd+$$Ifl40 n t0V 644 lapf4ytKG!&*'*(*e*.++a-xgVG6$ & F @ a$gdKG!$ & F @ a$gdKG!$ & F pxa$gdKG!$ & F pa$gdKG!p^pgdKG!~kd+$$Ifl40 n t0V 644 lapf4ytKG!++++++++++!,",&,',5,6,N,O,f,g,l,m,z,{,,,,,,,,`-----------------------......*.+.0.9.:.;.B.O.T.].c.d.l.m.~........../ //////!/./6/hhuhKG!B*phhKG!B*ph]a-~-- ._..a//E0r0811#344/5555@6t66 $ & F a$gdKG! $ & F a$gdKG! $ & F a$gdKG! $ & F a$gdKG! $ & F xa$gdKG! $ & F a$gdKG!6/7/>/?/U/]/_/h/i/q/r/////////00%0&000000000!1"1$1%1-1.111D2"3#3$3s3v33333333333333344 4 444+4,4B4C444p555555?6@666666666666hKG!h6OB*phhKG!B*phhhuhKG!B*phY66667U7~7778889:2:;< $ & Fa$gdKG! $ & Fxa$gdKG! $^a$gdKG! $ & F a$gdKG!$^`a$gdKG! $^a$gdKG! $^a$gdKG!$^`a$gdKG!67777"7&7'787E7T7Y7}777777777777777788888888888999:@:O:::::::0;6;;;;;<(<F<G<Q<R<<<<<ɼh_DhKG!>*B*phhCUnhKG!>*hhKG!6B*phhCUnhKG!>*B*phhhKG!B*ph h 1`hKG!hKG!hhuhKG!B*phhKG!B*phB<(<R<<l==>>>>>>>???#@c@j@ $^a$gdKG! $ & Fa$gdKG!$a$gdKG!$a$gdKG!gdKG!^`gdKG! x^gdKG! ^gdKG!  & FgdKG!<<<<<[=\=]=i=j=k=l=======u>v>w>>>>>>>>>>>÷않vlhYMYMYhKG!B*CJ$Tphh23hKG!B*CJ$TphhKG!jhKG!0JUhThKG!0Jj-hWJUhhuhKG!B*phhhKG!B*phhcQhKG!B*]phhKG!B*]phjhKG!0JU]hThKG!0J]j,hWJUhWJjhKG!UhKG!B*phhCUnhKG!>*B*ph h>NhKG!>>> ? ?4?]?p?t?u?}??????????@#@+@b@c@j@@@ AAAA"B#BKBVBBMCaCCCCCCCDDDDDD D"D#D|DDDDDDDEEEEۭ梸h5{hKG!B*phh;ehKG!B*phhKXhKG!B*phhKG! hhuhKG! hKG!6hMehKG!6hhuhKG!B*phhKG!B*phhThKG!B*ph h23hKG!@j@ AAAYAAABKB|BBBMCNCx$ ^ `a$gdKG!$ & F  ^ `a$gdKG!$ & F @ ^@ `a$gdKG!$ & F p$ $ ^$ a$gdKG! $ & Fxa$gdKG! $ & FJa$gdIu $ & Fa$gdKG! $^a$gdKG! NCaCC#DDD^EuEFOFlFFFFGFG$ & F p$ $ ^$ a$gdKG!'$ & FDxa$gdIum$ $^a$gdKG! $ & FJa$gdIu $ & Fa$gdKG!$^`a$gdKG! $ & FCa$gdIu $ & Fxa$gdKG!EEE\E]E^EtEuEF;FGFOFlFxFFFFFFGGGHHHHIIII JRJWJJJKKKKKKKKKKKLLLL,L-LKLLLPLQLWLXL\L]LcLeLLLLLLLLLLLLLLKMM hhuhKG!hhhKG!6B*phhhhKG!B*\phhhhKG!B*phhKG!hKG!B*phhhuhKG!B*phJFGGGGGG#HHHHIII JJK|$ & FB  pp^pa$gdIu $ & FDxa$gdIu'$ & FGa$gdIum$'$ & FG pa$gdIum$ '$ & FGa$gdIum$'$ & FDxa$gdIum$ '$ & FHa$gdIum$ '$ & FDa$gdIum$ $^a$gdKG!KKLLLLKMMM <<$IfgdKG!$ & FB  p0`0a$gdIu$ & FB  p0`0a$gdIu$ & FB  pp^pa$gdIuMMMNNRNTNXNNNNNNN,O.O0O2O6OpOrOxOzOOOOOOOOO PPP-P.PdPfP{P~PPP#Q[Q\QaQdQjQqQQRSSSSfSɸɸɸɸ­¥¥šhhuhKG!>*B*phhhhKG!B*phhKG!B*phhhuhKG!B*phhKG!@B*ph hhuhKG!hhuhKG!@B*phhhuhKG!B*CJ aJ ph hkhKG!h9klhKG!5@B*\phhKG!7MMNRNvk <$IfgdKG!$<$Ifa$gdKG!zkd.$$Ifl4r  t 0 644 lapf4p ytKG!RNTNXNNqf <$IfgdKG!$<$Ifa$gdKG!kdw/$$Ifl40 r t0 644 lapf4ytKG!NNNNsh <$IfgdKG!$<$Ifa$gdKG!~kdG0$$Ifl40 r t0 644 lapf4ytKG!NNN0Osh <$IfgdKG!$<$Ifa$gdKG!~kd1$$Ifl40 r t0 644 lapf4ytKG!0O2O6OOsh <$IfgdKG!$<$Ifa$gdKG!~kd1$$Ifl40 r t0 644 lapf4ytKG!OOOPePPP#QQuhh[LLL'$ & FFxa$gdIum$ $ & FDxa$gdIu $ & FDa$gdIu $@ ^@ a$gdKG!~kd2$$Ifl40 r t0 644 lapf4ytKG!QRRSgSSSTU4UU8Vxx $ & FKxa$gdIu$^`a$gdKG!$b>^b`>a$gdKG! $ & FJa$gdIu $ & FEa$gdIu $ & FExa$gdIu $ & FDxa$gdIu'$ & FF $ a$gdIum$'$ & FFxa$gdIum$ fSgSSSSU8U[UbUcUtUuU}U~UUUUUUUUU?V@VHVIVVVWV[V_V~VVVVVVVVVVVVVVVVVVVVVVW&W'W1W>W?WDWEWFWGWVWWWaWpWWWWWWWWWWWWWWWWWBXCXxXXX YEYUY[Y]YcYrYhhuhKG!B*phhKG!B*ph]8VVDWWQXFY^YBZ&[[[\]<]]~~~~$ & F p$ $ ^$ a$gdKG! $ & FLa$gdIu $ & FLxa$gdIu $ & FJa$gdIu $ & FKa$gdIu $ & FKxa$gdIu$ & F p$ $ x^$ a$gdKG!$ & F p$ $ ^$ a$gdKG!rYyYzY|YYYYYYYYBZQZrZtZ{Z|ZZZZ$[&[5[E[H[^[[[[[[[[\\\0\9\\\\\]0]8];]<]N]O]U]d]]]]^*^J^w^^^^8_G_m_p___r`v````````````aa,a0amah',WhKG!B*phh ChKG!B*phhKG!B*phhhuhKG!B*phT] ^&^^p_``Xaa*b>bb"c-ee$ & FIx^`a$gdIu $ & FNa$gdIu $ & FNxa$gdIu'$ & FJxa$gdIum$ $ & FMa$gdIu $ & FMxa$gdIu $ & FJxa$gdIu$ & F p$ $ ^$ a$gdKG!manaoapa}aaaa)b*b>babqbbbbbcccddd,e-eeeeff$f%f.f/f5f6f>fEfffffffhhhh i i:i*B*ph h>NhKG!hKG!B*phhKG!>*B*ph hKG!>*h*B*phhThKG!B*phhhuhKG!B*ph hLJhKG!h9hKG!5 *hKG!hKG!5 hR!\hKG!hKG!.nn'oo1pJp6qqqqqrr!rrr $ & F2a$gdIu$^`a$gdKG! & F2gdIu $ $a$gdKG!gdKG!1^gdKG!^`gdKG! x`gdKG! $x^a$gdKG! $ & Fa$gdKG!apqqq3q4q6q=q]quqvqqqqqqqqqqqqqqq|u|jYjUFhuhKG!B* CJ$aJ$phd2hKG! h~?hKG!>*B*CJaJphh~?hKG!B*ph hKG!6>*h@hKG!>*OJQJ^Jh@hKG!6>*OJQJ^JhhKG!6h@hKG!6OJQJ^J hhKG!hKG!OJQJ^Jh@hKG!OJQJ^JhKG!B*phjhKG!0JUh>7hKG!0JjhKG!Ujw3hWJUhWJqqqr rrrrr!rSr^rgrrrrrrrrss!sdsesssss/tDtjtkttttttt uuMuNuYuZuvvhvivmvpvvvvvvvwwOwPwƿƶh)ohKG!6 hKG!6 hEthKG!hEthKG!6 hKG!5hKG! h)ohKG!h)ohKG!5hKG!5B* CJ$aJ$phd2hKG!B* phd2huhKG!B* CJ$aJ$phd2hKG!B* CJ$aJ$phd2ǗiΚٚ&gdKG!^`gdKG! x^gdKG! $ & F2a$gdIu $ & F2a$gdIu $ & F2a$gdIu $ & F2a$gdIu $a$gdKG!+, !0167?@io͚ٚ$&;<==>~źɱѠvhcQhKG!56hvhKG!B*CJ$aJ$ph *hWThKG!B*CJ$aJ$ph h hKG!jhKG!0JUh>7hKG!0Jj4hWJUhWJjhKG!UhKG!B*phhKG!>*B*phh_DhKG!>*B*ph hKG!>*hKG! h)ohKG!->x*5ȡ;Ki $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $^a$gdKG! $ & Fa$gdKG! $a$gdKG! $ $a$gdKG!~!=ACvwxS}Оў (*5ˠjkǡȡޡ9:IJghžɾžžžžžžžžžžžžžžžžžžhhuhKG!\h_hKG!5B*ph hhuhKG!hKG!hhuhKG!B*phhKG!B*phhvhKG!B*ph hwohKG!h6[phKG!5hvhKG!56Bi̢cWjӤH $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG!ĢŢʢˢ"#,-67CDMNabchiyǣңߣUVhi~ŤFG:;ALTU_`æ:;<OP h+)YhKG!hhuhKG!\hKG!B*phhhuhKG!B*ph hKG!\ hhuhKG!hKG!Q<TĦ<!S $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG!ާߧ?]aŨ QRtwǩϩک۩,-GSXYԪժ0;<?@v|ɫABChKG!B*phhhuhKG!B*ph hKG!\ hhuhKG!hKG!Wϩ.Z֪A~CЬ $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG!C}~ɬЬ )>?~ȭɭʭͭޭ89:CGNkltuvʮ׮#$%VZ̯ׯ!#-.23<XYhhuhKG!B*ph3fhKG!56B*phhhuhKG!56B*ph hKG!\hKG! hhuhKG!hKG!B*phhhuhKG!B*phH@~ʭ;Olvʮ%v $ & Fxa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! $ & F xa$gdKG! $ & Fa$gdKG! $ & Fa$gdKG! %<"CO $ & F a$gdKG!$a$gdKG!gdKG! ^gdKG!^`gdKG! $ & Fa$gdKG! $x^a$gdKG! $ & Fxa$gdKG! $ & Fxa$gdKG!Yذ"±ñ*ABCڲܲ  !"%',.2378;Oƿ h>NhKG!h_DhKG!>*B*ph hdhKG!hdhKG!>* hhKG!h!hKG!>*hhKG!B*phhKG!B*phhdhKG!>*B*ph hwohKG!hKG! hhuhKG!9VWXݴ(3еֵ޵$'.Ͷ᳤~~wwowojwwwwwwww hKG!6hhuhKG!6 hhuhKG!hhuhKG!B*ph hbY hKG! hA:hKG!h3 hKG!B*CJ$ph *hKG!hKG!B*CJ$phhKG!jhKG!0JUhThKG!0Jj5hWJUhWJjhKG!UhKG!B*phhKG!>*B*phh!hKG!>*B*ph)(е'.K &2=C$ & Fx*$7$8$a$gdKG!$ & F*$7$8$a$gdKG! $ & Fa$gdKG!$ & F p^a$gdKG! ^gdKG! $ & F a$gdKG! $^a$gdKG!*+/0ɷ #9;bqrsvѸظ #&2=ѹܹ$ABxy׻ػٻ +9B¼ܼݼ0˽Ͻ˻˻hhuhKG!6@ hKG!@hhuhKG!@hhuhKG!6>*h~hKG!@ h~hKG! hbY hKG! hhuhKG!hKG!ICa> VǾ$ & F ppx*$7$8$^p`a$gdKG!$ & F pp*$7$8$^p`a$gdKG!$ & Fx*$7$8$a$gdKG!$*$7$8$^a$gdKG!$ & F pp*$7$8$^p`a$gdKG!    -.ǾVW_`qrvw|}&04hKG! hhuhKG! hKG!@hhuhKG!@hhuhKG!6@h;hKG!>*@hhuhKG!6>*@NH6RGU & F @ @ 7$8$^@ `gdKG!$ & F ppx*$7$8$^p`a$gdKG! & F%7$8$gdIu & F%7$8$gdIu45@ALMPQWX_`qr"#,-45:;OPRTU02Xj  xy[\hhuhKG!6hhuhKG!@ hhuhKG!hKG!Z@s)G xk{$ & F p@ 7$8$^@ `a$gdKG!$ & F p@ 7$8$^@ `a$gdKG! & F ppx7$8$^p`gdKG! & F @ @ 7$8$^@ `gdKG! & F @ @ 7$8$^@ `gdKG!\yD`xx[$ & F @ px7$8$^p`a$gdKG!$ & F& px*$7$8$^`a$gdIu $ & Fa$gdKG!%$ & F @ @ 5$9DH$^@ `a$gdKG!%$ & F @ @ 5$9DH$^@ `a$gdKG!$ & F ppx7$8$^p`a$gdKG!./56)QUWXYZqr.Ky}?^  ,-36FGO hKG!@hhuhKG!@hhuhKG!>*hhuhKG!@OJQJ hhuhKG!hKG!R` .?B|rrr_$ & F 0*$a$gdKG!$ & F& p*$7$8$^`a$gdIu$ & F @ p7$8$^pa$gdKG!$ & F @ px7$8$^pa$gdKG!$ & F& px*$7$8$^`a$gdIu$ & F @ p7$8$^p`a$gdKG! OP 67JZtq9:>az{#$,-n *,.04˾˾˾ hhuhKG!hKG!@B*phhhuhKG!@B*phhhuhKG!B*CJ aJ ph h_hKG!h9klhKG!5@B*\phhhuhKG!@ hKG!@Dm:7n <<$IfgdKG!$ & F0 px*$^p`a$gdIu$ & F x*$a$gdKG!.re <<$IfgdKG!$<<$Ifa$gdKG!|kd6$$Ifl4ys  t 0O 644 la6 f4p ytKG!.04ob <<$IfgdKG!$<<$Ifa$gdKG!kd7$$Ifl40d s t0O 644 la6 f4ytKG!qd <<$IfgdKG!$<<$Ifa$gdKG!~kdT8$$Ifl40d s t0O 644 la6 f4ytKG!tZK-$ & F' px5$9DH$^p`a$gdIu$ & F1x*$a$gdIu$ & F0 p*$^p`a$gdIu $*$^a$gdKG!~kd 9$$Ifl40d s t0O 644 la6 f4ytKG!v}4CDeq  LMRS[\ *R/0VWY,h4ChKG!6>*hhuhKG!6hKG! hKG!@hhuhKG!@ hhuhKG!T?*TWh$ & F(   px5$9DH$^pa$gdIu$ & F'  x5$9DH$^`a$gdIu"$ & F' p*$5$7$8$9DH$^p`a$gdIu$ & F' px*$^p`a$gdIu"$ & F' px*$5$7$8$9DH$^p`a$gdIu ,-56PUV*+,-<  bh  km)*+Иј#$UhpFGhKG!@OJQJh8vhKG!5@ hKG!>*@hhuhKG!6hKG! hhuhKG!hhuhKG!>*@hhuhKG!@ hKG!@GW lm~j['$*$^a$gdKG!'$ & FP *$a$gdIum$$ & F *$7$8$a$gdKG!$ & F' x p5$9DH$^pa$gdIu$ & F' x px5$9DH$^pa$gdIu$ & F'  x5$9DH$^`a$gdIu$ & F(   p5$9DH$^pa$gdIu the caller based on the threat criteria. Prior to evacuating, employees should check their immediate work area for suspicious packages or items that do not appear to belong. If a suspicious item is located, they should not touch the item and contact the appropriate authority immediately. Make emergency notifications and call 911 (do not use radios or cellular telephones). Post a temporary sentry near the device to protect it from inadvertent contact by employees until the area can be successfully vacated. Evacuate the building (including the temporary sentry). Check to see that all doors and windows are open to minimize damage from a blast and secondary damage from fragmentation. Establish a minimum 300-foot cordon around, above and below the object. Secure the area until authorities arrive by posting sentries and/or using crime scene tape to prevent access to the danger area. Law enforcement may choose to evacuate to a greater distance depending on the location or size of the suspected device. Do not permit re-entry into the area until the device has been removed or disarmed and the building has been declared safe for re-entry. Report the location and an accurate description of the object to the appropriate authorities. Reentry into the facility, relocation to another facility, and a decision to send employees home should be made according to existing policy. Explosion If an explosion occurs, initiate Code Triage Internal. Evacuate the facility immediately secondary devices may exist. Call 911. Establish a 1,000-foot cordon around, above and below the blast area. Secure the area until authorities arrive by posting sentries and/or use crime scene tape to prevent access to the blast site. Law enforcement may choose to evacuate to a greater distance depending on the location or size of the device. Treat injured in an area away from the blast site. Record the names and contact numbers of potential witnesses. Support law enforcement efforts as requested. All Clear When it has been determined that there is no evidence of a device in the facility, or the suspected device has been rendered safe, the incident commander will notify the operator to announce, Code Yellow, all clear, three (3) times. All personnel will return to their normal duties. Management will conduct a root cause analysis or similar review of the incident to identify areas for improvement and then implement those improvements Other Important Considerations: If a known or suspected device is in a vehicle: do not attempt to search for it. Upon notification of a Bomb Threat all wireless devices are to be turned off immediately. Should press or other news media be present, take firm position not to allow use of satellite dish for transmitting or reporting purposes. This is a possible source of detonation. Be prepared to conduct crowd control should the bomb squad arrive. Avoid use of the term bomb use the term device. Have available supplies such as flashlights, mirrors, knives, screwdrivers, tape, ladders, etc., to assist in search efforts. REFERENCES Bomb Threat and Physical Security Planning, Department of the Treasury, Bureau of Alcohol, Tobacco and Firearms, 7/87. California Code of Regulations, Title 22, 70743, 70746. The Hospital Incident Command System (HICS) Guidebook, www.emsa.ca.gov/HICS. The Joint Commission, HYPERLINK "C:\\Users\\ddiaz\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.Outlook\\LFOIHUJF\\www.jcrinc.com\\Joint-Commission-Requirements"www.jcrinc.com/Joint-Commission-Requirements.     PAGE  PAGE 2 515 South Figueroa St., Suite 1300 Los Angeles, CA 90071-3300 (213) 538-0700 www.hasc.org A COLLABORATIVE PROJECT OF: Copyright 2000, 2009, 2011, 2014 Hospital Association of Southern California Fourth Edition All Rights Reserved m*+$z:ޜlv.a$ & F( Hp*$7$8$^a$gdIu$ & FP*$7$8$a$gdIu$ & F? x*$^a$gdIu'$*$^a$gdKG!'$ & FP *$a$gdIum$$yz9:˚̚CF=AݜޜlНԝ  Ϟ-.`a˟]^fg|V;=ABFG]afhkh~hKG!@h4ChKG!@h6hKG!@ hKG!@hhuhKG!@hKG! hhuhKG!Pa̟֟ WrUU$ & F) p*$7$8$^`a$gdIu$ & FP 0*$a$gdIu$ & F @ p*$7$8$^a$gdKG!$ & F @ p*$7$8$^a$gdKG!$ & FP*$7$8$a$gdIu$ & F( Hp*$7$8$^a$gdIu$ & F( Hp*$7$8$^a$gdIu W P {om (# dgdsgds^`gdKG! x^gdKG! $x`a$gdKG! $x^a$gdKG! $ & F a$gdKG!$ & F) p*$7$8$^`a$gdIu$ & F) p*$7$8$^`a$gdIu kos}ߣ9  "#$ȥɥʥ 滳{sosososoejhKG!0JUhTCjhTCU hhuhP hhuh?hjhKG!0JUh>7hKG!0Jj9hWJUhWJjhKG!UhKG!B*phhKG!>*B*phh_DhKG!>*B*ph hKG!>*hhuhKG!>* hbY hKG!hKG! hhuhKG!hhuhKG!@ hKG!@'ܦ$a$$a$gd4}j$ !H$a$gd`$a$gd` &`#$gdr$ ۦ2ELRT[ø촩삆~w hhuhP ht*fh?dw h}hKG!ht*fhKG!5ht*fht*f5]ht*fhKG!5]ht*fhKG!5\]hTChQhKG!CJaJh4AzhKG!CJaJh`hKG!CJaJhKG!CJaJh,0JmHnHuhKG!jhKG!0JU hKG!0J%12 (# dgds $0^`0a$$a$E 0 00P&P:p+/ =!"#$% DpFdψ7do1%xJFIF,, ExifMM*bj(1r2i,,Adobe Photoshop 7.02006:06:08 17:10:30P(& HHJFIFHH Adobe_CMAdobed             "?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?]W\n[zkx jsg+8Gce̛7?/2ljZ9]8]W^^OX6쮡.?)9{ُck:Wn/},x걚UE}?8B5N"Sa5}Fd FP}1޹fk1 DaZ,T˪6׸9+yXzIWԳ9d4ygͪѺ}ee>6]w־WgCMwfT!~߲ 83+BvfYGrZ1W? >;5kohƯ.SP+#]]6P^dd[1ϳZ]Ԭ3> ?b^(kjtFmIaÄNHzBLK$''^.6<]nů~ϓ~@=;q+U?Ubcu~szL~FEwun(~am&zpjvoZⱞ?;|QF;:~nf 5Y{lǶOn~Ұ+ E~?߁mc>Y7lImuuOmxYݍqN9Tфc[^P)SPuoMdΐrYuuӒSKss+cSj}ٵ,]exIps`1TjC_/}w=niiA}Tfەձ~V*!ǦY^+:.G\ 鎶*B?y}^ wc1*cݏzލq]N.YӰ*>v?6uޮ5^۫ WIHqPlX?l5=ɫ2fzv3~;cl{XVv kvDZ*;]++5굆F=.U˲?SZr1:G`әkGɶX2>nfNO)XXYߓQ}XRoGsךr&Y>(oڱޮ/B?[ļfKl{Z{qU}+}f[}leS]}g?g;!nEcuo|VtޙV%+9CvU=;}8w֫@Ᾱ}X_} ߎzkhaٱɘK!1ӳn;1,@mi^Ө4]_kZ ̿֞}qm/AWS}RVN#[2_n{?5/9814urєLEyo~fTX+R͟eEϫ%W^\CS(h,:[vO%ؗ/~=98{Xpkg L8j*wWdLhޮZ7'Qn5WckM]^KMޣQeSe}-uۉ['}Uh?W>t,c8ԱN;21}omW@3GL*f];~ha{*ǭ-7~܌7GaOժכU,/ 1şdɲ[];*jjtZrΥޓleeXcze35о[4?`WUcj<\,es#e-ekWͿz?KnKC=ŶߙXe5^Oe3fUsZ/ůo=oZ=+SIO0Photoshop 3.08BIM%8BIM com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMOrientation com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMOrientation 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.subTicket.paper_info_ticket com.apple.print.PageFormat.PMAdjustedPageRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPageRect 0.0 0.0 734 576 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMAdjustedPaperRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPaperRect -18 -18 774 594 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMPaperName na-letter com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2000-07-28T22:57:04Z com.apple.print.ticket.stateFlag 1 com.apple.print.PaperInfo.PMUnadjustedPageRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPageRect 0.0 0.0 734 576 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMUnadjustedPaperRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPaperRect -18 -18 774 594 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-06-09T00:09:52Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.ppd.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.ppd.PMPaperName Letter com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2000-07-28T22:57:04Z com.apple.print.ticket.stateFlag 1 com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PaperInfoTicket com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PageFormatTicket 8BIMxHH@Rg(HH(dh 8BIM,,8BIM&?8BIM 8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM8BIMGP HASClogoRPnullboundsObjcRct1Top longLeftlongBtomlongRghtlongPslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongRghtlongPurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM8BIM  0 JFIFHH Adobe_CMAdobed             "?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?]W\n[zkx jsg+8Gce̛7?/2ljZ9]8]W^^OX6쮡.?)9{ُck:Wn/},x걚UE}?8B5N"Sa5}Fd FP}1޹fk1 DaZ,T˪6׸9+yXzIWԳ9d4ygͪѺ}ee>6]w־WgCMwfT!~߲ 83+BvfYGrZ1W? >;5kohƯ.SP+#]]6P^dd[1ϳZ]Ԭ3> ?b^(kjtFmIaÄNHzBLK$''^.6<]nů~ϓ~@=;q+U?Ubcu~szL~FEwun(~am&zpjvoZⱞ?;|QF;:~nf 5Y{lǶOn~Ұ+ E~?߁mc>Y7lImuuOmxYݍqN9Tфc[^P)SPuoMdΐrYuuӒSKss+cSj}ٵ,]exIps`1TjC_/}w=niiA}Tfەձ~V*!ǦY^+:.G\ 鎶*B?y}^ wc1*cݏzލq]N.YӰ*>v?6uޮ5^۫ WIHqPlX?l5=ɫ2fzv3~;cl{XVv kvDZ*;]++5굆F=.U˲?SZr1:G`әkGɶX2>nfNO)XXYߓQ}XRoGsךr&Y>(oڱޮ/B?[ļfKl{Z{qU}+}f[}leS]}g?g;!nEcuo|VtޙV%+9CvU=;}8w֫@Ᾱ}X_} ߎzkhaٱɘK!1ӳn;1,@mi^Ө4]_kZ ̿֞}qm/AWS}RVN#[2_n{?5/9814urєLEyo~fTX+R͟eEϫ%W^\CS(h,:[vO%ؗ/~=98{Xpkg L8j*wWdLhޮZ7'Qn5WckM]^KMޣQeSe}-uۉ['}Uh?W>t,c8ԱN;21}omW@3GL*f];~ha{*ǭ-7~܌7GaOժכU,/ 1şdɲ[];*jjtZrΥޓleeXcze35о[4?`WUcj<\,es#e-ekWͿz?KnKC=ŶߙXe5^Oe3fUsZ/ůo=oZ=+SIO8BIM!UAdobe PhotoshopAdobe Photoshop 7.08BIMHhttp://ns.adobe.com/xap/1.0/ adobe:docid:photoshop:f814b108-f87c-11da-9e92-f07a3f980126 XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)KmAdobed        ""   P  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz ?N*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UBҟY"ӛHDH$hi<ǦF9= &UK×q1K[uO.|G|:aXV xI5bܯ؉q'/^kuKqn$RARuaUqWb]v*U j֚L yL'WD51C2 %b.I*_ᄎ|̍F*{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.wXV>{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.wXV>{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.wXV>{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.wXV>{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.wXV>{_]n-?9|(G$c[sXQ|Iwź\?7un5cG?%%~ns#jt~KK-?G?Տėy[u =/.Uv+{\TF?rD#$NG(k-7:Wf1f?6QPU.B;;C<{Z[CZB? W^#=Gã2^Oz<~Zip$w7b?in9Lvel݊v*UثWb+ʻ ]Q56V_|iZzzѧ_N)?>su5hoMB%󄣋jR?Aߕ~dw7hgteЎoy_mhޒWr8y'MNs'TttE 5A $*??|"mDA,Us돷6Dj.ǫww7N1;fxNTx*v*UتO7V7[vc_>rQ-![Hwi@yOObk~mյ/q^ qTDjWZtk)Qѣb 89 -LFlDH3Ɋ?KoRRD'bKv*UثV":^R:> `t'5h%jz$O?%#k 24XM⨛-JŹM$-?eZo'tˊbƵ3]Z[AK%}q%;tMZF]%fd v*/ȟ[GAZKD(Ip15R|~&?gy5OׂjSPV?R+U? sX_CK7&#e󪀣QmC_?*:HATqWBοpU0>u~rdԜ)$ibGU/y=mJ[?Wg#̜U<[f$7_ab]v*72O5yq+׏NNWثor;͚+5mVb^{+\]HŘ#qR8V4ym(U(v*UثWb_0y~p I3KcodYb#Ž%[Rm9|l(z?VQDFhU~(v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*Uث=f迼%v~(gPv*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*(VƥT4J&Cma0SѤiqǙ㧜c7Wk_L(T.р dyf:Wf ; X)@&:d/m V;xY? .bW]޹B=Mi[F P\$n@rVbw1[!wXuf  b:4+ل+0>eCI]?z\yjaXI)i OWl;4J\:SOxd4Y3uo4ju4݈FfCa$̥kb։g\#m)'n1e3s-)@?u646zY^1\hr_\hyY85PbQ}3E4+iz(k Df|.\q? U^)v* ʯjFBTNEq+}~@M?L`P*1ilPbPuzW$џّCW?ߕ^\X1 Mr #?a__^#zŷ5u-MV*51IW|_4j>fmCVz(H)Yq=MDzu`qU k戦MJWx'lU#]^^ cԴL7:~7.*#*Zo֣;ȨI*UثW~snQieI5kjwOZA&_#jƣ;^H+wsRIN)Q6q$bM㧚xicq!YdSLy'⦾- ثGD3="][Iο?ɑ ˇg5J8 "y/?旫iWnڍ4BBR$ 9_o8RU~_yIۭJYuTQV[?_m l:d)(>(G_~i _4E?{qKeK1?qW>oA#[%OZED.yb FS^YXIMe5=H$hڛF*S)^::=Aq?.<V7bEaOZxW>yNC([^CFb.mFT4dpC;2z_ P_\bb]v*i_.3=ڔI9aX.YWo?ÞcYIJ''U~qWXثWb]C_izWw3a٧WZuO3UTmPI6,qgZɄޤO'Hdb#Sde bUtq0YRp]+4&ͬђnc{ac[ 43ѴƘ4@Gol4#Wh_]֖Q=Fiya5|˛  @PtfbR}Oזu M\Fbn<2kXÙy$!z%Nɏ#^Nf6x8p'/ߘM 'xdv͖=$!pgI5=s)vv*UyW\9 anD'>ce3k~< _*;ivf֤kFy')mOeEzil"$葨Q.k%##gw>1"r,cr<7r*&??̜:ye.x;~wk>b-3Q"y&_S7,aG'QU)v*U~Z~S^As5m?nꐏ?) -97>_폗LE IwoSg9!nN,Wb]v*UثWbZt B1W)v*8K cT_ث,PUثWFo'ܒ*VHHQ@._S+ [z|F>(?({6*UثV#m})Tmԇe_Z޷y.He;(*U|1_E\Le|Lثˏm$̋uRq"և(CaPv !}W1,4 EIGM~s?*H6() (A)[_d.>zk5Öj~kLi.)JqWџ^Aky[ԵN4,̀\F .Ad\Vh߯V̹=|#GG3δoƭ:6w,bQz3 }#rg?O,bv( |}Ϗž$Tt ʢ"P6 ېv*?2T^uD>WḦi>Aye䮟 WJviH~t_U3?Qz9}yR$vРphqǟsX.-1GR2ɱv*UR[@$UQ[=o5z<8\'E/)s&\i'/Y_q-(ݸ/\dpszFm/C^:eVEfye?ۛq eM]^Dn.Ha^G͛lbeA n^ko=LZjú28FVl1'.~&1y?<<ŭV8pٷM=\cBrX d;MI>3nv*Uث6w~3GխZj#+O'ͫ?Kri? (~GhZSC?A?F+4u/D|❦=$a%P*0WbPi۵ k*qR^;^[z$?ݏ7X4o?6\N$jĒO1p+`I<*Uث)'$ .+G 'Fi^Ycsn=}!mmkĀ*9orL v*UثWb]v*UثWbYIN+^8qjw&#?緣qWKe< RX /qUUiCs},_Fb]v*UIg|]aY._x똫Wb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]=f迼%v~(gPv*UثWb]v*UثWb]v*UثWb]v*UثWb;IԟѱIXбJb<2L3ڕX3wȸI?s zq\i'/q*>y$Ǻ¡˓rf H|ܸGRt_ʿ-kkKY |{Ϗžs޹q<*DTT`Lr]v*Ե{=.?Zxi([le!l]Ti/dZ-}䗇ޜ: ˟Ğy9!U4"Sњ?7f|;:#<_\9dyz^{yZj5+ɦC)8 r|I;v*Utqfc@'.~J[Bn_,C\ig/Y^\rl&4&Vܝ#9D}^\ӴDhס}ent`#&9[7b]3ahYjW(QR滯s#y9eiNF?\]m֓Zw\IػSm!0" LrRWb]/&~S~j6-UHۗZmT1s'.Oyo䶇3H\@?\_a?sIY<}1ť?Y`n]v*?074([:6N_ڙc__3tIeLڑnr|:~jΧ)p+1 ?oߴBre9 /jv*Uث?&)_u]?jݡw0*kfYr4n?Q>DTPP(sUثWb]v*UثWb]~yb\a_x PUثWEu!>._T+3s1ɫ|PLUثWDy>[{XƠނӨJr?u=qWxijWpXĉ݂/K}ŧEgn8,h<G#"1Wb]/-1yjǏ)DFXyԧ}?_|A]q[6^d{?_&⯫1CWR@yb^OU)v*?͏E_]l6* qe_Zi:Şnt=CQ]Wb9䵏5mnVX3+<>*HXG @*v*Uq%*}8j&({*UJ-a{M#K 96*#Jv.ũ8O{◗/1nŜd3}#~ybeW`d|PUث O>;ۭR۔wNJV5cҎx5]|Oj?lRbC~OblUN(v*Uy#F[O& nw<-j"MK+]v*Uhi{-$U*(WX'Z%㕿Jϊ1Fy[7% :s1ˊ^Y37u=XGN0lثuC *qCxWb]ygRxY_#bb?#(z*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb=f迼%v~(gPv*UثWb]v*UثWb]v*UثWb]v*VUVZZH۔zkOe,ƞ[᧜hGV?K' ȶ ̆z%*o?j?'^깐=/86ѬQ+drJUثWb.]APˡSCT-6ީIr!}ix#aBF*EQ6@UثWb]v*UثWb]~ybϐ#W:-:^.(@5b_LU5g[\P3*3*3*3?ͣ[ Ѱve q`)x*UG7?'d]|9?1G,`PG^)x*%,EؘT,O7_jb]q_LVyı;')^*& tymXh|U(v*6'\h# G?S4?&M?h(/Ցy?r RUثWbX14/u AS\|fF=22 =_ q;Tѷ6~ҽb FF˴ E.]v*=0GՏ:73A",dܽtߕh?Sӯc WΏM>>GRrl>{UثWbsJ=2n_}krF(XCAVQi)W3x䙙Pٻv*UثWb]v*UثWb]џEK^8{$mW8ثWb]'nwb?~_m+knW_tb_1~|MM\="2ƃx u)x*UثWb|۪no2[?~o$b+"KK[RqN˟_˜혫WbXoZ`?bqKTʞn|z)`(GUe=RD^զYH4ҎTtr1T?:mg;zޫq>_묋gUծk%i$5gsRqUn[{ti%TPKz*qW?41(mVADN=Ez4m?a?ob]~ybeW`d|PUثWb] w5N6)IW?k16*';v*UثWbPzΫe>ti m+r4\UfM^ϩ\s#6<_L0y[~.(QOWQ1CٱT>am- ѸVX}ث0hzƗq>4ViGN1\qsazF .qH;~MtW6HGX|b 8EBHrKWb]H|N8~y?NRO'0^_/XR薆CI?13e_//0[H/ݥ<(g͖=,!83N|̧ثWb]O=gM.J~G_(ɞ8ۏ =ʿq_LPSҟ?K59{D+://"OjS7#n0+fUثWb'iR5fbıA49Aiz_+}~p6 RJ[ˬvüc/S:b_5F?M,W4scِUثWb] ~Sjna2XW_Ÿ ^agGTa'_Hy;:Wؿx3#݇ ?6ye;,16dYUثWbRo5M*7G6]h5d1/^+BA;~ƿt4(t9̖b]mT ?(<<_!t{ŜgWŖL~L0\b]v*UثWb]v*UثWbUf*UثW?󎟙2=E((jšo^?CWbXoZ`?bqKTH򶫬$eI (ƿg@jO,jGVA⫠p8l]EX\Yו<ϭCO=^sS'*FJmT|EA{Ŀ_*UثWbM)KnqI5"||}Ldq9Гzg%QGOhkk2O\iafo) PTP3 r@UثWbRg:~\Gni)l%1ed-+ݿgݧuc͖>Α =hO~cT݊xroRfu}ҰK̷*UثWb])~Mb(VzGxPhJ-xt+vGc]?D?X_b?mS2A}]v*UثWb_xث&?*;v*UثWb<CbRlULM]v*UثWߟknV|c'qK&,"7rI Ayi_VVasOCۿ'TCT?mOw -O{q@m6iIN55'ׇt4ЏK5DX"6laM]v*UlJdE$=-^//hC{87Zwfv-g&f׵JaHiAKg敺f?6m`"$j9$;v*UثWb`ƀRO zO!l,X[x+!?գ~mt!.n=$(S^X%>wMFz/,eO'3b1L1b]v*UyoGhd^DDZf/_I,1sS~r|_mg̈́q'fzA!i/?Qs{K\:d73gb]v*Uث!g/7]}[NOiJ"Q~6|Ynň4M Lt?ݰ>#fϜ}L8>\sv*UثWbR2y˶2jZ1۫Q;Öcr9 /{7ߛC/sb.ScUثWbWGJ4ʫ}MUyJGyO*'/#'ÏÈ 1۝v*UثWb]v*UثWb]~yb\a_x PUثWEu!>._T+3s1ɫ|PLUثWI|||}NxLIST\UƇEX[PwsJ&bv*UثU젒s(Qς߆* R{$sH7͏#J}i8SysI2_'$_dX]&o&Ix6V?+W^dwaH^F5f"*ţ>OF)?V> Nir%? dž82ޟUß󝖟K~}IQ@@6`Wb]v*Uث̯stE~1o:n~m^~#9dzl띊v*UثWb?c4suwF\9]v*UثWb]v*UثWb]~yb\a_x PUثWEu!>._T+3s1ɫ|PLUثTUZ=Ώ=(e/|3i]Զ7c({48 V5ߖuum=Tс~_g~_biveր6?̟'*eTq|dچ(1^+ݿ$_`yΚ§:G?,Rǡu%,BRI1W#Zgvi^ SGeTF]y x]b|.{p/_/.2t; ' rz~'oqC,]JkO,jڃq;oqW6q}s#AJ)@⯢,iZ ޽}/k=qW8ثV(\RUO]ʔmhv/ኾ]v*UثVhU]q\kN⯪1CWb]v*3f1s)6*?Mt&&_db]v*ssOq;5.z1 U𯞼'5bJ<=|'qJ{G|ocv4iSJ*⯴qCWb]roGW|vsW,>E|]qΟu.*v%?brO_Tbb]rWQ)?<_⯑KW r,PUثW3@:U^gMKp}gSU_QĿ 7rSO ;5 sE__}/v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثW=f迼%v~(gPv*UثWb_ߙ:mG 1Ǔf>MD1-)Yd)Iu!/3M4[5y;DL1ҽ[N|4X4`*i[ɳY4}F݄1Fq;v*UثWbTnu$fr@)l A5m4P*or @~'`bJ[ɬyz1-wŒsb OOϛ|ZXc?u56%n;Wb]v*UثW'OYԔ|L?~Y'Y[{TZYOseQCYEѤbzF?GS,5b|^b]v*UثV3_=+󿓔*&G'o8tvLї4q|=Wc *m>ޣ[oQs.[Η6Y?3Wb]v*UثhA,MI?(%VGy9\4V6N$2,z=^0LZK+3N݊v*UثWb^w~hnXwDƱ3zV~zI$ҺaWb]v*Uث/(iG,P +Oqg"|ޛxbo6;v*UثWb]v*UثWb]v*ſ3| BV ';8 ثRUMy+Z(ec+<)'oqWڈ"BXT Wb^9K渠ӭqUoo%ċ H*I'`vcpuR"EBMP|UثWb)Sl\Do|QzVw%+q2*_+Rjvxޤg-&bbrrg'8#_qBYѡ^ޯ Zg^_u' c6=o?,Oz'ߝJ-)ʟ7n(ʾOpBU_v*U^lJiJZ*#FJ+?䬜_heaPF]v*UayDڥXPy*rlU8Jnh+bKUkKlKv)4Lu UWߕvvң^ qwW[OcC0]xG־]L}bP:h 9?W8ث1ռ+VKyH2C %I8d*/(RLuo ѥ1BcnTs }@j6X;oC$GȒb0<Z"ٷX`c??1KW\4B\$uQ9PLUثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]=f迼%v~(gPv*U^Qoi3tDR~Je!@'`+=Zu6[NoB?+Eo3]_>.v=,~LywA֧ˊ>OI9ϯ]=,!/3 '-ثWb]v*U j֚T&dG%Er6ەÍiATc?/K6<]vMhEdY}]VhK/,cHu)).\UثWb]v*U/XkhP^7)ˎb>ołY9|@kG_ޭ(OUO)?mdmbFRgv*UثWbZEK $sW;nzH^rEU X/yu?<"{Fi YܒI'7qI'rCWb]v*UثhA,MI?''DTֵfgAc6/3T]v*UثWbPڦk-p.|˒L2~iF6shZAcQ6uq q9!+)&^UثWb]M|aCW"ko*.Y #⯋_ͳf)^ W#_JAv*|%;& " E_fiumPO??(LW~~~f6 })_^3q8`yuU^*CS.[I?qWba$dhA8ؿ'msX-o$YZ̢@r ϊLUF(v*Uث5-%my|]LͺUWv"82:r'|]qث[ɯf{ifwrK1=ُ\Rf^NfiZ Ļ;9DO_eyx_ :jMZSԠ)_.(L1Wb a[V"+WoݯX_Yn^Q縐՝O(+PXWb+X'Zt[ν6*~U^⯰$oG}I ,[Ѣ/-y7B-F:;n1h>z9?qlU򶡨\j34NIb}>*UثWb]}c8Ǧgwt(RK{⇭]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*Uث=f迼%v~(gPd>XּGgx cz?NMNc QndžSoX)6pg~(jibV^'靎=QzƉ;C-Niٜ$@CLrn]v*UثWb=[Z7z+N@!J3Cv29Fr\OL(>qK1fgX̺ޑLsz7uIND=so qu-;v*UثWb]L-`z\ <^3sdbi fh=ȿ:o|+)+e٤ϯ2NGyzI PP;m.]v*UثT>mӼjouIB'EQHk]^LsQs5m*woo?·O-9ԜrثWb]v*Uث`4_E~MPk)[Cd: fu>}_^bUثWb]v*U~u*#իu=1:7][G۪v*UثWb]eߔ ѧ/-V15f#N.arDUثWb]v*UثWb]v*Uت5i4.(HeoTɺ%C#_⩜VpDyG+x⪸m*pDy 5*ip/mZT~$U*bPd*v],dF'Q[*zeitHWGEpD Us*=Ab+NO5?!Kд$8ӭN!Sg8;v*UثT=mDm"In"SWS~͈x+z_oQ43835?xUhY=g_Qbv*UثWbR9yKv4E B]+{lU_Bn Kޝ#?&Uu?,iZ#P}HKMC#ij< J[^nJTUP*EONO]75=]2ӕg*[oq *TbWbR[Z^U;K{)$V[ySH5!Aӧ^تbƦ4UT=@A\wMz-`xKiRccmF߯Ɗ|U5]Ajm !4jQ mU^m6?#U*DTP UlÌ|*EONS*]RM6͙MA6(6v*]u? ։d_qyWHR++dƒ5QcL銫E B8ơW bWb:+S*6TЬ&GhzcFe/{a[=2F3v)I~>>co'^a%nSWE(t8b'33e,X;v*UثWb]v*oDG=e?xh7O"1u/yuW.KT{viWb]v*UثTCYͨ]C4@+AQ f@XB"{Y[R5˟jQJ/¹Bg##e1v*UثWb]f=ge}arBUثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]<tdb)ʈ/ː߆[!. גc*l%(eoC=b9,,q9A7;v*UثWb]R&u$gr@fm ܼ\|a#./"\=NGv]hGwgΫ;'nGZD7XGuSflykb]v*UثWbYG.uo7K>6}~1j#VX%"~Ti>QQ,K|S7Kb_v>Y|uOs47%ثWb]v*U`'xNz_^t;oU_M)uY}!2HұBYؒI5$Nnv*UثWb]v*U_]wUJDߺFJ3jL~.KwLӱWb]v*UثWbGl j=zCͷgbe[CϞs~݊v*UثWb]m]9{O3ٍU{,ލثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]N*UثWb]v*U1WyI9[iԾQ//3cC)}pr ;}/Z0j/lܟb_Hu93K'6= .]v*UثWb]w*n$h$Up _'_>׍kjOȿn?kC?Kã?p%E$T@Tfw. *KWb]v*UتRԭwa!Vv4Lbdh1E͟>f-i7??F*t:mǼK>O2͓UثWb]v*UثVg]{/l`NôII 0:?'O?'6vY–#% \M UثWb]v*Uثoͯ1~žPބ~cvw'<괸 ;av*UثWb]Eiw bCd% BbhYTH|A4JUثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]N*UثWb]v*żyI)}';*GBÐuOǖdK/._q>'>y<ߗlO3}?c}I[Rs˩M\q]v*UثWb]v*|synIM$E-O\W\ołY9>/妗ջaG}/>yg/?̳1\b]v*UثWbW|c75)q/AL{$kN믇-Lj5wr3'taK·6sE[UثWb]v*UثT~뷱i+yf%lsYBF&yJʺlzezP#|gS))."xbyv*UثWb]v*y[]@ѡG\ 8VYėjz\N®]v*UثWb]Lyn䚺"oQnCd~=OEeY;v*UثWb]v*UثWb]v*UثWb]^rqUWwvHnMU1OVӘ$P,̌xWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*ow,PD;"di>vI՜+ׄTqn?J(]v*UثTezD1BXs o8gv*UثWb]z;jcC[AjÓ/G.o*]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWN*UثWb]}fGkBTh>CU~&fe!e}g`pn~c 躜vgO<sVf$Ovc`)֓k0Wb]v*UثWb!TT+ٿ.? y40ۣf?#ǚF `J,!K[H(cTA@n|]v*UثWb]:6F(o_o9MF1e<y~ ~S7ΛPtr̆b]v*UثWb]}-y RAPFwU^Oj8c0#Iys݊v*UثWb]v*Ƚ_vJ~+ %=,|.wkeQ>jΉ;v*UثWb]v*U_^b އ!DZrK4}q/]|sLv*UثWb]v*UثWb]v*UثV%>5wUUYWyr4 &2\0rɊ^7j~h7ڼ<*‹*kqRӺ@7?,PUثWb]v*U?`#kث|9Uy+4zCA%ӌ'~y}|@' V?<P,+Z4QqTL5v+ܲo7UY,_SJ6"'O6V;Txb0AK;}d_Vb]I<]'ʐ}gXX׊ݩ~7b ?]óE5D-,H1Tby+LvT0تϿ9j5»&ES7r{ ^*~d#"}(@جR~F"W V'C[-9h/7HqWxثWb]yߝ=fkc)Zn'IOHɊ{]׮خq+M?#XߟrE3r3dn#Q2ğ bL%㭿mͣhxG}lP7SKRx$WF Q8Wb]v*0PYܓk-A1"3|\璺ŘȵO516 vD-qƸ&_O9) 5't̼U8?%9T?-?:7ZYȂs h#E &-W/1W8ث6>q%Ѧ.OuRXZ9"r(( s7p'ɡr?w1op-,6o(K6Լuupn-Ս6/&av*UثT~kꚬB*Ic/7kb'ֿ*x.^ޯV1WyW[qe jCc܏##7* %~h-mE*i$쨃|+0iV(dWbXߟc5;'Q/ڑe⸫cԄɧb¡0\RE9i _LG\Pa-r<~%\]`־BSO=}kAAYOhuU7i%qZBG4 .eqBASj!J9=jWvtוcLnbqCWb_N*UثWb^mۦo//AU?C>/haE,L\,ڡ O)y6*UثWb3T=؞Ź9i'ȿ⯱<6ce?i}qBuv*UتSi/XmRh͟7ykm 4I|إتcysSwӭ'LNlUum~yi/ȣ1T bbQn?c!?*;yϚ ;I!ݏpO\UUא{+ej9]yUR1Wb_>jfԹ<7쑥v$_8'+K48Ifv9;W'Wb]yMfFTxdJ}|]2 Vs;qv6|/qW8ثWb]|%ZkVW)*oi5pFPI1T_sSIS8ѣb v Un*mk-ӈѤsT~QOY'M49n##x0 8*8X[YH6_Yb~QӼg;Wo8d+ث8gg- ez~=o/kqthأ#[}GO8aAokfԾV"h?o>l8Wb]gs._)>*K//o*V.%y$5gsRR]v* :t# b1W_ߝqVA0eQfXWbw_Gcf#(BAaFu^8o>Mo@F B=H??)xV*U5:qD>k'W^U4}^ O=3To&V'ޱxVWeelouI½X*'vW,ǎY Ey?Z Y\ A/W'|QǼRbj6N Wb]v*UثWb]o˿ʽC2 VX)ïĿO-F8++yKN򽨲YoU9,1)lv*UثWb]v*Uy^N7WGQ Nkoq\4?ΓFlKf%:U_EΟ1Py ͔-`UثWb]v*UثWbVrV:cFDf?!J/*i0PRo?UO>S\OGdCsWb]v*UثWb]\,uI3s t:syl7b]v*UثWb]}9 1MjQ7bu7'g7.!Ӽeqznkb]v*UثWb]v*UثWb]v*?|rk[ea]/9]O˯2-TGIs7lU@ ]v*Uث^N'՞*Z>*Qn5+/o<]ݺw8 Ӭau{F JwOi~&f3({P]7Y>lSC12껷sOqWʟCTvg`)ZuA2?_TR 7=9ZbqCWb{bz7sƟɱWαuK߹v.{~ʯÊPXȯ[! spE FH>5⇺@: UثWjm(dʿˊVʺM)=})iOY_DRpm (M@_mb] B :K˷A wnF⯎65n|V2p"^޴2_mK^c8>j~dgp M`z4ܯ}ONJI򶔁-vJVlPޯS}Y \ڍm#!x/]m>)"m5Wt_cv*'2$N+$%٘熼NiXY:A v*UثWߟ_ӣiXAYOƟf/IK1Wҟ6E/V@;g )-:~܍?myv$q(TQ@(UCtL΀,}d⯑2?//<> P:Ʈe5e,qsixז*;v*ɋ򡘊NyE31WXثoŝ=!k͊v*UثWb+)a!kRv* ⯻ *(OWb]v*WRmWc◶KCX:# !owGݎVoPYF "z"(U%]UlUg?㹨\qJM3qS_7|U(Cj]9=RE b=%-,<5wOf^R4Sͨӝ5_[b_~kYgN20#űKY_Mx仄0ג_ub]xh\$ʧx.k֟2kY~竓Z@Ÿfȿ*OVL^uC S'dm2}^0yϞtR67`T!%cCrxOXwAo$ӵ([e?, bWts0tu4!_iTy?;hߚ-A%_?c3,UثT.i5z藷${(i1W8ثWb&44- 7,R SwqG*5!P;~*UثWN*UثͿ1:<Íޢ6*]zTyMϦmP'~c6;}zWHxT],)^ZثWb]v*UثWb늽.MH&%h-;j8F]?;,N- V,Ā*"orJUثWb]v*Uثߞl`חgQ @R7cU0`9Mseŗf5/_Q_~ʯ/ubdflYkb]v*UثWb]v*oo%}nO1]-bpW|o<YGhf?vZ,Vx<лb]v*UثWb]v*#o[ZVu_Ds {RnecUثWb]v*UثWb~nʚZU(P~gl>|C,x[otu x-X<3(taQbh6,+RUثWb]v*UثWb]v*UثT̺zs-y)TUS|8໻.sYY1/GW=C0myWb_iJyE{KnSWǔS3UثWb]k[-O Fv,ƕUbo^,#In"]C|~*@: PUثV'XZ#2{sv;b)%1yKanQ_obb_;WyXhhkbxW=1 E=$PN@Wv*UyDePZXɌِ|PcqWƿ_27[v7_ubb]mkǕ,0Di!V/g)x.*O?x~Xԍo+ⰯXPUث*+r<:t^To#fNJ^Q}o8xXNܮ41 /v*O?-h5#?ڼ4_U>)zWWdnĠ<*';v*U_WMk\>F?.8di?^)}y__8RU1rc\]v*UثW^fy(cF/v 'G}U~HQiݩx?*Uث(^i~ъ`~A,R!yLynȃ}ߊv*UN*K]./X`U?F&FHDY|u}^H?|o~o OVev$W^UثWb]v*UثWbvs^̖M! )+$иjڀ>G}kL1;>Cy}OX[v*UثWb]v*UتM6YyZ+ʃ;Yv,G)Փ ,J|~nvDecOuq Br)&^UثWb]v*UثWbQ}څVviQ1HDYLE<|[Vf O7Ylr9$dz.8pk6;v*UثWb]v*UثW_?^yGXe8]v*UثWb]v*UQE[f'[3O߬y}'pUثWb]v*UثWb]v*UثWPy$:4f_WqQ b4=&mb 6V[%5/|RO+Y|Ɩfbº6y6r)5u<[1W,꺍փ+|I?ˏG_Lbb]v*'r\0cr \kte\RUث{91qF.c'Xr[ v*Uث[2>GYXNn* |2|\[}|9JO")(InX㸫WؿkⴑԬXB~& 8,?%G]v*ߐZzZeM|FK~!O‹4pR;v*y[F$#%ӟ$e#.*^k仹bLǩfY\ݕeĒ_9z(eWbXߕGybh|}H5 >(*z>t3Axے]$_x,PUثί63ydnVӧ 2IOXbtM2k?튻v*U 0ju֜v0Iث?"&5k-Yuilلq0bɉy}gءثWEu!>._X0,/FowQ RWc7?4gzF_|ocn2_lb]v*/ʟșM^]{^+hOm*m]|Oj?lRbLt1&}]-/o'ؑJN*oɿmԚ$sގQ#TSIW }I!?«ױWb_q[s)a*KC}Ŋv* rgb&Xv/#?wK^aqWK=*U"9H)QQ*K;v*Uثo*,%o);p䤞1KU-$'6 : T⯾SZ »"}#|_~!g˘;iv*UثWb]v*UثT] ilfYâ͕d18@}AoYc}M\RI '*zQ{{N1YUثWb]v*UثT趒#y3ԿUipR_&~aZmV/Tcƪi Q{6c̦b]v*UثWb]v*US.:+1:ˏ& 1k;b]v*UثWb]v*U7>yoR#괆Ԋav*UثWb]v*UثV*j6#_2 /Q''ȿ9f?2ITO?[ UF(|93o~`]R%:a=H/ S(O.ֺ_jUrurLUwp )T:U%?v(U]v*UWf: hȼY1K1Wb#XRNฏ6_^/{`\ ##oZU^]"H%oظѯ'$lP"%Q$lTj8UثWb_;Wl$BρՋ ϘTN yc+q^=BV0ۋIh[矕5*^ iO\Le 0taPj#_v*Uث+[6}V͊}1n6;gKxB]?h}/< ثWb]v*UثWb]v*˚/}Y|y89MN_d@ey;v*UثWb]v*UثWb>LjЋΗBoXfv*UثWb]v*UثWbQ~>pb& ADHQH$+3j"8TzEAungU88?γ v*UثWb]v*UثWb]H|eƉw9A(w?+VLU4df$z{Vx$i=7/_"=y/Nybkֳp&G._d??6(z*UثWb]v*OȿC$?q1WإثEbNJv*UثLAf4rN*g'Z$E/#V)z⯕jמbvɕ_DbZsO.bhH_|X)ln$f7 ,Rq_~ߗouC%7,U(v*UثWb]|Oj?lRbLt1&}v*UثWĿXn*ʿ*)./_qbb^S9/?*5;ES̑I._kKD"򆚫]fo*UثWbo m_be_)b%/B]Jʈ(z*UثO1N3lRqC9gO(zo}"+ؐw'~'%_]ƕw- rSLRS&ʺju;I{:XM Z,a[C{bv*rQJS֞g/=Kv*U'w6)} 8C3G=|95uW͖)-#uf)tqK\Uث?1~pUoK~̟ȾRoڗ})8YZ_cNJ^Gs)61u1WXثWb_=f迼%v~(gPv*UثWb]g~s0NT_',*ZH?`Ӝ/4mEK >5W$sSAdUثWb]v*UثWb9U;<)41ax S>u,ƤIΑ5]v*UثWb]v*UثWbyhy8݈C),}bid󝶆k3Lv*UثWb]v*UثWb$Ҿ[ߨ[O,#ͯgNGFq|v*UثWb]v*UثWb]TEhBYM#V0{AWyũʓOَO?kC5`m.{\Ի'b]v*UثWb]v*`hSIFyXB4_H($SsID03_%eY _p1Wеw _p1V1gI "eBUhhkX*ew-[Ibuta2JA_xyK1yJrrO86]v*UثV5Oo/yYE$pFCɱWqSNnBLEWnF&o4Y]̶xQeASGUثW>e{&FH:Iy#Yc({v*UثWbw̟z*u[(dyw-vI@>@NE}LUm7L elye+|?/="XW_fy/4)MD =WToثޱCW?p|ת)ryإ⬇YyMm.Ou ]v*UeϭQŸ|k'o^e nv> e_uE_ibb`qO2~F9_*bǖ$.Z{2 ?{6(z*UثWb]v*OȿC$?q1WإثEbNJv*Uث5bja\ŒQ/KɾK|zt%UT2M)%uY _p1Wеw _p1T̿d.}_W$ hHOy*U㯛Nyi,ji5zP7?t=Gv*UثWb] w5N6)IW:cko]v*Uث_?Ku?P,7e_HbCWbM4(?*}8z.d?j#,gqCqWb]y7ʜYnQ<*3}M#m 702~b]t<&/?㙨t⇺wH$ddu= |C䙼ͥKVp7lR1U[[m%Kte4!V_u8=M-HP\~̊>//ءVq◑\MuLUV(v*UثW=f迼%v~(gPv*UثWb]ʫ8ɇMQNb>/O9 -/KҭEo⪽ߵԤdlDPEdY;v*UثWb]v*UتO4ZcNT?cQݏ9n,G$C^L1k^`SnSL>~/ Y99)nXثWb]v*UثWb]v*UN4-[GxįY?{SU><=/E e;v*UثWb]v*UثWbX&o@Q"<]?{:.di0ZsC$>8ε݊v*UثWb]v*UثWb]zwm8Xj@7c+c+ hM;c6:,зuo[41ń+fUثWb]v*UثV=_96*wvμf=y|yIѿHG3lUثW}gnJ gKai1Wث/ŏ7z^\(?nj=N =CޱWb]CZ\Q}fv*qk3/ƫPV 8Wb]Gv2iouAE?O9˓q_0bjTe{6cY"Q'1WXث6?:<0.Ȝ?/&J".bI5I2b*1ULUثWbtZ dpe]ߒHin__*b`]򢟅|&_Vbb"4e )EH_|R\U|RN!)1W>^Yӭ8S5 O80]v*U枪5_3WJjO*S\U⟖KM{ ª->Bcu$Wث޿t}T_Ibb]v*UثWEu!>._X0,/FP>wu[KؽQX8 c*UثWb]v*UHk05bNO$)yzERi!y7G_u PUثU“J#Bbw_iY=ֿqlR⬟͇ʚS#x*yJDuC *qCxWb?;x|,2+oȎ5t <[xˊUثWb}I#{iVaXl{S튿>KW)i V2}uq&1Wxث$WBHEJ?/*utռܡd2UثWbe " _cإK{7̓+؆с>r*;|9[EaC%a*UW7SE4S3Xv*UثWb]ub }NhF(MW|k7WF\7͏*a8z8*-m0A$ĸlPUثWb(g 9m$88Wsyr;i֞DP?6(zn*Uث[OCͯ'/Y:S,jglvWo Y~ŜߘlPUثV嫹٩=xGr9|S]u{>]w Qo\?yK=qCԱWb?(3E0MiTOZ y{T~wO쪾]b>k^)dq:._W4=} [6ֿ浪#ɊcRO6wZCPI"V&=_#8Ww6[JL%Ŕ)SY/ߝ⯶4z^SӤL?eb~*U|9 EfijKC~'o{{g\L<٨!R>Xg_Hbb]E{h^c{֖ڈ3>v*ht:8AvZ$oJvo*@bXvc-aXЎnHo|o;jqRԞv1c^?ϟlRF}/6d19b1Ky__8RU1rc\]v*o27+[OxЄ'r)H-tqyNqT{,AUלuX@@cY)Qc_~+t{m6x[۠DLߴءv*U(UHE}◾%n0}aq_AbbX2,&%^3B<Oκ2jB>I]v*UثWb]v*UثWb]}%8(ƿ9Lև?OW[v*UثWb]x'yZy5%d?>)|݊K e܅z܊e}v*U$門:+zj?z]_>'plnG=zO/1`jC|9Q)5'n1KƱW~]F>_,5k5W _Řܴο*kJ W\H^1lPɓSynT"T#%4~uc3=\[#?v|}ut=+h 'U鿒_^E!;z7'oOqWȁU(t7|9ZbŁͱ{sn?)xv*mK1J$Ti$1W{=iAK䷐Ku#bS2^[JıV7o_,y~2^|}˵e,5zr/_䥄bCu)[3ӑx\9*5 P@ Wb_7GV74Ĭ2SjAqfO?/] fHɦh$#ԂJoz~ˊB`jpg6ܨDbI?(E_>UBmrGNJW\MafPzDj %?"|K1WNOo/"o?C!O_KHKkdDQ@T{b\UثWb7cEh.?J*k) sDPFS*8Vy2yR5Oh,7CUeAJU9ex 4ؙ+XA/ɏ2jhaXlPrFIcV^^^k7Us%任'v_DR[esP&eOlR]_X.^P՝I_{2#5Ħww?M.-cѮ&nʾGiC2]v*yWMMԤ4[h^MR}8RI5;^81Ia3q[J-{ȇA⯫1CWb_>N~^Debv0~_ܿ/qWbǓ쥽lm 5b1CWb]=f迼%v~(gPv*Uتw)^yPM6|M(H/frF(mnj4[yOʶ~WMZ"n~ӷH7ڿrr_(`gmf[<#^?g\UثWb]v*UثWb]v*Uث?{N:ủnh{Hw/fCv*UثWb]v*UثWb]v*UGwW4jt?EO}p]>!Yu]v*UثWb]v*UثWb]}%8(ƿ9Lև?OW[v*UثWb]/%8Sty ~/k>-WUծq3w=I?qJMCɩRj G"nX<9E-ŽViH̐HiV!*WbbX'歷#~\(>ԒeU'|}{5]MK(D_E,R]S?ϕNo"uQ4sÊu2U14Yerz%&xɋ[͆:umu'/(]v*U|Q<#K;I'-?oVK2ل% O4m.;xT*"(D]W<#viWRUثWbW"4fc@䓊qR/|c靦qrI,Ѵk==?N`QQEif#1Wb]6U*;28Oͯǻ%Tm=֭$J'K◉A،UUثUH T@UPI$ */MG@l(H)O}#ee)ki`*"@1B*UثWb^C"lXǪHh`:Ufa/_aU|itiyCe %(1u"3b[jB1:7bv*yvU&(~iSqW?.U}(-zO~,R±WbYαfdeCIt~+>|ӤխLRzDr@ T~)C4]K|_.y5:ʋ[_&i~vjyQdM9O/H7&r>LZx◛[|99gۭYyrPV+olU{dK0ebAj#?~ v*Uثȗ[ ˩Z'-/AGW~m^ v*"Fk[M>$TtOVWyG8o=n4a\?=|\~G v*U柛ߓ6wemhB>'KQ.5 [οèdoR|8,]v*Ϳ/(:Hke_@B7LUg得Oig;>ʃc_ŊV*UثUoO35,ƀ*b?7>pIi1t~9Bꏗv~Ę㸪ܶs%ͳ扃V}WyrWKP4E'zo潿ᠶC)ˏ(gxT6cv7SXqlUϞti J4vֿ6rڌ,#S]v*UثWb]v*UثzySGQ4=o/BfF ?U6O6wHY$9[<6]v*UثWb]v*UثWb]}38oym\ihD=fv*UثWb]v*UثWb]v*U-&o >}.V)Щ=ꎿ#|kca!!ф&(8; m2x>YuqLq78)~XثWb]v*UثWb]v*UثW_\kɸ3Wh~o|ջb]v*Uث<8yTXI.32R ~XqʰyTɸQ8@ Aa3<qTqw-]vYx*y?DejKQn'MQWo_Wb^y-+j1D" SԎN;Ŋp3yR1F2DLUBeGI5S7A 3ܱT$>U:,o[幞(oJVN-N6)OÊyT( l[^37|&%i*F -%QBS~/ag88"[m ƑO\U)?Il.m$QqV/{8!?Tav#dإB-`%UPS%mqKNoc.MC=KߗztH⒔2C9I㊲*g^o- XkKuO} z͹=>(Sb׿O(H?-6)B8֪ 9?wY&8a j?\P*~Yʴm*aj2NLY>*UثWb]a~q}oܶx'bOꏊUNnEHqE"1)E;POqVG(mBItQWօUqR8#]v*UثWbX/_7E+E|2/O>8ً*Ile?)I#S֋w{̟⬻?:Uu/HA'ɏ'ؼXNi[ AneWb]̏m;ϦV?\"jqyTɸQ8y= _ݦԮ*m"L[A\1yVaD7Q(?r7S}{fdUb E=V> 9~8=X/G i{ue_HcSUumXͷ"I%@?!_*8^& XF*baRU?r91Wh]y..R& LP##NkOo~U`(6v*U~b]Zy; e""74dSVk8X~]?q j_'ʇL-fe.R/_$lU/⷗Iգ?wWz ?/EiU{3foL1WbX矼mM47 ENQ Wyϖ[0?k 06yF2 E;ӳLw㊫7㟓 [H=i?U7/$KUwz<3LUXݟt98A xݾ&SLUثU;'ԩqcˈŤuÜcos.*8$$ה''kT&md7劥-yhȮЂ?BbYtm2;+(+xT*"*]v*kY|nlkxa=doU4m ߄%Q <qKX H|X8?pWbn8tJ4^(;G^o+,%~ lPEB (1VWb]J|ǦϤ\pfрvlUp*yOn-~RR%[*M8OJ|y4gBӼ ?ZzizZqwf;RHߴ6ÊXWb1.K{NN\[XOG] 硚jSab~k~ʢv*UثWb=f迼%v~(gPv*8V ;W_K;Oި:}5诿\z"t<1gz.kb]v*UثWb]v*UثOϟ:oXnմmѥ?޷ؿgG#OˣQylb]v*UثWb]v*UثWb]'`#I)?e\uD1ثWb]v*UثWb]v*UثWb%1gv+whn ?kN_ʹ8 e!/3t]v*UثWb]v*UثWb]lzc_MhcNC~;v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*U=f迼%v~(gPv*ȏL'Da- uS?%i05v]v*UثWb]v*UثV5m}DS O̍>/`hϓÍ=wi{c-®]v*UثWb]v*UثWb]}Q (9wﴟ@z`9]v*UثWb]v*UثWb]qs{/bV#sCEOh jxf^o ثWb]v*UثWb]v*Uث/G?5v?d?Azj݃Wb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb_=f迼%v~(gPz/]/ڰ/_cuXGKGyjk +AO;6r2"pl݊v*UثWb]v*UثWbw=:S[O>j&YrXN|^\)vw>,Ǔg_2M(|v*UثWb]v*UثWb]v*UG;AH9[GUcUثWb]v*UثWb]v*UثWbXg=n nOΟ\)X2 /.I hdCH߳F< Ӂev*UثWb]v*UثWb?pg=?X铺ߩv]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]=f迼%v~(gP"4fc@䓁_V~Q~^t ?H܀SOj,c6 owN[Wb]v*UثWb]v*Uث$|{+} &\7(ȟ݃|_6ɗ]f%ϙu]v*UثWb]v*UثWb]v*U󌗜 J@?/4}7bٚghUثWb]v*UثWb]v*UثWb]˻_9z/H"jt?',N>|#(|Wzܚ~x=O#~gO ?8( Wb]v*UثWb]v*KqQ7sݣ;`UثWb]a_>Dcp-df.>?d^MBî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U,:]cXuIqWаua?']Bî?O늻\tw WX?*s\U?DV.}p.>?cY*UثWb_=f迼%v~(gP{ķpjAV/j5xl_A;v*UثWb]v*UثWb]|OnoF/ܤgV>/;bYv*UثWb]v*UثWb]v*UثW6sfM凹F_5]?vT}v*UثWb]v*UثWb]v*UثWb]O/˻/9Zz3&+O8NOX򿙼}(J6o,Cn]v*UثWb]v*Ugn G2wZ[=_5nثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb=f迼%v~8TLF>e?|xÌ>t4hG*v9IHz(DPDY;v*UثWb]v*UثWb]?0~o5>9Ӛ|%u6UثWb]v*UثWb]v*UثWb]/Sw,d&#O k˘zc?霝4f[,.]v*UثWb]v*UثWb]v*UثWbj Eh̍_~l42 /{:Ѽ^vO2i'G_:\?Һ,N3̖b]v*UثWb]}%8(ƿ9Lև?OW[v*UثWb]v*U}7OoNIO1V5?PnW0Ȭ QثWb]v*UثWb]c@7$Tpbb_ګ̀ıT -dISqUlUثWbf &u8S/4Xè3 ?,Ugoz220a*v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb\MqT_7hбIoQP ?,Ug[_'i*LzWb]v*UثWb]v*UثWb]v*UثT̺]wwv򼨧oflUR[j,!}9UثWb]v*UثWb]v*UثWb]v*UثV;=y2RKIO)?q㊰ZqVSͯ-y}zJ*}C⬿v*UFx7E.&t9!](Ir^?p:,bl>wϳv*UثWb]v*UثWb]v*_]{ӵ+䃄LΆ_txo]CWb]v*UثWb]v*UثWb]v*evssO!IܰKx9d_Kt ūRUثWb]v*UثWb]v*UثWb]v*{MboYQa,2pQ_8eJ^yprӷ$RD??߫ϏnM6.})x6N Wb]v*UثWb_I6=q1&{~_'uSVv*UثWbRo6ʖj3kNs|8O>{kiⷑl @!y?_?1KI=N*9BI AA^yfEF,+FVoOϙ|c%}*j9]i\Pb /t}4\Kn]bvJGN\ |4?w#Kƚ\.|V*W 'ՊiG5b[KFy.nWg pMrqCرWbX潯''ъe+NQg ʄDXeKQzfwL.l&eS*rkۈO40/! ˿?E>*;yb%HkO'?k|-oR5k 1/3b9ZK\M%ã )r6W=+͌\K.xūݟ&*X0bb1jp}rªG Q^8ǪZ5ܗpu@һ9l Ŋyg䆥uefH$clTЬrJUvjMF镦gr,?/??,|s= XVEĻMs>OiG5bkpXƚ\.|V*W 'Պ`5-:淪d evrbzU0WU&4Un?kŭjS+n8}[9q[.#{(v*?}B=x(ثPICg |_\PqWb6իQ8rRgU쪵){whr_O%íJ .N({*UثWk~py(^QZ=IړZo. NQ1//ɹ?6)cX&QӥRGdo45lUƟ7EDA ثWLy}M,%xnn.a}-sW_Ms>O[y39{bMIhVcݞ/MlPαWb֯_PߟyzNZ}_.yqqK>{ {ˉo[/LUy+TMgϗ%e'5"g>DR^.c91;5ZZ✖2ev2_a]$3ڿىKH=*H(pȥثWb]v*UثWb]v*UثWʟO3(5, rJÌK5sqv*UثWb]v*UثWb]v*UثWb?#ҾYV5ԵOsp?;$?gv*UثWb]v*UثWb]v*UثWb]w\U䟘ߑ=CAmxjZ.}/$_]>izg o[G.P:KDbhl]v*UثWb]lzc_MhcNC~;v*UثWb\M1WƟ_ryZq N- ?b?_ R?G?kp0>UoZ_Rh?^_ТX@֖NR7(Y_/koa$DYcb?6*nC|m%JsnG~Y*Uث?Ϳ2I3_];r9ZF}4=OqpɯkI[!Of3%>ү _D*1+R5ފmG&_kαw.|KػOj:*◼N?[[G @xm q;~_"skqN+OqC NhaK ¡T%:o?_&yמ]KSӸ{ujēV-߿+5 W׊݊U:ý({n*U'|xK_ryʶ^i}+R m*X+q5S~/ _iXt򭭔$k)Xv_)bߗZt -R&7r+SqC#j*}.muI;sn[|9)i%^{A[/4 +R mY n&|*_i-^R}#O]B/4LUy#F\i "m劤]HblcY'UYN)}*7mO*7mO55ywP7`;:e27|{g-Z\/ vGSٔej>934+^YSd_W)O,FLU~)g~~>Mc7~s__h+U/g?b)b\xWb'|tbu*OıWúu^ͩ_v.<~ʯ◹~N?[gVdڥASdF U֞T,m㎔ P<y(JKR|&>V8}cI&ӯWŻ|4G)}-8Y5M2mK`A'<_HqCڱWb><7< aξi?+yZJ2Ƿ誓ə4lcp lrl}2tٴv*UثWb]}%8(ƿ9Lև?OW[v*UثWb]/16k븏?F2:򔈹/+qWꥈT~UtV_3Mr(R1:gU tثW~n~C]yX4sVQ'*T?1V($# \, :uJ{F*KWn3%{!_R.*UV[ɨ+$ҷ̳1lإ7A~u&qoI$(|1?5M]+*ԧٕ?]qK&IYb!e#pqBU*?űK?5}v*RO31K?mS2A}_xOZb]r-yNFxvlz|).*K㵀rWTQxK/+y{LmE" >'iء4])tMGc_qs^?|iGPGC_x;\=Ꟶs;{1_(xt,R?1sɷ_`bb{hNpGQ/#⯅1K[WΙ -!+S<r; 3$,kpM彯?ʿXΗ\i7q_Z1ãx2⯹<6iŶe|2120KlU)}s(Ε06i1C?*?*Rm+cbXثʟ4zv~_0f"4@=qJS8忯-c>K^*Byo/!U_|2dwgqS_1Z+z_3{cMQHk;3K1.V܏7?boͥITxZm{yxc0Tۈ+5ojg\R?%*έz.rpQi% D^Q|?vrD_,BNMyI } *\UN*UثWb]v*UثWb]v*UثFy^@hF!7#6e#ŐJje:v*UثWb]v*UثWb]v*UثWb]N|{]QkH$P2(ٗ)͏ĉ{f)HJ" t 9ȑOLv*UثWb]v*UثWb]v*UثWb]v*Uث%ͨűſl0kecꋇK=2|˽cʏMFE>(??yQ&cƳ%ثWb]}%8(ƿ9Lև?OW[v*UثWb]krxx*J\qWΞE[MU%{7_xbb]-Yj%AWe ٟʭ5nAU_ͥITx .êP7_byw ߐȡqUk?6K4qqfPt:]|9;u\78> 8? )|Ab1VI̟0v_Mk2EK?\U]ԭgxIe[F?X|8vGݒOPWf6`=_S;U}f ?:&WӸثW~~-ϓouA"X^K5V*At8}njC(|;)61?uK{1./.ҿM&(yG6_<\MuLR4bRO@1Wž~+y\՘gh~1K-~]4LjC=OO_-oHcZ/#^#GߙlOݱocْ5Ln* >Re~Ty[ Dr;OI{yqK5mt9TWb#Tͷ|={hԞW\o U?u#j&^K|ߍk>l-ߔb'SMc$w |o6(MWN*UثWb]v*UثWb]v*Uث?%5/GHyqTͯgFOpuT@|v*UثWb]v*UثWb]v*UثWb]v*3?[跏ȿy3;i2qF;*/O*m$gJ2Fá_󞆳oўr U%Zk,88󒖆6!=/S;Mf ?غ'1WӸثW~~]ouq(&HŊ5A8Rj#(|;)61?uK{1.$4L&Ө~Էc6;hqI[5؞Me~w S R?_ˏ=v*UoC礶8̼R*biZī5⯨qCWb-G\ m׈EJӯekyKAgwo4$r1_Zc,@.#nPBWÌ //'H vE qWx*?űK?5}v*RO31K?mS2A}_x0yCkRGs^.$L LPoI"T^[cm-bkpd J4OrٚNe&O͕XɼU㟓͚dj,2(v*UeoM!"c_Sf;%qK/ǻvɶEmad/o?=sv*N*UثWb]v*UثWb]v*Uث}C쬫P4Ldc'돨'fֻv*UثWb]v*UثWb]v*UثWb]z@k^?Ց[9irpKϩw]v*UثWb]v*UثWb]v*UثWb]v*UثUB!U(UAAo4gVm:+?͓\b,8˗>jyH}fWU<]?OI'^'[M(yOLq]}%8(ƿ9Lև?OW[v*UثWb]?/{֑)R?Z:uh|PT qK ?4hd12/*c*UhyMLoC*`b^9QKkO.ՒFĠ@^'=v*}E!G=Ұ?3⯜hך݅}.QOwQ_zbbw%*KLP̱Wb 5?q'kc8lPUIg|xK_}?ıKt1&}v*OȿC$?q1Wwd_׊_xت]m)[΅_#~b5m9%Wh#_Z:޽ϔ-C_FIc.e|PO,FLUW[/C̿??/:][/+ :S}*9q*G΁A3۸u4KunVEr@QUZT8{1.fU#K4bG׬!k:UH$UQSq\UnM RavҤ j~UW۞P̋"aO(|9mJ:lRMt&&_db]%S RT~1CqW)}8(V=ءxWb8k>S1RZ2ܨJ0#bl䲞;M%݆kGC,jD]N*UثWb]v*UثWb]v*Uثϛ߬>?A':m kY{UثWb]v*UثWb]v*UثWb]v*Ub2#V k_x9]N u^Očrv*UثWb]v*UثWb]v*UثWb]v*UثWb]o3Yh>d[(cY~W̜ZZ2`yqߔ'QniA{vM IyvMWAOT_ l,gpgP8(ƿ4};m`UثWb]q_~s^Ii#O&Kvp m6)E~N~oK[VK`dEH=hx..*AƲ鷰W0?։ȿ-mF3bNR7*W{b>^*ĭnO;z-?݌>fR6kIspӬI1#faP{o_̸

OM՗eϋu^i-6/^ by$E?Sge ]EN܏ _?ٿozV{7ӗ=|99'S{ c F|xX~`}YuNx!5F*AoC0w8?^cTmJ5dd_>/qW1~N?LF(w _O'ъ/'hS(~kn{ ftCFM]GHG9(udN&*NzbK;v*sIyT (>1KqK7:ԫrEbɊqJo:V(v*'4N?_D/6_O)b\xWba:QZOO_z-։y.~+NJV/vB3X@HnhH6X8}Ǜ*{?2izpK+$R)0Oo]4w$qeSȟ }Gu /n<],ǓRqȲygAڔTسI=89WYz#s(&c_4[P'~w<>'1C Gض)yOk=WRs>6 XQI+}\U _O'ъCjD4bwI"d1Vi_5yjZS-2*T~8?Ku?P/]LyO=~y?iO͊v*xRxT4n b*KSy+Y6Lj2vxğ_eovc3S &+rwht~Һ_;bm: 8 ?׍"|qB_M.y5lB|$7f_'~i~eyQ̃ҳo,8;].t{y?_Xb?ıKt1&}u T_4\RJD5OSTS9Vra?dܼO*%eX.]ˍ2h>^gүE'r+.RU_:Wɤ<fcW˟I_s\\Gm1 jY wI_Y=O\R[q_|ڛKJZ\u?Y⇯b^9WR^|Q17"O^-is0Yjd% /c#r_r\PUثWb]N*UثWb]v*UثWb]v*Uث yQçL4±sg73bUثWb]v*UثWb]v*UثWb]v*Uث$<ERz+d<9#cꃙ*<9|UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثU“!U(UA4- hZBXëEQԕklRbqJ]*}^o8k޼cT.OS}KccZ ""P(1B*ͯɛ?]v*<=;ΖOԗqRۍM>⯔|3JFia76`7OG?]KWGHbh$T}|"\~ėDŽQ7ĵ~KCӴ6Ў*3}fXr5+IBB>׶nX$fF}i5=:6i1u)qW¯QZN7Q$|ʐGi79(lI7)}Ϡhh}v$C߈_Xc[yvM Wc,O諊+j?og-ں\Ğ ?1N v*UثWbN*UثWb]v*UثWb]v*Uث4n5kُWv9b?c!zWv*UثWb]v*UثWb]v*UثWb]v*Uثɯ=4i VґS\`'G,0\b]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UتYy_IԘXSygJHk;{v Q"E\U2]v*UثWb]v*UEJ8 b-Ǒt >g#u[O☪>Eӫ+x_M?bUثWb:,Qe;wIf6;%Ӭfbkg p!( Uv*UتYy[IIk+y2DOUm}lmc 9?jqU];nkak?uqTv*UثWb]v*UثWb]v*UثWb]v*UثWb]N*UثWb]v*UثWb]v*UثK?34f;;ƿ~NBF?G3$?4c~%BF?俓_яsw 1??Nn~?C#F?_/gHhK9'7пy!/3$?4c~%BF?俓_яsw 1??Nn~?C#F?_/gHhK9'7пy!/3$?4c~%BF?俓_яsw 1??Nn~?C#F?_/gHhK9'7пy!/3$?4c~%BF?俓_яsdmDb |Q?_c58ƿ݇Lrfۻv*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]N*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWbXo?8|4Rѻ4jrU~(t0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q]C *%HOTqW+B_pU0>JW\?Gw $'8`|W!?Q^v*UثWbN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWbX??%Ku]J些6V5U\U,tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*O',:Ow O'׊'k]BeGI5tw#Wкy;Ydx]<,?U.NY?t^*UثWb]N*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UN*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*UثWb]v*U٠FՇ\l.\^iwAJFIFHH0ExifMM*bj(1r2iHHAdobe Photoshop CS Macintosh2006:07:19 11:12:45Ӡ(&(. HHJFIFHH Adobe_CMAdobed            " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?̱6 u2I.;AwDG ̼[mkah.-rz;/qcv]XZUY_ʬwJVU`,f ]UﱛYyk$ be^qbFSO|/MĹK`óhԿ+T.kv4ik뵧# E-uXW8gpV?AGKow{_+uDdoOg2pvN]ǡ\7s =Uo۽v;~ߏ2>=VM3~u,Q.AKelna:7v7XDMjGurf0]˅-: VTV-c#7߷cku XS-kL=vz~oWݥu?W#t\rr' E6={;VoyY}kcbuw׋V s+}lkZl|1գ?s}J=gg_ZܛelRfKj^m_! #QxydtW\vvG\en7e߭uzNk/枹ʲ,tWٰ;uPvU_H2֟ޢ\DwˠS,a$]P9xms2w}g=?7s]ev Cmh 8vv=;-)#|1zp0d ya\ZJQp}b}[̧cۙQv5l/slw9\ՏPR嗢]OÄlTKݵ+fֹCsqqV'}+L2pOS=[~oO\X_wֲOl}V1j=+Z-l{{V_:UZkYsm"gZEbi=Fb56*{6׎qf>)"{fBGBj1NIr11ר#^H_ev@îyaxnm^~}^+#2.fkrJ~#oH\WRM_d/; \{ݿS-}{\[0jsm{sG7g*❏Kz^&QXκ[>+! vTqƴ54F/ַw^>:Ӝkd<huu{ްֺyu ~;\>o]ަ澟muz?4TG I7@cz= cD@C$u_ۙR>S̜, +kYO_߫==?"퍡Ԝo]v3}G<K Bn/ugk>.o O[z=-̺(-ezn %Rd"_Z%K7v%ReeXp-dzeN:oTW2lsuYw?Jc7m-Ʒk'[β=_ENSM$Zs)/d! \6GI com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMOrientation com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMOrientation 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.subTicket.paper_info_ticket com.apple.print.PageFormat.PMAdjustedPageRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPageRect 0.0 0.0 734 576 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:55Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMAdjustedPaperRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPaperRect -18 -18 774 594 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:55Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMPaperName na-letter com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2003-07-01T17:49:36Z com.apple.print.ticket.stateFlag 1 com.apple.print.PaperInfo.PMUnadjustedPageRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPageRect 0.0 0.0 734 576 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMUnadjustedPaperRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPaperRect -18 -18 774 594 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2006-07-19T18:05:54Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.ppd.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.ppd.PMPaperName US Letter com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2003-07-01T17:49:36Z com.apple.print.ticket.stateFlag 1 com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PaperInfoTicket com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PageFormatTicket 8BIMxHH@Rg(HH(dh 8BIMHH8BIM&?8BIM 8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM8BIM8BIM@@8BIM8BIMO( HCNCC 4c logo(nullboundsObjcRct1Top longLeftlongBtomlong(RghtlongslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlong(RghtlongurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM 8@ JFIFHH Adobe_CMAdobed            " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?̱6 u2I.;AwDG ̼[mkah.-rz;/qcv]XZUY_ʬwJVU`,f ]UﱛYyk$ be^qbFSO|/MĹK`óhԿ+T.kv4ik뵧# E-uXW8gpV?AGKow{_+uDdoOg2pvN]ǡ\7s =Uo۽v;~ߏ2>=VM3~u,Q.AKelna:7v7XDMjGurf0]˅-: VTV-c#7߷cku XS-kL=vz~oWݥu?W#t\rr' E6={;VoyY}kcbuw׋V s+}lkZl|1գ?s}J=gg_ZܛelRfKj^m_! #QxydtW\vvG\en7e߭uzNk/枹ʲ,tWٰ;uPvU_H2֟ޢ\DwˠS,a$]P9xms2w}g=?7s]ev Cmh 8vv=;-)#|1zp0d ya\ZJQp}b}[̧cۙQv5l/slw9\ՏPR嗢]OÄlTKݵ+fֹCsqqV'}+L2pOS=[~oO\X_wֲOl}V1j=+Z-l{{V_:UZkYsm"gZEbi=Fb56*{6׎qf>)"{fBGBj1NIr11ר#^H_ev@îyaxnm^~}^+#2.fkrJ~#oH\WRM_d/; \{ݿS-}{\[0jsm{sG7g*❏Kz^&QXκ[>+! vTqƴ54F/ַw^>:Ӝkd<huu{ްֺyu ~;\>o]ަ澟muz?4TG I7@cz= cD@C$u_ۙR>S̜, +kYO_߫==?"퍡Ԝo]v3}G<K Bn/ugk>.o O[z=-̺(-ezn %Rd"_Z%K7v%ReeXp-dzeN:oTW2lsuYw?Jc7m-Ʒk'[β=_ENSM$Zs)/d! \6GI 1 211 40 1 72/1 72/1 2 2006-07-19T11:12:45-07:00 2006-07-19T11:12:45-07:00 2006-07-19T11:12:45-07:00 Adobe Photoshop CS Macintosh adobe:docid:photoshop:ce5b7c0c-18a8-11db-a28a-e658dc114c1e image/jpeg XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)KmAdobed@      (  s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz ?iN]S79mgV$"OZTla}!cl?_z˖FROp!v*Uy[:3Yu&e*jFS ُ8(n?\&.,r⑌l:YpszuPԭi_ q%Yn]v*UثWb]v*UثWb]v*Ї'ɺWֱ70!B\[(}:'[&k9HY*Y<;Hp=3e340ϼOn6=R(f\;@#"~XkZ.m!УҚ= A-ۈ8zJq)4dG'.^;nXGOU\T=7.ZWDlTѬmafIXWRThz_f{WYqC&i$R zy8DB P@.{CC&06msK~?q_' O^垙/+>wmg&u fpVOSA/d `1Wf}p ("#\1?n?|?Wu{ +Aj3۲[th[U`d#^vid2GdFTY[[jw~hƅDUjbd8Hs'~sM'dg|V sȾoJeL-t6߾n!h4eˏĔM };ޓU>,Y8ck~]z~zX~m(Ͽט|= VrY9*BW ݌t#86~p;K$$ވ?Gu52~Zkh52k~j2]kWGO;;EQS5#"l;gr.Lx&z_?__VIoJdr;C+w>kԿ"|cK7 WrXE!0_K7ȓ50 bvk0cF>q9h!ሗW^Ds:2濗k,~V߭y-7Vu^NFEfX̵ W)G|icc [<9]1[h0ߙ 4{͂[ oMi̳M75N>XNV#H KOxDnI9H;5mxA+\ _6}N^>8*_Eh7Ȏa&DG͑7 zAeX6uyak-%fIq,rTPng3i1owz9MKycm7W]ywhLT_KdQ 1J({;X,z@&](y9=KAHcysjoˍOc&?55֭sZ7F/Gڌ Z٪w.%_դ'c(Hw.L浢{~e\lnqcqg^ZxA)']`h:,,cW2Î npǗNo3:=D$lUˡ>5+%\~xX\,^M;;MW߻Rxw迨>ݭՍͽ̶w,ַp;G,R!䮎e"QKJ"`B 9?~Ŭy :wbj^(wAg`ڬı$O:xiK.P[@\l-LNnv%;A7R_g_|)x}v~FptίC&06msK~?qW9mK'ݮ2zvjdɬ;"w|]&=+Υgei&?3>FoXt2P%omg7!'.2rP)|UE "W]6#~|`L>7%+1džVoI$?>x?GL5;M"vQq񋋞l(VHm˜nF[LHxsߟ( o(h?_>o.;4x-S| Tg䞷Q2nWO)D?CjioXkf|ylh&1< CbZKG}99SO<#h:gR1I'+/<D($@5=B;&;="P'*؟yʯ!m[O.ibWXGk]\Aܱz9d܂ n͎O$7lGuMԖSO'Up2 _#$}azYMٿ Nu }oR~np]YK#󯜖m7ʭ-;GT5ݪ$wXRj ^B<<{˄ƼhgɴxȎ$P#rɐYF7=Sqb^(YJYrHĊ=lь\G_9%?7EC'͛WX-b\ x.3бiʎ"=~ueU̳ p~J~M;˾[ҵoSK 6+%AP6U'e]WVh%o}g`9Ԟ2b1ϊ`}YO&>q%*G[6y^jCF닇טgѬ.uIdvxNI*{8 F:G4Leٺ rh#&tz|6kmܫAj6TqRΎv,1K1=~gO,xg!@#x|Ke}[;o(~_>wӮ|%eoaj2ejM 2/U^ d h;o}Nqq8ʎ+Qo(~]N{O*y{̚^M/,-oFU#'͚22HL5XpN&Y@NKϑ<@?/|wAR;#,nU DFPi&ǐFCoQ$-ӥņ b#- տ-?!4]oIֵo$YyZĺ˝NTu ?˙JZcdk2QcFv.m>)S,sιT?7."a:<_?Y'D48bX6^o@jtܼ_WGo]WjjxF{cvjd?*nNgiFfialKis sJIС1f@y% Av {ܼtˎ1 ##b8:oy6D_2i\Y~&a (@e__)Dɱw8_FB#)Ka\8"v߆[{3~dUCC=M"&wwZ7s4xDݟ? >|# C)o%u7/|90Ki6v 4gHmB˷CC.6orw~:<oÄc}(w`N*u5ߙh-Jh1,!$Q,,ShQC&9e)U }k~L181(IύUGoʵ_ c}oON>N._3K[#(?iSϙɴgIJ :$jUXlq}!c1(l_zLLŖ&2q!v*Uy[u3>Y&յZe,j@?S4'ĉxD.k_k+{]3]ms 3]v Rs'$ F/>?K@y_Yg7HxyGu|O.~^|^ϓ.o=+H.c-oqyi]XF5HN tZlo8 s/p 5:.9 e(cWwږwQo7%ue[wᴑ zh>*q!t?{e 0g7ɗ$Bs"kF|C'9wJTeڷ[O4,/֣d:dTa^] Ư@31n.3u/^sÎD,u"^2{U ~O&bͺ?/+I-Yh/ﭯ$h^\QhsC>,dc&lFQ#qmg͔8cJBc!,Et95M|Mmu_/鿚^Rѣnu:$ڴw/ksI*zyUg81!l;&RYe=ȱOξf?/?;z]#4f]TqVY"wnZk;78D|& {Kzv|mA, \Bd> hu-QyH.|sycPo!gG Vo;IWPΛM(C7 A9șXFj(D8H \VC.-P;N~p&tȼŦE505^vʮ05RE9< 8o.<>-zs <\>Ud!ѡorU-u}n7+_ dE,4r]5čZ80xX> 39TGnUJ8GwG;)urq)obMƌ#HWmr̺^eYݽ6QcB@~FZqh@x|g[s=K-ef|_= A6y<5=rL򿐭.k:Si;YܤQWuֵ͞m.#^"yHaB2ܘ݁pk24|iL ";3#$PßUY}s[ _Y~o*>[q߆k2?3/A~'<_NnI Xm%;J,[ʰ\hPNG  IHDR ]cPLTE&]f@\4g0O{ Aqp`xPjp`@p0Pſ䏼 ymbKGDH cmPPJCmp0712Hs IDATx^B8Pv}\){n"TPpF䇤m&_4fYJ@"$@"$@"$@"$ 0%mׇկrR\_QK$-(m,جm"Qb%}'`'bH[vxˠI&Y8z%?5BnN"oы̋[M:Q?Ib[n6/l9/O_-0HF,"^u 4aYHB }gjܬ/nLÐ'h)nI~%Mԩio.c: Q(ȝ_' _PiYN{ M(y"aU3Y`I҃ VsOZ[81f6l\<#MP h`.j/nݳ=Q놗݅yOB# 陣Ðn,VL0(fñ+lVȤQx6,s &l%gjDe!{7:_ Ĵ̛Lޫ؄Zl \X˜{NH '\K㬻F3>yZ>N۸E$(1gט4VڒT4@$BrI7P`c=g%>gu4ܶBLA$lgNVaӔc?& 0qohiu T6Xw笕=*>66u) &a5eL,z|#͢u>u=+gGr[gTג @M|HPPj+oAf&( 1Ra|HR+N_JIu=p2xi; TV}G=>RMz~B#2>1VDr6\Hpתz}L&{GY xĩ5$Ewt19+h}6D$̍y`dRHVvx@SϊznZ-]CM`#0[rF4Tzaə|FH?/{T8N_c%1qdJXY0-bq?bZ{y_7όTk^0{iKHƸ9ϭ؝j=1~h̾LuUCsN(fyycoӡ+{Ѭ6?vC$< i,\ qOI$'6\ehڤ(gIJxgv{Vj$p * 1Î+~r/e/ͳx4PSvNzXM醻A7\6Rǧ/׼T". \ R{h'Qo|(h ւ8V(x:U8 )>^2x}OO+8GEXƫ^9>MqT!u;~j@ѣD|Ljc$b1"XI+eko8Hi 1^XX2zNvIЎifj3naq$0< ='_c@R$kd$^ELQw&99NB$!cR?g c'{(Դ c_(Z$0fɭ&< k &\&1P(K&,bpF}U K‹8T-HD HD HD H?6QfLIENDB`F2`˶SlOӕJFIF``CC,X" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((((((((((((((((Z>x A@ou^>vmh|ͪkF[k (n.m6=?O(WڷءII2?g-?gcI q8[ʹ͔rWkPZ81^(r`#+TThú>Ђr9r|gV„-*uX:4zݕ/?oBmkiZo0m:Έv|5j"A+Xb+LDR|k+zᏉKٴ+ǏW-#žKOK[9MFrp%U0X+GN.O*(Mj.: yF9,ZW hw.h9G-Q_}QEy '\{>o?g>0֬=6|ыBAZfXeC*UkէB)NQSrz$mՑR:PZQm[މ.EOluk ӵK->4_E6:սSIIsȆ3}w)WOO.~_h|\WY^7S> x_0<^ֽ359/c\3߈\yS:/WJ-K5)QWyZULԥ~qf\ P­:'2j ʚa8j_j6ar!wZ##|;2}ϙ@!OME~u^F\.T6Q*әƢj?D8:8,k/qZokO˒J7Q麖iv6ZZjZ^jzuYj}^Y^[JE,n կcO4Oͷg Ur0 c.eN~q 5ZSQEjQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE|eɠ~՟mXxƿ;@?~9Ec}OGH|/Ҩ_Ӵ[QҴEơ^VϽ;kh<8c2 rHBo?P| ca_$N-mҍ|M os]ZyP m|n%=bYl=.]-ZRFG)@>i d|<q;hzE𝖏U4C4|3[_5t-RW~e#֥B$zXz+ì+-qf3sERIPp:zž7%s/vG!fٟGp[ +8nX\$9SR9yd,JRԯ.KQgwyngvy$v/#I5J+I%T));ɻVzޣahujwv~閷]̰ZX$ww3HYd5>?m}==-g2ی7q]h B})}-|qwp 3B,^*5ҝ5yM{+FKSo8qSȲjӷ-:i߻5Jҵ??1~8mCΉ(RI; "TK_I--̑[N>8_s?#O7i"tmC!oP+5jֲ]CrPiτE f?'Dž|}CE~ZgK|8V_xz׋ViVj9[(#1WT'W;?*  /?io 6[gi˼I\OZT]9c`eғT)S\wqh 1oq*|gMT jꂭQ+IiFJQ__'7˟?]g!-bv{S:ty^,˩]4yKkXȯ9#x^HfHC rj-l< S3ž rz,")M_YfU+k_io#]$>::gRHt_xG9{'?fӡkh̍>yFn'tVdxø\=UqZ+ Cg _#6_%T|G/hZU?^Ƒ?|@|Am{-Ec!-.c\)?_Zo&=O<>h~!ڷk&ki/ kvwiGٿ;5ęs_ xOs=%֌Y"|kqHDPjOh\pMSUQ^t;9yJI59's> OfkѬ-)kV]i;ű )dOMaߋOd-?>!I4lx~qm]{Fm4m[O4灾|)f/^zg+4aOiӂ\RfyO(~?^X5OkKh9i{C#W"[_6i ~+~ QTti0QWI#cq9/Uu1uJsRoտN?+V`MZg zy;V\ b| ]+7Li;?!?Q1/Kw:cmN;4O|~I.N.0SG# E4R !2Qt!ԇWWr |Ox{מe8_-XkFROx;.eQs4KC{,+,7S8e<6#Q]+1n<ڟCo~0k7 ~x֯kσ)vQ 4ٙI>_ߵt?Q>X81VѪ_gV%Pr2v>͢+#Š(((((((((((((((((((((((((((5o*|ObL]Gß]cʲRO]JڬxFH'ϏTb^'d,<X.[(+ T'%ϛaW 8?*~/5jr}[?37,l S}fe1V#1J+? dzRN%(T*S8;K3TϾ!|*L_WmJr+=W[go CKTQEvQE?gǀu/~xW⏁.8\5ߕ$ :ok\Wuŭϗ*+l>#K:XI8qZJ5ѦgZE*1:Rd4ktg<3>*xBq\ Ľ#{|≆ɲ:(Ql~W0<$5vZ&xZlP u Db Ez)ӫ ҫ*RM4iiѭRXVRPeM;4kScJm58}Ohí(>QJ=^[\FM.G27 |K5¿< 6k֓,U[K#XvM(KIwVƎ__OϭO?kìKj4\ _W;P𣮟Wj^&yVS{bCm2\??Wc/4>Wj`AVSr e%Ѿ|smC%e{8mQX%Qx_ǷkZ 6q8'3%1cNuŷ*4J.FuU>]nW7ļe *ԅ EGڭV9xGVzwB})<5][F\oߌs$~oy:6 GZcZ")&i O>kN;͎ݛľ P7 _Kn :>9qvg 1g e G6j2<5SYlVûN#iWAEWaEPEPNz֣c=ީjڥ~iz|2]_:kccck 4ҺGhYg5~hgo?V(q<'. 8bg%F|mܕcO|Ml,8Fmt} Vg5z8?:>*|-ǍۗH` -|Uek7ěZJ};U_2yn/_%h~Q=^8xSw(ZIk88-c5%so>*:L5|ZVf\4_R\e٣?m؋ wW]m_oxSYMs1ehv$Ѯ-NO^Bֺ-cxO+?g6?hx{gvA(sO5e'mC?Ȱ|5IoBPw ٽ/di+ьEMo\o ꗈ,%:IQ_QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEM Ŀ4ω־-zoOxw E5_ _9.໻LIj<_C¼K}Sx;p% FI88ɭi٧tx|G)qg*<Iq\[M]J)vM6_|UOk^ ÚW<-#P|EͶO4}RQӯ ?z9G\Goo 6񅝛Zxk߄°;O% 1#N=~y`n/_ƞn3C .5=9Y O[=5璲u$IӪm>Y-6_8cr4u?mu9e.EqEW'i>D?x>7#jKgi@$BQ6*H?[4a|2|?/46kD?ѢMzC* _ta֢$.HU̺F:+丳gpUԚVX+([x*I)6JSo^q$w_ >x:$C]\8??U=w Qxྥ7_~ڏR[<0ڝ#5 ].o7Fc? _A͵ R WQRۻ{/diZU -zʝNU'NiidfS՟4QE~$~W-Ou<# u_Zzm_:WuIt:24H c57Ix{Bw3Ğ6k{oh扫ZAiZ_%^U_%hS-qx/%ιG2OKӟw߳t<{_P?tfW?o g>qav_>#i~0WS1'\~[sd>pea9(z.&I2\>KSZv콍-dWYI70Y5[[[\\N(m;48TE8߰]2/_ ^ Ҽ!O2;XuK/j^Ң."joe},+ fl;~MO h|U9"Pu,B;}+#Y,+Eqr bT n?s/U+MNj3ײ"|nMi~ៃ5x_0q&{oII'xCM\jJ))+ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (??Bo3׎ad GC:$}A6^Hj:{麬yy-N~MO O]_|a_|IĎ;ov9M-Io?޷Ja~}yzo| z}Ķwuů6WŭݭK$R" Wb8'ÏE7m?jwY=S;M]*x{kDY5x1Pe᧊~MfΕ]=-5-VϣGpl..-d!W7 qC֝ ޗp4Ji]{r$lcO EK:xzj72nɭOڽQ*4OV:zҤ~R{j~߷NĞ? <) |(]mJ3j:ډBWv x]%o/j~6yWws|+47o<j?owtɑ-'+ؾooڡx\NƘ,eSSqc8/4?OEb(bp^+ UOVyKU(qii_V~eWWS_LjԿ=4?.'fts~?Kׂ_⇉~G᭪[[7U1}TkmMqH Zq geVvZ[XuVV6V- 14+N+YcఘuZ\49iBRn4{]Kh`pxjجF NJRII^M$vJDQEpAEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPOQc^؟Z5,k_ufe'9>FMz7¿xH{Ǿ+kٴx7Ze sj6sFZukZ"RTt%Oc <~,g?,_ |E$:o^FtBx _ -<j \?%pfA*L (fu'KEZ>ޮ,>wV_UՊt4yem9*~^ <5$0woïx/B,/ƕf.@. ]i.uK{\\/ľ'/Ax^!<[zmO\'5{w֣pw\j\]:3$K$zwZOPVNUjɹ֭&)U+mɹjSo+c."+SbܨSISr(etɤQEMo3 1,#w܅DDP]5gF|@a7~m<.#HooxsY\jq^IoI!yeOEff}B(6v%JiZ彻f<-;^usoߐE-y_߃ =x'Ru߃'x#Uߍ4K wN B/b]7UݱVx|W VK^hr%I+Oa8̧ͨRiJ㤓~ezZgEd_^lxt}w #qs7,`G&Pڋ^|mR%)?gn>~W~.h4rZ?.jsGN{Z3p$&8KZ*yk byo*3+CvYA)x:Y]%kS{oj(M)WѿOC~<ğiF-Ce21I4^4+8y㇧iVn"z=߉֤%=[ib*^4vn;;srW (?kPԾx7nX_[IPm|m)m2)~[ٯz_ >[~LJ4)u_ NxI?0> rc_RI2Z.rKiZnXh&>koaiz]XZDZXXEq*"*_DOk3σ# ̣LK;>&iL %{=\~E߱gE-|yC䐶O]*So4o\bHf6~P)g?/5߲mJ$/y7V,miEM]4hgZ__c08>c#ejOKƦUi{Jw? /n3gqճ4G#*]8ErN K o FuImBW!s)#ğ Gg|/`חf QvOm=$u}y-<Ңs_UѩV0&+96IjvH&<.b%1rݬ۾%v(%C~!|=k# ώSo6k+]L G%nw .ġ!_',~bk]SK=I5((Tn!իm4m/˞;++K Kk k{+ +{{;;;Kxm,-H-,D h1_#} hbrnkq*j}#Q \.s5(FQ0~i>nN&Q_ǧHQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEW|foN_RNLh1m5{k{z,D-ɂH.TnkhWK:x;Qn2]c$O3:W:5tdqM4M=}S<>[ᏀmZxwzlv\Ȩrw޳{/fdf潂(^*\N&b'')JMRow)6onJtѧQRbI%dVI.lQEdXQEot"c'׾"x:oϑ|i`v㋸ʋO-ޅk9*g- \???K8~¶"M⺯+$ծ73VYZe}oE{9=gxxu$඲k.񋻊MYIC4pGU"5+^I$QV(\((((((((((((((((((((((((((((((((((((((((((((((((((((((((+įE<}(~~&{)h}MOU,'5RXWQ f}D#y^ Cr2?j*$x[2uV9"qp*)ڂѓnʳ)BVi_?RB~_?_'Ox3ltkF|jΝztn|Zڋkyo-f&0E_qŷ Em6&8bHnKkʢ3\KHĒI] ))FݷzɆZNYTR]Ϗ^o̿|]LV=Fv~ƺ u}_Il_ Ϗ4˭|qyH--]>DR\`W³2F )7;pD.&iI /s!E' db>L?oO"I3(x%{Oid$n RQ pzcUҳȊ«_Uu?~| .|K_+ik:g~5б[T{x.YZ W|Kׅkk~xBxĺ?e<٥wgo>rD6O3|;JOM跱v+WkwW֛zmjxzk KFzN?Xr(k\~xg>񮁤#Ymr;Ğ{At tcKN-$d KJ!nzmz'M?GsS$̗K@|7yoSRדPخ|"j~(7 .sf"rV$Q)F*KGū[h~kӥxMKSO"-*v/[UR9wM7?~>IgJ^t=KQѡ:yԭ-2&Tya)cE?d$EBYC7YC)jTe/-Eo%s+v?cccc7z#g-滭ExW\ԮbX -Oxyo*/ s>T|4:_>'᧏+qx~(-esm2dε|M,d1gR\ބJwK\JdHW i6g[>|W'?"~M<#jޫ]B&Ȅ14ĭ"GkS>+co_~';BdžloV+CsyΡ&`N/1-%VIbF6o`S7 ?nsU{ ~^ּD5k"ܶ5FUqsL&5 R;bIgp*+Z Y9$F27%\2>JdHW|A~ž׾xOM>|UO_o=C{}bCԼIs-fJΉiyKyq&~+(jI;(; ԧw5oS:_,n,o-/h/76vs40KowgVde'ix>ko٫*~e xs?xZ5Q='Ht׷wZs- {#=J˒}UE15;c[:xqf~𥶷=-e20V e7hE(^RIybQ_ ?cOOY_ >kO ǬK_{iU V pHRR~¢Q%x5Whڞ?콢:}Ffi;Z #a>v/|[xoƖ-tjxwQVEle.O6"pWqi[W|Pg|h SB'մ:MOQ CvX}' 9A7Bڇ|Q_uk/E[iS7ֵiӭ B `n`V*fy+_9{s+ETQEQEQEQEd~*x;V+0?೿ڿO%kCƿ4g[U#?7GMhz kZ.k>jnoijzf k ;Y%TWF\;b!'L>0xGqO_ |?O|E45sJiiYH8P$}|jɥ0'N)}QWʼncH>|Tu*_ECM Ŵ89twχMK1uWѮſ,s?_?/_zu~p?_fC?x|VWŞ)CVPt&ӌ֖d+/,$g?_M/HmgR:¥M =XCsV' I[o|2m]-PkEHMG+ 5Y-#\ fU%Vxxw牵CHƍM*oG5ЖV5C0ލ~"*dASկo~_o=zt[n]cGث~|*>]kÚ}x_JE(bQ֣OՌLd.R9G1Ik޷8xZvk [@i7<'ta 9j[B֓}el[7i߇5h^"1ChCa*VF1:$i`eaZG̷pNJjo?n*~~*U<_'࿄,WҬo 6 Y/Ɲ 9d-Yy/>G>5j{~!a|HXu1\OԴ5^}2KIPKV|_)gS[ _vkXH4ۏ|9i[u.'Ɩsyk?).O Nd{ ~(ѧȍmi*:B R =({*#+Til?֩?iFx4yEC7|Aq5hi?,Dv:\麍ESܭsT|U%Y7_^|G?<9} I'#+oiz~q9Ċ5k ᯎxsat xM>1j^/6Ѿ(xrS# &=͂7k%7zѫ*ЩUk]Ҝ1iukl|1{Qwt #^ǯZO5zNzV]-GOo2FUO;$>&|c>u|h|ex>,?h|[WݗtNL/|Mxihu7K'Oľ%z jψ5}+EѬ!V'5]NX,t>香fU8=Z;1SxƿO:o4 +T[Do4j ;Fk!&&JvvϟTTSw䊇n{w.}U^+?~%ľ_Ies'|K]NX[O h:{(, I [?)+<9xKš/ŭv^ӭ}Gx/KҬcNK;x![d` ?yٿƖǯڃXokӾx&X^e~tm:ιKS`VH{eW 6*bvw䵻/__n'8?~0^ xV7FأjSkiitk?YF:ۆ<c$g7 v;߈O>~'"n g<k^tGwi-B.HaԟT0q}{=???yn`gs ^GBFU/Bd_zqʼYMY]+zhvB#Uf{k{xRm.I\[ʁmN)!7*_ ?Q <XUhG3ƙ/ >)Ь|Cw0k^LHn-QżE?;{:W;[y/`9!`VXP4Nuc*ʍL<ҍXVZgsٱς'h:7OScTh./znu$]:I*l蟷mjmyh>3Nw\hϋ|EKyPdjTW?(Oğڧ><i{zxBm3Nl_(kcS"* hW@?-ӯլt aGd*P!Ohh'K}pj?|Wįå©,doұZJxW;nV? O I5x#O|;jwO I|?xoįhjZF7kt4oʐ1_i~ag66nam ecegoGmmoj =/!?\r[WӗfxQE睡_?!w_]'UWE/u[6"Mҵ_[``C}y44|~?=FX6ýO WE?$k4o0Eڪ̿W/'jg9(i3[мaSf&4Hqcx7MMt6qۻNܒ_Mqm9ƓIE]Oω!-g JxᏎ+[ kvZVӐ>{Kha6%bğ/'M{?W*Sk=TyM֛3 _unn-.>xvr&0ZWw !?4x|%2ƶ'uơ8&jzK۝Pp?ҤIi~`?b~ே9+|66Wᾙ4ZE[GVd ȳy8I I|9OMÚ|[m!mG0𞿧Wv˗6K*Ҡ`^<5j.hQ޽,EJUmS6߳~~߇|4kM=#LBu z G V+EƐkP24j.Kg迳/+= < ~,:D' 񮍣ZApMJ[Wc wGٟ~;AOf ONcms $KBt؞Uү&O[k6K(-c<+ooE ﵊?5">I-|oc>y\ʆX`޴+Q:𼩵JZp$#+`ْm2GčFO5(ͫ]k64 _t&3jpL S9G[֣__⇊g&_|Eյ[=([5-*(o㵑T|cӿ߈}k]l5ZxǾ:zԑ+ E𖏹НXSb]!Ϳ*UYgXwH>"|r{E&f9@L$%rsY>*$\da//oE_8+DCH獾Aۏhzd>%y⻸-UׅpƧ_]iR968?1||e<+sg>!{G^#,_Wz۴>jWFI67-!~ P_o,űyj qC#4ͭx~`N V+i|7ׂ!fG?xwƞr~,&9%7S¥NMZz>ݵ#Ԇs?4xB.R?MMm;lWۣG%ƅ 5>$An䶶%s"(Iz usX.h5?xS}hkP\4D,_J&H "Y;=6 ZO˃[GՑ#;G2I ȭ)9B+o5CTO5Z|ѐUèk6˳ .bPXr *pu"Q m ӻ> ?j^4/ 2WE$OR]JLn}qŮ/JyNO x+/+LxC^/2.^Ǡ{'\,eց2n~]j6W7Mkygw wvS*M]e$A4-*N,46ll,mⴳ6CokmlomjUQpRw挮Q*+8DxNg,X,|CYZa.%.Km'_Q/?<'~ |$W?Xj/6=T=|o{9Ÿ:,:Vs-͵ XR.b(|_WDi͔4oiq"rQ9|SWjK}5  F_/ ~_~ } O~6wshW:gL7]+Kb8ʟ8gQ, W- U0utKקJմnI[iGϋQ> O|Gm)_C^|WBLkk:]G@lﴫ'O%D@uV_? |qiM*w~4UxٙYt Qo*%O[#M ةUo峵[[Wi`Ym mG =(A1)]ңV.pԣV)H?~~ן .~x~ƟI-L"{kŶmio{Kao2HyP>h~ *񔿴>> <kx5x-5;Oj:υQK-NJf_3f>35|u՗ {>#=>g~U _]#.ş|78| χ>6Z%'|g?~BJBMmvI-,%O.y-fO_GWz#,^Lƛ ^+W0J?xΫ)W?y9k:mҼhP ^Mv?)[Ҥ(7E 3%)3Ȗq']'+]V%oXzW?ŸƟ? z/Y{/XxN!h%i2?>'P0X_7mvQMOYx7];kO|pG]o>37ᕽŖ=ּX2nuk Rib|m'޿,9ŖUn`I#  %'j ࢿ݋U/MᎥ_cͥ`l'xּVm\4!D69[Dz5 Wg?dswß|A.Ruֿ?k^!:ioqK'sx[丁h[6x7V!I*??vd K<㧌RG}q"^PZ[ U,$^Tbׯr2UR|۟')%BƏ x7_u \k~2k?j[kg6AK&&y?ۯ 5Ii^/x_߆tO &.ǩh>(-g<ymp%%բZ{r,> ծc[xw_uchIxOC?|[i_gۛMG[&*쑩 ȵ~_~~7o SwRi,"kk^\vWVhͨF4RBIS.7swލKRZj*T_3?g߉?o E:$uj7j:74;֊е" I#($rf,o&7+eڥ}|]uB|KsvVɖyٲxHDʞ;_ /~?x<=7ZsVoukh+w |bb'v xN~=tgR5N4Uk6`m>ys}5\\q5qq4[KDs҇*?rg |FexAO|uqÚ"JkX}6B&d`TL|M$|,W vx⽿< x.Ǒ6h?4/`1Ws#|Fgړl+\~:t{y Ěu{Ep`VӃIK"7&GS ec!s2j~#H״1w6]hڤ/xK5)l+e#&s U(JJ>M^ 4_^|  zJ|5*Eд]2v~[Xi(*/Fk+i/: >-x?|:6ɧkiv^XE'g[Z[آH~ܟ|=Hƿ/Bxc5uqK.8MO)oy/gqvZimg-uo ^hO=Os>#{H|1%/ckﵾ(Rim^'_7Sktxz'6#douODTHx$wOc?gI-4;> iIJ&"g=z6?ِ\Xj?fEqt>LM)7ls5|9?k|:ҿgs_𶻫i3R/o74hhxv)[N3J&Ut~"|/O/UFe%EơvVVVV:4 #kktnv"6NzK%{wV~M0JohvuHy/6wg54ߊ~G< uk=9|{g0\ʻX4RVsq8jm~[k ~{h`ڗÏ[^[L>/ymr dH_\(.Ÿ^#Gki]ZV>xC4[hY2G`d}vXŸߧT乖ޗ_/˟[>.WCyW/ǯqxᦂkmy_.t3Fm//4;c\/{xZ-n=N}w (G?‰~sVֶW~']~ .LkKk<l$Z ]R~ sV!m=G:k~7i&ҬJL-ɂ]:-[ڲGU)Q\Rէc֩ZRIɽ]^w<~پ!uB?x;_>+Imt-{Ju}j e/jF/Oq9÷ݟm|V|F]N]KIτQ׬ 7ۅNK)cme]ѳ?g/?? .5o >-RxoPtku[^3xkhĞt W_evu;o;M46##5['$|pIq]f?r,C7~WI5_G{/p;YK=R{;[).;wxOk 5/ȴφߴ]|_-[_t+|a7moZֈ| /-/$S\]X]x.-.9dheTN}cdO~ȿ  >-)6z$Cq." [ZO㺚 Ia0*-'եJjQv릝NmNJ5쬚_DZY|/t |Gek ]Kci,fnn/[˞h捊|%PG?L|wGF|8UnZh]'&(PJo|EFUG _߁|O{Z't]Sot;IށONPA/Fita$wlbu8Ÿş<3xw/RՅ/e^q5=+Hxi|\9ʪyХSJmmv9эZ߹t~gCoPmb$!r]Ҿ!X vBjRo% 7on/zE烼{-|6r-OC9PwZo~*S>/d>$4m!+i o kM|Wjzdz\ mL g/~>(Yo& dc#%E -aLg<hk_ Chz׾ 6woeGn"ѯei,\Z6m"*5#N"OOC PX63uKM6uAZiWK6)oY`;-y|ZgaiK+.e/[Ь7 d-_o@@濱+'_okeo?(~6/,Yk7_>)zddVi-!/'/ #%|=S/o-5?\h7w RP{h,[s}1R4"޿Ã`+{ws~??a//geˍZEÏǺgEp|@4"+=Q"~Z_ ?i3?о^=> ͫ7[ Xi6%县 ]-3cdP?exXjψ&O<=O 5ֽ(|I?cD^\J֬"rρ> |+Ok^2z/"е뉢C79᦯mEגRD&I*>ro~TohOG Go⟂:,%|9!|ҭE lH`@(8gQ, WMc\~ eߊ4]xᇌEZh"<%9|3'tKQu]*GմkNZO=io^ /Qr\[)71bU*s_~^ no>7am7Whz槥.7946QԬnDyVH#?W~1_xAM-y,5=-u}T\Xߍ;Yu{!ٺ}kȏb_M }Z|j_z߮%-|Cx/x^4sMӵK+F""?X_>[???k]w GP>.oZߥwNXPP|NN?\\z_Qߍ7ǡ|Zş ^L4x~IdGag}T;GKMs?馍_||5[Bς<$t 1VW0A'+n _L˥h‰5-WᎳ?4iښ|AZC+[i!ՖQ )o=oc kJ Kdm|&"_m|AjKqmgD7ilsMPOqqoT+⤴맗Jx|R_o_ol??bS;;*JTl&,@UW|X~^k=ͷ|{=r#VM~Y]ndhH`մ[8Y]'ok[2u/WK7w? 4[vz<-˥[xThQlZ&HJKS/~+jӏSMүuH>.-4\zk {Z-%I-F,ꜾjjӕJ>5js1IlR}E|7w~̞.Gz4?Z5Jr\G/[.\8E?T_؛⧄W|tEYKMgoiψsO-Ԗ6̡ѮcoWF7-|U4^sI=3G-dlkxt#sUU9ZVwz?TΚnW^2wesLBk~m%Si:Ձ=B'GK+|7<ш?Ebd~*xVk|Y7vOh3NWXѼFUd(nAꏔA*H2W/Q(ةZ^;]XS_saX+EWzAEPEPEPEPU>l.c[-^y1}ڬ"e˄I8ɫtPU9溎R K$Ym@HLP1;w1V+74Oo^/6os=T!-C5-[Pd6#d*ѫ[؆sqrƑp(e.m@3*-7E~!%mٷu/^oIC+񗏼EpYZxY}1J˦ߛx|7JFt\Vy:ʞ֑yVB4;x+-F-.D{!xDTJRSr`ڊmYW | /UдVϏ|[%5}B=R\ʶ&q,?;}Go⾈.^?Þ#kGHӂi7|iizƖrt漎xUTkA7*n*ԤSWgTWW_Koxz׋U,h:x`Hm-l0$hʧfoڗ}?|Z0Kk.o4Mo׶WW,tyᵿ$tebQ_2Q*(0((((;hXFXPȎ^9VFRAAh-ԥQ,2Ċ\U@̓+;Vv,rI5=~|DҞ5/ß7$7#xG3l[n;ȚV0iN궡m3Hӳv?zbd^gxX亸H!Yi[[X aj€-Q_~߷$О4{k+m_x2Qsokh>Wo+Yp?l/F2[ɤ>M'KL:<:nmd:ZYi^9mM 6ңɳkA׎\~M֤.Y&q2Q^!]?5UgxGo[B^>ko{yi 4zٮ)msq95ZJmDg4_&U-mma%1HUizvcuj}Daӵ+8/nbuitGAFGJҢm1z{m[|&JEE0+QUUB 0@(:nRvbI-AXzth&д!MΓzpP>a[k6r7))և#orj>/{}:ȓ^x+ܫ"r .4-'ODEVzWQE6bI%dkÞ,$|U'%r($/)5wwwSï&'P~ѿ |yÿ'oveXoo|E-7֞6U2ivW6 mZN_9ZJ\M:hpO?| /~.<k#k*Nk]"oe!-̫ 24j^ʺ.>- 5+]6:NlNPfB}16)|ˌDNMaB )I&~^EK¯;ᧆ0񅇎/_E ^|mΛYiizk$3[[: ]iVe&M;QE!Q@q2?:j?O|svO<5xL *qcY_Z)3Wv4SMtѭ? 4ÿxBk Úe:9df` OS]'p̟*x'WĈeOZzO,-a]*Tnu6z$sڬ^xԢ3IiSrinɼ"}QRQh:/}G$Ѵͤ~zu7(RRug 08"==L߄>mH|?X&gX!s8TVkk_@QEQEQEQEQEWџG~㯌|*k{&U0މa߈] xˆ7S3KW?`cmnQkľK;cP xƿW\#7zpt7I-)%?V xpmUx/Zcž1Vp~ ^oq6IԷۻ㻆]c;*_"ԾƱO!$^{Pc Z "v;i7ljuEG|< <+ T,|[8P ڝ:RTF6DKu"JRpm;u~:F+#D hGT~,|J>$*7@oi/U^mGZVqtrdGh ֐?ğآ__v~ c;;;.io5i } k Mf M{k|S[<6v30#o E탯kkZG?Tn|SkI<_*ZCyaoquil@仯_Pke&m__ֿ~xI/iw¾$|WY/#k6vQ:fe:y~KJ>Vѽ'5s^2~9ۿ~ L]??hͩxW/ /I׼}skuu/|Ewg;]z(Qٛ u!k 1|?]5O |LlK SNuxO-aC<724߱j(WsLxkW?׼?N] W,ıhvqTԵQwJ4}DEn"5b_?ό;-|IOpAg=I !( 4m{T6׷:ywOcY…B*mFY%{.VO;rc1C_ↇk+v 77!.ik617eF…Z__?p/G>56g~"k1ëM%ޏjgHNPil~ ~onn[{f k ir]E>$p]Ic :Qᇠ凇$R7ʵeIBVQߴ2⬡LVVPEu>v,31śG%$y5~П@8 ^\4HnbnW nU6hV(2;zW?U_†x>o,h~!tQ:́xNmMR55o~Ws[E[tXG4t»X,-搄vwTcuեi ^1?h&'~)۾;w<7S.UGt[º/牮ub=j4YvfJ0~7_GOC&už06.j/EXjvV6Y̖KW!sܷ~+Ҭ5[;О+_WMKQIS-Y-.K_7L5K{Qsq\\[-!O__ⷍ>~̟W~_G6;GÞ #|\WWW5}{Tdq|:Bano A_?f_ kkEu3:4=6}9X5x~!<6jfx.dmIO gſ~κ߁Gm'G<]sikoƱ[牼#mntBYf^,?e"Z4wc:~k߈_(56':zxKH| *8Ul_r|AN%ؑm.Umj ]]R :m2i|-=bfR2ۈl?Ÿό_|4=cx 9\i4ȭ6/x?OxM僚WM-4Uy730~V7Skjׅʷot+O@~" x^MI.-0-tlzBXi88J_M5^SRc \j|q^ӼJ>޷ib|~~Zh O:YyF?dovWKVƯx{X%hjmq ?uO/웭>#|.׼u>3-KѼ[O^kyxAմ'v:ͥ4.ҟmmG7o?_>"WOoY5)F _guί|5[c\X]kF|EKd5ѵ_0CxK7root-2 V(axo$^W,ˋ!XeGE9 ><#ˏ ~oi?< 0m"{-PG!ז hYm 9L/߀Y?j^_c>cF,lzvDgW/~|R>< m>&x>(Mno\6GOڷ`*z.~@Lߏ|?@шRtQ>iVNC?|g{Kc<>:ƭVxsZMӬ<7?.x+İZ,Z]m&L픊SundI^ɓKnM7u~_>#x~ |'_Pо87m"SKk웭ב\Xn[Αs7A~$߄4_"'_6ַ^;>tnc0]"?톿Qf;Wy5x_?t+S_5h[JR{ˉŅv4,>x* eVxw?knmiDiñhENþ{ *ʊJm]mWh$ܭm 9l㝯m{T=l__[};\.'E<6__׈..jOb IkRI~ރb;ksSvΰvEiKY#^6|~ʿ /xZ^D:zXx}bi~ Z:j-u#4JK㿏E/>G~/OJַ7qhڮC$6R}k3uˠp*t(K])UU`F.|鿡O)"[K?gmB'> i _ GX<_FNe}i^?nO?=ChZ O4~$fHt}_[o7Z[[nK+S$|%7 Yi㈾|4%M{7$.}KOkAxmW-` u,Vl8CU3KT욳BV%%vնc?)>:P J2W߈~A _ {Y_Y-߈ tF jg|[H w^a3$W?x'kӢk? n|3Yi^4)<:^cet hmi UɮF >2.M6Bߎu]?:O|aY]AѼn 'K~_~$yOKu?<xFD@M W_n-&p2?Dg]^M\4=>V2c| ľu5YeE:0^y WbVHh5նSӇVm(EߣLk^w+5~YVOCBOGo ב߾C//'ƢdE!F%X^mizS>xX&,ŧ)x& +'R G`ٯcV"ZAO5^,o3TOj/~5h*mt{MSZf|L5X⾿NZ[q#2l۽qѕ\4\]k UƝw̯[n.wZv|3MPn9cDxkŷ)V/H Ҭ%+[3 ˕߲yc|CH?k>+۽aa~7u<9A#mGC--I-a@RXjpng0X*kt{oX/g *>6Z |[MEVO?4twQ ]4SUMݿlMg_<=ֻ |Yú6:ljM}~%ԭ߮HV4捛վ8ԿEďgڻ^-卷۟^3㉭K=3a5aO?Cu%COlu'|ik#2ƣyh֚.y7p{MQbfɝjO0VﮗnʩVswx} ((((( w?k/ a~ ¿|3Ѿ*å470𾣬2357X^v1G=1;,בմ+:^fڽ֛h}/o{aXG5ճ) htj)u^Lέ5V?3 a|/O~$?^ oXh7LV<*o xHSσPhw!j} |ogž4 懯iӍdžy.DŽwh_Mفck~%|+ >1|]]<-ss{~<0Ї4Lh7aJ[Ibv6US!Nu&ݮ'J)ɮn[+^n<w Yx >֏GF6Lzf}wOcy.V)c_5~?f//g|}Xx <XZaykg]ZݵĐJ8I!vFXiƥYTi3ZPtG~'_z#~zS>}hu]wŗ7 NjօE*"`~ |;ddc;kM[WOڃ'%}:?>#Gx>"2d7qed#z>2Ɵeσ&fs5C?Iյۉ{~C]Lj/BZ{<ݱ} 'x'ᗄ`'|ºC]P.qcYCwCn[h.Fkg^:Sz;Y7^-LcF:SqZ{/˷ou3 3?!7gV?%< ௉mt]sZm-5:z& 0H D_.M_6QQ|{_kzׅ_/iޣk~sX'NZ * IvsA[xm^?^-xľ5<wΞ#6ޫ vYy1WPMu2$iǿ?S+¯AjAn_3h>86G4W{5-#K>)|q|y7V~n|Ckocq8{K6V>9xB'칠ZMBX_!_RT}ZnxѬӘ1;F2%|-t(0 a^? \jO|) g-?V<:uwemsƶ%20 C&ag_ƚ~3xzzX\h7|a t*U}OZVY!WSc ib]gDuuMO­Am@cB.'(hzτ >/|)kᎅ3G,7wzLC%Ӽ7n)(J q]2uu-vkQRT\'~|/?gcio]:[ú׊4k&X-ݾwirl*Fޤ7O& ~+Oo>xOb}XTòHER˶A1[l\exr>x s+"o <]VWwZڝƏq{3BK"+)G_h;7R.٨bï"E\K|[|O_ YY P] }o;Ư|4tOo]g>m|:w{[4AxR߈mKX5:-ݠL;rT*P~VVoOE}5SJ/f1yv H_셥~7~+xG|D |@׌4]i'IC};EFni '~ |d_ h~ 5ߊ>ii |g4Skzg. KdUգFPMoñJ3TN.3kZ<O/(WMfgⵖ|u "/ ⫻Hayc)v@L y7ş $>|u.47Ø|[=SMӵ=>ҭgYtVc?+4|N.AohFeѦ% 1 S Z߆~,O RKb qF,w ԠK_&`O<@lqX}j*~ߕ~[y^ֿ}[my8*<ߺ쨊UTUU p8# u ߴN.4kl-<=N!-;^"[k%V>5h C %C¶ڌ:՞.F;Wkx-./HI2:Q(N4s]kBU)vl@_f_؞Oz_};F_+j7vV#mZF ճĊV7?G~j~^PGӵlj5xTr[_xŞ|qwO湐tsq>~ϚG߅4O^ ПKmrKdڞn`7/"bG;Kx&=B^|uEn>׬o|9s&n&Ws]/E' {k>U958ѳ4#[T/? ~,YPog/3}^"/ WQ;G!Yw4? Kn/:SE~luش83q-Fk+su",e*08bdt/xZw>55Or? cм[i[zuv}ni,s)/ٓn;~ x'ƚ=厑(OXj6ki=ZFxRTb$Tk:7=m<1M7λH|UM^{e}_\oasw׿M{ w|uj?~Ծ'K xǷ!|NmMAs`^6sGo$_goأMQxg?tm|K? XkSZZ2jPε[|[Ƹ3@u׿r+|7>ާq9t7ε_+"/.H.l n bo(* **҄5_2%8)]os׾xK N4}O#I=zgt+t;d7W啮]&aWPOѿuo[N[x[ko}n} {54[˙Z(Ri=^#ٻw☼q+^5aРx#Ş(DHjiV[*;by)1 >XJV??`X<)u[xÿ~&.|ML5_cn&E,o> Q1Òg50Wk \Otm k'"vOvzWwQ u? PnW¾mΓ{l塑XR Gs@?g- Z^c7X|3? kZ]7nBhZsA=E,3F:%ezvP~z7_oj GhIi_eI+tMBE-o1# tOxsb5|9k>-B}CF=SfC#XjKidEY/[|D~jȿֺj:4O5 %Be3@I/K5ksXg]_[Ѵo?sq]xf[tmú=9"U$UP+#noh]{StO9|# :gtg-GH]FVK FMl&e'te9/_~%Au/ Γ]M ;_e3PM6mkB[ȿ.|9M>_ gIx]/։ ^jj2* ˃-8CHrk{Degg6?*$c:Wt|@=4]u$ӥӼ7? kĚn,"ּk⻻ցF}([ ;~ e=GZDioߌt+ϊ^SI<3k M_B<)ը J!(kbO'-SzYVo\xZzZin6ms _YOm|i麵T_?>=|v7π_~|5X=4i]jJx[ᗆm>Þ7|36wbR44%s>i?\/\|s;=w[״| ѾOKL5 kyU~Pʺn/-yL4?\߱'gs?1O"Ds|U.VR(ʐ2.TBƤTe%nN6Te/ ?jo??x{Ö޳iS]ԴY,4]+%u[XJ s_Jo)>8|NAѼW?xG1\麠g5/s.^|-O;u~$? ŧ-q~-wqiP[x>{E#ŵžd]l &~mT}~Y΢.ZKY|,bZh9E̟'JE$-ʇsS/h'OƏ)o9}w~ gďz}xL4iu,sZiV Đ[X?3~9#7ZoN?<73,wb5?4OJ?ɫpcF1*Z3~_|5fŦ/ xbW}4Igt{V{;?ڱ2"b/mSz<YcWjR_WPnm|rK'oaIt6&hKM=Kie =hru?g~EO y_5_]kNK)63dOqf]?RuKq#dܚ(b N`ͭ߇!) [T𢾗qe%M M#hӵψkN)ʔ$U_*? xιVe5&[5ˇ𖿠i蚔̿gP r_/?m٧4ߵGCྟ'V\z|7]xOZZϲ n/C &e+{x&$hdME,odEbH _L^T1?d/3OiZ5.=߆l"ܳ#4[G}ǚk ²V۳O'':VO?/|D~ԟPؿj/hwxO7-g= -C\/SjsymaY&W?bj3oy>CApe׼6Qkt2\?X|// W& o?Z4LmtHts4!s_'Y3{0|7+֣Q{_up]SBguk]y[>„8N\w!O?j)W xgDݮ|EӾZy?|I~!|@ VWtm* s4Sn^)csnzw#.W_<9ᨮ>)xSG4C;¾1??fZO4b\C.?g>6{?|s? /%6 X^OYh~[7ÖV'd_~!OZ.u=f$s,okIN%hF=;+E{?/ཞ6eC0xwSx 'tvޙs'|yjW]IooD%H^k >6J𞩦kkUzK;⅏Agŧ}k ?Li#SL3/-&nfFgM"iڵ湮ZB_ 5n{˴Xy&3;~M~O?a=<|olwXh=!ouf1㈄iSn3R[)TVpO">xW:f;>%I>[߃6m㏉!֯þ$HTZ\*3'<} /etT~!᷊\_[^'⟏jZc3l>'ǖ·q5/,'S _`]?Zg5/ GFiIu[/iڴPS\Y<4ܷe~?xBg^T44xgTCŧtk^&'RAb^X}7Nܻ5TJ>٤CM~!iHo*w KOKi^t]ųb6s{jFGw,V,ϋ>~^077G>)7xk_" q7>-`M>OT0D|l~-<|"M/Jk/xzV..RBԥuM{UfȪd QOl8h>WR>kSDa[cĶfiLk*jWZ%MkZeNZW&n?uO([~<7__?> 4k#?4_X#3oz_g5C`>K+;|*Auz~xgUkCC|r3οiSOK=3Y$7 wğ|FX{wj$v],R0Ӡ֧ԗp*%,G/xC4žOXF4=/~-c趶zfي N2sDQQSKNmќMj{~+ ( ( ( ( ( ( ( ( ( ( ( ( ( k:+)VV <#Q@Ka_x_~.73'Q"F~NOm. Hy3}5cy-=hg߇k C__xŚg+xŚΧ걉RR⽮RR&!SxI * ( ( ( ( ( ( (>4ǿPIm,fkMgh~.+9nCK.~vj~?i|-߀^EBi4kFp%m`W C1WҔUJ;_OgMKAsQEAaEPEPEPEPEPEPEPEPEPEPEPEPEPEPEP$$If!vh#vr#vV:V l/ t(65r5V/ apytIu$$If!vh#vr#vV:V lU t(65r5V/ apytU$$If!vh#vr#vV:V lX t(65r5V/ apytIu$$If!vh#vr#vV:V ll t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu}$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V lX t(65r5V/ apytIu}$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V lf t(65r5V/ apytIu}$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytU$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V l t(65r5V/ apytIu$$If!vh#vr#vV:V lu t(65r5V/ apytIuDyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\JointCommission-Requirements$$Ifp!vh#v:V l4y  t 0p 65/ apf4p ytKG!$$Ifp!vh#v#v:V l4 t0p 6,5P58/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0p 6,5P58/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0p 6,5P58/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0p 6,5P58/ / /  / apf4ytKG!$$Ifp!vh#vn:V l4p  t 0 6,5/ apf4p ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!DyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements$$If!vh#v:V l4p  t 0~ 6,5/ af4p ytKG!$$If!vh#v#vi:V l4 t0~ 6,5)5_/ / /  / af4ytKG!$$If!vh#v#vi:V l4 t0~ 6,5)5_/ / /  / af4ytKG!$$If!vh#v#vi:V l4 t0~ 6,5)5_/ / /  / af4ytKG!$$If!vh#v#vi:V l4 t0~ 6,5)5_/ / /  / af4ytKG!$$If@ !vh#v:V l4p  t 0V 6,5/ a@ f4p ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!DyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements$$If@ !vh#v:V l4p  t 0V 6,5/ a@ f4p ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!$$If@ !vh#v#v:V l4 t0V 6,5n5/ / /  / a@ f4ytKG!DyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements$$Ifp!vh#v:V l4p  t 0V 6,5/ apf4p ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0V 6,5n5/ / /  / apf4ytKG!DyK FnC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.NFPA.orgDyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements$$Ifp!vh#vn:V l4  t 0 6,5/ apf4p ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!$$Ifp!vh#v#v:V l4 t0 6,55/ / /  / apf4ytKG!DyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-RequirementsDyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-RequirementsDyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\JointCommission-Requirements$$If6 !vh#v:V l4y  t 0O 6,5/ a6 f4p ytKG!$$If6 !vh#v#v:V l4 t0O 6,55/ / /  / a6 f4ytKG!$$If6 !vh#v#v:V l4 t0O 6,55/ / /  / a6 f4ytKG!$$If6 !vh#v#v:V l4 t0O 6,55/ / /  / a6 f4ytKG!DyK FC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements^2 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH F`F ?dwNormal7$8$CJ_HaJmH sH tH N@N  Heading 1$ #d@& 56\]N@N  Heading 2$$@&a$56CJ`\]aJ`<@<  Heading 3$@&CJ,aJ,<@<  Heading 4$@&CJaJL@L  Heading 5$@&6B*CJ]aJph@@@  Heading 6$$@&a$6]P@P  Heading 7$$ (# d@&a$CJaJ:@: , Heading 8$@&5\B @B  Heading 9 $@&`5\DA D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List 4 @4 Footer  !2)`2  Page Number^J4@4 (Header  !vo"vBody Copy No Indentd7$8$CJ_HaJmHnHsH tH ujo2j Body Copyd7$8$`CJ_HaJmHnHsH tH u4O!B4Indent 1 8^8>AR> Indent"A"^`XObXCopy of Indent # XX O`O mHnHu@ar@ Indent "a" ^ `NqNIndent "a" 2 Line@ ^@ `oIndent "1" 2 line&d7$8$^`CJ_HaJmHnHsH tH uRaRCopy of Indent # 2 line `:U`:  Hyperlink>*B*^JphJV`J FollowedHyperlink>*B* ^JphBP@B ) Body Text 2p0^p`0PR@P Body Text Indent 2@ 0^@ `0PS@P Body Text Indent 30^`0ZOZ P Level 1% & F01$7$8$@&^`0 OJQJaJZOZ P Level 2%! & F01$7$8$@&^`0 OJQJaJZO"Z P Level 3%" & Fp01$7$8$@&^p`0 OJQJaJZO2Z P Level 4%# & F@ 01$7$8$@&^@ `0 OJQJaJH@BH u Balloon Text$CJOJQJ^JaJ2B@R2 & Body Text%x<oa< %Body Text CharCJaJ@@r@ : List Paragraph '^6o6  Header CharCJaJ@o@ ?K Body Text 2 CharCJaJDoD b[ Char Char2CJ_HaJmH sH tH DoD b[ Char Char1CJ_HaJmH sH tH RoR 3 Heading 8 Char5CJ\_HaJmH sH tH pp W7 Table Grid7:V-0-7$8$FoF *. ATruesdellCJOJQJ^JaJphB'`B *.Comment ReferenceCJaJ<@< *. Comment Text0CJaJbob F Default 17$8$H$-B*CJOJQJ^J_HaJmH phsH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] [y%[y%" M| ikD!#)-W26:<IPVaY_ e m~qIyi}XL!"&+6/6<>EMfSrYmaYkapqPw~CY4O,$k   "%&(+1458=?ADFINPR`gwxz}X | ^q:hPa"(+0{35;fAkEjIKL@MMPTY2^5cDdddgg7nqxqb'|lamVb*Y>B*Yp>+ ?!i$k'(*)v))&*a-6<j@NCFGKMRNNN0OOQ8V]enr3yrUi%C`.WmaW    !#$')*,-./023679:;<>@BCEGHJKLMOQSTUVWXYZ[\]^_abcdefhijklmnopqrstuvy{|~K//0HIJ bbb7*WBoO"-'''&(((UYY(Z1ׄLxIv%XXXXXXXXXXXXX  !!   OR$ψ7do1%xlGR$\l.\^iwA݇b$Xm%;J,[ʰ\hQ /R$`˶SlOӕ:;@H 0(  8(    <?#" ?   <?#" ?   <?"? b  C A 3"`?\  C A #" `?  S rAT  http://www.calhealth.org/gfx/t1_r1_c1.gif#" `?\  C A #" `?B S  ?BIMQRTZ%=Ct@(|th^}(tX"t@ Xt@ th}(t{  o w V ^ b g LLLLPP! !%%MS|~89#&p,;-<-z---...2/G/J/G0045G7H8HHHHJJMMOO``aakkuv@AopӋԋ 69r42C|3?58%  ! ![!e!!!!!("0"&&T))q1|11122(202y2{288JTOTX XXX&Y(Y[[dh΃ޅlךDXa?@|~89#&333333333333333333333333333333333333333333333333333333333333333333333333!i   O Q   v w \]]bb||899tv ""&!i   O Q   v w \]]bb||~89tv#&P !"#ETF1 {&# 16=r> $Pl}|A }=H ~bn/"8qg  EJ x3)fyJow,o.kg&| pbHH{:Zs8ߖ][ BT.8  /u!7<+*HIZX*Ep '+Sзc,́ygt!-V?0H ?0T716R8k%87CdGi^z81D:4(0;T];`:3:<𝄼uYFmWA^RD$`NVZ0E ԄlEаvUFFbGx\gkHT_-QIZLhXc?K(\JT{LRtQr%R>DpURV0W-"AWvPS4KXROQZL`[5[=I]tX<` Ԏa^$bc&jTcLQԨhD~(4lr:mQX>m]~hmn6G,pN<,8+pJdqr8uK2Fu"^'Nuf6$Pv>tY v\|0yؾl~P{cA}.etuI}:G <~UNU]$0^`0^J.0^`0^J.p0p^p`0^J.@ 0@ ^@ `0^J.^J^J^J^J^Jh pp^p`hH.h @ @ ^@ `hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH. ^`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH. pp^p`o(hH. pp^p`o(hH.  P ^ `Po(hH. 0^`0o(hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.p^p`.@ ^@ `.L^`L.^`.^`.L^`L.P^P`. ^ `.L^`L.h@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^ `OJQJo(hHh^`OJQJ^Jo(hHoh!^!`OJQJo(hH 0^`0o(hH. 0^`0o(hH. ^`o(hH. pp^p`o(hH.   ^ `o(hH.   ^ `o(hH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH. ^`o(hH. pp^p`o(hH.   ^ `o(hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH. bb^b`o(hH. ^`o(hH. ^`o(hH. ^`o(hH. pp^p`o(hH. pp^p`o(hH. ^`hH. L^`LhH. 0^`0o(hH. 0^`0o(hH. p0p^p`0o(hH. @ 0@ ^@ `0o(hH.x0^x`0o( L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. pp^p`o(hH. pp^p`o(hH. pp^p`o(hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.^`.^`.X L^X `L. 0^`0o(hH. ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.88^8`^Jo(.^`^J. L ^ `L^J.  ^ `^J.xx^x`^J.HLH^H`L^J.^`^J.^`^J.L^`L^J.p   ^ `o(hH.p ^`hH.p pL^p`LhH.p @ ^@ `hH.p ^`hH.p L^`LhH.p ^`hH.p ^`hH.p PL^P`LhH. 0^`0o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.p^p`.@ ^@ `.L^`L.^`.^`.L^`L.P^P`. ^ `.L^`L. ^`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`o(hH. 0^`0o(hH. @ @ ^@ `hH. ^`hH. L^`LhH.h ^`o(hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.0^`056CJOJQJo(.^`o(.0^`0o(.@ @ ^@ `.^`.L^`L.^`o(.^`.PLP^P`L.p^p`.@ ^@ `.L^`L.^`.^`.L^`L.P^P`. ^ `.L^`L.p^p`.@ ^@ `.L^`L.^`.^`.L^`L.P^P`. ^ `.L^`L. ^`OJQJo( ^ `OJQJ^Jo(o  ^ `OJQJo( x^x`OJQJo(H^H`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o ^`OJQJo(0^`0o(.^`56B*o(ph.$ $ ^$ `o(.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH.  P ^ `Po(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`o(hH. pp^p`o(hH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.0^`0o(.^`56B*o(ph.$ $ ^$ `o(.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. 0^`0o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.p0p^p`056B*o(ph.p^p`.@ L^@ `L.^`.^`.L^`L.^`.P^P`. L^ `L.0^`0o(.^`56B*o(ph.$ $ ^$ `o(.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.^`.^`.X LX ^X `L. 0^`0o(hH. p^p`hH. @ L^@ `LhH. ^`hH. ^`hH. L^`LhH. ^`hH. P^P`hH.  L^ `LhH. 0^`0o(hH. 0^`0o(hH.^`OJPJQJ^J. pp^p`o(hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. p0p^p`0o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. 0^`0o(hH. ^`o(hH. pp^p`o(hH.x0x^x`0o( L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH. ^`o(hH. ^`o(hH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.808^8`0^JhH. ^`hH. pp^p`hH. @ @ ^@ `hH. ^`hH. ^`hH. ^`hH. ^`hH. PP^P`hH. ^`o(hH.0^`0o(. 0 ^ `0o(. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.0^`0o(.^`56B*o(ph.$ $ ^$ `o(.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. bb^b`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.0^`0OJPJQJ^J. ^`o(hH.  0 ^ `0o(hH.   ^ `hH. xx^x`hH. HLH^H`LhH. ^`hH. ^`hH. L^`LhH.0^`0OJPJQJ^J. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`. ^ `.jL^j`L.:^:`. ^ `.L^`L.^`.z^z`.JL^J`L. ^`o(hH. 0^`0o(hH. bb^b`o(hH. pp^p`o(hH.   ^ `o(hH. pp^p`o(hH. ^`hH. ^`hH. PLP^P`LhH.h ^ `OJQJo(hHh ^ `OJQJ^Jo(hHohx^x`OJQJo(hHhH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohX ^X `OJQJo(hH 0^`0o(hH. ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`o(hH. pp^p`o(hH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. p0p^p`0o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.808^8`0o(. 0^`0o(hH. ^`o(hH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. ^`o(hH. pp^p`o(hH.  P ^ `Po(hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.  ^ `5o(.  ^ `o(.0^`0o(. HH^H`hH. ^`hH. L^`LhH. ^`hH. ^`hH. X LX ^X `LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`56B*o(ph. ^ `. L^ `L.x^x`.H^H`.L^`L.^`.^`.L^`L.h@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^ `OJQJo(hHh^`OJQJ^Jo(hHoh!^!`OJQJo(hH0^`0OJPJQJ^J. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.8^8`o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L. 0^`0o(hH. ^`o(hH. pp^p`o(hH.   ^ `o(hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.0^`0OJPJQJ^J. ^`o(hH. 0^`0o(hH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH. 88^8`o(hH. pp^p`o(hH. 0 ^ `0o(. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. pp^p`o(hH.   ^ `hH. \ L\ ^\ `LhH. ,,^,`hH. ^`hH. L^`LhH. ^`hH. ll^l`hH. <L<^<`LhH. pp^p`o(hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`o(hH. pp^p`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. 0^`0o(hH.h ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hHhp^p`OJQJ^Jo(hHoh@ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHhP^P`OJQJ^Jo(hHoh ^ `OJQJo(hHh ^ `OJQJo(hHh ^ `OJQJ^Jo(hHohx^x`OJQJo(hHhH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohX ^X `OJQJo(hH 0^`0o(hH. 0^`0o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.P&|a EY vFuUF][ RD8qdq(4l716)f$bc$Pv0ygt!-NugkHG,p[5[ ]>.8 uY<A}QZmWAH .kgQI4KX0W 1Z0E>mtQJT{Lh~hm <~"AW}|A Xc?KX<`pbu%Rx3lE {NU ] Tc i^z8 {: 3:< ?0 ~P{ n/ ?0 ETpUI} ];owm8r> X*<+*D:+pc,%870;bG '+u!`0^J.1^J.2^J.3^J.@4^Jp5^J6^J7^J50QV0R,T000Wt00Wt00Wt00Wt00Wt00Wt00Wt00Wt00Wt00Wt0PP         {        ,u!y"*Pv~                      etTL!nKRA7   jn\tt     X+*,$       [:-b5&Jvpܵ  v d6mn_    4N :h.L։              &7FKTs       ڡm                n1                 \        x&꘡AI      6         bU&꘡AI                                 bu4zD              [x        L       32a<\F8V      bu4zD      nr        z        bu4zD                        y$Z<^     6 */j       [hdzj@.     l*B      $R        Et        hXVH      bu4zD      6         v        rk        H%К                 cd$Rrk#Dz             $ZN       bu4]gD      6         *V ~       #Dz        Z Rqx: V       8HC       &?%g e     |Ģ        z                 6         bu4        z$T6Bx<]\P     a?&꘡AI      Vv%zvZ     6         '$C                :Z        <`Ĵ       6                           nrd       T UK#wF2.}(~%V(LYA0\7u:>0DK A:rD.:QRW:TCR\ l Nr/Mzm k{W} R U E t ) * \ Cy < 8 p< C KJ bY j F{ .% u M  # B( 3 E F S 1UWQ+0;k:|>T(^e~vC3f%X6d>Zj1?W)K+2&Tz<[!~%/NlXn ?jk+:e`|-.2OU ,Wg{?Tu Q")]*R6DROe}  #-5<4nE71\*aON`)fiw3O) 6@W 6 ; ?K yy [| !U!!07!JF!KG!^!"J"}'#2#A#C#xD#J#oa# $G4$e$#%7 %(/%{g%(&K&@]&o&\r&'i!'F'['o'Ly'_ (; (YM(_u()C )t )) D)N)a)Hv*++ + +:+Z4t45)5o@53t5\ 6p;6F6`67 :7N7W7+m788N8"f89cc9Lj9W{9:Y:':<:G:r:7;;;.;a;q;Rv;-|;;<P><G<Z< k<&=O=>;>?>=~>W>E?b?|?~?(@B@P@QV@A#A7AQAbA*B0BNO O/O9O.!P(P\PQ;QEvQxQyQRR2"RHIRLRqR3sRV'S6S]SWgST TTT@!TET JTC[TqyTUUv-U.U\U}U)V@VF9Wk@W(YWrBX$gXwX%{Xv~XYDYZY+)Y@7YZxZZl{Z[$[)[tE[a[b[\3\<\W\/X\uf\1r\]9]N]x$^PE^P^e^x^3_24_:___``^`r a!4aObWb_bjbvb[yb~ybS c^c?c@cNncrd`dkdod2eMeWege{e ft*f_DfRfRfYfg.gig h4hh;h]ThV>iXiS`iuiE1jgjQ|j4}j. k62kAk}_k,ikxk~|kk/l"l1/l};lClJlRlvlbm(*m+mQHmSmuem5pmymnn(nS;nx?nCUnBhn)o-4owopp p?p6[p? qqC9qs[qnqr/6rFyr9sEsmst$t1tftu1u3uO8u)@uIurbuw ww0wCwMwVw?dwHxbx$gxsxby4AzeKzkzmlz{{{V!{P{ ^{Ni{||.|6|9|z|}}It}o~)~G~lU~y~ism>R/?LL[a{]TxEQ{} W=6_~m 3^<RWtz2U3<7pv]w9 5;=e@KDesft ;Y_[$#.g^knKntu.X\~v' %iTt) y#1y}vcQzf;2!)/Mv $,(ET W U&+-?hD)EQP^za#*M1\_f_j EN-sn )/IbcfqxU}c #,n7T{]Ex~C4dls(u.9`4 u#OOnjoz $' kM!",g.Qr.J/Vg|,13H$ZuO+ uTP0%%(.:sEq|TG,OW3nBLJrSZpR@tHQQq~0hY!24bn&C5FHJ;$,u9bMY*%3:FvW`pz.BS~D!{@@hk|}D1RIO7Vax n Smhdqz$[qf ihY> "DP]p<*?B{Wp8v  6n- 36=\mo|~A:b@~5dP .;6Lp|jSHTkh?rw!$G^a"SkIRw; ? $#Ay^{q~.J9KPa=k+#Q-b-~1!&7/X>^gR@AkJJU9vKKK[typT |)`D&rujxJ &&)1@4[d(=H` t uWg>Pd-efkBt$hisxw"r$Z'kx& 69cPL~ck*a1D_e<A3T:qD]j g\ Aup{.(:^.UYop 5O=P$}s~X-2Oa)r #06DQ}z # 7JiQjq],y[f9u N-/1k?(4+AIabwv d7@Sp@<_o '5t:jLM_<&Tap4C$[t<&)-6}:AMIT`6-/?l 70,5^mma0:C8]^GGc~a?PGa+3LRGRo]mrhuU~ .;GI9!yA`aoks=IXWjlvA}Kh6E@ %@I2LUV^vt~&QI+1`2=XQ^o rsExmx'.46"7PYg-!e",v/E`/UnvR\ugqd{=;;?S#X3tIrKu#,K^MTVqu|MTNMViHs8yz@!HZ{`ds|~@////?/@/AeVeWu|u}uuuVV78%@ D@JL@d@@@@(T@N@@0@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial;Wingdings7"Univers5. .[`)Tahoma7.@Calibri?= *Cx Courier NewA$BCambria Math"At{%t{%z%)HSm)HSmxx24 3qP?$2P!xx !HASC Standardized Emergency CodesHospital Emergency CodesEmergency, CodesDean P. Morris, CPPPat WallLP                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O Oh+'0 4 HT t   $HASC Standardized Emergency CodesHospital Emergency CodesDean P. Morris, CPPEmergency, Codes Normal.dotm Pat Wall2Microsoft Office Word@G@ kp@Op@Op)HS՜.+,D՜.+,` hp  Hewlett-Packard Companym "HASC Standardized Emergency Codes Titlet 8@ _PID_HLINKSA,T\u$C:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirementst!C:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\JointCommission-Requirements\uC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements\uC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements\uC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-RequirementsnC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.NFPA.org\uC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements\uC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements1M C:\Users\Hollywood\Documents\- Security and Emergency Management\HASC\- Standardize Emergency Codes\2014 Codes\standardized codes\Code Revisions\www.jcrinc.com\Joint-Commission-Requirements\u C:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\Joint-Commission-Requirements1MC:\Users\Hollywood\Documents\- Security and Emergency Management\HASC\- Standardize Emergency Codes\2014 Codes\standardized codes\Code Revisions\www.jcrinc.com\Joint-Commission-RequirementstC:\Users\ddiaz\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\LFOIHUJF\www.jcrinc.com\JointCommission-Requirements|Xmailto:pwall@hasc.org<l*http://www.calhealth.org/gfx/t1_r1_c1.gif  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDFGHIJKLNOPQRSTUVaRoot Entry F@{pcData  ;1Table&WordDocument$SummaryInformation(EDocumentSummaryInformation8MCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q