ࡱ> lvky K4bjbj s ,  000DDD8|LD%.||||EEE6%8%8%8%8%8%8%$&)|\%0#"E\%|q%NNN8|06%N6%NN:#,z$?@L($ "%%0%($R*t|*z$*0z$EvTNDSwEEE\%\%^EEE%*EEEEEEEEE :   PRIVACY IMPACT ASSESSMENT Electronic Document Management System (EDMS) May 2010 Prepared by: Office of the PBS Chief Information Officer General Services Administration 1800 F Street NW Washington DC 20405 PART II. SYSTEM ASSESSMENT A. Data in the System QuestionExplanation/Instructions 1. Describe all information to be included in the system, including personal data.  a. The purpose of the EDMS system is to serve as a repository for the Regions documents to reduce paper storage and provide reliable and secure access to documents where and when they are needed. The system includes any documents and records which are not maintained in other electronic systems. This includes documents such as unsolicited resumes from the general public, suitability adjudication letters, training and warrant documents for GSA employees, and other documents which may contain information subject to the Privacy Act. b. Resumes include name, personal e-mail address, home address, home phone number, and other personal information. Suitability adjudication letters include name and adjudication decision. Employee records include names and may also include gender, race, birth date, age, home e-mail address, home address, home phone number, Social Security Number, employment history, and similar personal information. 1.a. What stage of the life cycle is the system currently in?Implementation/Operation/Maintenance PII is not stored in the system pending PIA approval.  2.a. What are the sources of the information in the system? Information is contained in documents submitted by the individual or generated in the course of performing GSA business. Resumes are submitted by members of the general public for review and consideration for possible job opportunities. Documents containing employee information are generated by employees, supervisors, and program managers for purposes such as tracking contracting warrant levels and expiration dates, tracking intern and co-op program requirement completion, maintaining documents such as telework agreements and travel records, and for processes which proceed or follow the use of automated HR systems.  2.b. What GSA files and databases are used?  The EDMS is a document management system. It could potentially include documents from any GSA system which generates documents or reports.  2.c. What Federal agencies are providing data for use in the system?  None.  2.d. What State and local agencies are providing data for use in the system? None. 2.e. What other third party sources will the data be collected from?  None. 2.f. What information will be collected from the individual whose record is in the system?  N/A  3.a. How will the data collected from sources other than Federal agency records or the individual be verified for accuracy? N/A. The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. No data is collected for this system.  3.b. How will data be checked for completeness?  N/A  3.c. Is the data current? How do you know? N/A  4. Are the data elements described in detail and documented? If yes, what is the name of the document?  N/A. The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. It is a collection of documents rather than a collection of data elements.  B. Access to the Data QuestionExplanation/Instructions 1. a. Who will have access to the data in the system?  Access is limited to employees in GSA. Access is role-based and organization-specific. See attached list of roles.  1.b. Is any of the data subject to exclusion from disclosure under the Freedom of Information Act (FOIA)? If yes, explain the policy and rationale supporting this decision.  N/A. The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. Any exclusions would be governed by those processes.  2. How is access to the data by a user determined? Are criteria, procedures, controls, and responsibilities regarding access documented?  Access control is based on existing controls on paper and electronic documents. Document owners specify which business roles are authorized to have access to each type of document in the EDMS system. The EDMS maintains an access history.  3. Will users have access to all data in the system or will the user's access be restricted? Explain.  Access control is based on existing controls for paper and electronic documents.  4. What controls are in place to prevent the misuse (e.g. browsing) of data by those having access?  Access groups (roles) are organization-specific. Within each role, users can only see the documents in their own organizations cabinet. In order to see documents in another organizations cabinet, they must be assigned to one of that organizations roles. Document owners have the ability to further restrict access on a document or folder-level basis. 5.a. Do other systems share data or have access to data in this system? If yes, explain.  No PII is exchanged with other systems.  5.b. Who will be responsible for protecting the privacy rights of the clients and employees affected by the interface?  List the title and office of the person(s) responsible to ensure that the privacy data is being handled properly. This typically should be the System Manager.  6.a. Will other agencies share data or have access to data in this system (International, Federal, State, Local, Other)?  None. 6.b. How will the data be used by the agency?  N/A  6.c. Who is responsible for assuring proper use of the data?  N/A  6.d. How will the system ensure that agencies only get the information they are entitled to?  N/A  7. What is the life expectancy of the data? Life expectancy of documents is variable depending on the type and purpose of the document. GSA Handbook OAD P 1820.2A, GSA Records Maintenance and Disposition System, is used for determining disposition requirements.  8. How will the data be disposed of when it is no longer needed?  Documents are deleted when no longer needed.  C. Attributes of the Data QuestionExplanation/Instructions 1. Is the use of the data both relevant and necessary to the purpose for which the system is being designed?  List each data element and the relevance to the system. Employee Name, Person Name used to identify the the individual to whom the document pertains  2.a. Will the system derive new data or create previously unavailable data about an individual through aggregation from the information collected?  No 2.b. Will the new data be placed in the individual's record (client or employee)?  N/A 2.c. Can the system make determinations about individuals that would not be possible without the new data?  N/A 2.d. How will the new data be verified for relevance and accuracy?  N/A  3.a. If the data is being consolidated, what controls are in place to protect the data and prevent unauthorized access? Explain.  N/A  3.b. If processes are being consolidated, are the proper controls remaining in place to protect the data and prevent unauthorized access? Explain.  N/A  4. How will the data be retrieved? Can it be retrieved by personal identifier? If yes, explain.  Documents may be accessed via full-text search or by name as a metadata value (if associated with the document and populated). Search results will only return documents to which the searcher has been granted access.  5. What are the potential effects on the privacy rights of individuals of: a. Consolidation and linkage of files and systems; b. Derivation of data; c. Accelerated information processing and decision making; and d. Use of new technologies. How are the effects to be mitigated?  N/A N/A N/A The EDMS maintains a record of access history.. D. Maintenance of Administrative Controls QuestionExplanation/Instructions 1.a. Explain how the system and its use will ensure equitable treatment of individuals.  The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. It ensures that documents are available when and where they are needed while limiting access to employees who have a business need for using the document. The EDMS does not process data.  1.b. If the system is operated in more than one site, how will consistent use of the system be maintained at all sites?  The EDMS system is centrally located in Chantilly, VA and accessed via network connections.  1.c. Explain any possibility of disparate treatment of individuals or groups.  The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. It does not process data.  2.a. What are the retention periods of data in this system?  Retention period of documents is variable depending on the type and purpose of the document. GSA Handbook OAD P 1820.2A, GSA Records Maintenance and Disposition System, is used for determining retention and disposition requirements.  2.b. What are the procedures for eliminating the data at the end of the retention period? Where are the procedures documented?  In Phase I, disposal procedures are based on existing procedures for paper and electronic documents. Document owners dispose of documents in accordance with GSA Handbook OAD P 1820.2A, GSA Records Maintenance and Disposition System. Under consideration for Phase 2 is a module to remind document owners when documents reach the end of their retention period to aid in timely disposal.  2.c. While the data is retained in the system, what are the requirements for determining if the data is still sufficiently accurate, relevant, timely, and complete to ensure fairness in making determinations?  The EDMS serves as a repository for documents generated by or created for other systems and GSA business processes. It does not process data. The EDMS provides versioning capability, showing only the most recent version of a document by default. It also includes version notes, creation and modified dates to support determination of timeliness. 3.a. Is the system using technologies in ways that Federal agencies have not previously employed (e.g. Caller-ID)?  No  3.b. How does the use of this technology affect individuals privacy?  N/A  4.a. Will this system provide the capability to identify, locate, and monitor individuals? If yes, explain.  Some documents such as resumes and telework agreements contain home addresses provided by the individual. 4.b. Will this system provide the capability to identify, locate, and monitor groups of people? If yes, explain.  No  4.c. What controls will be used to prevent unauthorized monitoring?  N/A 5.a. Under which Privacy Act System of Records notice (SOR) does the system operate? Provide number and name.  GSA/PBS-8 (Electronic Document Management System EDMS)  5.b. If the system is being modified, will the SOR require amendment or revision? Explain.  GSA/PBS-8 (Electronic Document Management System EDMS)      EMBED Word.Picture.8   !"NOPQRTUVW[abcij}­|woh|bSGShHCJOJQJ^Jh!~hHCJOJQJ^J hHCJ hH5CJ$h!~hH\ hH\hH5CJaJ hyhHhrhH5CJ(aJ(hJhH5CJ(\hH5CJ(\)h!~hHB*CJ$OJQJ^JaJ$ph#hHB*CJ$OJQJ^JaJ$ph h.(PhHhHCJ$aJ$hyhHCJ$aJ$jhHUmHnHuhH!"OPTUVWabcdefg$a$gdHgdH$a$gdH$a$gdH $^a$gdHgdH $a$gdH$a$gdHgdHghijwx ! * C $$Ifa$gd$a$gdgd$a$gdH$a$gdH ! C D  7 @ L } 1 { Q V rcQcBcrhH6CJOJQJ]^J"h*DRh*DR6CJOJQJ]^Jh*DR6CJOJQJ]^Jh6CJOJQJ]^JhH6B*CJ]phh*DR6B*CJ]phh}6B*CJ]phh6B*CJ]phhCJOJQJ^Jh5CJOJQJ\^J%h5B*CJOJQJ\^JphhCJ^Jh h!~hHCJOJQJ^JaJC D E U V {{{r $Ifgd*DR $Ifgd $Ifgdrkd$$IfTl0 $$0$64 laT V W $Ifgdtkd$$IfTl0 $$%0$64 laTV 12bd  UV[\ABNORTֵֵs֙֙s%h'36B*CJOJQJ]^Jph%h6B*CJOJQJ]^Jphh'36CJOJQJ]^Jh6OJQJ]^J"h56CJOJQJ\]^JhH6CJOJQJ]^Jh6CJOJQJ]^Jh dm6CJOJQJ]^JhCJOJQJ^J- 12 $Ifgdrkd$$IfTl0 $$%0$64 laTcd $Ifgdrkd$$IfTl0 $$%0$64 laTdef $Ifgdrkd($$IfTl0 $$%0$64 laT  $Ifgdrkd$$IfTl0 $$%0$64 laT  TUV\ $Ifgdrkd:$$IfTl0 $$%0$64 laT\]^ $Ifgdrkd$$IfTl0 $$%0$64 laTAB{{ $Ifgd $IfgdrkdL$$IfTl0 $$%0$64 laT $Ifgdrkd$$IfTl0 $$%0$64 laT !NOST $Ifgdrkd^$$IfTl0 $$%0$64 laTTUV{ $Ifgd'3 $Ifgdrkd$$IfTl0 $$%0$64 laT|pp $$Ifa$gd $`a$gdgdrkdp$$IfTl0 $$%0$64 laT@Zz|./mn8LMT\]_|m^O@O@OhHx6CJOJQJ]^Jhi^6CJOJQJ]^Jh6CJOJQJ]^JhxhCJOJQJ^J"hxh6CJOJQJ]^J%hx6B*CJOJQJ]^Jphh 6CJOJQJ]^Jh146CJOJQJ]^Jh6CJOJQJ]^Jh5CJOJQJ\^J%h5B*CJOJQJ\^JphhhCJOJQJ^J{| $Ifgdpkd$$IfTl0 $$f0$4 laT|}~-./| $Ifgdx $Ifgdpkd$$IfTl0 $$f0$4 laTlmn^_ $Ifgdpkd$$IfTl0 $$f0$4 laT_`a| $Ifgd $Ifgdpkd$$IfTl0 $$f0$4 laT_KLsxLMPR./0 R S  ǸǸhOJQJ^J *hCJOJQJ^J"h56CJOJQJ\]^Jhx6CJOJQJ]^Jh"rU6CJOJQJ]^Jh 6CJOJQJ]^Jh6CJOJQJ]^Jh6CJOJQJ]^JhCJOJQJ^J0 ! $Ifgdpkd $$IfTl0 $$f0$4 laTJKLtuvwx $Ifgdpkd $$IfTl0 $$f0$4 laT xyz $Ifgdpkd $$IfTl0 $$f0$4 laT $Ifgdpkd $$IfTl0 $$f0$4 laTKLMQR $Ifgdrkd) $$IfTl!0 $$f0$4 laTRST $Ifgdpkd $$IfTl0 $$f0$4 laT $Ifgdpkd9 $$IfTl0 $$f0$4 laT/0 $Ifgdpkd $$IfTl0 $$f0$4 laT   Q R S $IfgdpkdE $$IfTl0 $$f0$4 laT }qq $$Ifa$gd $`a$gdgdpkd $$IfTl0 $$f0$4 laT 4!l!{!}!!!!!!!e"f"h"i"""""3#4#7#8##### $ $$$$$$$%%f%g%%%%οοοοοοοοqqhN+6CJOJQJ]^J"h56CJOJQJ\]^JhCo6CJOJQJ]^Jhi^6CJOJQJ]^Jhl{6CJOJQJ]^Jh6CJOJQJ]^JhCJOJQJ^Jh5CJOJQJ\^J%h5B*CJOJQJ\^Jphh, 3!4!5!m!n!!! $IfgdpkdQ$$IfTl0 #904 laT !!!d"e"f"i" $Ifgdpkd$$IfTl0 #904 laTi"j"k""""" $Ifgdpkd]$$IfTl0 #904 laT"""2#3#4#8# $Ifgdpkd$$IfTl0 #904 laT8#9#:#~##### $Ifgdpkdi$$IfTl0 #904 laT### $ $ $$$ $Ifgdpkd$$IfTl0 #904 laT$$$$$$$$$ $Ifgdpkdu$$IfTl0 #904 laT$$$%%%%% $Ifgdpkd$$IfTl0 #904 laT%%''&'T'V'Z''''(() )))5)7)))**c***3+4+,, ,,,).*..ð񒃒tj[h=6CJOJQJ]^JhtOJQJ^Jht6CJOJQJ]^Jhelg6CJOJQJ]^Jh6CJOJQJ]^Jh5CJOJQJ\^J%h5B*CJOJQJ\^Jphhh~P6CJOJQJ]^Jhi^6CJOJQJ]^JhCJOJQJ^Jh6CJOJQJ]^J#%%%@&A&u&v&&&&&&&'x $If^gd $Ifgdpkd$$IfTl0 #904 laT ''''"'&'V'W'X'Z'''xssgs $`a$gdgdpkd$$IfTl0 #904 laT & F$Ifgdi^ $Ifgd '''''(((6)7)yyyypy $Ifgd $Ifgdpkd$$IfTl0 L#04 laT $$Ifa$gd 7)8)9))))** $Ifgdpkd$$IfTl0 L#04 laT***b*c*d***|| $Ifgdelg $Ifgdpkd$$IfTl0 L#04 laT***2+3+4+, ,|| $Ifgdt $Ifgdpkd$$IfTl0 L#04 laT ,!,",,,,).*.|| $Ifgd= $Ifgdpkd$$IfTl0 L#04 laT*.+.,.../\0 $Ifgdpkd+$$IfTl0 L#04 laT./[0\000000&1'1*1,11122 2 2|2~2222222222A3C3D3|3}3~333444ֹֹֹֹ|lhHh}CJOJQJ]^JhHCJOJQJ]^JhHhCJOJQJ]^JhHhHCJOJQJ]^JhHhSdYCJOJQJ]^J *hCJOJQJ^J *h6CJOJQJ]^JhCJOJQJ^Jh}6CJOJQJ]^Jh6CJOJQJ]^J(\0]0^00000000 $Ifgdpkd$$IfTl0 L#04 laT 000%1&1'1+1,1 $Ifgdpkda$$IfTl0 L#04 laT,1-1.11112 $Ifgdpkd$$IfTl0 L#04 laT2 2 2}2~2222 $Ifgdpkd{$$IfTl0 L#04 laT2222222 $Ifgdpkd$$IfTl0 L#04 laT222B3C3D3}3~3 $Ifgdpkd$$IfTl0 L#04 laT~3333334 $Ifgdpkd $$IfTl0 L#04 laT444444444 4"4#4%4&4|wuuuuugdgd$a$gdgdpkd$$IfTl0 L#04 laT 44444 4!4#4$4&4'4)4*4-4.4D4E4F4G4I4J4K4ǼjhHUjנUK hHUVhHjhHUh!=jh!=Uh hh5CJOJQJ\^JhOJQJ^J&4(4)4+4,4-4H4I4J4K4gdH G0P&P1h/R :p/ =!"#$% Dp`!"k)HhבZ.]L5xOoDxu*တ7E5fs6U,8 'qcX!+ 8p*'影MnDL:7oh4fpvXxw-8GGE:xZYPvhI:oCe U>-%HhړH[{WЍ`OUP=tS˞t;=&GN0~sRQ#i1C !4>;XIGx/~JFT!||٧S~?(2+eL2Y&dVɔYk1fbɲ2ҹP4#Rlu96$eѧWiY'O3dv:LxAMM\;(yw0Y"9yXP q{ 8C3" {yԗLHULe"2%b(TfWxvBQij o|ioͻ)@QX+DL!$n#UȈLrj&̵Y&wQ;$9޼1餕8T\q<^s6Lc7I:wza0֥L aJ605azFxl&wiګߊƪ<6"n\D"҆/fji\bS!Ewt%usΈ1˂ʋsgJ˪ܔ6l/aȫ(r05V["0K.VWys.PL.v`$6SY3hh.0۝ܻRd4'Ֆvc'+#Ŧ}ۄ^3lbY6>gy6ْLkN3֍ J,10Aw3qx^XSV< FKk|@\T|)䒁Z`>uj0ChΘ`0 jaior&ߓ$.Cd6/Xfb 3 S0],9FK=k޴7  vVN 7Ht ۋ;ӞXd,Z&wDʙ`4&f]b:0QF{+3{[ =?Y&d,eL2L%gk;e߽L2Y&d,eL3S6kޢӷƹy2$$If!vh#vW#v9:V l0$6554T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vW#v9:V l0$655%4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l!0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#vb #v.:V l0$55f4T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v9:V l05594T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l055/ 4T$$If!vh#v#v:V l055/ / 4T$$If!vh#v#v:V l055/ 4T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554T$$If!vh#v#v:V l0554TODd 0  # A"}` h2}] @=}` h2}Lagq8qmxM  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\^_`abcdefghijmxopqrstu{|}~Root Entry  F0]@wData ]h#WordDocument sObjectPoolX:@0]@_1263902935 FX:@:@1TablenCompObjhObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font  @Vl,b$ޱˤƐ֙W" @n(  6   AB S  ?}t@;)@UnknownGz Times New Roman5Symbol3& z Arial"h\\!$r0-2JinaitakanarchukJinaitakanarchuk   FMicrosoft Word Picture MSWordDocWord.Picture.89qOh+'0Lx    ,4<DPIA TemplatejinaitakanarchukNormalBrieLSansotta2Microsoft Office Word@ObjectPool :@:@WordDocumentzySummaryInformation( DocumentSummaryInformation8 bjbj yjjl ooo$ joM"oooMo o py 0DD jCJUmHnHu 1hN N!"#$$$%nOޱˤƐ֙PNG  IHDR'NTsRGB@}PLTE'0DI_h pHYs dIDATh_:C ke4}Eq~Z8]o&vF?zN[P+ bQBXԝ((YE(eQeQeQeQ *gh;fCpt=QIܦj.P4O(o%{у9,EgFHPKs7KFNi8i8Qbպ=*AR1{Ssr_7|p}Qaka)L=Vh#J/LgԲrasBR׏ɓmۨM_TȂcڂFW\;;@9wԺ9AuXH~k{0ïh/M2b Q}c}ڥQlv\<5C:ؗjEݹtʧ .h ʏeFD뺺!DJ<=x =%⥨[+H)(cGzM-ɶ%9q r%IAT /놭wͳwʷWl.OW\ȠqtrLb2:Ksҭugq-I?MʜbZ }]>գ5J7Y`Dp>(Ş9" Xz bJb]dTujSpJ8 =!*({Ӣ =?mua}`,*\(HK$_zrJ^4e6uXZS1@00(5C·SDT;DHbyon(Kjit?xY؎+lpVb$jxŏ#܄)>0@:}o]t fÙ .%# Kx%*0XދR^7iiK(hD~˯7|VNwD~LQΨHDׅO5Yc'FU,ʢ,ʢ,ʢ,jO5[(cIENDB`Oh+'0|  8 D P\dltssJinaitakanarchukdinainaNormalkJinaitakanarchukd2naMicrosoft Word 9.0@@{@{՜.+,0 hp   General Services Administration2  TitlelK[vbE5y}Q&mI1@%EqcVN K&HP"(zA z=E"PO=%%lDFyVß'Mo\s&< `]H:x0Fc_דX\yfŶI%?>ICϠ* )̗8a* qQxZlv{6 G9g4wO?%(*ߪ^4k_{-oPm"D3pW&ӠL{Q*7nm'ui_h _`d(Mgh~<'ZwO4y(+V,if4EƐepQK˘ f,:3 Q[Ϭ_{MxrvF3.@IJ9&d)#!#'-Aj%SHAȡTEXnVpa;Km:LM؞H8(^XbbKP`5dRbU;R#rLLnPz pl$R3H Gu U\Y C&֫=Yv*\/;k5K҂fjJù hf5WaQJ3%)`U4=4S@\FDLk))YJŖ1M^)BLTLi`:Sv] / 6#־+Aޯآe\rll g*dۂz}'2 S )H+ƲȠe2ne%hD, 8bXƻp 4VVɎ1/X@e7]*OGPXJ)>%e/e ,@L7+.kL,=)↱dm]7z؂E>1DY%&9"U}hNu`bj*\yRFlg0ڲjO%({8Shx(sLmW{!%hL}&XLa0lZmp&T1@Z1d$Lh14Fʿ}Ri^ 1e\6g$3PH`_^@ `ZtL'6Dձ3Zc!X i8 LjHTD0=3131313113L9ӑ&LLLL2S лiwSsZ~mgFwX[xj/d}zg; `6 P/޽M1Sw̗~R̿Yf>s(CWN;fcq_zюOMݽ m̯Ӯs<Op9)ܧܙV9o]H|<ǗvL:wmNswHmKh Y:lb[ ^}ƿ9ӝOþHˌ=TSO4+߭Gu\ݏs^=ez8{biAzE2m%GeQMQQ18*cQ^2d⨌8*cL&`&fb&fb&fb&fw3Qe&y3_L>e =ssۮ.ϵ?枸Mrn/&?1Table'*SummaryInformation(|DocumentSummaryInformation8 @CompObjr@~ڵ@@~ڵ@ %՜.+,0 hp   General Services AdministrationP ,  PIA Template Title  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH Z@Z  Heading 2$@&^5;B*OJQJ\^JphH@H  Heading 4$@&5CJOJQJaJZ@Z  Heading 5$$@&a$5B*CJOJQJ\^JphL@L  Heading 6$$@&a$5OJQJ\^JL@L  Heading 7$@&^5OJQJ^JL@L  Heading 8$$@&a$5OJQJ\^JN @N H Heading 9 <@&CJOJQJ^JaJDA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 8B@8 Body Text B*ph6U6 Hyperlink >*B*ph4 4 Footer  !RP@"R Body Text 2 7$8$H$B*OJQJ^JphH@2H  Balloon TextCJOJQJ^JaJFVAF }FollowedHyperlink >*B* phHoRH Hfp_app$a$5:CJ0_HmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] K,K, V _ %.4K4!-2=FOXgC V d \T|_xR !i""8##$$%''7)** ,*.\00,1222~34&4K4 "#$%&'()*+,./013456789:;<>?@ABCDEGHIJKLMNPQRSTUVWY:l,2$k)HhבZ*I@(  z  c 6A ??BGSA Logo#" `?B S  ?K,0t~.~.~.~.~.~.~.~.!!!L,!!!L,9*urn:schemas-microsoft-com:office:smarttagsState8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsplace;*urn:schemas-microsoft-com:office:smarttagsaddress>*urn:schemas-microsoft-com:office:smarttags PostalCode $ 08)) , ,",#,#,%,&,(,),+,-,I,L,, ,-,H,I,L,C+C+D+|++,, , ,",#,#,%,&,(,),+,L, , ,",#,#,%,&,(,),+,-,I,L,g}]dp rvFhh^h`o(.88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.g}]d r                  $# -}'314!=~P*DR"rUSdYg[)Y^i^elg dmCotl{x N++HO}Hx;=HUH  ,",@K,@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial5. .[`)TahomaACambria Math"1h#2g#2g% P% P!x4 , ,2qHP ?2!xx  PIA Templatejinaitakanarchuk BrieLSansotta