ࡱ> Z\Y^M =bjbj== WW6l    R R R V 6767678D9V :]9=>>>7@D-EZZZZD[[\$] `\R E@"7@EE\M  >>\MMME 8>R >ZMEZM> MV:X: R qY>9 _V ,67G(]Y qY\ ]0:]gY `J`qYMV V      EMBED Word.Picture.8  RISK ANALYSIS Project or System Name U.S. Department of Housing and Urban Development Month, Year Revision Sheet Release No.DateRevision DescriptionRev. 01/31/00SEO&PMD Risk AnalysisRev. 15/1/00Risk Analysis Template and ChecklistRev. 26/14/00Minor changes per Office of AdministrationRev. 34/12/02Conversion to WORD 2000 Format Risk Analysis Authorization Memorandum I have carefully assessed the Risk Analysis for the (System Name). This document has been completed in accordance with the requirements of the HUD System Development Methodology. MANAGEMENT CERTIFICATION - Please check the appropriate statement. ______ The document is accepted. ______ The document is accepted pending the changes noted. ______ The document is not accepted. We fully accept the changes as needed improvements and authorize initiation of work to proceed. Based on our authority and judgment, the continued operation of this system is authorized. _______________________________ _____________________ NAME DATE Project Leader _______________________________ _____________________ NAME DATE Operations Division Director _______________________________ _____________________ NAME DATE Program Area/Sponsor Representative _______________________________ _____________________ NAME DATE Program Area/Sponsor Director RISK ANALYSIS TABLE OF CONTENTS Page #  TOC \o "1-3" 1.0 GENERAL INFORMATION  GOTOBUTTON _Toc481805391  PAGEREF _Toc481805391 1-1 1.1 Purpose  GOTOBUTTON _Toc481805392  PAGEREF _Toc481805392 1-1 1.2 Scope  GOTOBUTTON _Toc481805393  PAGEREF _Toc481805393 1-1 1.3 System Overview  GOTOBUTTON _Toc481805394  PAGEREF _Toc481805394 1-1 1.4 Project References  GOTOBUTTON _Toc481805395  PAGEREF _Toc481805395 1-1 1.5 Acronyms and Abbreviations  GOTOBUTTON _Toc481805396  PAGEREF _Toc481805396 1-1 1.6 Points of Contact  GOTOBUTTON _Toc481805397  PAGEREF _Toc481805397 1-1 1.6.1 Information  GOTOBUTTON _Toc481805398  PAGEREF _Toc481805398 1-1 1.6.2 Coordination  GOTOBUTTON _Toc481805399  PAGEREF _Toc481805399 1-1 2.0 PROJECT AND SYSTEM DESCRIPTION  GOTOBUTTON _Toc481805400  PAGEREF _Toc481805400 2-1 2.1 Summary  GOTOBUTTON _Toc481805401  PAGEREF _Toc481805401 2-1 2.1.1 Project Management Structure  GOTOBUTTON _Toc481805402  PAGEREF _Toc481805402 2-1 2.1.2 Project Staffing  GOTOBUTTON _Toc481805403  PAGEREF _Toc481805403 2-1 2.2 Risk Management Structure  GOTOBUTTON _Toc481805404  PAGEREF _Toc481805404 2-1 2.3 Periodic Risk Assessment  GOTOBUTTON _Toc481805405  PAGEREF _Toc481805405 2-1 2.4 Contingency Planning  GOTOBUTTON _Toc481805406  PAGEREF _Toc481805406 2-1 3.0 SYSTEM SECURITY  GOTOBUTTON _Toc481805407  PAGEREF _Toc481805407 3-1 3.1 Baseline Security Requirements  GOTOBUTTON _Toc481805408  PAGEREF _Toc481805408 3-1 3.2 Baseline Security Safeguards  GOTOBUTTON _Toc481805409  PAGEREF _Toc481805409 3-1 3.3 Sensitivity Level of Data  GOTOBUTTON _Toc481805410  PAGEREF _Toc481805410 3-1 3.4 User Security Investigation Level and Access Need  GOTOBUTTON _Toc481805411  PAGEREF _Toc481805411 3-1 4.0 RISKS AND SAFEGUARDS  GOTOBUTTON _Toc481805412  PAGEREF _Toc481805412 4-1 4.x [Risk Name]  GOTOBUTTON _Toc481805413  PAGEREF _Toc481805413 4-1 4.x.1 Risk Category  GOTOBUTTON _Toc481805414  PAGEREF _Toc481805414 4-1 4.x.2 Risk Impact  GOTOBUTTON _Toc481805415  PAGEREF _Toc481805415 4-1 4.x.3 Potential Safeguard(s)  GOTOBUTTON _Toc481805416  PAGEREF _Toc481805416 4-1 4.x.3.y Safeguard Name  GOTOBUTTON _Toc481805416  PAGEREF _Toc481805416 4-1 5.0 COST AND EFFECTIVENESS OF SAFEGUARDS  GOTOBUTTON _Toc481805417  PAGEREF _Toc481805417 5-1 5.x Potential Safeguards  GOTOBUTTON _Toc481805418  PAGEREF _Toc481805418 5-1 5.x.1 Lifecycle Costs Acceptable Safeguards  GOTOBUTTON _Toc481805419  PAGEREF _Toc481805419 5-1 5.x.2 Effect of Safeguards on Risks  GOTOBUTTON _Toc481805420  PAGEREF _Toc481805420 5-1 5.x.3 Economic Feasibility of Safeguards  GOTOBUTTON _Toc481805421  PAGEREF _Toc481805421 5-1 6.0 RISK REDUCTION RECOMMENDATIONS  GOTOBUTTON _Toc481805422  PAGEREF _Toc481805422 6-1  1.0 GENERAL INFORMATION NOTE TO AUTHOR: Highlighted, italicized text throughout this template is provided solely as background information to assist you in creating this document. Please delete all such text, as well as the instructions in each section, prior to submitting this document. ONLY YOUR PROJECT-SPECIFIC INFORMATION SHOULD APPEAR IN THE FINAL VERSION OF THIS DOCUMENT. The determination of the type of risk assessment to be performed relates to the decision made during the category determination process described in section 1.3 of the System Development Methodology. The level of effort required to perform a risk analysis will be much greater for a new development effort than for an enhancement of a system. GENERAL INFORMATION 1.1 Purpose Describe the purpose of the Risk Analysis. 1.2 Scope Describe the scope of the Risk Analysis as it relates to the project. 1.3 System Overview Provide a brief system overview description as a point of reference for the remainder of the document. In addition, include the following: Responsible organization System name or title System code System category Major application: performs clearly defined functions for which there is a readily identifiable security consideration and need General support system: provides general ADP or network support for a variety of users and applications Operational status Operational Under development Undergoing a major modification System environment and special conditions 1.4 Project References Provide a list of the references that were used in preparation of this document. Examples of references are: Previously developed documents relating to the project Documentation concerning related projects HUD standard procedures documents 1.5 Acronyms and Abbreviations Provide a list of the acronyms and abbreviations used in this document and the meaning of each. 1.6 Points of Contact 1.6.1 Information Provide a list of the points of organizational contact (POC) who may be needed by the document user for informational and troubleshooting purposes. Include type of contact, contact name, department, telephone number, and e-mail address (if applicable). Points of contact may include, but are not limited to, helpdesk POC, development/maintenance POC, and operations POC. 1.6.2 Coordination Provide a list of organizations that require coordination between the project and its specific support function (e.g., installation coordination, security, etc.). Include a schedule for coordination activities. 2.0 PROJECT AND SYSTEM DESCRIPTION PROJECT AND SYSTEM description This Risk Analysis document provides an approach for conducting risk assessments of implemented systems, systems under development, microcomputer systems, implemented applications, and applications under development. The approach is adaptable for conducting the different types of risk assessments, whether it is for a personal computer (PC), large system or application, or whether it is for a system or application that is implemented or under development. It allows an informal review or short-form risk assessment to be conducted when it is determined that the system or application being assessed is, or will be, a microcomputer-based system. 2.1 Summary Provide basic information about the project and the application system for which a risk analysis is being conducted. 2.1.1 Project Management Structure Identify the project sponsor, sponsoring office project leader, and the estimated or actual start and end dates of a new or modified system project. 2.1.2 Project Staffing Determine the approximate number of staff hours required (HUD personnel and contractors) and identify the expertise, knowledge, skills, and abilities needed by the project team to develop and/or maintain a quality application system. Staff hours should be broken down by major skill category, both technical and program related. This information will help management determine the resources required and when they are needed. 2.2 Risk Management Structure Identify organizations responsible for managing identified risks and maintaining countermeasures. 2.3 Periodic Risk Assessment Describe the frequency of periodic risk assessments of the operational system. 2.4 Contingency Planning Determine the level of contingency planning needed and identify the responsible personnel involved. 3.0 SYSTEM SECURITY System Security Based on the environment, scope, sensitivity of the data, and criticality of the proposed system to the project sponsor and users, assess the security requirements and specifications necessary to safeguard the system and its corresponding data. Include such information as privacy requirements, estimated dollar value of assets, and contingency planning requirements (including the Business Resumption Plan). 3.1 Baseline Security Requirements Analyze the processes and procedures required of the new system or the system to be replaced and the sensitivity of the data the system will be processing to determine inherent security risks. Determine the security controls that will be required to adequately counteract these security risks. 3.2 Baseline Security Safeguards Describe the security-related technology that is currently available or projected to be available at the time the system is scheduled for operation. Determine potential safeguards against all identified risks and vulnerabilities, including those safeguards that may already be in place at HUD. 3.3 Sensitivity Level of Data Evaluate the data being processed to determine whether the level of sensitivity requires safeguards, such as the application of security controls. In this evaluation, include input and output data, internally processed data, and data transmitted to or from the system. 3.4 User Security Investigation Level and Access Need Analyze the systems end users, including those having direct access to the system and those who will indirectly receive output from the system. Determine the levels of security investigation and system access required for each user. 4.0 RISKS AND SAFEGUARDS RISKS AND SAFEGUARDS This section provides a detailed description of security risks and safeguards. Each risk should be under a separate section header, 4.1 - 4.x. Evaluate the proposed system and its operational environment for potential risks and safeguards. For physical risks, determine the vulnerability of the computer room and the impact of environmental hazards on the computer, related equipment, and their contents. For communication risks, evaluate the system for threats to the privacy and authenticity of telecommunications. For hardware, review the systems current or proposed hardware configuration. For software, review the system software for security risks and potential vulnerabilities. Identify the potential security risks and provide the following information for each: 4.x [Risk Name] Provide a risk name and identifier here for reference in the remainder of the subsection. 4.x.1 Risk Category Identify the category of risk (physical, communications, hardware, software). 4.x.2 Risk Impact Provide an assessment of the magnitude of the risks impact in the event of an occurrence. 4.x.3 Potential Safeguard(s) This subsection provides a detailed description of potential safeguards corresponding to the risk named in 4.x. Each safeguard should be under a separate subsection header, 4.x.3.1 - 4.x.3.y. 4.x.3.y [Safeguard Name] Provide a name and identifier here for the potential safeguard for reference in the corresponding subsection of 5.x. Describe the safeguard. 5.0 COST AND EFFECTIVENESS OF SAFEGUARDS Cost and Effectiveness of Safeguards Analyze the identified security threats and potential vulnerabilities of the proposed system, and determine the necessary measures to be taken to safeguard this system. Evaluate the identified measures for appropriateness and cost efficiency, and formulate a recommendation identifying those measures deemed suitable for implementation. Each safeguard referenced in the corresponding section of 4.x.3.y should be under a separate section header, 5.1 - 5.x. 5.x Potential Safeguards Review each of the safeguards identified in the corresponding subsection of 4.x.3.y and determine whether it is appropriate for use within the systems operational environment. Indicate its level of compatibility with the guidelines for operating information systems at HUD. 5.x.1 Lifecycle Costs for Acceptable Safeguards Estimate the cost to develop, install, and operate each of the proposed system safeguards. Include user training and maintenance, if required, in these estimates. 5.x.2 Effect of Safeguards on Risks For each of the proposed systems identified risks and vulnerabilities, estimate the extent to which the recommended safeguard will be effective in preventing or minimizing that threat or vulnerability. 5.x.3 Economic Feasibility of Safeguards Contrast the lifecycle costs of each of the potential safeguards against the financial impact of the security risks they are designed to prevent. Consider the effect each safeguard is projected to have on minimizing those security risks. Determine whether the benefits achieved by these safeguards outweigh their operational and developmental costs. 6.0 RISK REDUCTION RECOMMENDATIONS Risk Reduction Recommendations Outline the potential security risks to the system to be developed or replaced and provide a detailed description of the security safeguards that are being recommended to counteract those risks. Revision Sheet Risk Analysis Page  PAGE i Risk Analysis Page  PAGE ii Risk Analysis Page page iii 1.0 General Information Risk Analysis 1.0 General Information Risk Analysis Page page 1-3 2.0 Project and System Description Risk Analysis 2.0 Project and System Description Risk Analysis Page page 2-1 3.0 System Security Risk Analysis Risk Analysis Page page 3-1 4.0 Risks and Safeguards Risk Analysis 4.0 Risks and Safeguards Risk Analysis Page  PAGE 4-1 5.0 Cost and Effectiveness of Safeguards Risk Analysis 5.0 Cost and Effectiveness of Safeguards Risk Analysis Page  PAGE 5-1 6.0 Risk Reduction Recommendations Risk Analysis Risk Analysis Page page 6-1 #$'()*125LN~YZ}  56mHnHu56j56U5CJ CJ>* 5CJ \CJ jCJ UCJ55CJ6CJCJ 5OJQJ5CJ OJQJ5CJ0OJQJ5CJ@OJQJ jCJUj< UV jU7 "#()2345LMN$^a$^& #$$a$:==d$$IflFI $I6 0    4 lal $$Ifa$&.YZaiyyyyyyyyyy $$Ifa$|$$IflFI $I60    4 lalyyytt$a$|$$IflFI $I60    4 lal $$Ifa$ z{|yssss   n$$Ifl40 # 064 la $$Ifa$$If  !"GHI<GVW    P    &d P    S _ } ~  S 9 1   8^8  8#^#  8^ $a$$a$$a$    P     4 5 L M P R ] ^ y z   2 3 6 8 X Y t u   * + . 0 D E ` a x y | ~  jUmHnHu mHnHuj5UmHnHu5mHnHu56mHnHuj56UmHnHuM     ! # $ G H c d { |  &'*,JKfg~  !"%'(KLghjUmHnHu mHnHuj5UmHnHu5mHnHu56mHnHuj56UmHnHuM $ -(;K?Is   ^   8#^#  8^8  8^458:qr,-DEHJK_`{| !89<>VWrsjUmHnHu mHnHuj56UmHnHu56mHnHu5mHnHuj5UmHnHuM*+BCFHIuv  89TUlmprskmnegCJCJ6CJ6 *6 *565CJOJQJ jUjUmHnHu mHnHuj5UmHnHu5mHnHuj56UmHnHu56mHnHu? ! $a$ $ a$ $ a$mneg{| "7CS $ & Fa$!$a$$a$$a$$a$1$$a$gSd <=st@Bl$%!!!1"U""##$$1%O%%%&4&H&[&'(@)a)b)**+,, -"-#-->0?01H2I2313X3Y344#599:::::::: 0J5CJj0J5CJUCJ5CJ *CJ>*5CJOJQJCJCJ *66LS;NZl<=t@BXYkl$a$$a$$a$$$a$$$$a$$$a$ $ & Fa$$ & Fa$l ! $a$$a$!$a$$%!!!1"T"U""##$$$1%N%O%%%%&&$a$!$a$$a$$a$1$$a$&&& &!&"&#&$&%&&&'&(&)&*&+&,&-&.&/&0&1&2&3&4&H&I&J&1$$a$$a$ ! J&Z&[&'((@)a)b)***+++,,,,,,,,,,,, ! $a$!$a$$a$,,,,,,,,,,,,,, - - -"-#---.0>0?0000$a$$a$1$$a$$a$0011j111I2b2c22222222222222223 ! $a$" $ !a$$a$$a$333333333132333X3Y344$5=5>5R666'7K7L78B8 !1$$a$$a$B8C89999999999999999999999999$a$$a$ $ ! a$99999::::::::::::;;;; ;!;"; !H$$d N  $d N $a$1$:::::::::;;;;;;;;; ;!;";6;7;<;=;@;A;B;C;D;^;_;`;p;q;r;;;;;;;;;;;;;;;;;;;<<<$<%<*<+<.</<0<1<2<H<I<J<Z<[<\<p<q<v<w<z<{<|<}<~<<<<<<0JCJ 0J5CJCJ5CJj0J5CJU0J5CJmHnHuU";B;C;D;E;^;_;`;p;q;r;s;;;;;;;;;;;; $d N  !$$d N  $d N $a$ !$$d N ;;;;<<<0<1<2<3<H<I<J<Z<[<\<|<}<~<<<< $d N  !$$d N  $d N $a$ !$$d N <<<<<<<<<<<<<===*=+=,=-=W=X=Y=z={=|= $d N $a$ !$$d N <<<<<<<<<<<<<<===*=+=,=W=X=Y=m=n=t=u=x=y=z={=|================0JCJ0J5CJmHnHu 0J5CJj0J5CJUCJ5CJ.|=}==============$$&d P ]$^$ $d N  !$$d N  !$$d N  $d N $a$@00P/ =!"#$% P0 pj-000 &PP/ =!"#$%&00 &P/ =!"#$%&00 P/ =!"#$%&00 P/ =!"#$%)00 0P/ =!"#$%&00 P/ =!"#$%)00 0P/ =!"#$%&00 P/ =!"#$%)000P/ =!"#$%&00 P/ =!"#$%)00 0P/ =!"#$%&00 P/ =!"#$%)00 0P/ =!"#$%&00 P/ =!"#$%)000P/ =!"#$%`!w MI4=0HxڥEӇk%gI$\ 眣 H<82 $A$(}O.Yg_5=ݽ˞$"NLR$_{ݴ{SJѽgv'SÞ% :KSp/I0Qq$/` 0ĄvU!Q֏|V ̇.k'*p\䳂bMyc ,->+pt!D,.|0T~xv~:5~5}~o4AM,ǽ܏E,)QTN|yzJҫ)E=@q`ޑ 2e9,\a|J4Liǘ0j*sK_`1@M!HyR 0> CC㩄̠O))?/-a0{ G0SޖHZ BR~W4`斗|JKcU!Dk[yyWJ<SJMJKY$ Mfr& P*C չ_jb_Mv:crAܐZLKabE"RgTg^Ͻϯϱ8ϴ8+*X+NK Tƾ ګҿ:zK%i m}h@o%il*J|5iX91[2n[%:Z%Z2Z%Z퍹iD߆h:PX5:qAU^96~a%P# e3 ( ԰"u{U2^7&//AkBF[Ȅ]F/>+ Ӡ b%vzꟁggE(Bb+X_܌O־s $ԥ05oUUVA*o}"ƶ|K y$%偔RFJܑ('KnK%ΫB Ֆ{RPɯ҄4gB~bZYxe%D^3@RHxJ&)^D2m-i6oM剼GVnk,uSu%פ:u ,AiK(]1з3LR:}^ CIpD ,{+jRZj*ʻrR/_~rUHe_ Wat/q ?1KFK0r={Cv(2( f,r> #),cg5|φY 3 i0S$LDDE79޴ϰ {`k+V bF ߲m2jK"*3im@p]**H6Xvf O0+!8 G84`{NjJoyu ̠QU/I#*`<7Mv1&| yĎ"Bv0 `GXKrH@v1frŮ1+k vC%3Tj=ԇTb2mɲ={3|?c aK!tvyhI'$o5|TC~nEes}iUh+ϱstZ I堼 A+IF,d֪EI6.ٵ )y 䇂~BS%󎖕/eP"Oj0'|D yȦyђ]X!.Oa e4w f -E!DRPDRi!IM4LG ʬA1C΋V{%)m}QWWeA2:~;ԩ֖=֣n_SzԸ.&ZTCޠOj9ԊPe!-eo֛w==zB'd؂j7؉,kczk篲^I>2U'JyOFi_s,m*㰋^ KmT'g䖞zNj\_<Ӵ昞#zBQ9e ϰvνrP7a݄Fm(!ؔĶ }ÜLY) ĩt >"Z+3Д#r #2Y|K 6c)lʐg(aNp|DgyF8BOqv]dJ_It bh !Ƿy惼ANe&+铑_i\zCbgGLΌ,cv3 rC^vmYoC8S_wAح@vE `bά6NMv*kuG|?4_}c̗:Bf0Ce:P 3zrclcEk'Gd{hd l<Qc8|WSHsMZ"Z -Y9r8-m.hV`UewQrcn1Zѕ0Og;No` YX{G%|3$@h2^ekQC-HsjE}SS:'5 skZNh>Bȩ/*@_q&(E]>כ>JOk*[_4qgO]{hy岶R_5N98M6qy:PwjO]~SrLO{~8}.7u'۪].bwXjqZ}~gTϧfiJen+&v0fj2fvWcT+`3}=v|8iM';ygdZMmFY\~ !'۞g~O׍ﯢ:@{D:cUa&L0 i9d#EXq#Y#Iav ɮ%: ,KT'B, 0^8+_M7?5@vg@ BcEJ>Z+qċ#8:GR~ZF߯I$ok8k|Va%|eh\h_D. a>Ά滂m=U_GH=`0Jh 㸞? `?Mi s Yyf3aiߤ3u6uթZ'7Y\H]Q+ l*5̍Oc^9ƜS2`_Gw#ps?eshc*Wc`]LQE^KrYL="亜W\CV;ݱEw,cBֈ虃h)z {!jsQ؎4E\bmuk|c.9&Yc4P'q@oW[bwBO<3ΗYtӭ2_7`3NY Kt3.V;Y}v0oge u3w{zZquXE,t:Vu|^˪«YA9>V‗^,e56~X" _}ŊK6ble%lY[h^s99/c%J7Q\.~ K쾡*VUc !5亖6kj݈&Yn[𽅺of3x]bƳq1*2Ͽۧ掦`̦6\6x~.ԁZP^}ƫ'N{jm)RKJCW.M,+H+$iU>׀:_m4庅oN.M4EjWF~ݤ*h+ϽmC kI_F9ssZ(4ѫP}y+mu:ljr%LXfQصg_sL*$Mӿ<E,=Dd l 0  # A2w:2h|>!SDx`!K:2h|>!v;H,xڥxն^z 4 QA7J t-"E&HHC 9y~ϙٳZfNd+,V\6r aVi냁 }Lj2k9ߜ^zv̥7#^ S\3^5%G^ xЯkW=1GA" ryqɍ5y<}[^hm]%ǗbZb(arf)g5}Ƹ|Ozˑښ9>gTi?4u&H723 h *F~0o)aD`X"oؿ`fV}}cR[ 79+8O>o)xhD?`XQu)3>걂zkuOA1!e5+g=s *uOXnr;p=U`1ƹ&as:?p[037:r=UP(h muĚZkOXDYA[A{$n 8lu?8qVpތn6skODm9~2l5Oey@e% 2d63c457x)!2Oۣ^ծqm^7pgٲ,El>ڏs#m穲D9~ښl~g&hc4.&aXK6GJcy,##PTSy:5” 2oK*Mua.b &X&<< s hHmd KCT`ܔgĮ `׆> - MԇzPBjB0A G9/ Nc<`@GMPԵ)U(4c7jaJMtB_I(V"P_.|Wt@́I?,ϤTGE|~#1#ǭ8;R|M3ZHӈ |C*tO"_JUy = r>4^SIصGZ~o/Ϥ<ӑO˴ƎWCҦ. 212;JW]le+=y*3;tݖfrS iH]BԀ@F?*U}+/:%'Q 0DId1rXlGi!?po#礯"#'STP&4 G: dg|$3Y'T`"Ca>G(z a!(d;2 "ڗr?2 L\uU2Dֲ2jߋa: q.vsYhHF3R>0vb?~odzzZa`k+T bzFf9mkM,U\C+@$ u/6[Ӷm=^#^>g9[vY03+3pO4D$ fro%fK(IL=HNHdfIrh2\*\7xon0]/ޣ?y#|6=Iz2cǻۗDoϞAЍ:\Wwv\_l.1;%E OYl 1mp$O8K>gySxO]O<:'- P4Mߘ7XvhiJvN<;2ץ ;+M׎I9Ӝ%}SRm@v+մagkA}]Y:|g>{hMeeϐAn+b2&@6}><x' UL% IR!+u{L.kؓݾ謁D-D[--ݞsjK. $H#yz_Km FR|RPVO%WZC_UTP ؕZJ*/K৸RC )y(%R ]eX~wg@P m"YE+AE ٴd'v|"nbWo!XH| h=lcH t@GMM v w թ_Uj6uMʞ^SoA~-ksj܌ܚ[rj$o';}jmznAh=q.=;I;}K2H[qM=4Gm穲[~7j٦}dΒH&tL־2\Gs["m'ӱ 2ZQ& 7\D@\I=+rTg8`nӝrBw`=#B:ISAlq1=Ix=M3h:+pIϡz5إ:yyZɛT"mT2^Hn䁼3g='z pwnJ.>K뚼a]պ"Y !=la7Nuh/{\d Io3&xYZLf6 'cݕzn3 o})@oCx 6}DMO2>1/;}^lct>Q<3MCNi- ~ڄZjbG-5@ E,wQP|ΦG[elN@}Sfj78u0>0FkkYa&S U'Ϫ[aybS<$ #<3@{}oSQ*ɏ߂2Y JrEWO^Gn|gN$VNrCspe;? GA(Dϰ((%9~jgh+h1ԙc%uwԞZ'fX`vhi!Ђ̚⯙X4TSeݹb=FLЉPb'Kt,0B#`   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPRSTUVWX [%`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F_]Data QWordDocumentObjectPool__1018437323 FOle 1Table_HCompObjh   FMicrosoft Word Picture MSWordDocWord.Picture.89qOh+'0  (4 P \ h tRisk Analysis Templateisk i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph FontB?B  @VBBBAx@?@,2$r?E.AO8i3f@=?D(    BCDEF"Y@`:  BC3DEF"Y33@`9  BC8DEF"Y88@`8  BCDEF"Y@`7  BCDEF"Y@`6  BCIDEF"YII@`5   BCNDEF"YNN@`4   BCDEF"Y@`3    0e0e     ?BCSDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||SSu@`S"2    0e0e     ?BCSDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||SS~@`S"1    0e0e     ?BCRDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||RR}@`S"0   0e0e     ?BCSDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||SSu@`S"/   0e0e     ?BCSDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||SS@`S".   0e0e     ?BCSDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||SS}@`S"-Z   0e0e     ?BCdDEPFZ3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||dd G^. pX.CF3]'p}5dd*,@`S",  BCDE0F:Y e@e@`+  BCDE0F:3f e@e@`*z   $0e0e     ?BC!DEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||88  /?O\*g7rFzWk~wofZL >-  ! -8BHNRVWWWVStOiJ_CU;M0E$?9742rt@`S")   0e0e     ?B>C:DEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||>7:4>>@`S"(   t0e0e     ?BC5DEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||/.u/j0_4V9N@GH@Q;Z7c4m0v/-,,-038?GR^fmsy~TJA80(#,9O!_(n3y@M\l{{wrmgb\WRLD%<)3-+/"235 5332/)4=FLSW[^`bccc`v^lZcS[LSAN5J-I%IIJM QV^epzviXK>1% r W@#,/<K Zgv//FH@`S"'   0e0e     ?BFCCDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||F5C2FF@`S"&   0e0e     ?BCqDE F*3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||HH=dnl_uTH@951126;C*M;YKeXpd}lquvurlC4 VqxfTqDa6N);'  xh#Y2LC?V"@`S"%*   0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||=Aa7x 2` @`S"$   T0e0e     ?B?CDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||>>an({  ","6(B.N0[2i2v/( ?iaxqh`XPH?95100148<BHOBaa~@`S"#J   0e0e     ?BCDEHFR3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||:<9<{l$,a&(@`S""B   0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||qqDw   &1+96=AAKDTE]EeDnBt@|=:6=BHNT[ahov|! ztplhea]XQLD=4*! Dl{sjaWKB940/-/046:=DlDD@`S"!    0e0e     ?BCCDE(F23f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| &'\C|q@`S"     0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||**gVVTSPOLyJqGhD_AW?N;E;E1@?CFHKNPSVYZ[[neDP W VXZggVX@`S"*   0e0e     ?BICDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||If6&+9JIPaZB;IfIf @`S"*    0e0e     ?B*CkDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||)*ik1F0F0kk;%% @`S"  !  0e0e     ?B5C~DE(F23f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| 5(.RB~Qw~;,@`S"B "  0e0e     ?BtC|DEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||qq026:?FM#U+]2f9q?|EINPPNIA6 +$ .6;?@@>8x2j(\OC:2-**-3q>`LO_Cy920 r^*L9:I*\p 2&G7WKc_murttqmh_ UI0;A+R`kuz|zyrajMa=U/J#>1$ /00@`S" #  0e0e     ?BCYDE0F:3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| -YAs=4{-Y-Y@`S"* $  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||/+';J  @`S"z %  $0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||88nyp^}Mr<e.VB/  #/> )(eUH?8320248>#D,K5R>[FeMpRzVXXWSMBrt@`S" &  t0e0e     ?BCTDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||7BKSY[^^^]ZvVmRbN\ITEL>D7>/7'20- -047;ADJOTY^cin"+4<BIPTTuReMVEI<=02#'   woga"Z'U.P5L;GCCK?`iQpFy=72///259>BGMT \dmw$'('" vpi`WLC9.%  +8 GUa)m9xKf|ri^UK77FH@`S" '  0e0e     ?BrCDEF"3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||}ar-@`S"* (  0e0e     ?BCnDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||In:93?2> Xmz8// @`S" )  l0e0e     ?BCZDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||IZ;H+>&5-%{r iaYSN!G-::/H$Ucp~  -AT,e=sPfwm aT&D028=) 6AIPUY\____\V~PoHb<W/L!C=842259>sEcLTUHa=n5|.+--..02469=AELS[ cks{@`S"* *  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||hSV/E/E}bv7EE @`S"z +  $0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||88q{o]Ky:l([H5#$0$[NC;63236:#?.D7K@SH]OfVq[|`cdc`[RHrt@`S"R ,  0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||ss@2)v1l9_=RAFA<A2@)= 951 -'3=FPX_ekpuy||xrofd]UT>W=*l6r@zHNRVXYYVTPJD<5-% W>@h  )2< EQX_dilooolid_B)h@@@`S"* -  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||V@M OO0h]eYZV@V@ @`S"* .  0e0e     ?B3C}DE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||3h}+6<? CNN/<3h3h @`S"  /  0e0e     ?B@CDE(F23f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||  @ ~E7:OO  @`S"* 0  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||Q](@uh)9xvy'QQ @`S"  1  0e0e     ?BCVDE F*3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||rV,@`S"   2  0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||**3}/{+x't!pkg b\VQLGHLsNNU[c$l*r/z49=AEGJN2+k@k>9VX@`S" * 3  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||P{>T*h>P @`S" * 4  0e0e     ?BCDE8FB3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||L,]pSSsTdnnL,L, @`S"   5  0e0e     ?BC(DE(F23f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| !4aKB,(!!@`S"B 6  0e0e     ?B}C{DEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||qq.-./26;AHN"V)`1k8{BHLNLHC:0#-7?FJLLGBx:j/["OC:1,)*/:pI]^Ly;. ~wph"b&[2L@<Q-cw -F3ZHj^ut|}}ytlaXJ0;A+P]irx{{vokQ\;O+A2$ -..@`S"B 7  0e0e     ?B|CDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||qq@DGKNOOONKGD >3('4> DHJJFB:0$n^ PF;50-.16r?aJQWBe7v/**/:Me!@b_ZZSTNNGI@B;<6700,*'##   jT*>@+]z  $%65DERU^ggxouz|zvnb'P=;Q!d pw}~zupyimdb_A@@@`S" 8  T0e0e     ?B5CDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||>>\x$  ("2)>.J2U5b5p3.'1s \}vme\TKC;6210126:?DLD\\~@`S" 9  0e0e     ?BECrDE F*3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||HHHJ-359>EOZgu  )4<BFHH6BHHIFB;5.'irrme[ L<&)19>BCEC>|7f/R#B2% HH@`S"B :  0e0e     ?BCDEF3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||qqXzpyzq!i%_(W)O)I)@(:&2&4*7/86;;;@<G;M:T7[2c,l$w}wqkgd^XRKD < 5-% &/Xv $,4>FOYbjty|}}|yuplfa@vXX@`S"J ;  0e0e     ?BOCDEHFR3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| <</&O1 &(@`S"J <  0e0e     ?BC;DEHFR3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||q]^\\Eqx@ 29nF;<xqq&(@`S" =  0e0e     ?BCxDE F*3f A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||HH<?jrxzzxtmdW I8$$09AFHJHFA90x%n?}~}{upjc^XTPPI-ZElWeovxxwrk,d?[VLj>|/ JP@`S"r ? 6; B S  ?  !"#$%&'()*+,-./0123456789:;B=z8t<!\t;.Jt:M)t9t8:t7[Zt6c1t5<1t4%t3}t2:(t1o$t0Vt/}pt.ut-;pt,wCt+Pt*BDt)SDt(53t'#t&~t%It$`t#dot"Dft!Jt )t>t/3t^tI2t^tNSt82t\'tt*BtatttN't5Z#3t0Ftr<Xt t0ht V6Qt -t t 3k t *trg*t L*t *tYl*t-*t t?yt=C=C@fB@UnknownG:Times New Roman5Symbol3& :Arial"hA&A&Ap##r0k2QSETASETAObjInfo ObjectPoolOlePres000 ;WordDocument     &!"#$')*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWX l x; F&WordMicrosoft Word  ,HCourier New-@Times New Roman-  2 H, -&- "-Y-$,,, "--&&;T-Y-$SS;;S--&&em~-Y-$}m}eem}m--&&-Y-$--&&-Y-$--&&k-Y-$kkk--&&-Y-$--&&+C-Y-$BB++B--&&--3f-$,,,--&&;T-3f-$SS;;S--&&d|c-3f-${{bdbd{--&&)B-3f-$))AA)--&&-3f-$--&&f-3f-$ee--&&-3f-*$--&&e-Y-$ e--&&h`-3f-$ {h`{--&& }@-3f-r$7 },}/~1~468:;=>?????><;:8631/,  *-/13567889999998765420.+  }--&&9hBq-3f-$Ai@p9p9hAi--&&1J\-3f-F$%7$7"7 7889;<=>@ABCEFGIJKLMNN N!N"N"N#N$M$M%L%L&K&J&J-<.;/:0817263555648494;4=4@5B6E8F9G;H=I@IBIDIFIIHKHMGOFQFRESDTDUCVBWAWAX@X?Y>Z<Z;[:[9[8[6[5[4[3[2[3T6U8U9U;T<S>R?Q@PANAMBKBICHCGCFCDCBCAB@B>A=@<>;=;<;:;9;8;7;6<6=5>4?3@2B1C-M,N,O+P*Q)R(S'T%T$U"U UUTTRQPNMKIFC@=975321 1"1$1%1'1%7--&&H#S.-3f-$R&O-H*J#R&--&&&b-3f-$GA/4578:;>@BDGJMPRTVXYZZZZZYSA?????> > > = = < < < V^`aa`_^\ZWUROLIEB?<97531/&<A--&&A-3f-$ mAV[JXgm]l}--&&a-3f-~$=oaprtuwy{}|osx}|{zyxwvusjso--&&k-3f-&$sspk--&&E-3f-$pcUIHGFEEEEEFGIKLNOPRSTUVWXYYXXXXYYZZ[\]eeffgggggghhghmmlkjihgfeddcbaa``_____`aj|c_e\[[ZYXWVUTRQONMLKKKKKLLMMW_c--&&'`-3f-$ 9' -4\_7>9--&&VS-3f-T$(OEF)F)F(E'E&E%D$D#D"C!C CBAJ:L(( ) * +!,!.!/"0"1#2#3#3#3,P&R" ;C;C<FUDOE--&&Z B-3f-$ <aAZ bd$ &e*g;6<--&& =-3f-$   ;<<<  22 --&& @-3f-$  ?> --&& AR-3f-$p=>@ABDEFGHIJJ"K$K'K)K+J-I/H1F3D5B6?7=8:8794928/7-7+5)4'2&/$-#*#'"$"!##%'*-17= < ; : 9 7 6 5 4 3 2 10/,)'$" "&*/3 7":$<'=*?-@0@3@6?9?<>?=A<D:G8I6K3M0O-P)Q&Q!QPOMLJIGECA ? > <==--&&?.x_-3f-$ E^?[W.w>tDZ7SDjPgUPJE^--&&wR-3f-$ gk|l|~wzRWgwg--&& -3f-r$7  --&&  -3f-F$                        --&& -#-3f-$"* ,"--&&">V-3f-$ <C=I U N++++5/3"5*L<C--&& \E-3f-$+t-~|{yxv t rpomlkjihgfdca`__^!]"]$]&\'\*\-\1]4^7_:a<b?eAgBjDnDrDtDwDyC{B~A@><:85568:;~<|={=y>x>v>u>s>r>p=n<l;j9h7g5f3e1d.d*c'c%d"defghjlnpsvwwxyz{{|}~!"#%&%u+t--&&\3-3f-$ X[ *2'*E MO1(X--&&fi-3f-r$7}{xvsqoljhggffghijkminsqponnmnnoopqrsuvxy{}--&&-3f-$r--&&#Z-3f-$ RYKC55)#19FGR--&&#-3f-$  "   --&& -3f-$  --&&L-3f-$ K(8;#>@&,IK--&&D{-3f-$`wz]DJ`--&&L-3f-V$)o^]]\\[[ZYXXWVVzssstuvvwxxyyzzslyxTLjo--&&  X-3f-$ 6WA #=D,/G O46--&&4&-3f-$ 31(&%(--&&<-3f-$  ;:  --&&-3f-$p--&&q-3f-$p~|zxwvvwy{~}|{zyyxwwvuutrrqqqqrtvy~~--&&-3f-~$=--&&v"-3f-$G  }~}|{zyyxxv !!!  yx--&&-3f-$p--&& -3f-&$    --&&G-3f-&$')>>&'!EF$!'--&&3-ob-3f-$GN@_5e@fBgDgFgHgJfLeNdPbR`S^U[WYXVYSZQZNZLZJZHYFXEWCUBS<HN@P>P>P>O>O=N<N;M:M:L9L8L8L83E=V?ZB\D^G`J`NaPaTaW`Z_\^_]b[eYgWjTkRlOmLnJnGmDlAk>a-K8N@--&N@Times New Roman-- 2 NN - 2 kN -'-7 BbjbjUU " 7|7|=l,,,,, 8 ,8 PPPPP          $  :        PP;     8PP        PD `<ٱf,,    08  H H    <=>BB*CJaJphjCJUmHnHu=?@AB=A 1hN N!p#"p###$#%SummaryInformation( DocumentSummaryInformation81Table(`SummaryInformation( Oh+'0d   , 8DLT\ssSETAfETAETANormalSETAl2TAMicrosoft Word 9.0@Ik@XTf@jf ՜.+,0 hp  Seta Corporationi  TitlehĽm_"av0k/WaOFMpO]?e0 Ձ$Q)q?!Ces:؄cv^Vr;#w_[ɛN%i+ gsfw}Eڒw .'ž\e%B%A"\C<6^eu57p=]pU8+r=p~.ja;оM{nˁT~pv#(:7qh#8q_Q(8v-=מ'?{{??!.@"mI`/c{}]U\sg4'`/>xv\OG6'뻒BZdժpnS8Ijce 7>J.p,mma6vl߲3=,vV¶Taʮ뛉Hf+Q:V^ǿ" hܮYcojV+&iU=zN>`53-鬆Rm{OA!_t%z[ZGh#=vJKqJ:JJ']pU;SzY;/pI;R"\vm~p~O~J.a<= t9|p['{~GWs>v'5O 7zL^=E;Ⱥ>Po,75cVL}d5Ve=UɼuQ~&EOfǗŽ/CߴURhnFvVUm;( x˸=X7vb<{$gt}=U%QGnq @Ba ,ٟ|+XeceͺJ򍮖mp-:VuG98}OrVe!,0fC$3X9a7l"?9c<+n8x81‰5^[[LuF< sd ,:f:+JS7&'ƒr c1|F{g4Ƣu<+DV)r_N$^"$Ejwfk-}b'&nfl&&و ֢q5zW}%X] !w=y۹{:Z>uwe ד:&)Ni00a.Qz\0-b[p{8I]۱٦uM:G}u:&ZpBב ׍̗2~˼=|s~|;9?R=CӴ)lN OQi#هt cѶ__ct5ZI}V{/e֐:ޠK ]XtǢ;ݱ莥V+X#bг} <s5@x J$PY#°K~v(FhEwxj2ڌY!=GFhrC=2Qpj0^wwK^rޫ\lfҾvc籌E<φY8f hdl'g""xxF0#߉1)uym)*M69gⷮězrMyjJ}ƶTq%e_|scv]BE{H=hhk½PPRH+}W8܁CmB 4~]jcB@|K+9T;4jPI[u]'F*]U[C;;{ڙ;hN{KkC}#_s^Z ֮԰1l> 4:񊰖Z5rudzw^P.",o)Q](X2ѺnrT p CHM TeamysiHM HM  Normal.dotiMaura Lilienfeldpla2urMicrosoft Word 9.0a@@"@g@g(-՜.+,0 px  CHM`t72 DocumentSummaryInformation8 @CompObjjRisk Analysis Template Title  FMicrosoft Word Document MSWordDocWord.Document.89q# iD@D Normal5$7$8$9DH$CJ_HmH sH tH j@j Heading 1/$ & F 0<@&^`05;CJKHOJQJd@d Heading 2/$ & F 0<@&^`05CJOJQJ\@\ Heading 3'$ & F0<@&^`05CJOJQJ^@^ Heading 4'$ & F`<@&^``56CJOJQJLL Heading 5 & F<@&^ 5OJQJDD Heading 6 & F<@&^6LL Heading 7 & Fp<@&^p CJOJQJPP Heading 8 & F <@&^ 6CJOJQJR R Heading 9 & F@ <@&^@ 56CJOJQJ<A@< Default Paragraph Font,@, Header  !, @, Footer  !&)@& Page Number0@0 TOC 1 $ x566@6 TOC 2 $ x^52@2 TOC 3 $ ^CJ22 TOC 4 $ ^CJ22 TOC 5 $ ^CJ22 TOC 6 $ ^CJ22 TOC 7 $ ^CJ22 TOC 8 $ ^CJ22 TOC 9 $ ^CJO bullet2 & F p0<<>T-Tf^`0,B@, Body Text$a$4"4 Caption $a$5CJ Heading1|$ & Fh>Th.Tf^h`a$5CJOJQJ(U@( Hyperlink>*B*O bullet~ & F0<<>TTf^`0.P@. Body Text 2!CJ8Q@"8 Body Text 3"$a$6CJ9"J"( ).3/559Bq<g 5` "#()2345LMN&.YZaiz{| !"GHI<GVWS_}~ S91$ - ( ; K ?Ismneg{| "7CS;NZl<=t@BXYkl$%1TU 1!N!O!!!!"""" "!"""#"$"%"&"'"(")"*"+","-"."/"0"1"2"3"4"H"I"J"Z"["#$$@%a%b%&&&'''((((((((((((((((((((((((( ) ) )")#))).,>,?,,,,,--j---I.b.c................/////////1/2/3/X/Y/00$1=1>1R222'3K3L34B4C4555555555555555555555555555556666666666667777 7!7"7B7C7D7E7^7_7`7p7q7r7s77777777777777788808182838H8I8J8Z8[8\8|8}8~8888888888888888999*9+9,9-9W9X9Y9z9{9|9}999999999900000000000000000000000`000000000000000000000000000000000000`0000000000000000000000000000000000000000000`0000000000000000000000000000000000000000000`000000000000000000000000`00000 00 000 00!00 00g0g0g 0g 0g 0g 0g 0g 0g 0g 0g 0g 0 g 0 g 0000 0  0  0  0000 00B( 0BB0Y!0Y( 0BB000`000000000000000000000000`0 000 00!0( 001!01( 00!0 00 !0  001!!01! 00!!0!0!0!`0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!`0! 00J"!0J" 0J"J"0#!0# 0J"J"0@%0@% 0J"J"0&0& 0J"J"0'!0'0'0'`0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'0'`0' 00 )0 )0 )0 ) 0 ) )0.,0.,( 0.,.,0,0,( 0.,.,0,0,( 0.,.,0j-"0j-8 0j-j-0I.0I.0I.`0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.0I.`0I. 003/03/03/03/ 03/3/0$10$1( 0$1$10R20R2( 0$1$10'30'3( 0$1$1040404`040404040404040404040404040404040404040404040404`04 00505@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 0333377ZZZZ^^%%%%LLnnnn))))VVhhhh g:<=!*+-.1<@ Sl&J&,03B89";;<|=="$%&'(),/023456789:;=>?A=#  4LPQ]y267Xt*./D`x|}  ! " G c {   & * + J f ~ ! % & K g   4 8 9 q  , D H I _ {  8<=Vr*BFGu  8Tlpq9: 2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D2%D&-/KRUrx|`fj!% !!!!!!!!!/Xr$+.ix2$w MIx@t(  <  # AB S  ?9l64# _Toc481575381 _Toc481805391 _Toc481575382 _Toc481805392 _Toc481575383 _Toc481805393 _Toc481805394 _Toc481805395 _Toc481805396 _Toc481805397 _Toc481805398 _Toc481805399 _Toc481805400 _Toc481805401 _Toc481805402 _Toc481805403 _Toc481805404 _Toc481805405 _Toc481805406 _Toc481805407 _Toc481805408 _Toc481805409 _Toc481805410 _Toc481805411 _Toc481805412 _Toc481805413 _Toc481805414 _Toc481805415 _Toc481805416 _Toc481805417 _Toc481805418 _Toc481805419 _Toc481805420 _Toc481805421 _Toc481805422gBY1 1!!J"##&' ).,,,j-3/$1R2'3459  !"zWj#S M!!Y"$`%&'!)=,, --W/<12J3A459 4Qy7t/`} " c  + f & g  9 , I { =r*G Tq6667767A777$8/8p8{888m9y9999999 "),G 4Qy7t/`} " c  + f & g  9 , I { =r*G Tql//1/>1116667767A7E7Q7s77777777$8/838>8p8{888888888-969m9y9}9999999933333333333333333Z`ahi}} 4Qy7=Et/`} " c  + f & g  9 , I { =r*G TqdfB;?AWW66667767A777$8/8p8{888m9y9999TibbalsA:\RiskAnalysis(T)djt9June.docbbremmer\\PROD2\GROUPS\Sweng\HUD\HUD TASK\TASK 25\System Development Methodology\Templates\30May Turnover T&C\Risk Analysis (T) rev 2.docSETA\\PROD2\GROUPS\Sweng\HUD\HUD TASK\TASK 25\System Development Methodology\Templates\30May Turnover T&C\Risk Analysis (T) rev 2.docMaura LilienfeldVC:\Keith Lilienfeld\hudweb t and c\Initiate Phase\Revisions\ratemplate rev1 040202.docMaura LilienfeldgC:\WINDOWS\Profiles\KAL\Application Data\Microsoft\Word\AutoRecovery save of ratemplate rev1 040202.asd Full ShredC:\Documents and Settings\Administrator\Desktop\April_Working Copy\Initiate templates and checklists\ra\ratemplate rev1.1 041202.doc Full ShredtC:\Documents and Settings\Administrator\Desktop\April_Working Copy\Initiate Phase Final\ratemplate rev1.2 041202.doc Full ShredtC:\Documents and Settings\Administrator\Desktop\April_Working Copy\Initiate Phase Final\ratemplate rev1.2 041202.doc Full ShredsC:\Documents and Settings\Administrator\Desktop\Finals\Initiate Phase Final for review\ratemplate rev1.3 041202.docMaura LilienfeldaC:\Keith Lilienfeld\hudweb t and c\Karen 3 FINAL 1st DRAFTS\Initiate\ratemplate rev1.3 041202.doct !@xh5CJOJQJo(.0xh5CJOJQJo(xh5OJQJo(xhxhxhxhxhxh*PTMTM\TM @ 0^`0OJQJo(TM@0^`0CJOJQJo(-&.YZai6999"@HP LaserJet 5MP\\It05\it05_o_yr2000_hp5siHPPCL5MSHP LaserJet 5MPHP LaserJet 5MP@g XX@MSUDOHP LaserJet 5MP<d HP LaserJet 5MP@g XX@MSUDOHP LaserJet 5MP<d dM9P@UnknownG:Times New Roman5Symbol3& :Arial"h7d&7d&df(-`Yxx0t762QRisk Analysis TemplateCHM TeamMaura Lilienfeld