ࡱ> 3 ^bjbj {T $ P! " #7'(_'_'_'+~U12$ 59+|+"55_'_':::5_' _':5:: ] 6_'0} 5\oԵ0D6 t3L46:74,c433373335555333333333 :     Document Control Organisation[Council Name]Title[Document Title]Author[Document Author Named Person]Filename[Saved Filename]Owner[Document Owner Job Role]Subject[Document Subject e.g. IT Policy]Protective Marking[Marking Classification]Review date Revision History Revision DateRevisorPrevious VersionDescription of Revision Document Approvals This document requires the following approvals: Sponsor ApprovalNameDate Document Distribution This document will be distributed to: NameJob TitleEmail Address Contributors Development of this policy was assisted through information provided by the following organisations: Devon County CouncilSefton Metropolitan Borough CouncilDudley Metropolitan Borough CouncilStaffordshire ConnectsHerefordshire County CouncilWest Midlands Local Government AssociationPlymouth City CouncilWorcestershire County CouncilSandwell Metropolitan Borough Council Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc217374644" 1 Policy Statement  PAGEREF _Toc217374644 \h 4  HYPERLINK \l "_Toc217374645" 2 Purpose  PAGEREF _Toc217374645 \h 4  HYPERLINK \l "_Toc217374646" 3 Scope  PAGEREF _Toc217374646 \h 4  HYPERLINK \l "_Toc217374647" 4 Definition  PAGEREF _Toc217374647 \h 4  HYPERLINK \l "_Toc217374648" 5 Risks  PAGEREF _Toc217374648 \h 4  HYPERLINK \l "_Toc217374649" 6 Procedure for Incident Handling  PAGEREF _Toc217374649 \h 5  HYPERLINK \l "_Toc217374650" 7 Policy Compliance  PAGEREF _Toc217374650 \h 5  HYPERLINK \l "_Toc217374651" 8 Policy Governance  PAGEREF _Toc217374651 \h 5  HYPERLINK \l "_Toc217374652" 9 Review and Revision  PAGEREF _Toc217374652 \h 6  HYPERLINK \l "_Toc217374653" 10 References  PAGEREF _Toc217374653 \h 6  HYPERLINK \l "_Toc217374654" 11 Key Messages  PAGEREF _Toc217374654 \h 6  HYPERLINK \l "_Toc217374655" 12 Appendix 1 Process Flow; Reporting an Information Security Event or Weakness  PAGEREF _Toc217374655 \h 7  HYPERLINK \l "_Toc217374656" 13 Appendix 2 Examples of Information Security Incidents  PAGEREF _Toc217374656 \h 8  HYPERLINK \l "_Toc217374657" 14 Appendix 3 - Procedure for Incident Handling  PAGEREF _Toc217374657 \h 9  HYPERLINK \l "_Toc217374658" 14.1 Reporting Information Security Events or Weaknesses  PAGEREF _Toc217374658 \h 9  HYPERLINK \l "_Toc217374659" 14.1.1 Reporting Information Security Events for all Employees  PAGEREF _Toc217374659 \h 9  HYPERLINK \l "_Toc217374660" 14.1.2 Reporting Information Security Weaknesses for all Employees  PAGEREF _Toc217374660 \h 9  HYPERLINK \l "_Toc217374661" 14.1.3 Reporting Information Security Events for IT Support Staff [or equivalent staff]  PAGEREF _Toc217374661 \h 10  HYPERLINK \l "_Toc217374662" 14.2 Management of Information Security Incidents and Improvements  PAGEREF _Toc217374662 \h 10  HYPERLINK \l "_Toc217374663" 14.2.1 Collection of Evidence  PAGEREF _Toc217374663 \h 10  HYPERLINK \l "_Toc217374664" 14.2.2 Responsibilities and Procedures  PAGEREF _Toc217374664 \h 11  HYPERLINK \l "_Toc217374665" 14.2.3 Learning from Information Security Incidents  PAGEREF _Toc217374665 \h 11  HYPERLINK \l "_Toc217374666" 15 Appendix 4 - Risk Impact Matrix  PAGEREF _Toc217374666 \h 12  HYPERLINK \l "_Toc217374667" 15.1 Risk Impact Matrix  PAGEREF _Toc217374667 \h 12  Policy Statement [Council Name] will ensure that it reacts appropriately to any actual or suspected incidents relating to information systems and information within the custody of the Council. Purpose The aim of this policy is to ensure that [Council Name] reacts appropriately to any actual or suspected security incidents relating to information systems and data. Scope This document applies to all Councillors, Committees, Departments, Partners, Employees of the Council, contractual third parties and agents of the Council who use [Council Name] IT facilities and equipment, or have access to, or custody of, customer information or [Council Name] information. All users must understand and adopt use of this policy and are responsible for ensuring the safety and security of the Councils systems and the information that they use or manipulate. All users have a role to play and a contribution to make to the safe and secure use of technology and the information that it holds. Definition This policy needs to be applied as soon as information systems or data are suspected to be, or are actually affected by an adverse event which is likely to lead to a security incident. The definition of an information management security incident (Information Security Incident in the remainder of this policy and procedure) is an adverse event that has caused or has the potential to cause damage to an organisations assets, reputation and / or personnel. Incident management is concerned with intrusion, compromise and misuse of information and information resources, and the continuity of critical information systems and processes. An Information Security Incident includes, but is not restricted to, the following: The loss or theft of data or information. The transfer of data or information to those who are not entitled to receive that information. Attempts (either failed or successful) to gain unauthorised access to data or information storage or a computer system. Changes to information or data or system hardware, firmware, or software characteristics without the Council's knowledge, instruction, or consent. Unwanted disruption or denial of service to a system. The unauthorised use of a system for the processing or storage of data by any person. Examples of some of the more common forms of Information Security Incidents have been provided in Appendix 2. Risks [Council name] recognises that there are risks associated with users accessing and handling information in order to conduct official Council business. This policy aims to mitigate the following risks [amend list as appropriate]: To reduce the impact of information security breaches by ensuring incidents are followed up correctly. To help identify areas for improvement to decrease the risk and impact of future incidents. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Procedure for Incident Handling Events and weaknesses need to be reported at the earliest possible stage as they need to be assessed by an [Name a role although likely to be an Information Security Advisor]. The Advisor [or other named role] enables the [Name a department e.g. Information Services department] to identify when a series of events or weaknesses have escalated to become an incident. It is vital for the [Name a department e.g. Information Services department] to gain as much information as possible from the business users to identify if an incident is occurring. For full details of the procedure for incident handling please refer to Appendix 3. Policy Compliance If any user is found to have breached this policy, they may be subject to [Council Names] disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from [name appropriate department]. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible the person(s) responsible for developing and implementing the policy. Accountable the person who has ultimate accountability and authority for the policy. Consulted the person(s) or groups to be consulted prior to final policy implementation or amendment. Informed the person(s) or groups to be informed after policy implementation or amendment. Responsible[Insert appropriate Job Title e.g. Head of Information Services, Head of Human Resources etc.]Accountable[Insert appropriate Job Title e.g. Section 151 Officer, Director of Finance etc. It is important that only one role is held accountable.]Consulted[Insert appropriate Job Title, Department or Group e.g. Policy Department, Employee Panels, Unions etc.]Informed[Insert appropriate Job Title, Department or Group e.g. All Council Employees, All Temporary Staff, All Contractors etc.] Review and Revision This policy, and all related appendices, will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Policy review will be undertaken by [Name an appropriate role]. References The following [Council Name] policy documents are directly relevant to this policy [amend list as appropriate]: Email Policy. Internet Acceptable Use Policy. Software Policy. GCSx Acceptable Usage Policy and Personal Commitment Statement. Computer, Telephone and Desk Use Policy. Removable Media Policy. Remote Working Policy. IT Access Policy. Legal Responsibilities Policy. Information Protection Policy. Human Resources Information Security Standards. IT Infrastructure Policy. Communications and Operation Management Policy. Key Messages All staff should report any incidents or suspected incidents immediately by [enter appropriate details here]. We can maintain your anonymity when reporting an incident if you wish. If you are unsure of anything in this policy you should ask for advice from [name an appropriate department] Appendix 1 Process Flow; Reporting an Information Security Event or Weakness [Include a diagram similar to the one below if required]  EMBED Visio.Drawing.11  Appendix 2 Examples of Information Security Incidents Examples of the most common Information Security Incidents are listed below. It should be noted that this list is not exhaustive. Malicious Giving information to someone who should not have access to it - verbally, in writing or electronically. Computer infected by a Virus or other malware. Sending a sensitive e-mail to 'all staff' by mistake. Receiving unsolicited mail of an offensive nature. Receiving unsolicited mail which requires you to enter personal data. Finding data that has been changed by an unauthorised person. Receiving and forwarding chain letters including virus warnings, scam warnings and other emails which encourage the recipient to forward onto others. Unknown people asking for information which could gain them access to council data (e.g. a password or details of a third party). Misuse Use of unapproved or unlicensed software on [Council Name] equipment. Accessing a computer database using someone else's authorisation (e.g. someone else's user id and password). Writing down your password and leaving it on display / somewhere easy to find. Printing or copying confidential information and not storing it correctly or confidentially. Theft / Loss Theft / loss of a hard copy file. Theft / loss of any [Council Name] computer equipment. Appendix 3 - Procedure for Incident Handling [Please replace with your own local procedures as appropriate] Reporting Information Security Events or Weaknesses The following sections detail how users and IT Support Staff [or equivalent] must report information security events or weaknesses. Appendix 1 provides a process flow diagram illustrating the process to be followed when reporting information security events or weaknesses [include if so required]. Reporting Information Security Events for all Employees Security events, for example a virus infection, could quickly spread and cause data loss across the organisation. All users must understand, and be able to identify that any unexpected or unusual behaviour on the workstation could potentially be a software malfunction. If an event is detected users must: Note the symptoms and any error messages on screen. Disconnect the workstation from the network if an infection is suspected (with assistance from IT Support Staff [or equivalent department]). Not use any removable media (for example USB memory sticks) that may also have been infected. All suspected security events should be reported immediately to the Information Services Helpdesk [or equivalent department] on [state phone number]. If the Information Security event is in relation to paper or hard copy information, for example personal information files that may have been stolen from a filing cabinet, this must be reported to Senior Management and either the Data Protection Officer or Caldecott Guardian [or equivalent posts] for the impact to be assessed. The Information Services Helpdesk [or equivalent] will require you to supply further information, the nature of which will depend upon the nature of the incident. However, the following information must be supplied [amend list as appropriate]: Contact name and number of person reporting the incident. The type of data, information or equipment involved. Whether the loss of the data puts any person or other data at risk. Location of the incident. Inventory numbers of any equipment affected. Date and time the security incident occurred. Location of data or equipment affected. Type and circumstances of the incident. Reporting Information Security Weaknesses for all Employees Security weaknesses, for example a software malfunction, must be reported through the same process as security events. Users must not attempt to prove a security weakness as such an action may be considered to be misuse. Weaknesses reported to application and service providers by employees must also be reported internally to Information Services [or equivalent department]. The service providers response must be monitored and the effectiveness of its action to repair the weakness must be recorded by Information Services [or equivalent department]. Reporting Information Security Events for IT Support Staff [or equivalent staff] Information security events and weaknesses must be reported to a nominated central point of contact within Information Services [or equivalent department] as quickly as possible and the incident response and escalation procedure must be followed. Security events can include: Uncontrolled system changes. Access violations e.g. password sharing. Breaches of physical security. Non compliance with policies. Systems being hacked or manipulated. Security weaknesses can include: Inadequate firewall or antivirus protection. System malfunctions or overloads. Malfunctions of software applications. Human errors. The reporting procedure must be quick and have redundancy built in. All events must be reported to at least two nominated people within Information Services [or equivalent department] who must both be required to take appropriate action. The reporting procedure must set out the steps that are to be taken and the time frames that must be met. [It may be more appropriate to establish a single line of reporting with demonstrable accountability of the person / role required to take action on the reported event] An escalation procedure must be incorporated into the response process so that users and support staff are aware who else to report the event to if there is not an appropriate response within a defined period. Incidents must be reported to the Business Continuity Management teams [or equivalent departments] should the incident become service affecting. Management of Information Security Incidents and Improvements A consistent approach to dealing with all security events must be maintained across the Council. The events must be analysed and the Security Advisor [or equivalent role] must be consulted to establish when security events become escalated to an incident. The incident response procedure must be a seamless continuation of the event reporting process and must include contingency plans to advise the Council on continuing operation during the incident. All high and medium incidents should be reported to [enter details here]. All low incidents should be reported to [enter details here]. To decide what level of impact an incident has users should refer to the Risk Impact Matrix in Appendix 4. Collection of Evidence If an incident may require information to be collected for an investigation strict rules must be adhered to. The collection of evidence for a potential investigation must be approached with care. Internal Audit [or equivalent department] must be contacted immediately for guidance and strict processes must be followed for the collection of forensic evidence. If in doubt about a situation, for example concerning computer misuse, contact the [Name an appropriate department e.g. IT Helpdesk] for advice. Responsibilities and Procedures Management responsibilities and appropriate procedures must be established to ensure an effective response against security events. The security advisor from Information Services [or equivalent department] must decide when events are classified as an incident and determine the most appropriate response. An incident management process must be created and include details of: Identification of the incident, analysis to ascertain its cause and vulnerabilities it exploited. Limiting or restricting further impact of the incident. Tactics for containing the incident. Corrective action to repair and prevent reoccurrence. Communication across the Council to those affected. The process must also include a section referring to the collection of any evidence that might be required for analysis as forensic evidence. The specialist procedure for preserving evidence must be carefully followed. The actions required to recover from the security incident must be under formal control. Only identified and authorised staff should have access to the affected systems during the incident and all of the remedial actions should be documented in as much detail as possible. The officer responsible for an incident should risk assess the incident based on the Risk Impact Matrix (please refer to Appendix 4). If the impact is deemed to be high or medium this should be reported immediately to [enter appropriate details here]. Learning from Information Security Incidents To learn from incidents and improve the response process incidents must be recorded and a Post Incident Review conducted. The following details must be retained: Types of incidents. Volumes of incidents and malfunctions. Costs incurred during the incidents. The information must be collated and reviewed on a regular basis by Information Services [or equivalent department] and any patterns or trends identified. Any changes to the process made as a result of the Post Incident Review must be formally noted. The information, where appropriate, should be shared with the Warning, Advice and Reporting Point (WARP) to aid the alert process for the region. Appendix 4 - Risk Impact Matrix Risk Impact Matrix To decide on the potential or actual impact of an information security incident, the impact matrix below should be used. [You may choose to replace this with your corporate risk management matrix] Type of ImpactReputational Media and Member DamagesReputational Loss within Government and / or Failure to Meet Statutory / Regulatory ObligationsContractual LossFailure to meet Legal ObligationsFinancial Loss / Commercial Confidentiality LossDisruption to ActivitiesPersonal Privacy InfringementLowNoneNoneNoneNoneNoneNoneNoneContained internally within the council Unfavorable council member responseInternal investigation or disciplinary involving one individualMinor contractual problems / minimal SLA failuresCivil lawsuit / small fine - less than 10KLess than 100,000Minor disruption to service activities that can be recovered Personal details revealed or compromised within departmentMediumUnfavorable local media interest Unfavorable council member responseGovernment authorised investigation by nationally recognised body or disciplinary involving 2 to 9 peopleSignificant client dissatisfaction. Major SLA failures. Failure to attract new businessLess than 100K Damages and fine100,000 - 500,000Disruption to service that can be recovered with an intermediate level of difficulty. One back up not backing up for 2 or more daysPersonal details revealed or compromised internally within authority. Harm mental or physical to one members of staff or publicHighSustained local media coverage, extending to national media coverage in the short termGovernment intervention leading to significant business change. Internal disciplinary involving 10 or more peopleFailure to retain contract(s) at the point of renewal Greater than 100K damages and fine500,000 - 1,000,000Major disruption to service which is very difficult to recover from. Two or more systems not being backed up for two or more daysSevere embarrassment to individual(s)Sustained unfavourable national media coverageService or product outsourced through Government interventionClient contract(s) cancelledOver 1M damages and / or fine Custodial sentence(s) imposedMore than 1,000,000Catastrophic disruption - service activities can no longer be continuedDetrimental effect on personal & professional life OR large scale compromise affecting many people. Harm mental or physical to two or more members of staff or public     Information Security Incident Management Policy and Procedure FINAL COPY v2.0Page  PAGE 1 of  NUMPAGES 13 [Version No.][Page. No.] [Local Authority Logo] Policy and Procedure Document Information Security Incident Management Policy and Procedure [Date]   #$56CQRSYikqr * , 8 : ; < ±±±±±±±‘vlhYdB*^JphhB*^Jph hYdhYd5B*CJ^JphhYdhB*CJ^Jph *h}hB*CJ^Jph *h}h}B*CJ^Jph hYdh5B*CJ^Jphhk h5jhk h@^IU hk h hk hjhk hU(     !gdk !"#56CRSYjckd$$Ifl40j 5&j  t05&644 lalf4ytYd $If^gd^gdk gdk jkr~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd~qq $If^gdkdF$$Ifl40j 5&j  t05&644 lalf4ytYd~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd + ~qq $If^gdkd/$$Ifl40j 5&j  t05&644 lalf4ytYd+ , 8 9 ~qq $If^gdkd$$Ifl40j 5&j  t05&644 lalf4ytYd9 : ; < M N \ d u ~yypk^Q^Q H$If^Hgd H$If^HgdYdgdk ^gdk gdkdu$$Ifl40j 5&j  t05&644 lalf4ytYd < D M N W [ \ c d t     # $ 9 : ; a e f o p }  8 9 t u ׼ƙƙƏƙƙƏ{q{q{hKQ>CJOJQJ hKQ>CJ hKQ>5hKQ> hYd5hYdB*^JphhYd5B*CJ^JphhmzhYdCJhYdhYd5hYdhB*^Jph hYdhYd5B*CJ^Jph hYdh5B*CJ^Jph hk hYdhk h5hk hYd5, XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^HgdkdT$$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd# $$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4ytYd XKKKK H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4ytYd  XVMMM@@ H$If^Hgd^gdYdkd $$Ifl4\  % $ t0%644 lalf4ytYd      ^kd_ $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd H$If^Hgd     k^^^ H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd  ! " k^^^ H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd" # $ : ; a f p ~ kbbbbUUU H$If^Hgd^gdYdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd~  k^^^ H$If^HgdkdC$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd k^^^ H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd k^^^ H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd  kbYYYH & F+7$If^7gdKQ>^gdKQ>^gdk kdn$$Ifl4F/ ]5&/ .  t05&6    44 lalf4ytYd 8 9 ] t u 3Tkd$$Ifl0&F$F  t/'644 lBaytKQ> & F+7$If^7gdKQ>Tkd'$$Ifl0&F$F  t/'644 lBaytKQ> & F+>$If^>gdKQ>u Tkd$$Ifl0&F$F  t/'644 lBaytKQ> & F+>$If^>gdKQ> & F+7$If^7gdKQ>    % & ' > ? @ A ] ^ _ ` a b r s t ˷˦zcWFW jh0h0CJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJph'j>h0h00JCJUaJh0h0CJaJh0h00JCJaJ!jh0h00JCJUaJ'h0h3;'5B*CJ\^JaJph0jh0h3;'5B*CJU\^JaJphhk h5h hKQ>CJhKQ>CJOJQJ    % :1^gdk Tkd$$Ifl0&F$  t/'644 lBaytKQ> $If^ & F+7$If^7gdKQ>Tkdh$$Ifl0&F$F  t/'644 lBaytKQ>% & * y '}+{aPLlS4  $%gd0 $gd0gd0(    ۾{g۾S'j2h0h00JCJUaJ&jh0h0CJUaJ'j8h0h00JCJUaJh0h0CJaJh0h00JCJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJh0h0CJaJ jh0h0CJUaJ&jh0h0CJUaJ   $ % & ' ( ) * + , H I J K L M W X Y s t u v w x y z { ֱ{gֱ&jh0h0CJUaJ'j,h0h00JCJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJ&jh0h0CJUaJ jh0h0CJUaJh0h0CJaJh0h00JCJaJ !"#$%&'ͶͪڶzfͶͪRڶ&jh0h0CJUaJ'j h0h00JCJUaJh0h0CJaJ&jh0h0CJUaJ jh0h0CJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJphh0h00JCJaJ!jh0h00JCJUaJ'j&h0h00JCJUaJ '()EFGHIJ[\]wxyz{|}~៎zf៎R&jh0h0CJUaJ'jh0h00JCJUaJ&jh0h0CJUaJ jh0h0CJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJph'jh0h00JCJUaJh0h0CJaJh0h00JCJaJ!jh0h00JCJUaJ    %&'()*+,-IJKLNOYZ[uѺѭѭzѺѭfѭ'jh0h00JCJUaJ&jh0h0CJUaJ'jh0h00JCJUaJh0h0CJaJh0h00JCJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJ jh0h0CJUaJh0h0CJaJ"uvwxyz{|}۾{g۾S'jh0h00JCJUaJ&jh0h0CJUaJ'jh0h00JCJUaJh0h0CJaJh0h00JCJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJh0h0CJaJ jh0h0CJUaJ&jh0h0CJUaJ ?@A[\]^_`abcֱ{gֱ&js h0h0CJUaJ'jh0h00JCJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJ&jyh0h0CJUaJ jh0h0CJUaJh0h0CJaJh0h00JCJaJ ./0JKLMNOPQRnopquvͶͪڶuaH0h0h0B*CJOJQJaJmHnHphu'j!h0h00JCJUaJh0h0CJaJmHnHu&jm!h0h0CJUaJ jh0h0CJUaJh0h0CJaJ,h0h0B*CJOJQJ\^JaJphh0h00JCJaJ!jh0h00JCJUaJ'j h0h00JCJUaJ*+,FخxdP'h0h0CJOJQJaJmHnHu'j"h0h00JCJUaJh0h0CJaJmHnHuh0h00JCJaJ0h0h0B*CJOJQJaJmHnHphu!jh0h00JCJUaJ1jg"h0h0CJUaJmHnHu+jh0h0CJUaJmHnHu"h0h0CJaJmHnHuFGHIJKLMNjklmstоЭ|hоOоЭ|1j[$h0h0CJUaJmHnHu'j#h0h00JCJUaJh0h0CJaJmHnHuh0h00JCJaJ'h0h0CJOJQJaJmHnHu!jh0h00JCJUaJ"h0h0CJaJmHnHu+jh0h0CJUaJmHnHu1ja#h0h0CJUaJmHnHu4IJKefgijklmn͹ͫjڹZF'j%h0h00JCJUaJh0h0CJaJmHnHu1jU%h0h0CJUaJmHnHu+jh0h0CJUaJmHnHu"h0h0CJaJmHnHu *h0h00JCJaJ'h0h0CJOJQJaJmHnHuh0h00JCJaJ!jh0h00JCJUaJ'j$h0h00JCJUaJ012LȲșȲxdPȲ'h0h0CJOJQJaJmHnHu'j&h0h00JCJUaJh0h0CJaJmHnHu!jh0h00JCJUaJ1jO&h0h0CJUaJmHnHu+jh0h0CJUaJmHnHu"h0h0CJaJmHnHuh0h00JCJaJ0h0h0B*CJOJQJaJmHnHphuLMNPQRSTUqrstz{оЭ|hоOоЭ|1jC(h0h0CJUaJmHnHu'j'h0h00JCJUaJh0h0CJaJmHnHuh0h00JCJaJ'h0h0CJOJQJaJmHnHu!jh0h00JCJUaJ"h0h0CJaJmHnHu+jh0h0CJUaJmHnHu1jI'h0h0CJUaJmHnHu-./123456RSTUWXw͹ͧxڹmYB,h0h0B*CJOJQJ\^JaJph'j)h0h00JCJUaJh0h0CJaJ1j=)h0h0CJUaJmHnHu+jh0h0CJUaJmHnHu"h0h0CJaJmHnHu'h0h0CJOJQJaJmHnHuh0h00JCJaJ!jh0h00JCJUaJ'j(h0h00JCJUaJwxy⽦u\J4+jh0h0CJUaJmHnHu"h0h0CJaJmHnHu0h0h0B*CJOJQJaJmHnHphu'j*h0h00JCJUaJh0h0CJaJmHnHuh0h00JCJaJ,h0h0B*CJOJQJ\^JaJph!jh0h00JCJUaJ&j7*h0h0CJUaJ jh0h0CJUaJh0h0CJaJ  տ|uqjf_WKCfC8hUJhUJCJaJhS)CJaJ *hS)hS)CJaJhCJaJ hk hhS) hk hS)h h3;'h3;'0jh0h3;'5B*CJU\^JaJph0h0h0B*CJOJQJaJmHnHphu!jh0h00JCJUaJ+jh0h0CJUaJmHnHu1j1+h0h0CJUaJmHnHu"h0h0CJaJmHnHu  lmntuUV^gd^gdmz^gdmzgdS)^gdUJgd4  & F $gd0?Ljklmnrstu&~Ὸ~xl^lULhCJ\^JhfCJ\^Jhfhf5CJ\^JhfhfCJ\^J hfCJ *hhCJ *hR|hCJ hCJhR|hCJhoDhCJ\^Jhmz hk h hk hmzhhUJhCJaJhhCJaJhCJaJhUJhUJCJaJ *hUJhUJCJaJhUJCJaJTUV4lmnJK)*6VǾwnbnbnbnbnbnh@^Ih@^ICJ\^JhCJ\^JhOO CJ\^Jh@^ICJ\^JhOO CJaJhUJhCJaJhCJaJhUJCJaJhUJhUJCJaJ hk hhf5\^JhmzCJ\^JhCJ\^JhoDhfCJ\^JhoDhoDCJ\^J hCJhoDhCJ&mnLWRSTZ[A C ! & F'gdOO ^gdOO gdOO  & Fgd^gdmz^gdUJVRTZ[i# $ ? X [ !!!!!!!!!! "G"a""""""""###"$\$ż̕wwkwwkwkwkw *hUJh(fCJaJhUJh(fCJaJh(fCJaJ hk%h(fh(fhmW3h;CJ\^JhOO hOO CJ\^J *hOO hOO CJ\^JhOO CJ\^J hOO hOO h(fCJ\^JhmzCJ\^Jhh@^ICJ\^JhCJ\^Jh@^Ih@^ICJ\^J)!!!!!!!#$$$x$y$z$$$%%&&&#&$&&& & FgdmW3^gdmW3gd;^gd(f & Fgd(fgd(f^gdmz^gdOO \$b$m$w$x$y$z$$$$% &&&&"&#&$&N&\&&&$'/'{''''?(K(((( )C)D)F)P))))@*B*Y*d**+++ +++,+:+ǽǽ׹ǽǯǯǯǯǯǯǯǯۚۄ hmzCJ *h>h;CJ h;CJh>h;CJ *hmW3hmW35CJhmW3hmW35CJh(f *hmW3hmW3CJhmW3hmW3CJ hmW3hmW3hmW3hmzhCJ\^Jh(fCJaJh;CJaJhOO CJaJ4&$'{''>(?(K((((Rkd+$$Ifl03$  t 0644 lap yt0>xx$If^gd0>^gdmW3 & F(gdmW3 (E)F)P))ckdf,$$Ifl03$  t 0644 lap yt0>xx$If^gd0>)))A*tccxx$If^gd0>kd-$$Ifl03$  t 0644 lap yt0>A*B*C*D*X*Y***++ +tkkfk]]]kk^gd;gdmz^gdmzkd-$$Ifl03$  t 0644 lap yt0> +++,++++++,E,],t,,,,,->-?-@-M-N--.q. & F&gdKJ1 & F)gd! & F)gd;^gd;^gdmzgdmz:+H+++++++\,],s,t,,,, -->-@-M-N-------.O.P.o.q.r.}.µ쯦yoe]Yh0:hB*ph *hNRrhKJ1CJ *hNRrhNRrCJ hNRrCJ h;CJ *h;CJ *hKJ1hKJ1CJ hKJ1CJhmz hmzCJh>h!CJ h!CJh>h!CJmH sH h!CJmH sH h;CJmH sH h>h;CJmH sH h;h;CJh>h;CJ *h>h;CJ!q.r...../T/U/////M0|000,1j122222 & Fgd^gd^gd0:gd^gdfgd0:^gdmz}......./////S/T/q/////L0M0{0|0t1122222222233?3t33333333{{ph;5CJ\aJhm {CJaJ *hm {hm {CJaJhhCJaJo(hh5CJ\aJhhCJaJhCJaJh0:hhfhfCJj.h;Uj4L h;UVjhfU *hfhfCJ hfCJhhf,22@3333334T4U4V4444444%6&6^6_6gdk%gdk%gd^gd & Fgdk%gdk%^gdk% & F$gd^gd & F!gd34 4 4414?4H4S4T4V4W4b4d4s4{4|4444445!575F5 6#6$6&6^6n6o666667~uneeeehoDhk%CJ hoDhk%h%hk%CJ *h%hk%CJ *hmW3hk%CJ h:CJ hk%CJ hhhhCJ *hhCJhk%h0hh:hZCJ\^JhCJaJhm {CJaJ *hm {hm {CJaJh CJaJhhCJaJ%77777888<8Q8R8S8T888889$9/9091949H9I9K9t99999999_:t:u:::::::::::;8;9;:;@;A;l;m;;;;;;;;;;<<=<V<W<<<<<<<= *hhk%CJhhk%CJ hk CJ hm {CJ *h:CJ *hoDhk%CJ hk%CJhoDhk%CJhoDhk%5CJH_6777U888J9K9::;;;;><X<<<<==@=A=> >n?gdk% & Fgdk% & Fgdk%^gdk%==@=T=U=x=y=>>>Q?R?l?m?o?????@@A@[@@@@@AAAA\AAAAAAAB(B)B+D,DDDEE & Fgdk% & Fgdk%gdk%^gdk%EEEE8FXF`FaFhF|F}FGGGGGGG H H#H5HWH_HHHHHIIzI{II.J/JVJWJdJeJfJJJJJzKKKKKLLLLMM6M7MjMkMNN[O\OOO䰩 hk CJ *hk%CJ *h59hk%CJ *hQ!Khk%CJ *hQ!Kh!GCJ hcCJ h!GCJ *h:h:CJh59hk%CJ h59hk% h:CJ hk%CJ@EEEEGGHHHHJJJJKKBLCLLLM8MlMmMINJN\O & Fgdk%gdk%gdk%^gdk%\O]OZP[PPP,Q-QAQhQQQRRSSS S!S"S#S$S%S&S'S(S)S & Fgdk%gdk%^gdk%OOOOOOO8P9PXPYPZP[PPQQ?Q@QfQgQQQQQR)R*RkRlRRRRRSS(S)S3S6SISJS]SSSSST»µµµµµµµµµµv *hQ!KhQ!KCJ *hQ!Kh9CJ hQ!KCJ hk%h9h0h9 hfCJ h9CJ *h%hk%CJ hk%CJ h59hk%h59hk%CJh59hk CJh0h0CJ *h0CJ *hKJ1hk CJ h0CJ h:CJ hk CJ.)SISJS]S"T#T2TXTTTTU5USU 1$$Ifa$gd0 1$$Ifa$gd5gdk%gd9 & Fgd9gd9 T!T"T#T2T@TITJTPTQTfTTTTTTTTTTUU*U+UWUXU}UUUVYVVVVVVAWTW[W{W?YCYDY ['[ \!\\\\\\\\]]]]3]A]кhs"jhUmHnHsH tH uhcjhcU h0:hfh0h0>hfmH sH hfh8hf5\ h05\ hf5\ hfCJ h9CJ *hQ!KCJ:SUTUkdt$$Ifl4    ִ  t"|)818$ pT0    8    4 lalf4yt5TUXU]UbUgUlUqUvU{U|U}UUU V;VgVzVVVVVWAWWX$XFfIz 1$Ifgd0Ffw 1$Ifgd5 1$$Ifa$gd5$X8XX>Y?YDYYZEZiZZ[([)[*[Y[[[[[\N\\\Ff΃ 1$Ifgd0Ff 1$$Ifa$gd5Ffr} 1$Ifgd5\\\\\\\]]]B]C]D]V]z]{]Vkd$$Ifl0K&[\ t644 layt=P $$Ifa$gd=P $IfgdKQ>^gdcA]C]D]J]N]R]U]V][]\]b]c]d]e]i]j]u]v]x]y]{]|]}]]]]]]]]]]]]]]]]]]^^^^^警yhhCJ$ h@^I5CJ0 h5CJ0hh5CJ0 *hhhc hhh hh *hXf#h hhhKQ>CJmHnHujh=Ph=PCJUh=Ph=PCJhh59hKQ>hh0>h,{]|]}]]]]]]]]]]]^^^ $^a$gdTkd$$$Ifl0K&[\ t644 laytXf# $$Ifa$gdXf# $Ifgdgd^^^^^^ h0:hfhhhhCJ$ *hhCJ$^^^^^gdc:&P 1h/R :p=P. A!n"5#$% =&P 1h0/R :pfA .!"#r$8% $$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYd$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4ytYdi$$If!vh5$5 #v$#v :V l t/'65$5 BytKQ>i$$If!vh5$5 #v$#v :V l t/'65$5 BytKQ>i$$If!vh5$5 #v$#v :V l t/'65$5 BytKQ>i$$If!vh5$5 #v$#v :V l t/'65$5 BytKQ>i$$If!vh5$5 #v$#v :V l t/'65$5 BytKQ>}DyK _Toc217374644}DyK _Toc217374644}DyK _Toc217374645}DyK _Toc217374645}DyK _Toc217374646}DyK _Toc217374646}DyK _Toc217374647}DyK _Toc217374647}DyK _Toc217374648}DyK _Toc217374648}DyK _Toc217374649}DyK _Toc217374649}DyK _Toc217374650}DyK _Toc217374650}DyK _Toc217374651}DyK _Toc217374651}DyK _Toc217374652}DyK _Toc217374652}DyK _Toc217374653}DyK _Toc217374653}DyK _Toc217374654}DyK _Toc217374654}DyK _Toc217374655}DyK _Toc217374655}DyK _Toc217374656}DyK _Toc217374656}DyK _Toc217374657}DyK _Toc217374657}DyK _Toc217374658}DyK _Toc217374658}DyK _Toc217374659}DyK _Toc217374659}DyK _Toc217374660}DyK _Toc217374660}DyK _Toc217374661}DyK _Toc217374661}DyK _Toc217374662}DyK _Toc217374662}DyK _Toc217374663}DyK _Toc217374663}DyK _Toc217374664}DyK _Toc217374664}DyK _Toc217374665}DyK _Toc217374665}DyK _Toc217374666}DyK _Toc217374666}DyK _Toc217374667}DyK _Toc217374667$$If!vh55#v#v:V l  t 06,55p yt0>$$If!vh55#v#v:V l  t 06,55p yt0>$$If!vh55#v#v:V l  t 06,55p yt0>$$If!vh55#v#v:V l  t 06,55p yt0>%FDd *Q8XXb  c $A? ?3"`?"oE.*m εKE.~ @=CE.*m ε!/jEx} `Tda&=!$aB1,%SIZ Ue\ P,DSR(VnD [D,K+ZT<̙ M   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~2Root Entry FmData WordDocument {ObjectPool0}m_1291115316F0} (Ole EPRINTCompObjs  !"#$%&'()*+,-./0123456789:;<=>?@ACDEGHIJKM FMicrosoft Visio DrawingVisio 11.0 ShapesVisio.Drawing.119q Oh+'0 X`lx Steve Cottrell      !"#$%&'()*+,-./0156789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~l dY EMFO nNF, EMF+@``FH<EMF+0@?@ @ @@ @vBrMCTCrMC*.CrMC%C~C %CgC %CgC %CgC %CgC%CgC%CB %CB+.C4BTC4BvB4BMB4B9+BB9+BB9+BB9+BgC9+B|CMBqMCvBrMC@!b $$=='%  ; 6, X4 [  [ w[ w[ w[ wY$[ w[ 8X([  , 6 X(5 8Y$8wX( 5  =<>*P % $$AAFL@EMF+@ @@4 ף>@vBrMCTCrMC*.CrMC%C~C %CgC %CgC %CgC %CgC%CgC%CB %CB+.C4BTC4BvB4BMB4B9+BB9+BB9+BB9+BgC9+B|CMBqMCvBrMC@$$==_888% % ; 6, X4 [  [ w[ w[ w[ wY$[ w[ 8X([  , 6 X(5 8Y$8wX( 5  =<@)O% % $$AA( FEMF+@FBrMCTCrMC*.CsMCCC CNB CMB CMB CLBCMBCB CB+.C4BTC4BFB4BB4BsABsABsABsAMBsA}CBrMCFBrMC@i( $$=='i%  ;6lX4  ^    Y$  xX(  JlJ6JX(uJxY$xX(^u=<>D % $$AAF`TEMF+@@4 ף>@$$==_888% % ;6lX4  ^    Y$  xX(  JlJ6JX(uJxY$xX(^u=<@C% % $$AA( Fl`EMF+*@$BBsA4B@0$=ARIAL6@Security Incident or l=x>H>x>>x>S>x>>x>7>x>>x>>x>@M?x>@4?x>@?x>@{0?x>M@?x>4H?x>Y?x>ei?x>z?x>`?x>?x>Ž?x>K?x>??   RpArial;H26Zu5pH26<9x9|9@9 `R! hn#>05v15vPx(<4vD; 29`B9 +999D;&99=<dv% T*[h@ B B*fLxSecurity Incident or % F EMF++@ *@$BBsA4B6@weakness observedj=>5N>>>>a>>>>>>@4?>?>#?>+?>=?>~N?>P^?>@"n?>4y?>?>k?>??   % T*hu@ B B*sLpweakness observed % FEMF++@ @ @rCrMC|CrMCg@CrMCb{C~Cb{CgCb{CgCb{CgCb{CgCb{CBb{CBh@C4B|C4BrC4BKC4BCBCBCBCgCC|CKCqMCqCrMC@( $$=='%  ;q 6 X4i  wwww68X(i  6q X( CC8Y$C8CwX(C  q =<>P % $$AAFD8EMF+@ @@4 ף>@rCrMC|CrMCg@CrMCb{C~Cb{CgCb{CgCb{CgCb{CgCb{CBb{CBh@C4B|C4BrC4BKC4BCBCBCBCgCC|CKCqMCqCrMC@$$==_888% % ;q 6 X4i  wwww68X(i  6q X( CC8Y$C8CwX(C  q =<@O% % $$AA( FEMF+@rCrMC|CrMCg@CsMCb{CCb{CNBb{CMBb{CMBb{CLBb{CMBb{CBb{CBh@C4B|C4BrC4BKC4B!xCB!xCB!xCB!xCMB!xC}CKCrMCqCrMC@( $$=='%  ;6X40^0000Y$00xX(0JJ6JX( JxY$xX(^ =<>Ds % $$AAF`TEMF+@@4 ף>@$$==_888% % ;6X40^0000Y$00xX(0JJ6JX( JxY$xX(^ =<@Cu% % $$AA( FPDEMF+*@$BB!xC4B6@Incident Report Raised =x>=x>>x>H>x>g>x>>x>A>x>>x>>x>>x>@k?x>="?x>3?x>D?x>P?x>Y?x>na?x>u?x>?x> ن?x>Ž?x>ખ?x>Z?x>??   % T[th@ B BfL|Incident Report Raised % FEMF++@ *@$BB!xC4B6@ and Loggedz>>>>>>?> ?>?>v0?>A?>6S?>c?>??   % ThUu@ B Bs L`and Logged% FEMF++@ @ @o sBXC7CXC CXC&C^C&CrC&CrC&CrC&CrC&C|C&C$"rC C0iC7C0iC7C/iCo sB/iCJIB/iCBr'B$"rCAr'B|CAr'BrC>r'B]CJIBXCk sBXC@( $$=='%  ;6; X4 j j qj qj qj q6j X(j # ; Y$; X(&#6qX(&=<>)* % $$AAFD8EMF+@ @@4 ף>@o sBXC7CXC CXC&C^C&CrC&CrC&CrC&CrC&C|C&C$"rC C0iC7C0iC7C/iCo sB/iCJIB/iCBr'B$"rCAr'B|CAr'BrC>r'B]CJIBXCk sBXC@$$==_888% % ;6; X4 j j qj qj qj q6j X(j # ; Y$; X(&#6qX(&=<@(,% % $$AA( FEMF+@o CBXC7CXC CXCC^CCrCCrCCrCCrCCpCC$"fC C0]C7C0]C7C/]Co CB/]CJB/]CA$"fCApCApCArC|A]CJBXCk CBXC@i( $$=='i%  ; 6{X4"  X    6 X( c" { Y${  X(f c Y$ X(Xf =<> % $$AAF`TEMF+@@4 ף>@$$==_888% % ; 6{X4"  X    6 X( c" { Y${  X(f c Y$ X(Xf =<@ % % $$AA( FEMF+*@$BBA/]C6@Line Management 8>E>F~>E>>E>>E>T>E>">E>C?E>?E>t)?E>F9?E>J?E>@xZ?E>s?E>`ʁ?E>`z?E>6?E>??   % T/@ B B/LlLine Management   % FEMF++@ *@$BBA/]C6@|pAdvised>>?>?>$?>,?>q@CL?>??   % TxFp @ B BGL\AdvisedD% FtEMF++@ @ @H<7BCrBC}"CCrBvzC7BC@( $$=='%  % V0.o( %  % $$AAFEMF+@ @@4 ף>@H<7BCrBC}"CCrBvzC7BC@$$==_888% % V0,n( % % $$AA( Fh\EMF+@H<BCrBC}CCrBvzCBC@i( $$=='i%  % V0"c #6h # #%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V0 b #6h # #% % $$AA( FEMF+*@$BB^.BC6@Is Assistance a>.>9>.>Dy>.>p>.>>.>)>.>>.>@M?.>?.>?.>i+?.>L?.>@m\?.>??   % T:@ B B:LhIs Assistance % FEMF++@ *@$BB^.BC6@xRequiredl>r>t>r>>r>>r>K?r>2 ?r>D?r>@%?r>??   % T|Bp@ B BBL\Required% FtEMF++@ *@$BB^.BC6@@4?@v6?r>??   % TTpu@ B BpLP?B% FEMF++@ @ @%qBXD))CXDCXD'Ck;D'Cu D'Cu D'Cu D'Cu D'CD'C JDC,D))C,D%qB,DLfGB,Dz%B JDy%BDy%Bu Dv%Bk;DFfGBXD%qBXD@( $$=='%  ;W$6C W$X4 W$q #q (#q (#q (#q (#6q !X(q S! C 6 X( S!!6(#X(#W$W$=<>) F % $$AAF8,EMF+@ @@4 ף>@%qBXD))CXDCXD'Ck;D'Cu D'Cu D'Cu D'Cu D'CD'C JDC,D))C,D%qB,DLfGB,Dz%B JDy%BDy%Bu Dv%Bk;DFfGBXD%qBXD@$$==_888% % ;W$6C W$X4 W$q #q (#q (#q (#q (#6q !X(q S! C 6 X( S!!6(#X(#W$W$=<@( G% % $$AA( FEMF+@%ABXD))CXDCXDCk; DCu DCu DCu DCu DCDC JDC,D))C,D%AB,DLfB,DA JDADAu DAk; DFfBXD%ABXD@i( $$=='i%  ;#6#X4* # # h" h" h" h"6 :!X( *  6 X(^  :!6h"X(#^##=<>: % $$AAF`TEMF+@@4 ף>@$$==_888% % ;#6#X4* # # h" h" h" h"6 :!X( *  6 X(^  :!6h"X(#^##=<@;% % $$AA( F<0EMF+*@$BBA,D6@Contact and evaluate =G>24>G>y>G>>G>>G>.>G>>G>b?G>I ?G>?G>z+?G>D?G>T?G>@ed?G>7t?G>|?G>?G>ৎ?G>`d?G>@M?G>??   % T'@ B B'LxContact and evaluate cD% FdXEMF++@ *@$BBA,D6@$action with appropriate 1=?>V=?>*>?>P>?>rp>?>>?>>?>>?>>?>??>C??>??>'??>@\7??>@H??>@Z??>.e??>v??>??>??>`s??>@\??>??>??>??   % T""@ B B" L|action with appropriate % FEMF++@ *@$BBA,D6@ authority n>>>> ?>a?>&?>!8?>3C?>K?>T?>@ed?>??   % TE"u/@ B BE- L`authority % FEMF++@ @ @`C>CC>CC>C.CC.CC.CC.CC.CC.CYC.C2!CC8CC8C`C8Cu±C8CzC2!CzCYCzCCzCCt±C>C_C>C@( $$=='%  ;68X4f!fzfzfzfz6fLX(f86X(9L6zX(!9=<>[ % $$AAF8,EMF+@ @@4 ף>@`C>CC>CC>C.CC.CC.CC.CC.CC.CYC.C2!CC8CC8C`C8Cu±C8CzC2!CzCYCzCCzCCt±C>C_C>C@$$==_888% % ;68X4f!fzfzfzfz6fLX(f86X(9L6zX(!9=<@Y% % $$AA( FEMF+@`C>CC>CC>C.CC.CC.CC.CC.CC.CYC.C2!CC8CC8C`C8Cu«C8CzC2!CzCYCzCCzCCt«C>C_C>C@i( $$=='i%  ; 6xX4a6X(]x]6 ]X(y]6X(ay =<>Ou % $$AAF`TEMF+@@4 ף>@$$==_888% % ; 6xX4a6X(]x]6 ]X(y]6X(ay =<@Mt% % $$AA( F<0EMF+*@$BBzC8C6@Evaluate Appropriate ,=>y!>>`>>>>џ>>>>5>>'>>@e ?>@L?>&?>78?>I?>T?>f?>hw?>@=?>0?>?> ֑?>?>??   % TW@ B BWLxEvaluate Appropriate % FEMF++@ *@$BBzC8C6@|pAction g>a>@ ?a>?a> &?a>-?a>P??a>P?a>??   % Tx{@ B B|L\Action % FtEMF++@ @ @H<CB DrCRsCRsCB DrCDCB D@( $$=='%  % V0Kl"oo"&"%  % $$AAFEMF+@ @@4 ף>@H<CB DrCRsCRsCB DrCDCB D@$$==_888% % V0Jm"oo"&"% % $$AA( Fh\EMF+@H<CBDrCRsCRsCBDrCDCBD@i( $$=='i%  % V0?`!!%!%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V0>a!!%!% % $$AA( F0$EMF+*@$BBC۷C6@Does Security Forum &=^>>J>^>߇>^>>^>&>^>>^>>^>D?^>@?^>@v/?^>:?^>oB?^>K?^>[?^>c?^>u?^>`0?^>@?^>@i?^>?^>??   % TW@ B BWLtDoes Security Forum  % F EMF++@ *@$BBC۷C6@need to make a > ?_> ?> ?> ?? ?? ?? ?s+? ?Z3? ?L? ?v\? ?@Hl? ?|? ?? ?`? ???   % Tf"@ B Bf Llneed to make a  % FEMF++@ *@$BBC۷C6@xdecision_>.?>.?@ ?.??.?#?.?k3?.?R;?.?L?.???   % T|t"/@ B Bt-L\decision% FtEMF++@ *@$BBC۷C6@@4?^?.???   % TT"/@ B B-LP?.% FEMF++@ @ @"[CC\DCR/DCLDPCLDCLDCLDCLDCLDgCLDtCR/DہlC\DہlC"[CہlC7#CځlC( % $$AAF8,EMF+@ @@4 ף>@"[CC\DCR/DCLDPCLDCLDCLDCLDCLDgCLDtCR/DہlC\DہlC"[CہlC7#CځlC  % $$AAF`TEMF+@@4 ף>@$$==_888% % ;6eX4  +    6 7X(  e 6 X( }}76}X(}+=<@ % % $$AA( FEMF+*@$BB >)n> >ԙ> >x> >F> >> >? >4? > ? >(? >3? >@xC? >@T? >@8f? >Jq? >z? >??   % T@ B BLlIncident report % FEMF++@ *@$BB'>>'>>'>??'>?'>?'>@\)?'>@:?'>@B?'>uR?'>Fb?'>??   % T@ B B Ldupdated as % F EMF++@ *@$BBk>1>k>դ>k>x>k>>k>?k>?k>@!?k>,?k>fMD?k>mZ?k>Tb?k>k?k>-}?k>??   % T @ B BLlnecessary with % FEMF++@ *@$BB ?m> ?> ?U> ?> ?> ? ? ?? ?#? ?@3? ?|C? ?cK? ?4[? ?d? ???   % T @ B BLhtimescales etc % FtEMF++@ *@$BB)W$)#)(#)(#)(#)(#Y$)(#)!X()S!>) ( 6W$ X(# (#S!(#!6(#(#X((###W$W$W$=<>2 F % $$AAFD8EMF+@ @@4 ף>@XDXDZ"DXD$DXD_'Dk;D_'Du D_'Du D_'Du D_'Du D^'Du D^'DD_'D JD$D,DZ"D,DXD,DD,Du D JDu DDu Du Du Dk;DDXDXDXD@$$==_888% % ;W$W$6(W$X4>)W$)#)(#)(#)(#)(#Y$)(#)!X()S!>) ( 6W$ X(# (#S!(#!6(#(#X((###W$W$W$=<@1 G% % $$AA( FEMF+@XDXDZDXD!DXD_$Dk; D_$Du D_$Du D_$Du D_$Du D^$Du D^$DD_$D JD!D,DZD,DXD,D D,Du D JDu DDu Du Du Dk; D DXDXDXD@i( $$=='i%  ;##6'#X4~(#)#)h")h")h")h"Y$)h"):!X() ~( ' 6# X(" h" h":!6h"h"X(h"#"###=<>&: % $$AAF`TEMF+@@4 ף>@$$==_888% % ;##6'#X4~(#)#)h")h")h")h"Y$)h"):!X() ~( ' 6# X(" h" h":!6h"h"X(h"#"###=<@%;% % $$AA( FEMF+*@$BBu D,D6@Security Forum >>^>>>>>>w>>>>i>>-?>@?>@?>@F.?>@??>J?>\?>bu?>??   % T4@ B B4LlSecurity Forum C % FEMF++@ *@$BBu D,D6@decides action)>a>n>a>>a>>a>^>a>>a>a?a>2?a>?a>+?a>@;?a>@6E?a>@M?a>@}^?a>??   % T6)@ B B6'Lhdecides action% FEMF++@ @ @&Ce@DCe@DCe@D0Cy>D0C;D0C;D0C;D0C;D0C$7D0C4DC k2DC k2D&C k2DC k2DӳC4DӳC$7DӳC;DӳCy>DCe@D&Ce@D@( $$=='%  ;&06x&0X4&0/....6-X(#-,x,6,X(,#--6.X(/&0&0=<>Y % $$AAF8,EMF+@ @@4 ף>@&Ce@DCe@DCe@D0Cy>D0C;D0C;D0C;D0C;D0C$7D0C4DC k2DC k2D&C k2DC k2DӳC4DӳC$7DӳC;DӳCy>DCe@D&Ce@D@$$==_888% % ;&06x&0X4&0/....6-X(#-,x,6,X(,#--6.X(/&0&0=<@X% % $$AA( FEMF+@&Ce=DCe=DCe=D0Cy;D0C8D0C8D0C8D0C8D0C$4D0C1DC k/DC k/D&C k/DC k/DӳC1DӳC$4DӳC8DӳCy;DCe=D&Ce=D@i( $$=='i%  ;f/6f/X4_f/.8.8.8.8.6 -X(c,_++6+X(^+c, -68.X(.^f/f/=<>M % $$AAF`TEMF+@@4 ף>@$$==_888% % ;f/6f/X4_f/.8.8.8.8.6 -X(c,_++6+X(^+c, -68.X(.^f/f/=<@L% % $$AA( FEMF+*@$BBӳC k/D6@ Action Takeng>?>|>?> >?>??>p??>??>0+??>3??>wD??>HT??>d??>@s??>??   % Tk@ B Bl LdAction Taken% FEMF++@ @ @AoBe@DTCe@D*.Ce@D%Cy>D %C;D %C;D %C;D %C;D%C;D%C$7D %C4D+.C k2DTC k2DAoB k2DEB k2D#B4D#B$7D#B;D#By>DEBe@DAoBe@D@( $$=='%  ;&06, &0X4 &0[ /[ .[ .[ .[ .Y$[ .[ -X([ #- ,, ,6,X(,#--6.X(/&0&0=<>( % $$AAFD8EMF+@ @@4 ף>@AoBe@DTCe@D*.Ce@D%Cy>D %C;D %C;D %C;D %C;D%C;D%C$7D %C4D+.C k2DTC k2DAoB k2DEB k2D#B4D#B$7D#B;D#By>DEBe@DAoBe@D@$$==_888% % ;&06, &0X4 &0[ /[ .[ .[ .[ .Y$[ .[ -X([ #- ,, ,6,X(,#--6.X(/&0&0=<@'% % $$AA( FEMF+@A?Be=DTCe=D*.Ce=DCy;D C8D C8D C8D C8DC8DC$4D C1D+.C k/DTC k/DA?B k/DB k/DgUA1DdUA$4DcUA$4DcUA8D^UAy;DBe=DA?Be=D@i( $$=='i%  ;f/6lf/X4 f/ . 8. 8. 8. 8.Y$ 8. -X( c, +l+6+X(W+c, -Y$ -8.X(.Wf/f/=<> % $$AAF`TEMF+@@4 ף>@$$==_888% % ;f/6lf/X4 f/ . 8. 8. 8. 8.Y$ 8. -X( c, +l+6+X(W+c, -Y$ -8.X(.Wf/f/=<@% % $$AA( FD8EMF+*@$BBcUA k/D6@Incident Report ClosedT*=?>b=?>>?>N>?>n>?> >?>>?>m>?>_>?>->?>!??>@#??>@S5??>@F??>Q??>>[??>%c??>w??>??>`{??>@d??> M??>??   % T!@ B B!LxIncident Report Closed% FEMF++@ @ @AoBoDTCoD*.CoD%CemD %CokD %CokD %CokD %CokD%CokD%C`D %C^D+.C2[DTC2[DAoB2[DEB2[D#B^D#B`D#BokD#BemDEBoDAoBoD@( $$=='%  ;;6, ;X4 ;[ o;[ :[ :[ :[ :Y$[ :[ .8X([ 7 7, 767X(77.86:X(o;;;=<>(p % $$AAFD8EMF+@ @@4 ף>@AoBoDTCoD*.CoD%CemD %CokD %CokD %CokD %CokD%CokD%C`D %C^D+.C2[DTC2[DAoB2[DEB2[D#B^D#B`D#BokD#BemDEBoDAoBoD@$$==_888% % ;;6, ;X4 ;[ o;[ :[ :[ :[ :Y$[ :[ .8X([ 7 7, 767X(77.86:X(o;;;=<@'n% % $$AA( FEMF+@A?BlDTClD*.ClDCejD CohD CohD CohD CohDCohDC]D C+.C2XDTC2XDA?B2XDB2XDgUAdUA]DcUA]DcUAohD^UAejDBlDA?BlD@i( $$=='i%  ;6;6l6;X4 6; : : : : :Y$ : n7X( 6 @6l@66@6X(W@66n7Y$n7:X(:W6;6;=<>d % $$AAF`TEMF+@@4 ף>@$$==_888% % ;6;6l6;X4 6; : : : : :Y$ : n7X( 6 @6l@66@6X(W@66n7Y$n7:X(:W6;6;=<@b% % $$AA( FEMF+*@$BBcUA2XD6@Incident Reports jX>t>x>t>Þ>t>f>t>4>t>>t>L?t>?t>%#?t> +?t>??t>hO?t>`?t>(r?t>@:}?t>Y?t>B?t>??   % T1w@ B B1LpIncident Reports % F\PEMF++@ *@$BBcUA2XD6@collated and passed to O=>=>8>>\X>>w>>>>>>5>>>>a?>@3?>@!?>@2?>@:?>@:L?> \?>k?>{?>?>p?> d?> ?>П?>??   % T"@ B B"L|collated and passed to % FEMF++@ *@$BBcUA2XD6@security forum >~?>~?Q>~?>~?@Z?~?l?~?S?~? ?~?0?~?8?~?A?~?]S?~?o^?~?o?~???   % T6@ B B6Lhsecurity forum% FEMF++@ @ @|CoDCoDCoD:CemD:CokD:CokD:CokD:CokD:CaD:C _DC\DC\D|C\DаC\DC _DCaDCaDCokDCemDаCoD{CoD@( $$=='%  ;;6;X4`;o;::::6k8X(7`<7<76<7X(<77k8Y$k8:X(o;;;=<>Ys % $$AAFD8EMF+@ @@4 ף>@|CoDCoDCoD:CemD:CokD:CokD:CokD:CokD:CaD:C _DC\DC\D|C\DаC\DC _DCaDCaDCokDCemDаCoD{CoD@$$==_888% % ;;6;X4`;o;::::6k8X(7`<7<76<7X(<77k8Y$k8:X(o;;;=<@Xr% % $$AA( FEMF+@|ClDClDClD:CejD:CohD:CohD:CohD:CohD:C^D:C \DCYDCYD|CYDЪCYDC \DC^DC^DCohDCejDЪClD{ClD@i( $$=='i%  ;6;66;X46;(:(:(:(:(:6(7X((7|6|66|6X([|677Y$7:X(:[6;6;=<>Mg % $$AAF`TEMF+@@4 ף>@$$==_888% % ;6;66;X46;(:(:(:(:(:6(7X((7|6|66|6X([|677Y$7:X(:[6;6;=<@Lf% % $$AA( FxlEMF+*@$BBCYD6@D8Security Forum reviews and D=`>h=`>{0>`>o>`>>`>İ>`>>`>>`>(>`>{?`>?`>;$?`>L/?`>@?`>Y?`>a?`>@l?`>|?`>I?`>`=?`>@&?`>@6?`> ?`>?`>?`>?`>[?`>??   % TQy@ B BQLSecurity Forum reviews and  % F\PEMF++@ *@$BBCYD6@if appropriate changes 9>>Y>>{>>>>/>>>>>>@i?>@?>@)(?>;3?>";?>J?>lT?>>d?>%l?>@{?>?>?>D?>?>`ݧ?>@Ư?>??   % T_@ B B_L|if appropriate changes % FEMF++@ *@$BBCYD6@pdpolicy?t?M/?t?@?t?H?t?{P?t?L`?t???   % Tp@ B BLXpolicy% FEMF++@ @th rB/]C*>BdJCEB FCyBOCyBrMCBrMCBOCB FCBdJCrB/]C@wF( $$=='Fw%  % VDIp   a  xx a   %  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDHq   a  xx a   % % $$AA( FEMF+@th rBCԒBCĊBCzBCzBXCjBXCjBCcZBCSRBCrBC@xH( $$=='Hx%  % VDLmd 65uu56%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDKne 65uu56% % $$AA( FEMF+@th zCCjC Cf}C CnCC}CC}CCnCCf}CCjCCzCC@xH$$==%  % VDP #"b1h h c1c$#%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDQ #"b1h h c1c$#% % $$AA( FEMF+@th rB,DԒBQCĊB OCzBSCzBvzCjBvzCjBSCcZB OCSRBQCrB,D@wF( $$=='Fw%  % VDLm   KK  %  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDKn   KK  % % $$AA( FEMF+@th CBDXCD OCDCoDCoDCcDCcD OC DXCX DCBD@wF$$==%  % VD@+ ! 2!T! ! "T"p""!%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDA, ! 2!T! ! "T"p""!% % $$AA( FEMF+@th rCRsCCCC1C\CC>C{;C]wCXBCcCsCC CCCrCRsC@wF$$==%  % VD}  %  % $$AAF`TEMF+@@4 ף>@$$==_888% % VD|  % % $$AA( F|EMF+*@$BBcUAlC6@THYES7>`>>??   % T`*>@ B B+LTYES% F|EMF++@ *@$BBCC6@H<NOx=,>M>,>??   % TXo|@ B BzLPNO% FEMF++@ @th u DBDPDD0}DD$DoDRsCoDRsCcD$DcD0}D DPDX Du DBD@wF$$==%  % VD'+ h"!! `!2!!!!"!"`!p"!"h"!%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VD(, h"!! `!2!!!!"!"`!p"!"h"!% % $$AA( F|EMF+*@$BB8C,D6@THYES`>=>=>^G>>??   % T`@ B B LTYES% F|EMF++@ *@$BB OCD6@H<NO=eC>oF>eC>??   % TXbgpt@ B BbrLPNO% FEMF++@ @th PC k/D DC83,DCi+DCC-DCDFCDNC-DC;t+DC0B,DPC k/D@wF$$==%  % VD_ + +u*B+%%C+C*++%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VD^ + +u*B+%%C+C*++% % $$AA( FEMF+@th 0C86DC/6DCE4DC5D@DD2D DSCK3DC˃1DgC81D0C86D@xH( $$=='Hx%  % VD7_ -!->-H-%#%r#+,!a,g,-%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VD6` -!->-H-%#%r#+,!a,g,-% % $$AA( FEMF+@th C86D#*C:D.C9De&CX7DӳCX7DӳCq5De&Cq5D.CP3D#*C@2DC86D@wF( $$=='Fw%  % VDN - . m.g --]-g ]- , , -%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDO - . m.g --]-g ]- , , -% % $$AA( FEMF+@th ̎B2XDԒBTDBSDBUDBe=D Be=D BUD BSDĊBTD̎B2XD@wF$$==%  % VDJmd @6054t5f/qf/qt5405@6%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDInf @6054t5f/qf/qt5405@6% % $$AA( FEMF+@th CbcDǭC^DgC_D۟C9bD@CaDC dDzϟCydDRCCٳfDF}CgDCbcD@wF$$==%  % VD{N 87m78 s8 99i998%  % $$AAF`TEMF+@@4 ף>@$$==_888% % VDzO 87m78 s8 99i998% % $$AA( FEMF+@@4?@, C}BsoC}B@$$==_888% % W$gl % % $$AA( F\PEMF+@<05nCB!xC}B5nCB5nCB@( $$=='%  % V,doHH%  % $$AAFEMF+@@4?@ b{C}B\C}BrC}BVuC%BVuCeBVuCeBVuCeBVuCeBVuCYtCVuCuyCӒCp}C.Cp}C2Cp}C@$$==_888% % ;06X4OO'O'O'O'6OFX(O6<@qg% % $$AA( F\PEMF+@<0yCxCARIAL6@ Process Flow ?l> E?l> ?l> E?l> ?l> ?l>T@l>: @l>@l>r@l>@l>'@l>4@l>??   ( RpArialiao $>HvxHv $Bwzu0;0 xku7$nu7xxBwx h0:u0:u h x`uL:Nw hZu@u:u!u x0!50h҃u`u`udv% Tv '@ B Bv" LhProcess Flow   % FtEMF++@ *@$BBp@p@6@@4 8@l>??   % TT #'@ B B"LP % FEMF++@ *@$BBp@p@6@L@ Security Incident ReportingtA@l>E@l>P@l>xY@l>^b@l>$l@l>^r@l>v@l>$|@l>H@l>H@l>H@l>Hڋ@l>HM@l>H@l>Hi@l>Hܛ@l>H@l>Hi@l>H@l>Hi@l>Hܯ@l>H@l>H@l>H@l>Hi@l>H@l>H@l>??   % T% d'@ B B%"L Security Incident Reporting       % FEMF++@ @ @dD=\D)D=\DH,D=\D f.DZD f.DWD f.DWD f.DWD f.DWD f.DBUD f.DLRDH,DPD)DPD)DPDdDPDDPDDLRDDBUDDWDDZDD=\DdD=\D@( $$=='%  ;Y'76l*7X4+7+6+5+5+5+56+f5X(+4+74l*74Y$l*74Y'74X(&74+&4+&f56+&5X(+&6&7Y'7=<>bCq % $$AAFD8EMF+@ @@4 ף>@dD=\D)D=\DH,D=\D f.DZD f.DWD f.DWD f.DWD f.DWD f.DBUD f.DLRDH,DPD)DPD)DPDdDPDDPDDLRDDBUDDWDDZDD=\DdD=\D@$$==_888% % ;Y'76l*7X4+7+6+5+5+5+56+f5X(+4+74l*74Y$l*74Y'74X(&74+&4+&f56+&5X(+&6&7Y'7=<@aBs% % $$AA( FEMF+@dD=YD&D=YDH)D=YD f+DWD f+DTD f+DTD f+DTD f+DTD f+DBRD f+DLODH)DMD&DMD&DMDdDMDDMDDLODDBRDDTDDWDD=YDdD=YD@i( $$=='i%  ;&P66)P6X4S*P6*5*!5*!5*!5*!56*4X(*3S*w3)w3Y$)w3&w3X(%w3k%3k%46k%!5X(k%5%P6&P6=<>V7e % $$AAF`TEMF+@@4 ף>@$$==_888% % ;&P66)P6X4S*P6*5*!5*!5*!5*!56*4X(*3S*w3)w3Y$)w3&w3X(%w3k%3k%46k%!5X(k%5%P6&P6=<@U6g% % $$AA( FEMF+*@$BBDMD@0$=ARIAL6@xActivity>~>(>~>>~>>~>>~>?~> ?~>w?~>??   ( RpArialia[$>HvxHv<zud>$0 x8$nu!5xxBwx i0:u0:u i x`uL:Nw iZu@u:u!u x0!50h҃u`u`udv% T|nFS@ B BoQL\Activity% FEMF++@ @ @UDlD)DlDH,DlD f.D iD f.DGgD f.DGgD f.DGgD f.DGgD f.DeD f.D`cDH,DCaD)DCaDUDCaDDCaDyD`cDyDeDyDGgDyD iDDlDUDlD@( $$=='%  ;';6l*;X4+;+y:+9+9+9+96+9X(+8+Q8l*Q86'Q8X(&Q8h&8h&96h&9X(h&y:&;';=<>f % $$AAF8,EMF+@ @@4 ף>@UDlD)DlDH,DlD f.D iD f.DGgD f.DGgD f.DGgD f.DGgD f.DeD f.D`cDH,DCaD)DCaDUDCaDDCaDyD`cDyDeDyDGgDyD iDDlDUDlD@$$==_888% % ;';6l*;X4+;+y:+9+9+9+96+9X(+8+Q8l*Q86'Q8X(&Q8h&8h&96h&9X(h&y:&;';=<@e% % $$AA( FEMF+@UDiD&DiDH)DiD f+D fD f+DGdD f+DGdD f+DGdD f+DGdD f+DbD f+D``DH)DC^D&DC^DUDC^DDC^DyD``DyDbDyDGdDyD fDDiDUDiD@( $$=='%  ;&A:6)A:X4S*A:*9*9*9*9*96*8X(*8S*7)76&7X(/&7%8%86%9X(%9/&A:&A:=<>Zy % $$AAF`TEMF+@@4 ף>@$$==_888% % ;&A:6)A:X4S*A:*9*9*9*9*96*8X(*8S*7)76&7X(/&7%8%86%9X(%9/&A:&A:=<@Yw% % $$AA( FEMF+*@$BByDC^D6@ Documentation<>=>5>>Kt>>>>{>>>>@?>@h?>:"?>+?>3?>D?>??   % T]@ B B] LhDocumentation % FEMF++@ Ld  )??" FEMF+@ ObjInfo VisioDocument4VisioInformation" SummaryInformation( /Visio (TM) Drawing ZQsRT'`م`hn#%8 !fffMMM333Fwͩ}|kݝHxiUPT/|@ CUJ:DT5I[1hXT@. /UbW##_b0zGz? L\&B1r&b%U& !oM $d ) P?;H$,Q, & #&J , 5& ?D#//?M?\.? CA  ~,,,'q/%P6$Y6 (}k?l)?"U   U%A3# o >S@#B:_a_ReUUeUeUeUeUeUePONODN`_ReUUeUeUeUeUUeUeUU/b SR%;5OM%>Qiq;RRRRgg Rqh>Qj /A^F' %p3:|bFpT#| | | vi?=Os<34x,,,/RQmeY q]U@QvovL__q____OO_OOTYA`,X@L&/d2?ɖQ3YҨsUΡ̦xΟ@$"Jʼ& ͥ*@d2A??ϟJ[D! f:45ŧ5ŷ5@ 0 0D$#    Q#b ; Chߠ Y ,00JDNrq(NN㊮NN(NN&&uc7D)KXXFNvvK&KD#KD#-D#NHGDB$KzzDKq%iz4 }1T\,Eu9fdhT,W'0΢Uܮ5E0 fI$[OmOC%ߑE##HZߪ  E,3Y&4JY&5&6<s9FaBaj+h8 8?&!3"DE=T;ܯ?w?@??8&t,'5UR^LY  Y7akKt//BJhuizpsĝa.1DTcAcpvOpM KKuhdX(G:iX IT[EEh.D#E,ah-50zG#zpvb aHGmc/QP K{\Hp_ hd? pA?%?7?I?[;<t5j! OO*FQ///F/K]SEn%cO@OOlE$g\Ey[EO_!_3_E_W_i_{_____VB506,HM.`e^MIa,>PbQaƒ2q? a%oXIoQfdoooSEX_O-OF6EDpE66Oҟm2Hg;pbӏ_ ,X7R[,nu,l3~O?贁Nk?dTfI6SH]?0'^5xZEZEZ@$'n //jRFfuOOo{ o_0@G9.O_eZkW_i_((]іTq?Q1CU/? qOR?q 89|???:ztb#~jb#5O*op?bǓ~Ebۨ&8J\n͏ߏ'9K]oR%&'íǟٟ럴bd.\:sb1CUgyӯ .@Rdvп q(E@Rd-0ޖ4 -?Quo߁ߓߥ#5GYk}N))|* kbjbܖ&8J\n#5GYk}Ϫ??Wtb>?O"O4OFOXOjO|OOO_|sOOO__(_:_L_^_p____a8\0_a=b;b|h_U./o"o4or-b@b 3?bDbgoyoooojmioob@Rdv*T2GYIbkY1 \1΂<&8J\@nj͟ߟ'9K]oT!֯:W3Ҡ!C1C9 w2΂vп*w6]oρϓϥϷ#5GYkU45߬ߤ dZd'9K]o@ /ASewTF#wY3{bq"#w#HZCh(9'oo '9"Ht//(/:/L/^/T>1{/R9/)6Hx///@n|??,?>?P?b????L^`T<Od1m[YIE1 VG.O$/T 6D UUF~@xF4Fzk%>F >A2 OBu D(2OVhz~ Drag thuesapWonodwipe+.cs*Wfuci: oObl-=l)cka!dh-1 H D  # =ih#4>T#3 A5AUF~? ?F\.?P6 Tuv` ??uJ bkrr r.AšJYMJU5 !LK@#I;!@$5 `?CopyrigTt (c])r 20~ 3r uMj ch osb Ifp"a!rd !ap ib n r AUl h(s"e eh v d/`Vj s_SFBcTm!#5N~"06!5' #%0 5K)M6G# G'? *lW btrr&/Lh=L@l>61Uhh7PY!"  *#"JT3FFFr\F BM)(aOAO#"A5N_IQEEFR_Ov[R52O;EBrA RS#")(le @j 7heGoj@8=ook8too q(b5@MCW?0v0v H"SFAr@K\/SqMRB_<NhCFi{z,%)t@@r uGj5q5{#5"C#"mZon+EBTM,"KK2JK\3;%Vq>#  @!2`a!sp s.2`A#"2,%q1BXVqajGDu*5AଚbA"` R"o͒c"4ڑAEDɏ,%A!MJa?)E[4C/G## %(p&"p"!0~Rb  %BevmHY bg|4G5n","X)(S&@Vq2b~߿\.??a߿,h??4D_ Q);M_>m w =_H'+fs k}bk_J?3UF#~Q#Q~MB T]{a@F@WQJe5K@BSnMpy #% 'T+'-4U.A1N%2[UFDfP h>$/T 6D UUF~@xT E=R3]AUF~? ?F\.]?P6  ^bj4u`l?MuXBAE >XzE($*$& *JUF F(??FbXD%M% NT!ajaTajOrk&#)l~02-#5 L@"֒-#}145 ?`?CopyrigTtk(c)k2003kM0c0os0f21r01a0i0n.k Al0 8s2e*0e0v@d0+/`V0s__SF.0hm!#52071tw7 %CK0OEKC9lM3 7?M:$ b$&:%&C?LhML@l> xAUhh EG1Z2G0 *Ra#JZ-$#*/' bM78:-$ P),#@"2an5>k]{a_`.e>n9 YokmQ.eE2_eRrA ZLrRs"78$e q(bU]ISYvv!?$*oeqMRoSTYj3:5ELh^0 #UZ2#4n5tǏЏ $%mxhe{+RTMʔ:2lln2J7~4}1!>#  IPcB`1s0+pB`IQ":5A !GDu:;n5AOaHQB2` RBocB$@~:5RA!;MJkЁ?bG#%C % p&2pB1Lr?b b5zEe)P@% gHn5#5";:278,Ls&@!Rb~߿\.??a߿,h??4D ~&8J\j oHu+`t Χe YHpWFTJ#ԂQR B O%!ba$W@o@_,ToÄ 6KN&@BSqM aUFDfP h$T PYYBUF~@x%^ d%kU3u )W#"  [b{\[dVDrag onut he]pe,nqddsblu x < ;hRp <(e#w i7icUtecn ci).X`28l HDD D# =h <>T$P]]9 AUF~?\.?FM&d2?P-?DT! @AA-u `u bu  @"E1Ef#wu` ?u  blAYB  ##be5֤JUFx@`0 5l&44~&4&'/%@7-)?R$7f#5 L10 l6Ew9M? 7!B/OQ(>WFE"EOFF`Qps-8R?= I@ #S@Q6F@2)f#FQKT5 `?CopyrigTt (c)}P20P3}PMuPc.sPosmPf{RlQroPQa{PimPn.}P AlP sXsRePeJsPvPdP/`VuPs_SbP.Phm!#5`6bks5MRS RW?}:9$ v tN&s1tb zl重\f#2Ǎq`?ofM?iA)UZ&s?9:P?$Uh,ZqZq9 ]dQ2Jw0\P2J!Tf#>A3POG$!E"2)*Mg8mf$f EE%rb-1(1C 7 ( /yTC5af$}% r#x# Eif$ Bߏ @E2 !7U3f$FP\#wBr"2C$eJ̝T䟅ؘ>e2L&9ԍC$?˕W9muv32j55eSnX)WKxq1g heϿ71CTAE3g8:T&@7cb\.P&d2??LDi?-?H+Ľ XEn> _E7MFT'P#ăQ)wB _R]a@;*@T? P+ܟ6KK/bUFDfP h$T PYYBUF~@xV@ `r]W(U"ODrag onut he]pe,nqddsblu x < ;hRp <(e#w i7icUtecn ci).4a}hb\.?Dh?3A. ? HD # =h <>TB$]]9 AUF~?\.?FP-DT! @@-u `u bu  @-"1f#wu` ?ubV bBL A )Z *V'` %!Z;&0"(@&@D"D",0""5S&EJtU?[̾#?9 \a  tN Is1" <#Fx@`o0 5I=644O64z6l72?5D"7=0'?$,#LJG@ $7DD6 "@,&0 F!/FOQ(>%2V("'j_/#"AI`Qps-8R? Y@ Y#@Q ^*$3B֬#!a!';`?CopyrigTt R c 20d`3X`MP`cN`oKsH`fVbGarJ`aa iH`n.X` Al` Nhsbev`eN`vҴ`d`B/`VP`s_Sub`.\`hm> W#5`6`9A\#2qp? vM?AR0j&O RI:`?>Uh8qq9 ]$"D?aDF"`"66JT74F9c4<s3y" b23M+8W74jZ?F@1<`0rr?"sက33!;Ek74 BP(ՅއS"S#7B |D" #~Eq74xCC>  r#[@P@דsrߕ褗m%4?FM&d2އ]#BBwEƅ\_VjՏrg#e 074NCQS8qį<ο߆ܐ#gSduFؔ򔲷 b`H|d 8)wSD"(Br΍q°c ^C;^BIpt  he]GuT?!?!MS!S!.2@;B~BJ%:T͏!aA!&lg0΅tP+!7tR:aЦ85};S0"|O&薧O&B`MH`dP`fL`arrbwTe`dX`STaJ`ee.5<$T$P]]9 AUF~?\.?Fi4F?P-?DT! @AA-u `u bu  @"E1Ef#wu` ?u b.A f8%zb5JUFx@`0 %5l&44!~&4&l'"/%"@7-)?R$7f#5 L10 6Ew9HM? 7!/OQQ(> WFE"OȫFF`Qps-8R?{ I@ #@Q6F@*2Bf#FQKT5 `?CopyrigTt (c)}P20P3}PMuPc.sPosmPf{RlQroPQa{PimPn.}P AlP sXsRePeJsPvPdP/`VuPs_SbP.Phm!#5`%6`5Qks5MRS MRW?}:9$  tNLs1tb zl\f#2q`?ofM?ARUZ&s?@9:P?]UhzAdQ2Jw0\P2JZf$%wBOH "3'Mg83f${ EE+rr$7 2A5Q?'z#xetb na7@swB҉ES숟t)Hh$e2NChY@eM9hz=xە32edtAb9 6};|HF@JuIvBIu?bZ1(1 -?wBR@b-?Q՚J RR C"X"bMB85e yB8geqeݿ791TAE3g8ܓT&@7cb\.h4F??lD??Huý %O=~ IF$T;]#tM<B T=ct@o@T_>P+L9KCAaUFDfP h>$/T 6D UUA@ ?I?43P? ȅH?BT ?2~҉ء  03`PHolow,ar\hedUcn e t.Io-i"s? o i4'#j)u 2)ji e^ %* 8o//fС2~ ` C.E0`H2 N?`2O Aa????/AOU#Drag onut he]pe,nqddsblu x < ;hRp <(e#w i7icUtecn ci).b0&d2[ɿ??xzPQ??R :HD  $=h8>T ]]9 #UBdAU@? ?@0&d2?P-DT!>u `u bu  - &!B@֍u#`l?M^ui"YH8[.A@h`EJ@$e'`"o/%'y-/ $4#5 'L[a/ ;?Q( A_e|*_9r{6u?yl9F`q4? f K #0@Qq6_@"!"2U !BP39@h1MGrCB4#AAG;zC`Vis_SE.cTm!#49577P`?CopyUrPgTtk('P])k20dP3kMPcNPoPoIfVRGQrJPQaVPiHPn%P kAUlP NXsRePeNPvPd%P]Uhz ?Q5a7 J=4*[W3_?r #'&#  M(R4$t6fU5`y7cd"A e5a  d,5#mGb rb#2arEQ7'T6`23IB4eAo\0K|23ICwEz\.Ҍwsb3eICg0u{fHecXsd2dAbPrE9 G4$E6e6 d h'82b)B @|03bV\@JGZG (& #8BoH!eXm`@!(:g@:d aeZ0`TA,2)8KsT d&@AH ,. A] 4gsDx&F4TC\#D{MWEB} tTB}~a܄@B@+9KB;aLTBVUFDfP h>$/T 6D UUF~@x`>!2 ?2] Ol?zg?)?)5GY uy$ Drag onut he]pe,nqddsblu x < ;hRp <(e#w i7icUtecn c]i). inrHD  $=h T,]]R>#B AUFD"H$@F\.? UP6 u`u bu]`u /@&2-Nu#` n?ku|vbU LA@A#"%"A%"P%""MJZV?FQ( B@Fv@F|>?"A &## #///$~9&$#/'< 2C&c3c3"%"`%"c3# -2']Pa2*u1Hߘl~ߐߢߴگ"eCٞ 6멑3Rd&C="21u)û5"ȯ#=/@͟yiqTdg唱X:G' 0U vupqIQ|{  dQlQl5uFFKT\`;ǢeD՗~lrQHWS5 a,n/ 7⍁266#h6#)#H63,;7û7ѷLַL`}V''?9e?GB<.7B7?[736 ɡɳŖ //./@/FU'bZ d? 5b T 6(y|2V:q&@r1VO1yDgmb\.⿸?f'D?hHKM!4H'0 zO1 CW2F|TKݱ#}M}MB tR=NaTW@o@ߔToSP+:K W=aUFDfP h>$/T 6D UUF~@x`>!2 ?2D 6V?- /= σX P |Yf$?Drag onut he]pe,nqddsblu x < ;hRp <(e#w i7icUtecn c]i). inrHD  $=h T,]]R>#B AUFz^?FVj?F\.??F]?P6 u`u bu.]`u @&h2-Nu#` ?kuvbU eLA @A# "%"@A%"%""MJx?FBP(@F@FQ( B?o&"x&#&#&~'" A  C&3333 3  "//??,?>?9&$#/'v7M&32%"C3 , ??OB4U5 @'F~?FJ&Wd2EE"lr)2?Q BrAFDl@(VFLDbV# j_PYB""R"ԒzCQT5 -`Vis_SE.cTm!#49515`(`?Copyr`}gTt (%`])V`20b`3V`M`cL`o`oIfTbEarH`aaT`iF`n#` V`AUl` Lhsbe`eL`v`d#`I6zDMLLy5)be aB7zC6R W?J%u\zCIvLxI{?PKAj#zC0zG_z?=@#g=zC]SErM5W3a0elhqUhWQ==aCUaJvFq$O RPCa[ qr(~" âah~ze. U9d[j$VeN/eyAj!~(R7MnHzC88`Ȃ Mv;e )a5r!<Ǿ?;R4!vR#:Z?R 5&@KE\cSɒ Zv3^ӯKӑ'v@T@U32%"%"2Ff`0 5_s :WQr?U@TίH#OCGeqjXv+D1,EXF7PwcuJFπ\>#HiuXS*JR0BTf{@4#C2*u8?3XKnygϟcu3M2FzC/GA>V4+5!"C3iȄǁ@qegXzGN'0UBIvEq{ Nb d̈WQG!50A7bTDqLV"v rҪ;Zl3ª$ NrHlSÖ a, ́@B7F,FW#=W#yKEW#?3AKK77Ƿ7HyrW3]',??HWt[FTWݱ#UYB DReZaąW@o@To\P+$#@L'} V6lX-1u. Bj2u2Z2j2#u9r#ULH/MB#AD5 60`Vis_SE.cTm!#20AD%`;Copy<0igTt ?D1f@M)@c<0o+@ofdBUArX@Aad@iV@n3@ f@Al@ \HsBe*+@e<0v@d3@J@=#x# A G{?9#n"E&0444 M70#AHB 53_lj#PSV6U8l>(UhnE qJ$&9"(Fn_g5Fe#pheo'T !! Jcxo)vR2'"U75a%O3W_74b5-6R `F2 5au\@|Q:0b)`R@As)@E T@xd@Di ei=G]U6Tg'2"qV!DHAn 6SWaHw* O`EW )F T-d#|Ue7B tEHf]c"o@$TPU !"t4u+P@/]2#@ DSk}C-@27 "AU !"#t4u+P@/]2#@ S~k}C-T@7 "A"%t4u+P@/]2#@ T^Bk A>-L@7AU!"'()*t4u+P@/]2#@ S6l}C-@M7 "A"+t4u+P@/]2#@ ^Bl A>-̂@7A"-t4u+P@/]2#@ ^Bl A>-Ԃ@7AU"./0t4u+P@/]2C#@ lTCmC-^BUT7 AU"/01t4u+P@/]2C#@ TmC-^BU7 A23t4u+P@/]2#@ _Bn AJ-3!7 @yQ4kJR@4zQkJR@lzQkIR@zQOlJR@zQlIR@{QlIR@L{Q^mOR@{QmOR@{Q+nDRH<(H<(H<(H<(H<(H<(H<(H<(H<( E,|QCo REd|QPo RE|Q]o RE|Qjo RE }Qwo RED}Qo RE|}Qo RE}Qo RE}Qo R_`(,T $~QeݦSWF "?B!T'/"\T/S4T:STZCt T1KS T]WSTTc ٸj/@yQonwPD?{Qo5 VF& ?jZ@f?l6@g( "`*^p?( 4 [P #5GYk} C:\Progam FilesMcsftOfeVso1"\"03,\AR4OWS_j.S<[P7"4FXj| D C:\Progam FilesMcsftOfeVso1"\"03,\BAKGR_j.SF[P"4FXj|D C:\Progam FilesMcsftOfeVso1"\"03,\BASL _.S6[P"4FXj|D C:\Progam FilesMcsfUtOfeuVso1"\"03,\}B RDE6_.SFն(*QqUC!Dr+/rr> rCs/dGra@YU$` ,?jZ@fl6@ LFDNTyB@ uh^T  UFu+P@F/]2#@FxP%ePtR/e-bYr _qr!u51CUyFRwRaPbvDDee!111 !!u!`1!.1$1!\!f!z!p!1XAUda!!!1"B11cA!1R.3UH5  !!ꈬ!!u!!`1e!!.1.1$1$1B1B1ʁʁꈄ!!\!\!f!f!z!z!p!p!11XAXAꈦ_eaaꈲ!!!!!!1111cAcEցց1څ1a!!!2F!2ʁ&141 }!Q5!D/E )!0_mj ^5E4u}4=?@k!@@9?@%D"ב??9Jգ8aAKBoB\!a ʁzAp#r@3PB+jQG3Qt)~ՆLa#7i!lm?9ݿs |!bbbiz@_bbbm3U0O贁Nk?FPcei]&d(j ]hXDjf '2q2''U fjBjgXok}mkxA{o+S^211B2?Q`1 /}]ցց2ʁVc%ShruPi`yPI>Pcd`n` Tw`agqs`!b`e Pv`d-0La.1\/n//}]11BaQY8c_ED\xAlj벣RP8^G@xaS5:FH3EDO^N wGj 3NO3OqÄRဳadS5|?P8O!OS5EQBudOd_v_RAUVE[^_VaUPogQU-o}\VA-PVEN`r >W @ ' ss"4FXVVy á#r iՙwuR(&$1CU bbbȂ!3EWi"? Q ?2?D?///A/S/M?/+L+/R0p"gaU 1d a L0g?Z?l?~5VE?? uVA????OO*OoNOvρM~OOO __1_C[UAܯ_?8AEOOoOO@_[k/_9bXd]Pn]bR__a/7ϯGOX28yOOqQ1__o1ofVoGﵾ4oߺbې{ߍ؏|-}ouӘ11?I01sT01t2c2R0Wqur2?0//*/?)Fœr $seSsbB내iE,Š@ğ֟ (#Z0O贁wNk?Fad2?!,>Pbtj./9k/?9&C?JL^p!6?H?Z?ůרsxCoc d0evla!Ci.B wtp'Ap\@r@_Ai:HuTBofBty0 !???`r)Ϫ)q 2DΑz_ƿ^ o_'[_4egEWmoFe"+hP -FVQZU -?Qcu &w@@:@@h4 q *<N`r//&/8/J/\/n//////W/E"?OÿOj?|???ͿO?=E2NA\OEIO1CUOOZY__cVQ/_A_S_e_w___Yo_Z]o%o7ofmooooj uo~rG4ie!xy u$vXu rw FFCcuաB3U@|~3zzEq@@S??@`_0 ?Ya4CUX`m`v`v5# avA徟Йm@p1?@#H$f%o%4$ܑ!"4b?bbOds$?6?H?_qwўՃ tmlZ]ZxIel(kO$A_??$4K]߫0QOpG`boseN>oNoPo$g}Nr@5 !b]Des0Scty0Frm0ne o0mk*a0drip?0ќү,ځ| 0څg| ! 3Om+I,>ߧrJOdg5i@@R?@p8?˔D^Փ|YES YB(s,+J+e$/6)X-YCc gR P0H#y0ONk?RFL&d2?N'Aڅ)Ry$$//,bbb8F+AN`ȑBޏjX8_Dqk0H3{q10_T_V?h?z?6ϯ?8G|{I062n peSp ud%tarcrs%rwrhiT0qc%ltec.p!q$6j_|\ Vƣ__11?O_*O߲___:L$Aij|%iO e&N#,dv%a?9u{&1ᅡ&4&&].~mXaXa"/;1PσtφϘϪϼw_(_ o^_ߦ߸)ooPMo$46>IaUcQd_t`R_pSrrCos_dcoooR%bi11TfxSx6'įUU#1S/2q///3%,Wˡ)// >lkU75?@Nt77I;X>S$j?BB2vvL3aka3??GSA _OqOKO$ȯOOOObbb__Y6_H_Z_l_~____M;_)q o_]Vohozooxov$usc%plR/pap6q nUps3t po4qcu'pipy f%ru: 0~6V1Ց1ݟ%7e bt!  2ڲ_ 0/Http/y//(@%/KNpV1/1:?^pʾ@@D{~怴?@<?@gEpE$!50$H·&&BeÉϛϭϿ+=Oas߅ߗߩ߻oKooon GYzdSF ebiwiprihglwcj|&8Q5Vh5Q=?ͣiFnIiNj]ğg +`%:?L?tH,HP-%iL?/@/?=rFWi11/<W1/?3?Q/S5QGQQqaaQaaa[Fࡁ5CI(!8?@@k!@@ńqD?pEnKQu0{`uF`AWAR$v"Z[?4=l)RpU`Dw@z3Q">DVpvėփߨ?1R2EaOT1 UAaeLB .B1#ZZ҇7XWj j4fUR tN,QzsV #CKI2r-b?@I*#!J Q!UdF BP(Ԫ?PCQK 8& =g^P?p}#NuvbQ R/)s/j33gгg׻1dM@?tQqS/ y/Y@@]"?@Vj?׷ŧ?Pjʗ翎 6c+.%!p&Џ%7 #axdw<OCCQ'C"U0˟ݚ[DOf=g$Bx_GS _d?y A#!3EWi{ X?,pUmTfl/Z9$RB/6d$Ym/G[G/̈́S?OA?S?/w??????Փ@%A??XI%A-A&OrFOjO|OOOOOOF@FH!h??@MIRS0_뵿4G F`AY WIJ_SĿ^Cpšπ_o#orSӄ\Ifoooo"qš'9{FwJ\nxFbw e?;jR8%A/,c%l/ m/e#[-j|ğ֟ "r:Lrzvԩ˯ݯp%@@FzEq@Fue]Y?@2_F??PrܼvJ~ӗ?F@qx @@U &' //mS%Q_&K/^/L^p5fS&&&ӄ?o$6Hm^ s9w߉ߛ߭Q+=@Oa艹突26突A`0 ?@uvFKt?@/T@ ҅*6R_*6JT@cA^_KV33OO$6HZlpb qc4q>(:L^p,Fy@@8g?@ BP(?tu?Pxt&wp+.{ @@|~3zp2]#q%^t/#^ppq///A%$B?2~d_?q???oіq????? OO-O?OQOuOOOO@ovO o_'a?@J5M:x<?@lZ_wBv_ko7)o;o_oqooooo@koo?ykq$|?ٔ%Uwg}q ǘЪqپy.S?@~ZAo@@ `?'@`453 (ĀqYYup`э?jSYcuHm TL|ww 寽SwRci]pc@y(L!]kv}[*!~L o/Lu-SUY|SޠiPSyX'2ǥqvߖ!ؔT{qPu ŒqZl~ߐߢ@F?@(Ia@@C"H$?@)JR0#ʓ%BT]o&*<+&??L%'O9OIMdvO?O?"OOFO NO%7I[m-_oQ/uZ?l?~?+[zLpzEq@@P:@+s u wGz&'.@@e1Q=d3+?  v21P+~Q߭Kʟܟa);M_qo˯ݯ W u&uuQ`0 ?@v{uN?t?@Ք vܽv ^2ԖsRϠvψπϾT/π&*¿e#Y?@!qha?@ *$ϴe5]/M5mU$nL./)&>/ASew{2ђߤ ߅A l-:ty1AHmxROKN @FC<]}@@* BFDMD&u`u`A)Ru`um8U &Qw@@dg5i@FN #A@EV_@_mEV__^\AA%8bBBh>f8bT^g1(ճ}B`13Afmbfƒk5wfmi ;BP(?@t:2rqǟIp?tїu)?1j&ƕ:\FH#ճ0u.sFL2w?nmphy?G?6X%"/3}#q 2ƕ_ްv(U:U U!"#&234t4u+P@/]2C#@ ht1C-dBU7 A@TORH<(ET0 R\Ttn9Tc@?T.PDlT=.PU1( UO"D&aUAUNj )h"T} U+U- |ɉ B- -H*=(Xi{(E//,/feArial UncodeMiS6?/?`4 R$fSymbol$67fWingds*7 feArial"*Cx /@~4 R$fSwimunt(S$fPMingLU(w$fMS PGothicj@ $fDotum"|i0@ S$fESylaen  $fEstrangeloU dsaC 9$fEVrind1a8MR$fEShrutqi| R8fEM_angl$fETunga<"@$fGSendya*/ (   R$fERavi"$fGDhenu"*/ (  R$fELath#  R$fEGautmi 8$fECordia NewE R$fGMS Farsi*/ (  R$fGulim"|i0@ S$feTimes NwRoan*Ax @D$\BT}EBBT°.BLCT%BCT8BUC-oBU7 A%t4 oB_ A-t@7AJ@$WOR@$W6RH<(H<(JE4%W\ REl%Wi R{ * g"4FX?, ,e(@(hE#Ao@(Tv:hn#y W LQB$[QX P \|&WpU.6<<Ts C^B}o@yQpVR$TXq!ݧTx)Ttb'|oh1 "WҮ#WXP2$W;T?1 _.*'"D 1 vH%a! Olly BakerMicrosoft Visio@a՜.+,D՜.+, `ht  SAVVIS'  Page-1VProcess DecisionS Fancy arrowFlexi-arrow 3E45 degree singleNHollow connect 1NDocumentSummaryInformation8 1TableԼSummaryInformation(DocumentSummaryInformation8H Hollow connect 2NHollow connect 3NDynamic connectorN PagesMasters (`ht_PID_LINKBASE_VPID_ALTERNATENAMESAOh+'0( <H h t  <Information Security Incident Management Policy TemplateQ?G䆦9v~[W `~v H7( x¦i9p ! (wǶ688 a5Fʩ2l̗zTʃf Ϣ= @ ̚?8ped̰յΒd]n9t+jؿ4_?_ ?9b,:9 - T>x2cCѺ7Ie72bQN#wPSrʏ/9տXʏ&ͧ4d8qnQ0N6XSBa- Ś t{ǜXK;~^{ kE{/.AO^w"َKc-5%H7ǚ(y~ rZ#<-߉?l(Onʚ2nݙ/:7ג3Ʊ=z[[ג .C90BD6xfz\zT`U/UvDTX },Mo703Ь L6fu}7:rؚk-IBؿV)@) ϢϾWBS9]W{mLXC971=${ЯP 孻.`^;BAn?uuUe! d85Mik?stӊb"n^7ɯ?"ӯ}T0ܘgOϸI99!^b$\-=.Im8!t*3B[ңpɊG$+糵.%L`rX;=q3ƊYL:Y$3-׊s"y;4U.H.pmБyhӧA13ண#^udǗloCH9p5:{t3G[6 ,OjZB(%ѩk&"\c<5- v*o̯깯b(s<]wB:e|Cb,LM#!wa_ڕ?}Wp -ӷgpP`TɯKN+ v*XO X˾]p=?$/h^vƽr*9y~k4@N">%'ք䃬@)y0 JyCcoy>هy)s5 EQ;^7d1]s(sGfOCa8xnC`':}sy ml?9]A$@y{=9y1׌]a;̰À1e)D9(p\lp1g3lKcg3;‚a;mIGXmG pg3ˁh0;ƾT}&ْXzzKPn81Ώhg2dw;=kə鏏]pӢ+3acX :f^hcهg~;w1,@ڍil_c/a 0}n;Z[7_Π]ETt.b^R@ʻE?|~tҘ.e[NXcUƤ}ȽLtSr;i`-_NQ(ouuu1<8yJ,瞞\+l8C8_sgN3 Igg&g,/"'~K>ڗ o'~""ЁwL.N<[Ch5KDzMc!рrF"վF?)Nr%0DuLKSوv}?e#4qtƩx4 2s=Fy{ e<pXH-rܖ{Ҳj%|[18?=KI$f hs{q6q7_c]7@O&3Nɟ{lbOM-,;#wC֞$زc `f"SG(g'Sa^g t-d~`':qPc{ƻow EwbAr0.a@o 5_959l"n &³-~kpjCހ>;Cٞ4j ҟ{ҲjÓPn=i,b'ko XtFCx=r obd,BGó[ J/8O ȻXʏ&yÉw$mͿ->}: ւG&D,ǚ+x &N)c&D`MYԧ'¼9{~607qPgƻypu]kV.CZRlʀaF(Kp#kwX5[[rqmc=3m 3=1mZ/ш@5YR,:-*c 2f2Ʊw;dLԖЯ=[wݷ-NFG[w;籍(vm 6myΫkwI7 vwX '`gUWϼI穂w-y֯,-hWN_PюJSgP¶bZx:%+mr=} x^M(; =vtÍ| I }hd[1cD-節I d" " Ad{gϹOtD\%޶5Y.u,k^p3šgqt`[{b~fDS`KNŤw%0ʢf>k-%%Z6 &+i~, rq|<}&d}d}#d=.gAed+>d=4}X~ݗvKj-91cmUٖr\}g.K;a1ؗ_QYryg9γ"3.X?*VJ)vC|-sMUnQqxOrE6|r`g쫒/u- +;1F $^ô5>9P9}D\%ܾQ6=h^Ӵu)ߦi7W DZS3}_ (0ݪΓ u },IЮ},Ĕ-GڈEo 2E}dO.S\|Yybc;ro(ЋV Ϯ0.Cf^NlvC ia`M"A*Ƕ%ث,,_$rUkԦ&i+m<|p A]H]3Q/xKYnE5X'|؏>zv#6I~ˁR@ʬE}zڑspLnnafoHީⓂR zx4N4u薾کkWd ~5ÿEF~̿_?< 슏< 5&ťѣkfK~!_*| .X>Zěgp] *p4]řhp N{g"o_ 7JduB0 =6M9C)yǿ8>x}o}voqjrҍ;D[(w%#~7 u:Y*r .g0sa@^ ($&PuƵwL⊸ qy*Ƕ$ƙ*&1nc *1Zfś᪘ꀾ+ e0dnHS6)Mog(G?39Qr# ^Nw*SD2r>q /uu3/6@/KBGN.? Ӕn"үH~:O>2'O{gݿ :UU[~U"? ȍqb=}Lw׾tzDŽc+joceҴ?5|5柡܀lg`HvL57; #sw*g4ƓAx2?e+ ]}&g(; ر~?qP[N;_ ) k $0 !y` %p2و{`KSD6g98:v"oopM-^bapє5~&;_#7 uE؂qsz?Lo{^_|p-.v8 TR˳QR41lUY3yT;U}(wgwǭO\H3êlKz9ӗ~lRK*>pľTo\fZ|&@쎎4 lc WH=,/ "<%/ Hېu9W/y*񇿒\g($IS@/ %066MpyHH'+[ I|i|+NljbnzL\L?5:O6Qid<Nɗ;\LN D{v[(#;䄿2;@^R++f)㟵^&9*?5]M?zDs52=~\/v;rdO~A>#ݮC/3 N?l2[ص<اD&^\9H J{YPp# PN΋jovT9Pr[ ?]Ӟ:"H5~JDE)>)q-$!y o`}??Zlh뜨?_X̉n S:' 889?8z_ϸR :a._ 'ug+o*kON׊].#~rn.r@r ~^v5/o>|&^(ԏtzG0#n~ԮiG CCmζ;/r=:N<ߚflLZ}V{ U:C~P^J)~~z.mgakw%~'w-+M9>ޡ~2swe0mmn; ,MAx\o濔:G;W>C>!yc8o`d%ߣ>|  - JS D6g\0 w\dǼ tJVO횦(.C`yO(')SYX|?I~`ދa^>pʆrS8ekӮ*!>FyB9 _Adڗ>}(q\8rlxq'ǫ9g`ƹZ:]0^X>wqZzf|[(__^ߞ[d8ែ] Dɂdv#y@n\qD%S֢c ϸ2 5HyZUXs,C=lI7w~P93?sNHw Jb@6W_l3d3]t/U'#,y(c#cLϖ#ȱ g14rܼ29ΌWO=NU[e8^35JӞm^,E'qw2}}@>0 mF"8~N)ESZoVum=[{oY/ R`|d#+̧Fe~|QEM3@oW5]~~:mV[Z܈Pǩ Erǩ<3ۺ Jgjv׆{Zo~cꧥ֦nHe]['Vrs8zK3ao(TG;k33*^_B5?<kuo(twGN%  kׂN6<ԝN|Ȳ^2AN#Ye>Qhʚ}c&~w{6]]iUAcS0[d^kBP~oٶp"%>6e1P?o[)ROT?_kBȵ,Z{_ *OrW=*yi#PG|,L+2m¯ v&>:qv< @zH4W3 ڌ<(/deO2^iwҩs1Nץ覎 yc=I;YKB)[q-x\[/y6Iě+0x^0]{KιZrw[--#5t1SaJs tc̴@cgf8V~5OڪƖv7f9k|ds/ 3#DZȟms:dAWȬyvCì,|l&w<I_ߩY*g&p PN٭ǎ]V%.*L9H V%a_Yڣcbū Un+Ra^.):*:GU\U4d&Ӽ\UI1]}F+`Λ!{ob=k(Hą+JNr)ów) e0'q/umkw u:uh_!;BR39E.N?SG܅'t{] |`#~=PܘNl wLz a czM8y4!r0aшN?02cXMrlts<4zި{=:}o {f30fLO_:ɾ _N/G_Rf,:\',L'% 3gJߵCo٩;O|d-/+z|QVcrؾX ,vscv˲]^|ql+햕[gv;}hc `|}Ϗhau뜩?63*wӮYni Iԫ:(1`~н}=3\pǧ ;ዙd)G%pzɼ{oF Evguܵ܆~Űum kNmLjj[^ 2oPmi۟^aؾ,kFf0kk2 ?קZ7X^$ mVH>=o]*c08܎{ 3ӑth;U[v2O뾟Q)ID]|{wщx$}]4QI{%?gC v{;o{WHqVr2 !],U+%?[,#9#v-# xL0DŞ!B_%~ ϘviS_L}N ~);Ng7˱:5[ʶ;#Ӷ#V6aML/|;  G&Ӷ#Ӷc>t,Gf=x]vlm;X)(K@ێ2=8x"fk̗zT`U/dp{lZ.ڐi痱Z@f*Gn{/r ,{2kf[' +.p$8#6Qw~cRn)< _j#Zl~:g?g0Tn*_+}HjҜ|C5USmC6M [mbX|L'xfo}¶2Q/Ѷc9>v>m;ܵcv a,| նm0[d 㭜qmis*z t`sj&䚵~^fuu%׀(+m Y/Q>ʘt83ӑtF s5`S[BFaco{.FFbuhǶ G~ڭeWskA3%I1H~K2k.3~1.ص@suKN"X=se|ჂRk;/f`lѥgiLqyx=jmGcC؁e ]Y LnPo <HX$`i :Hv\@fgfv.2J ?̀õ0ɋ0ß]!|p/X "u#\{%OzD}ԯe^%y2-+Ko)ek"/Ybı}l}$l~QVܬG gJcY͸kP'GB<7俸4(S qޅu+kMOPtA-k]OdI'~o$9>k' %hp^O8_K@@YL0qıJSe,"{ 9~2Ӕc8_cK=p]Ҕomg[6o|$O4yb7\/n;(ǜRȬhK~|d20x^w!Ӗ>]W,lg;?)O:XD`{/#(Sa$'g>%sOy1}rGoՙ8z^}qbN~WS!?5՜CTbdv.vZ JE|y pK5>k>ͶRV@|qVOٍPoq!XC(#~]k/J C^2Ug:u"?u}MY.z o oE?jĜiI{_{WVU G$d 9#{KT2Cf9$#vrD--RͿA4!rB3s,h0}s4@>쇗w{o[gn q@ew5\UKЈe #ysC͔Gs 9_緲qMWu~{'e78O w~et{}BNF0>ZM{wZ͢MZjs%'\Oo0fQ=2S+3%}Eã-¿sgoX<#~yx"_Mj kU_V:uW }+GQ|Io6^~k\5 Dpot^F zȷ-P q~ЊvcV{$fitF7e-ie^/"pZ${}uGPo u4hQ(3:<|W&+u>G畗[`'Hns]r49༟ӹolKaO濆5$eOpT!5/c~t`릕KW< ]!㸦 Gz8qMf9&Lxsx|t\|#/;v,T~UcJkX' X' kXG]b<2 Ύa"C9H67WLs/øa`](qGQCTc/7*~ ՠo骱oUƾY>dc|e9&RطsKٷ2-zpzHÐm!sBVV' B !C, e)2&|ٷGo/|!Nmb髪61L9g(W;hŷٞ!?W oa{OeݝMEH&Y L6qfJբKv %Q r9*"# DMLIQI۩&4j]-Ǭ?DioSwm^1Wݷ~Οf翩OYWnۺj7fڰ]ofh{jx&|b/^=˹zL{<=g>C ~}'&̮bBn L"qD-czL{< r=_JYW_eF@g+o;=}7;v4GT qz$p3{\_'zo-w\3^%/zϮ4P9 VDzFtlFgdL䜦)e15-I!YBVw$ICv9~֛b!Ky'?y}PIdgaLI3@-Ey+9rMp(-==֘m! >70Oհ=O:L9yoz7s?[|[h @t)oKM@*^ƙ6ƃ@C7ƈw1uQӀ3E> HeL^U^I7bJ"I tRgmu(VRmwgfjmIZ%oFp njF:f[ʂr)i;L9"jQۡ?ǮV5sjs̆!eN]W=w\G/ V?r/|K#\Kw h>omϓ>NTx|@q7[^qW,gy_I2+ep_&8r(Q?ݙї+~EG? .ر'ڀ|G4[ k.tύIC7Ƚ?Kp9}KOgf|D֧NdZe!{2gw {BpW wS;zO&"2"H{I*8i0-u`\(@ktzR ic"\2uH+%F ٪N%mm Ydp'Rg-|c7 VX<(67E ԍ (LQ`uÑnA\qۚ7 !%'ltڻt rd<7(w_[Fu|ڬuOLѳ6Sy9天D|v:*ʓ~쳥Ԩ1=<e:K1m@Oy<:93qb tm;><..|<qr1~|}8e:Cn_,Ը}򺺿#OhoJ;l{r P_Y,#?lѨiHu4r'0~VFʺ6sa7E1ABbṰ-Rf9^C!bJ'#tV)g}]MPw7a(ӧ1GqУ`C&mdi˳(@2YKF Vt]j 6]RcH<-Hq/l;ޢD,}Οs:xKu}xsԇm"e  {v)kL, <5 1@oߝu'kLX5N֘܋5 ɸ`S?Eu_tFXQbz tS S9g6V]?sc?0sjhD2d7=N\^N9""UGfk=cWMWcd$~Y%>@[y{`Jctyu69#sqએd8߻WE~O(|myjs¦ÆWM&1|;k?-M?5Hdh|ӦsH3ԢaӚ&[ m,yw͇M Mם\<29޹M>9w wh>wIޢ~Ѽ)-p!r}eݵMOG4u^X;7m_' 9"ԗҶ}&9 퓳w 4A&~)OOo~T?ڢk&%"AOw[ϻ5g:koCu~߬s.]efg @Syr.¸)Ü\7Ecp܄\͹ 4˹J¼sV:E}P/*K+742V<̲֥a~o.$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l40    8,555$ 5p5T554alf4yt5A$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l4  3f0    8+,555$ 5p5T554alf4p 3fyt5kdu$$Ifl4    ִ  t"|)818$ pT  3f0    8    4 lalf4p 3fyt5A$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l4  3f0    8+,555$ 5p5T554alf4p 3fyt5kdy$$Ifl4    ִ  t"|)818$ pT  3f0    8    4 lalf4p 3fyt56$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l  0    8,555$ 5p5T554alp yt5kd:|$$Ifl    ִ  t"|)818$ pT  0    8    4 lalp yt5A$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l4  0    8+,555$ 5p5T554alf4p yt5kd]$$Ifl4    ִ  t"|)818$ pT  0    8    4 lalf4p yt5;$$Ifl!vh555$ 5p5T555#v#v#v$ #vp#vT#v#v:V l4  0    8+555$ 5p5T554alf4p yt5kd$$Ifl4    ִ  t"|)818 $ pT  0    8    4 lalf4p yt5c$$If!vh5[5\#v[#v\:V l t65[5\yt=P^$$If!vh5[5\#v[#v\:V l t65[5\ytXf#PolicyOlly Baker - Aperia IT Security Policy Template.dot Olly Baker2Microsoft Office Word@F#@F$|P@P@P  IH՜.+,D՜.+,|8 hp  Aperia Government Services+T 9Information Security Incident Management Policy Template Title 8@ _PID_HLINKSA4~ _Toc2173746674~ _Toc2173746664~ _Toc2173746654z~ _Toc2173746644t~ _Toc2173746634n~ _Toc2173746624h~ _Toc2173746614b~ _Toc2173746604\~ _Toc2173746594V~ _Toc2173746584P~ _Toc2173746574J~ _Toc2173746564D~ _Toc2173746554>~ _Toc21737465448~ _Toc21737465342~ _Toc2173746524,~ _Toc2173746514&~ _Toc2173746504 ~ _Toc2173746494~ _Toc2173746484~ _Toc2173746474~ _Toc2173746464~ _Toc2173746454~ _Toc217374644   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q      !"#$%&'()*+,-.^5 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH L`L Normal ^CJOJQJ_HmH sH tH T@"T mz Heading 1$ & F@&5B*\^JaJphF@F oD Heading 2  & F@&CJ\]aJD@D 59 Heading 3  & F@& CJ\aJLL  Heading 4  & F@&5B*\aJphVV  Heading 5  & F@&56B* CJ\]aJphFF  Heading 6  & F@&5CJ\aJHaH  Heading 7  & F@&CJOJQJaJ<a<  Heading 8  & F@&]8 a8  Heading 9 & F@&DA`D Default Paragraph FontVi@V 0 Table Normal :V 44 la (k ( 0No List @@  Balloon Text CJ^JaJF@F Header$ (#^a$^JaJ@ @@ Footer %AB^CJ:)!:  Page Number CJOJQJ`@`pTOC 1$ h$^a$B*\^JaJmHnHphuL@L pTOC 2 $^` B*aJphRU@QR0 Hyperlink'>*B*CJOJQJmHnHphsH u.@. pTOC 3 ^RR Section Heading  & F@& B*CJphH>H Title$ & F@& a$5CJ KH\aJ 22 Bullet  & Fm$66 Numbered  & Fm$FVF FollowedHyperlink >*B* ph&& TOC 444 TOC 5$^a$.. TOC 6 ^.. TOC 7 ^.. TOC 8 ^.. TOC 9 !^BC"B Body Text Indent"$a$RR2R Body Text Indent 2#$a$ B*]ph:B: Style1$& #$./FBRF  Body Text%$^a$ B*phJSbJ Body Text Indent 3& B*phl1rl Style Heading 3 + Black Left'$a$B*^JaJphDP@D  Body Text 2($^a$aJll Style Header + 12 pt Bold Left)$ 9a$5\`;`  List Number 3$*$ ^`a$aJtH jj  Table Grid7:V+0+B'B RE0Comment ReferenceCJaJ88 .RE0 Comment Text-CJBB -RE0Comment Text CharOJQJ@j@ 0RE0Comment Subject/5\FF /RE0Comment Subject Char5\dOd fTable Text Small1<<1$^CJaJmH sH tH :": 3c0 Footnote Text2CJP1P 2c0Footnote Text CharOJQJmH sH tH @&A@ c0Footnote ReferenceH*PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] 7v~V7v~)KV< LL<  'uFLwV\$:+}.37=EOTA]^^0:NQRSTUVWXYZ[\]^_`bcegmoqrtvy{!j+ 9    " ~  u % !&()A* +q.2_6n?E\O)SSUTU$X\{]^^123456789;<=>?@ABCDEFGHIJKLMOPadfhijklnpsuwxz|}~&>?_s %'(*JXtvwy"$%'G\xz{} &()+KZvxy{@\^_a/ K M N P p + G I J L l J f i j l  1 M P Q S s  . 1 2 4 T x &''V X%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕX%ĕ̕:dkmr~!t    ,R$A!D@0:!@ (  VB  C D"?D(  t  3 S"?   s *X)?3"?   s *X)?3"?   s *X)?3"? B S  ? V}'0t/St>+t/Ot z%zu2 _Toc151889812 _Toc151889833 _Toc160615973 _Toc160616200 _Toc160616367 _Hlt190759227 _Toc217374644 _Toc217374645 _Toc160615977 _Toc160616204 _Toc160616371 _Toc161078638 _Toc190759235 _Toc217374646 _Toc190759236 _Toc217374647 _Toc217374648 _Toc217374649 _Toc217374650 _Toc217374651 _Toc217374652 _Toc217374653 _Toc217374654 _Toc217374655 _Toc217374656 _Toc190759237 _Toc217374657 _Toc217374658 _Toc189383656 _Toc205370199 _Toc217374659 _Toc189383657 _Toc205370200 _Toc217374660 _Toc205370201 _Toc217374661 _Toc189383658 _Toc205370202 _Toc217374662 _Toc189383661 _Toc205370203 _Toc217374663 _Toc189383659 _Toc205370204 _Toc217374664 _Toc189383660 _Toc205370205 _Toc217374665 _Toc217374666 _Toc217374667 llllnnTzD" #@%s&'V,W,,&.&.&.555o7o7===@@@BBB[H[H[H)KJKV@ 1 !"#$%&'()*+,-./0##&&& rrrrrsY"W"*#L%&S',,K.].].-5?5?577===@@@BBBHHHHK\K]KV<P<O<L<M<P 12B.NOV12B1NOV9*urn:schemas-microsoft-com:office:smarttagsplace>*urn:schemas-microsoft-com:office:smarttags PersonName ȱ)\c##LOVOsO}O4S@STTTTTTTTTUUUUUV!!+"."t$v$$$TTTTTTTTTUUUUUV3333& ~#~#\$s$$$$$>%>%&'**++t++1,H,T,T,b,d,003333993K6KTTTTTTTTTTUUUU3UAUCUNURUUU[UeUiUyU{U}UUUUUUUVVV&^_IJFGJKo p k l   r s S T ~#~#\$s$$$$$>%>%&'**++t++1,H,T,T,b,d,003333993K6K!TTTTTTTTTTTUUU3UAUCUNURUUUUV+dQ俒 7|?A &R9 xm, |=Z_rmYb92V GqD/V>5^h|k!WK$A:&h.;5A&ײ<+LDrh6+œ$Mi,<]pC1b82&X+3ld3f"Z+8%  ^?:kzE;v%$6n>4 2fQBaDډ@*SrV#xV:oWbZrF`Ȧ?\shMUs$}?ls~&{\v ]6wn**||'bl~h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH8^`B*OJQJo(ph:uhH8^`B*OJQJo(ph:uhH8pp^p`B*OJQJo(ph:uhH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(hh^h`CJOJQJo(888^8`CJOJQJo(^`CJOJQJo(  ^ `CJOJQJo(  ^ `CJOJQJo(xx^x`CJOJQJo(HH^H`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`OJQJo(hH ^`hH. pp^p`hH. @ @ ^@ `hH. ^`hH. ^`hH. ^`hH. ^`hH. PP^P`hH.0^`0o(0^`0o(.0^`0o(..88^8`o(... 88^8`o( .... ^`o( ..... ^`o( ...... `^``o(....... 00^0`o(........h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h88^8`OJQJo(hH^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh8^8`OJQJo(hHh^`OJQJ^Jo(hHoh ^ `OJQJo(hHh ^ `OJQJo(hHhx^x`OJQJ^Jo(hHohH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH P^`PhH @^@`hH. 0^`0hH.. `^``hH... ^`hH .... ^`hH ..... ^`hH ......  `^``hH.......  0^0`hH........h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHpp^p`B*OJQJo(ph   ^ `OJQJo(o   ^ `OJQJo( xx^x`OJQJo( HH^H`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`.hhhhhhhhh 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHop^p`OJQJo(hH@ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*o(ph:uhH. ^`hH. L^`LhH. pp^p`hH. @ @ ^@ `hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo( 0^`0o(hH. 0^`0o(hH.. 0^`0o(hH... 0^`0o(hH.... 88^8`o(hH ..... 88^8`o(hH ...... `^``o(hH.......  `^``o(hH........  ^`o(hH.........h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH+A:&s6>_D~>n>lszE;+3^<+05A&*S|k!F`6wm, Z+8|pC1dQoWqD^?:?\sh?A x=$6<{\vl~mYZMi,V G#xV82/VfQB9 V76+d3K$@y ++                                    l3F                                                     DK        ,f6:5DFpz'f                                                               DK                          DK                 W        DK                 jt|.vWFLdj(?42W                                                      m        DK                                   S\1WV7NDC k OO ?d 7m4Xf#k%3;'S)KJ1_2 3mW359590:<D=KQ>oD!G@^IQ!K=P#V` a(ff>hNRrsUs>v<zmzm {}^hRE:X1;UJ#C@?^ZV 5c!wYd$0> V?9pcf9Z%%V 0J6qck ;TT@Vx@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7.{ @Calibri5. *[`)Tahoma?= *Cx Courier New;WingdingsA BCambria Math"1h+҆+҆ˆ IH + IH +nx4dTT 2qHX $P2!xxYS:\Chief Executive\ISD\ICT\Security\Security Policy\Admin\IT Security Policy Template.dot8Information Security Incident Management Policy TemplatePolicyOlly Baker - Aperia Olly Baker+                           ! " # $ % & ' ( ) * CompObjLy