ࡱ>  3456789:;<= VMy Rbjbj k{{Kq  f#f#j$j$j$$$$$P$\:+|$ŗ- P:L:::LT`k\rDFFFFFF$7jj$uOLTuujf#f#::uNf#:j$:DuDRW $Jj:P 6w*zr_00ŗ `v ŝ{ŝ<jjŝj$$l +uuuuuuujj6puuuŗuuuuŝuuuuuuuuu  ,":   Defense Security Service Electronic Communications Plan Sample Date: 02/01/2012 Company: XYZ, Inc. Address: 12345 West Broad Way, New York, NY. 54321Cage Code: 89PGKODAA Unique Identifier: 89PGK-20111119-00009-00019 Table of Contents  TOC \o "2-2" \h \z \t "Heading 1,1"  HYPERLINK \l "_Toc311452427" 1. INTRODUCTION  PAGEREF _Toc311452427 \h 5  HYPERLINK \l "_Toc311452428" 2. PURPOSE  PAGEREF _Toc311452428 \h 5  HYPERLINK \l "_Toc311452429" 3. ROLES/PERSONNEL SECURITY  PAGEREF _Toc311452429 \h 6  HYPERLINK \l "_Toc311452430" 4. DETAILED SYSTEM DESCRIPTION/TECHNICAL OVERVIEW  PAGEREF _Toc311452430 \h 8  HYPERLINK \l "_Toc311452431" 5. IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES  PAGEREF _Toc311452431 \h 9  HYPERLINK \l "_Toc311452432" 5.1 USER IDENTIFICATION AND AUTHENTICATION  PAGEREF _Toc311452432 \h 9  HYPERLINK \l "_Toc311452433" 5.2 DEVICE IDENTIFICATION AND AUTHENTICATION  PAGEREF _Toc311452433 \h 10  HYPERLINK \l "_Toc311452434" 5.3 IDENTIFIER MANAGEMENT  PAGEREF _Toc311452434 \h 10  HYPERLINK \l "_Toc311452435" 5.4 AUTHENTICATOR MANAGEMENT  PAGEREF _Toc311452435 \h 10  HYPERLINK \l "_Toc311452436" 5.5 ACCESS CONTROL POLICY AND PROCEDURES  PAGEREF _Toc311452436 \h 11  HYPERLINK \l "_Toc311452437" 5.7 ACCESS ENFORCEMENT  PAGEREF _Toc311452437 \h 12  HYPERLINK \l "_Toc311452438" 5.8 INFORMATION FLOW ENFORCEMENT  PAGEREF _Toc311452438 \h 13  HYPERLINK \l "_Toc311452439" 5.9 SEPARATION OF DUTIES  PAGEREF _Toc311452439 \h 13  HYPERLINK \l "_Toc311452440" 5.10 LEAST PRIVILEGE  PAGEREF _Toc311452440 \h 14  HYPERLINK \l "_Toc311452441" 5.11 UNSUCCESSFUL LOGIN ATTEMPTS  PAGEREF _Toc311452441 \h 14  HYPERLINK \l "_Toc311452442" 5.12 SYSTEM USE NOTIFICATION  PAGEREF _Toc311452442 \h 14  HYPERLINK \l "_Toc311452443" 5.13 SESSION LOCK  PAGEREF _Toc311452443 \h 15  HYPERLINK \l "_Toc311452444" 5.15 SUPERVISION AND REVIEW ACCESS CONTROL  PAGEREF _Toc311452444 \h 16  HYPERLINK \l "_Toc311452445" 5.16 REMOTE ACCESS  PAGEREF _Toc311452445 \h 16  HYPERLINK \l "_Toc311452446" 5.17 USE OF EXTERNAL INFORMATION SYSTEMS  PAGEREF _Toc311452446 \h 17  HYPERLINK \l "_Toc311452447" 6. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES  PAGEREF _Toc311452447 \h 18  HYPERLINK \l "_Toc311452448" 6.1 SECURITY TRAINING  PAGEREF _Toc311452448 \h 19  HYPERLINK \l "_Toc311452449" 7. AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES  PAGEREF _Toc311452449 \h 19  HYPERLINK \l "_Toc311452450" 7.1 AUDITABLE EVENTS  PAGEREF _Toc311452450 \h 19  HYPERLINK \l "_Toc311452451" 7.2 CONTENT OF AUDIT RECORDS  PAGEREF _Toc311452451 \h 20  HYPERLINK \l "_Toc311452452" 7.3 AUDIT STORAGE CAPACITY  PAGEREF _Toc311452452 \h 20  HYPERLINK \l "_Toc311452453" 7.4 AUDIT MONITORING, ANALYSIS, AND REPORTING  PAGEREF _Toc311452453 \h 20  HYPERLINK \l "_Toc311452454" 7.5 TIME STAMPS  PAGEREF _Toc311452454 \h 21  HYPERLINK \l "_Toc311452455" 7.6 PROTECTION OF AUDIT INFORMATION  PAGEREF _Toc311452455 \h 21  HYPERLINK \l "_Toc311452456" 7.7 CONTINUOUS MONITORING  PAGEREF _Toc311452456 \h 21  HYPERLINK \l "_Toc311452457" 8. CONFIGURATION MANAGEMENT POLICY AND PROCEDURES  PAGEREF _Toc311452457 \h 22  HYPERLINK \l "_Toc311452458" 8.1 MONITORING CONFIGURATION CHANGES  PAGEREF _Toc311452458 \h 22  HYPERLINK \l "_Toc311452459" 8.2 ACCESS RESTRICTIONS FOR CHANGE  PAGEREF _Toc311452459 \h 23  HYPERLINK \l "_Toc311452460" 8.3 LEAST FUNCTIONALITY  PAGEREF _Toc311452460 \h 23  HYPERLINK \l "_Toc311452461" 9. INCIDENT RESPONSE  PAGEREF _Toc311452461 \h 23  HYPERLINK \l "_Toc311452462" 9.1 INCIDENT RESPONSE POLICY AND PROCEDURES  PAGEREF _Toc311452462 \h 23  HYPERLINK \l "_Toc311452463" 9.2 INCIDENT RESPONSE TRAINING  PAGEREF _Toc311452463 \h 24  HYPERLINK \l "_Toc311452464" 9.3 INCIDENT RESPONSE TESTING AND EXERCISES  PAGEREF _Toc311452464 \h 24  HYPERLINK \l "_Toc311452465" 9.4 INCIDENT HANDLING  PAGEREF _Toc311452465 \h 24  HYPERLINK \l "_Toc311452466" 9.5 INCIDENT MONITORING  PAGEREF _Toc311452466 \h 25  HYPERLINK \l "_Toc311452467" 9.6 INCIDENT REPORTING  PAGEREF _Toc311452467 \h 25  HYPERLINK \l "_Toc311452468" 9.7 INCIDENT RESPONSE ASSISTANCE  PAGEREF _Toc311452468 \h 26  HYPERLINK \l "_Toc311452469" 10. PHYSICAL AND ENVIRONMENTAL PROTECTION  PAGEREF _Toc311452469 \h 26  HYPERLINK \l "_Toc311452470" 10.1 PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY AND PROCEDURES  PAGEREF _Toc311452470 \h 26  HYPERLINK \l "_Toc311452471" 10.2 PHYSICAL ACCESS AUTHORIZATIONS  PAGEREF _Toc311452471 \h 26  HYPERLINK \l "_Toc311452472" 10.3 PHYSICAL ACCESS CONTROL  PAGEREF _Toc311452472 \h 27  HYPERLINK \l "_Toc311452473" 10.4 MONITORING PHYSICAL ACCESS  PAGEREF _Toc311452473 \h 27  HYPERLINK \l "_Toc311452474" 11. CONTINGENCY PLANNING AND OPERATION  PAGEREF _Toc311452474 \h 28  HYPERLINK \l "_Toc311452475" 11.1 CONTINGENCY PLANNING POLICY AND PROCEDURES  PAGEREF _Toc311452475 \h 28  HYPERLINK \l "_Toc311452476" 11.2 CONTINGENCY PLAN  PAGEREF _Toc311452476 \h 28  HYPERLINK \l "_Toc311452477" 11.3 INFORMATION SYSTEM RECOVERY AND RECONSTITUTION  PAGEREF _Toc311452477 \h 29  HYPERLINK \l "_Toc311452478" 12. SYSTEM AND COMMUNICATIONS PROTECTIONS  PAGEREF _Toc311452478 \h 29  HYPERLINK \l "_Toc311452479" 12.1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES  PAGEREF _Toc311452479 \h 29  HYPERLINK \l "_Toc311452480" 13. APPLICATION PARTITIONING (IF APPLICABLE)  PAGEREF _Toc311452480 \h 30  HYPERLINK \l "_Toc311452481" 13.1 INFORMATION REMNANCE  PAGEREF _Toc311452481 \h 31  HYPERLINK \l "_Toc311452482" 13.2 DENIAL OF SERVICE PROTECTION  PAGEREF _Toc311452482 \h 31  HYPERLINK \l "_Toc311452483" 13.3 BOUNDARY PROTECTION  PAGEREF _Toc311452483 \h 32  HYPERLINK \l "_Toc311452484" 13.4 TRANSMISSION INTEGRITY  PAGEREF _Toc311452484 \h 32  HYPERLINK \l "_Toc311452485" 13.5 TRANSMISSION CONFIDENTIALITY  PAGEREF _Toc311452485 \h 33  HYPERLINK \l "_Toc311452486" 13.6 NETWORK DISCONNECT  PAGEREF _Toc311452486 \h 33  HYPERLINK \l "_Toc311452487" 13.7 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT  PAGEREF _Toc311452487 \h 33  HYPERLINK \l "_Toc311452488" 13.8 COLLABORATIVE COMPUTING  PAGEREF _Toc311452488 \h 33  HYPERLINK \l "_Toc311452489" 13.9 MOBILE CODE  PAGEREF _Toc311452489 \h 33  HYPERLINK \l "_Toc311452490" 13.10 VOICE OVER INTERNET PROTOCOL  PAGEREF _Toc311452490 \h 34  HYPERLINK \l "_Toc311452491" 13.11 SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE  PAGEREF _Toc311452491 \h 34  HYPERLINK \l "_Toc311452492" 13.12 ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE  PAGEREF _Toc311452492 \h 34  HYPERLINK \l "_Toc311452493" 13.13 SESSION AUTHENTICITY  PAGEREF _Toc311452493 \h 35  HYPERLINK \l "_Toc311452494" 13.14 MALICIOUS CODE PROTECTION  PAGEREF _Toc311452494 \h 35  HYPERLINK \l "_Toc311452495" 13.15 INFORMATION SYSTEM MONITORING TOOLS AND TECHNIQUES  PAGEREF _Toc311452495 \h 36  HYPERLINK \l "_Toc311452496" 14. MAINTENANCE  PAGEREF _Toc311452496 \h 37  HYPERLINK \l "_Toc311452497" 14.1 SYSTEM MAINTENANCE POLICY AND PROCEDURES  PAGEREF _Toc311452497 \h 37  HYPERLINK \l "_Toc311452498" 14.2 CONTROLLED MAINTENANCE  PAGEREF _Toc311452498 \h 38  HYPERLINK \l "_Toc311452499" 14.3 MAINTENANCE TOOLS  PAGEREF _Toc311452499 \h 38  HYPERLINK \l "_Toc311452500" 14.4 REMOTE MAINTENANCE  PAGEREF _Toc311452500 \h 39  HYPERLINK \l "_Toc311452501" 14.5 MAINTENANCE PERSONNEL  PAGEREF _Toc311452501 \h 39  HYPERLINK \l "_Toc311452502" 15. MEDIA PROTECTION  PAGEREF _Toc311452502 \h 40  HYPERLINK \l "_Toc311452503" 15.1 MEDIA PROTECTION POLICY AND PROCEDURES  PAGEREF _Toc311452503 \h 40  HYPERLINK \l "_Toc311452504" 15.2 MEDIA ACCESS  PAGEREF _Toc311452504 \h 40  HYPERLINK \l "_Toc311452505" 15.3 MEDIA SANITIZATION AND DISPOSAL  PAGEREF _Toc311452505 \h 41  HYPERLINK \l "_Toc311452506" 16. EXPORT CONTROL PROCEDURES  PAGEREF _Toc311452506 \h 41  HYPERLINK \l "_Toc311452507" 17. ADDITIONAL FOCI PROCEDURES  PAGEREF _Toc311452507 \h 43  HYPERLINK \l "_Toc311452508" 17.1 TELEPHONE PROCEDURES  PAGEREF _Toc311452508 \h 43  HYPERLINK \l "_Toc311452509" 17.2 FACSIMILE PROCEDURES  PAGEREF _Toc311452509 \h 44  HYPERLINK \l "_Toc311452510" 17.3 COMPUTER COMMUNICATIONS  PAGEREF _Toc311452510 \h 45  HYPERLINK \l "_Toc311452511" Additional ODAA recommendations  PAGEREF _Toc311452511 \h 50  HYPERLINK \l "_Toc311452512" ATTACHMENT 1 NETWORK DIAGRAM  PAGEREF _Toc311452512 \h 51  HYPERLINK \l "_Toc311452513" ATTACHMENT 2 EXPORT RELEASE FORMS  PAGEREF _Toc311452513 \h 52  HYPERLINK \l "_Toc311452514" ATTACHMENT 4 ECP REVISION LOG  PAGEREF _Toc311452514 \h 54  1. INTRODUCTION The XYZ, Inc. agrees with the Defense Security Service (DSS) to adopt this Electronic Communications Plan (ECP) in connection with our [Describe applicable FOCI mitigation agreement]. The ECP template applies only to unclassified systems and can be modified to meet the facilitys needs. Items that do not apply shall be annotated as Not Applicable. Set forth herein are written policies and procedures that provide assurance to the Government Security Committee (GSC) and DSS that electronic communications between us or our subsidiaries and our parents or their affiliates (i) do not result in unauthorized disclosure of classified information or export controlled information, (ii) do not otherwise violate any OPSEC requirement; and (iii) are not used by our parents and/or their affiliates to exert influence or control over our business or management in a manner that could adversely affect the performance of classified contracts. This ECP shall include a detailed network description and configuration diagram that clearly delineates which networks will be shared and which will be protected from unauthorized access (mitigate foreign influence). The network description shall contain all electronic communication medium including but not limited to, personal/network firewalls, remote administration, monitoring, maintenance, and separate e-mail servers, as appropriate. The scope of this ECP includes all communications including telephone, teleconference, video conferences, facsimile, cell phones, PDAs and all computer communication including emails and server access. Video conferencing shall be treated as a visit under the visitation requirements of the FOCI mitigation agreement. XYZ, Inc. (Herein the Company) ECP adopts a systematic approach based on the template published by DSS to assist Company with describing Company electronic communications at the appropriate level of detail to allow adequate assurances that XYZ, Inc policies guidance are uniform and in compliance with the terms of the mitigation agreement. The set of issues addressed herein is derived from that National Institute of Standards and Technology Publication: 800-53 (Appendix 2). This ECP shall describe companys policies and procedures that have been implemented to ensure that all Company communication complies with the terms of the adopted Foreign Organization Control and Influence (FOCI) mitigation agreement. This ECP shall cover all communications including telephone, teleconference, video teleconference, facsimile and other computer to computer communications including emails and server communication and access. Subject to the express and implied terms of the Companys mitigation agreement, which may allow some discretion or variation. DSS assumes that video teleconferences are also visits subject to each of the visitation requirements set out in the Companys mitigation agreement. Important: You must address all sections in this document. Do not change the order of any of the section(s) but you may add other section(s) or sub section(s). If any section is not applicable to your particular implementation make the note not applicable and then explain why it is not applicable: be consistent in your terminology. 2. PURPOSE Instructions: Describe the Companys specific requirements from the mitigation agreement, the electronic communications of the company, and how the company intends to comply with the terms of the mitigation agreement. Identify the person(s) and entities whose electronic communications are subject to the ECP requirements of the Companys mitigation agreement. The purpose is to define and outline the requirements and responsibilities regarding the use of the company-provided electronic communications. These procedures implement the electronic communications requirements as specified in the Special Security Agreement (SSA), and apply to all employees, also herein referred to as associates. This ECP, together with the Technology Control Plan (TCP) and the SSA Implementing Procedures are required for XYZ, Inc. Facility Security Clearance (FCL). The FCL provides the eligibility for award of government contracts and involvement in government programs that require personnel to have security clearances. XYZ, Inc. has established, administers and maintains a separate secure computer networking and electronic communication system. The network server hardware, software and other computer-related resources are located inside the secure facility and are not accessible by the XYZ, Inc. parent company. The parent cannot access, monitor or control any of the network resources or electronic communication activities of XYZ, Inc. XYZ employs a full-time Network Administrator, reporting directly to the Chief Operating Officer (COO). The Network Administrator is responsible for all phases of Information Technology with oversight and monitoring by the FSO/TCO. All associates utilize company-supplied electronic communication resources and have been provided security training regarding their responsibility to maintain compliance with the ECP, IT Policy, TCP, the SSA, the SSA Implementing Procedures, the National Industrial Security Program Operating Manual (NISPOM), the International Traffic in Arms Regulations (ITAR), and the Export Administration Regulations (EAR). Ultimate oversight of this ECP and policy is the responsibility of the Facility Security Officer/Technology Control Officer (FSO/TCO) and the GSC, with periodic reviews by DSS. All changes to this plan must be authorized by the GSC and must be approved by DSS. Also, identify other person(s) and entities (parent, subsidiaries, divisions) whose communications is subject to this ECP requirement of the Companys (SSA, Security Control Agreement (SCA)) mitigation agreement. 3. ROLES/PERSONNEL SECURITY Instructions: Enter specific points of contact with phone numbers and email addresses identifying the FSO, TCO, IT Personnel, and Outside Directors etc. Name:Title:Email:Phone:Joseph SmackersFSO  HYPERLINK "mailto:Joseph.smackers@xyz.com" Joseph.smackers@xyz.com(555) 555-1234AFSOTCOIT ManagerISSMISSOOM 1OM 2OM 3GCAGCA - Security 4. DETAILED SYSTEM DESCRIPTION/TECHNICAL OVERVIEW Instructions: Describe all resources and servers that will be shared identifying all associated facilities, locations and legal entities. A diagram of the shared resources on companys IT infrastructure is provided as Attachment No.nnn. Key functions of each of the systems or resources as follows: Describe the Fax machine and its communication line: Is it dedicated or shared, is it analog/digital line and so on. Describe in detail if any alarm system: its configuration, managed by and so on. Is it IPbased communicates via the internet to what company or Internet Service Provider (ISP). Is all outside communications (both voice and data) are IP-based via a broadband connection provided by a third party ISP. Describe broadband internet data communications secured/unsecured by a security appliance (hardware firewall)? Does this appliance allow remote (VPN) access to the company LAN? Who are the authorized users on the companys domain? Is the Internet also used for voice communications if so, how are they routed? Any additional appliance, to secure this communication? The central server on the company LAN is the Domain Controller. It contains [List all software including any proprietary tools, database, source control tools, all versions with numbers, encryption software, any company financial database, etc.]. Also, describe the backup and recovery software and procedures or normal business practice. How are the backups protected? Is this machine the Primary Domain Controller (PDC) / authentication server for the company domain, of which all the important computers on the company LAN are members? Describe all users and controls to this PDC / authentication server. Describe all the employee e-mail accounts. Are they web-based, hosted by a third party and who administers the accounts? Are all the e-mail accounts secured with a username and password? Does the parent company or other affiliates have possible means of access or administrator privileges for e-mail accounts? Do they have user accounts for these systems? Describe other servers such as VPN server/machine that may be provided to allow the parent company or its affiliates to remotely access the company accounting system or for the purposes of providing shared administrative services such as payroll, financial auditing and reporting, and tax preparation services or any other service. Does the parent company user utilize remote access or other services with a remote connection VPN to any of the company services? List and describe company personnel responsible. They shall: Be responsible for protecting any information used and/or stored in their accounts or files. Be required to report any computer security weaknesses or vulnerabilities, any incidents of possible misuse, or violation of the mitigation agreement to the FSO. Not share his or her personal accounts with anyone. This includes sharing passwords to accounts or other means of sharing. Strictly adhere to the Property and Equipment Policies as detailed in the companys Employee Handbook. Coordinate with companys FSO regarding the need to process classified information on a computer system or the need to transfer classified information by electronic means. Coordinate with companys TCO regarding the processing of controlled unclassified information on a computer system or the need to transfer controlled information by electronic means. Mark any document or e-mail communication that contains controlled classified information or sensitive but unclassified information with an appropriate marking, and when in doubt should contact whom? Describe any and all other companys employees responsibilities. 5. IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review and update: (i) a formal, documented, identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organization entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls. Company currently has [NUMBER] employees. Given the companys size, there is no current need for a robust identification and/or authentication system/policy, e.g. biometric-based. As the company grows, this section will be revised and updated to reflect the need for such a system. 5.1 USER IDENTIFICATION AND AUTHENTICATION Instructions: Describe how the Companys information system will uniquely identify and authenticate users (or process acting on behalf of users). A user account (a username and a password) for each XYZ Inc. employee, with appropriate privilege level, is created on the domain controller/authentication server; only these user accounts can be used to log into any of the computers that are members of the domain. Each individual employee of company is also assigned an email account. IT manager assigns a unique user name to each individual using the following convention: Firstnameandlastname or Firstnameandlastnamefirstcharacter or SameAsEmailAccount@XYY.com 5.2 DEVICE IDENTIFICATION AND AUTHENTICATION Instructions: Describe how the Companys information system will identify and authenticate specific devices before establishing a connection. For example, how the Companys information system will use either shared known information (e.g., Media Access Control (MAC) or Transmission Control Protocol/Internet Protocol (TCP/IP) addresses) or an Organizational authentication solution (e.g., IEEE 802.1x and Extensible Authentication Protocol (EAP) or a Radius server with EAP-Transport Layer Security (TLS) authentication) to identify and authenticate devices on local and/or wide area networks. IT manager assigns a unique individual identifier to each computer on the company LAN, e.g. PGKserver or MKserver or PRKserver, and joins it to the domain (for which PGKserver is the Primary Domain Controller / authentication server). 5.3 IDENTIFIER MANAGEMENT Instructions: Describe how the Company will manage user identifiers by: (i) uniquely identifying each user; (ii) verifying the identity of each user; (iii) receiving authorization to issue a user identifier from an appropriate Contractor official; (iv) issuing the user identifier to the intended party; (v) disabling the user identifier after [state time period] of inactivity; and (vi) archiving user identifiers. The IT manager shall create all computer user accounts. Identity is verified as part of our employment and hiring process. For each employee, the affected user account(s) will be deactivated (or, at a minimum, passwords changed) once employment with company has been terminated. 5.4 AUTHENTICATOR MANAGEMENT Instructions: Describe how the Company will manage information system authenticators by: (i) defining initial authenticator content; (ii) establishing administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators; (iii) changing default authenticators upon information system installation; and (iv) changing/refreshing authenticators periodically. For example, the following: How and what the XYZ, Inc. information system authenticators include, tokens, PKI certificates, biometrics, passwords, key cards and so on. How users take reasonable measures to safeguard authenticators including maintaining possession of their individual authenticators, not loaning or sharing authenticators with others, and reporting lost or compromised authenticators immediately. For password-based authentication, how the companys information system: (i) protects passwords from unauthorized disclosure and modification when stored and transmitted; (ii) prohibits passwords from being displayed when entered; (iii) enforces password minimum and maximum lifetime restrictions; and (iv) prohibits password reuse for a specified number of generations. For PKI-based authentication, the Companys information system: (i) validates certificates by constructing a certification path to an accepted trust anchor; (ii) establishes user control of the corresponding private key; and (iii) maps the authenticated identity to the user account. How authentication of public users accessing our information systems (and associated authenticator management) is required to protect nonpublic or privacy-related information. All authentications on the XYZ, Inc LAN use password-based authentication. Passwords and usernames are managed based on the policy specified in XYZs Access Control Policy. 5.5 ACCESS CONTROL POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review and update: (i) a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the access control policy and associated access controls. All employees currently have access to the XYZ IT system and associated data, with privilege levels assigned at a level as deemed appropriate by the IT manager. Parent company personnel only have access to the XYZ IT system as described in Section 4, number 5, above. XYZ, has developed an Access Control Policy and will disseminate said policy to all IT system users and require signature from each user agreeing to compliance. XYZ Special Security Council (XSSC) will periodically review and update the Access Control Policy to ensure it remains current and viable. 5.6 ACCOUNT MANAGEMENT Instructions: Describe how the Company will manage information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts. Describe review schedule frequency of information system accounts [monthly, quarterly, annually]. Describe in more details, the following: How the Companys account management will include the identification of account types (i.e., individual, group, and system), establishment of conditions for group membership, and assignment of associated authorizations. How the Company will identify authorized users of the information system and specifies access rights/privileges. How the Company will grant access to its information system based on: (i) a valid need-to-know/need-to-share that is determined by assigned official duties and satisfying all personnel security criteria; and (ii) intended system usage. How the Company will require proper identification for requests to establish information system accounts and approves all such requests. How the Company will specifically authorize and monitor the use of guest/anonymous accounts and removes, disables, or otherwise secures unnecessary accounts. How the Companys account managers will be notified when information system users are terminated or transferred and associated accounts are removed, disabled, or otherwise secured. How the Companys account managers will be notified when users information system usage or need-to-know/need-to-share changes. Explain how the Company will use the following control elements to manage accounts: (1) Automated mechanisms to support the management of information system accounts. (2) An information system that will automatically terminate temporary and emergency accounts after [state time period for each type of account]. (3) An information system that will automatically disable inactive accounts after [state time period]. (4) Automated mechanisms to audit account creation, modification, disabling, and termination actions and to notify, as required, appropriate individuals. XYZ, Inc. does not have any other types of account(s) management other than the local user accounts previously described. 5.7 ACCESS ENFORCEMENT Instructions: Describe how the Companys information system enforces assigned authorizations for controlling access to the system in accordance with applicable policy. You may describe, for example, the following: How access control policies (e.g., identity-based policies, role-based policies, rule-based policies) and associated access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by the Company to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the information system. How, in addition to controlling access at the information system level, access enforcement mechanisms are employed at the application level, when necessary, to provide increased information security for the Company. Explain how the Company will use the following control element to manage access enforcement: An information system that restricts access to privileged functions (deployed in hardware, software, and firmware) and security-relevant information to explicitly authorized personnel, including, for example, security administrators, system and network administrators, and other privileged users. Privileged users are individuals who have access to system control, monitoring, or administration functions (e.g., system administrators, information system security officers, maintainers, system programmers). [Company should also list each responsible individual by name.] XYZ, Inc. has a guest wireless network for the use of its employees and also any individuals visiting our office. A computer connecting to the wireless network can only access XYZs servers and other computers on the network when the user has a current PGKserver domain user account; otherwise, access is limited only to public resources such as the Internet and the unclassified printer(s). 5.8 INFORMATION FLOW ENFORCEMENT Instructions: Describe how the Companys information system enforces assigned authorizations for controlling the flow of information within the system and between interconnected systems in accordance with applicable policy. You may describe, for example, the following: How the Companys information flow will control where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. How the Company will keep export controlled information from being transmitted in the clear to the Internet, block outside traffic that claims to be from within the Company, and not pass any web requests to the Internet that are not from the internal web proxy. How the Companys information flow control policies and enforcement mechanisms will control the flow of information between designated sources and destinations (e.g., networks, individuals, devices) within information systems and between interconnected systems. How the Companys flow control is based on the characteristics of the information and/or the information path. Specific examples of flow control enforcement can be found in boundary protection devices (e.g., proxies, gateways, guards, encrypted tunnels, firewalls, and routers) that employ rule sets or establish configuration settings that restrict information system services or provide a packet filtering capability. Not applicable because, XYZ, Inc. is a single facility and as such does not have multiple, interconnected IT systems. 5.9 SEPARATION OF DUTIES Instructions: Describe how the Companys information system enforces separation of duties through assigned access authorizations. You may describe, for example, the following: How the Company will establish appropriate divisions of responsibility and separate duties as needed to eliminate conflicts of interest in the responsibilities and duties of individuals. How there is access control software on the Companys information system that prevents users from having all of the necessary authority or information access to perform fraudulent activity without collusion. How the Company will divide mission functions and distinct information system support functions among different individuals/roles. How the Company will have different individuals perform information system support functions (e.g., system management, systems programming, quality assurance/testing, configuration management, and network security) How the Company will use security personnel to administer access control functions who are different from the personnel who administer the Companys audit functions. Refer to XYZs Access Control Policy for details on Separation of Duties. 5.10 LEAST PRIVILEGE Instructions: Describe how the Companys information system will enforce the most restrictive set of rights/privileges or accesses needed by users (or processes acting on behalf of users) for the performance of specified tasks. You may describe, for example, how the Company employs the concept of least privilege for specific duties and information systems (including specific ports, protocols, and services) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations, organizational assets, and individuals. Refer to XYZs Access Control Policy for details on Least Privilege. 5.11 UNSUCCESSFUL LOGIN ATTEMPTS Instructions: Describe how the Companysinformation system will enforce a limit of [state the appropriate number] consecutive invalid access attempts by a user during a [state the appropriate time period] time period. You may describe, for example, the following: How the Companys information system (i) will automatically lock the account/node for an [state the appropriate time period] and/or delay next login prompt according to[ state the appropriate delay algorithm] when the maximum number of unsuccessful attempts is exceeded. Whether automatic lockouts initiated by the information system will be temporary and automatically release after a predetermined time period established by the Company. All XYZs IT system limits the number of unsuccessful log-in attempts to 3. A specified lock-out period will occur after three unsuccessful log-in attempts. Individuals who do not have the appropriate local user account information will not be able to access our IT system and must contact IT support services. 5.12 SYSTEM USE NOTIFICATION Instructions: Describe how the Companys information system will display an approved, system use notification message before granting system access informing potential users of the following: (i) that the user is accessing information system; (ii) that system usage may be monitored, recorded, and subject to audit; (iii) that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and (iv) that use of the system indicates consent to monitoring and recording. You may describe, for example, the following: How the Companys privacy and security policies will be consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. How the Companys system use notification messages can be implemented in the form of warning banners displayed when individuals log in to the information system. How the Companys system use notification message provides appropriate privacy and security notices (based on associated privacy and security policies or summaries) and will remain on the screen until the user takes explicit actions to log on to the information system. For the Companys publicly accessible systems: (i) how the system use information will be available and when appropriate, will be displayed before granting access; (ii) how any references to monitoring, recording, or auditing will be in keeping with privacy accommodations for such systems that generally prohibit those activities; and (iii) how the notice given to public users of the information system will include a description of the authorized uses of the system. XYZs systems use a notification message in the form of a warning banner displayed when individuals log-in to the information system. Users must acknowledge that they have read, understood, and accepted the rules listed in the system use notification message prior to logging into the system. 5.13 SESSION LOCK Instructions: Describe how the Companys information system will prevent further access to the system by initiating a session lock after [state appropriate time period] of inactivity, and the session lock will remain in effect until the user reestablishes access using appropriate identification and authentication procedures. You may describe, for example, how the Companys users will be able to directly initiate session lock mechanisms. It is recommended that Company not consider a session lock as a substitute for logging out of the information system. Moreover, Company policy in this respect should, where possible, be consistent with federal policy; for example, in accordance with OMB Memorandum 06-16, the time period of inactivity resulting in session lock is no greater than thirty minutes for remote access and portable devices. XYZs policy is that users are able to directly initiate session lock mechanisms by logging out of the information system. Computers will also automatically lock after a specified time of inactivity that is no greater than thirty minutes. Users will be required to reestablish access to the IS using their domain user id and password. Also, refer to XYZs Access Control Policy for further information on session lock. 5.14 SESSION TERMINATION Instructions: Describe how the Companys information system will automatically terminate a remote session after [state appropriate time period] of inactivity. Company should consider a remote session to have been initiated whenever an organizational information system is accessed by a user (or an information system) communicating through an external, network not under the control of the Company such as the Internet. Refer to XYZs Access Control Policy for further information on session termination. 5.15 SUPERVISION AND REVIEW ACCESS CONTROL Instructions: Describe how the Company will supervise and review the activities of users with respect to the enforcement and usage of information system access controls. You may describe, for example, the following: How the Company will review audit records (e.g., user activity logs) for inappropriate activities in accordance with organizational procedures. How the Company will investigate any unusual information system-related activities and periodically reviews changes to access authorizations. How the Company will employ automated mechanisms to facilitate the review of user activities. An event log of user activities is automatically generated by XYZs information system and can be filtered for unusual system-related activities. The IT Manager will review these logs for inappropriate activities and changes to access authorizations and investigate as necessary. 5.16 REMOTE ACCESS Instructions: Describe how the Company will authorize, monitor, and control all methods of remote access to the information system. The Company should consider remote access to include any access to an organizational information system by a user (or an information system) communicating through an external, network not under the control of the Company such as the Internet. Examples of remote access methods include dial-up, broadband, and wireless. Remote access controls are applicable to information systems other than public web servers or systems specifically designed for public access. You may describe, for example, the following: How the Company will restrict access achieved through dial-up connections (e.g., limiting dial-up access based upon source of request) or protects against unauthorized connections or subversion of authorized connections (e.g., using virtual private network technology). How the Company will employ automated mechanisms to facilitate the monitoring and control of remote access methods. How the Company will use cryptography to protect the confidentiality and integrity of remote access sessions. How the Company will control all remote accesses through a limited number of managed access control points. How the Company will permit remote access for privileged functions only for compelling operational needs and documents the rationale for such access in the security plan for the information system. All and only XYZ employees are issued user accounts on the PGKserver domain, with certain employees accounts giving them access to the XYZ LAN remotely via VPN connection using Cisco VPN Client or Cisco AnyConnect software. Once connected, this encrypted session will allow the user full access to any IT resources as allowed by the user account. The session will remain open for as long as there is user activity and the user has not logged out, or will timeout automatically after a specified period of inactivity. Remote user accounts will be monitored through event logs. Upon an employees termination, their PGKserver domain user account is either cancelled completely or the password changed so that they will no longer have VPN access. Individuals who do not have the appropriate local user account information will not be able to remotely access the XYZ LAN or IT systems. 5.17 USE OF EXTERNAL INFORMATION SYSTEMS Instructions: Describe how the Company will establish terms and conditions for authorized individuals to: (i) access the information system from an external information system; and (ii) process, store, and/or transmit Company-controlled information using an external information system. You may describe, for example, the following: Whether any of the Companys external information systems will be information systems or components of information systems for which the Company has no direct control over the application of required security controls or the assessment of security control effectiveness. Whether any of the Companys external information systems will include, without limitation, personally owned information systems (e.g., computers, cellular telephones, or personal digital assistants); privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, convention centers, or airports); information systems owned or controlled by nonfederal governmental contractors; and federal information systems that are not owned by, operated by, or under the direct control of the Company. Whether any of the Companys authorized individuals will include Contractor personnel, contractors, or any other individuals with authorized access to the Contractors information system and information that is not intended for public access. Whether the Company will establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. The Company should establish terms and conditions that will address as a minimum the types of applications that can be accessed on the organizational information system from the external information system. Explain how the Company will use the following control element to manage use of external information systems: A prohibition on authorized individuals using an external information system to access the information system or to process, store, or transmit Company-controlled information except in situations where the Company: (i) can verify the employment of required security controls on the external system as specified in the Companys information security policy and system security plan; or (ii) has approved information system connection or processing agreements with the Company entity hosting the external information system. XYZ, Inc. does not allow any external IT systems to join the PGKserver domain and access any of our servers or resource(s). If an individual brings an external system into our office, we have a wireless network which they can access if given the log-in credentials. Without a user account on our PGKserver domain, they do not have local user access to any of our computers or servers, only access to the Internet and Printer(s). 6. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Contractor entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls. You may describe, for example, how the Companys security awareness and training policy and procedures will be consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. Everyone at XYZ Inc. understands that participating in the NISP allows us to access classified information and that makes our company and our personnel a potential target for hostile intelligence interests. In order to ensure that we protect and limit the access to classified information, export controlled information, company proprietary information, and sensitive but unclassified information, XYZ has established a formal, documented security awareness and training policy in accordance with NISPOM 3-100. Our training program applies to all XYZ personnel, including management, corporate staff, and employees performing work on contracts, including overseas. Upon employment with XYZ each cleared employee receives an initial security briefing that includes at a minimum the following: A threat awareness briefing; A defensive security briefing; An overview of the security classification system; Employee reporting obligations and requirements; Security procedures and duties applicable to the employees job; The Special Security Agreement (SSA) for XYZ; and Execution of the SF-312, Classified Information Nondisclosure Agreement. All employees will be made aware of the protections for Classified Information and the three levels of classification: Top Secret, Secret, and Confidential. In addition, storage and data transfer procedures will also be reviewed. XYZ, Inc. does not have any storage capabilities or cleared facilities at which to discuss classified information; however, in the event our status changes to a holding facility, this ECP will be updated accordingly and XYZ, Inc. will provide an annual briefing in compliance with NISPOM 3107 which will cover any changes in security regulations, our SSA, and will reinforce our initial security briefing. To supplement this training, the FSO will also provide monthly security training on selected topics to reinforce our security program as a whole. These monthly security briefings are provided to all employees of XYZregardless of clearance status to ensure all employees are aware of their duty to protect the information they are entrusted with. Our specific security awareness and training policy and procedures, and detailed descriptions of the briefings provided to our employees, are outlined in more detail in our Standard Practices and Procedures (SPP). 6.1 SECURITY TRAINING Instructions: Describe how the Company ill identify personnel that have significant information system security roles and responsibilities during the system development life cycle, document those roles and responsibilities, and provide appropriate information system security training: (i) before authorizing access to the system or performing assigned duties; (ii) when required by system changes; and (iii) [state appropriate frequency] thereafter. You may describe, for example, the following: How the Company will determine the appropriate content of security training based on its specific requirements and the information systems to which personnel have authorized access. How the Company will provide system managers, system and network administrators, and other personnel having access to system-level software, adequate technical training to perform their assigned duties. How the Company will require a signed acknowledgement by personnel receiving security awareness training. XYZ does not currently have any personnel that have significant information system security roles and responsibilities during system development life cycle. We also do not maintain any classified or export controlled data. Should any of these items change in the future; these procedures will be updated accordingly. 7. AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Contractor entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls. You may describe, for example, how the Companys audit and accountability policy and procedures will be consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. XYZ, Inc. IT infrastructure, consisting of one physical server and approximately 10 workstation computers in less than 5000 square feet of office space, also less than 10 personnel. XYZ also employs an RFID badge system for entry and exit, with each employee assigned a unique card, and a digital video surveillance system records all after-hours movements at the external doors. These systems all produce manufacturerspecific logs that are traceable to specific personnel and are reviewed periodically by information security management personnel to detect any unusual activities that might warrant further investigation or action. 7.1 AUDITABLE EVENTS Instructions: Describe how the Companys information system will generate audit records for the following events: [list applicable events]. You may describe, for example, how the Company will (i) define auditable events that are adequate to support after-the-fact investigations of security incidents and (ii) periodically review and update the list of defined auditable events. Manufacturer-specific logging capabilities provided with the IT server, VPN firewall, alarm system, and video surveillance system, auditable events shall include: Alarm activations, e.g. motion detects, glass breaks, door opens (system is also monitored, providing immediate police dispatch) Enabling and disabling of the alarm system, due to employee accessing facility using RFID badge After-hours movements inside the facility within the view of four separate cameras (including one at each of the two external doors) Remote access to the DAC LAN via the VPN mechanism Access to certain sensitive files, e.g. company financial information All major changes to the IT server environment, e.g. system updates and/or installation of software 7.2 CONTENT OF AUDIT RECORDS Instructions: Describe how the Companys information system will produce audit records that contain sufficient information to establish what events occurred, the sources of the events, and the outcomes of the events. You may describe, for example, how the Companys audit record content will include: (i) date and time of the event; (ii) the component of the information system (e.g., software component, hardware component) where the event occurred; (iii) type of event; (iv) user/subject identity; and (v) the outcome (success or failure) of the event. The contents of XYZ, Inc. audit records contain all audited events with date/time stamped and traceable to specific individuals. Manufacturer-specific logs that provide sufficient information to accomplish these requirements shall be considered adequate for auditing purposes. 7.3 AUDIT STORAGE CAPACITY Instructions: Describe how the Company will allocate sufficient audit record storage capacity and configure auditing to reduce the likelihood of such capacity being exceeded. You may describe, for example, how the Company will provide sufficient audit storage capacity, taking into account the auditing to be performed and the online audit processing requirements. Sufficient capacity shall be provided for storing the last 12 months of audit records. Older audit records will be deleted. 7.4 AUDIT MONITORING, ANALYSIS, AND REPORTING Instructions: Describe how the Company will regularly review/analyze information system audit records for indications of inappropriate or unusual activity, investigate suspicious activity or suspected violations, report findings to appropriate officials, and take necessary actions. You may describe, for example, how the Company will employ automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: [Provide a list inappropriate or unusual activities that are to result in alerts]. In conjunction with the quarterly IS security manager meetings, the General Manager and IT Manager shall review the audit logs. Additionally, the alarm system logs (which register after-hours entries and exits) shall be reviewed weekly by the General Manager, who may prompt additional detail auditing of the other records if warranted. 7.5 TIME STAMPS Instructions: Describe how the Companys information system will provide time stamps for use in audit record generation. You may describe, for example, the following: How the Companys time stamps (including date and time) of audit records will be generated using internal system clocks. How the Company will synchronize its internal information system clocks every: [state appropriate frequency]. Clock / calendar settings for the main server, the alarm system, and the video surveillance system shall be checked and adjusted approximately once every six months, at the changeovers to their local time zone (EST, CST, PST and so on) 7.6 PROTECTION OF AUDIT INFORMATION Instructions: Describe how the Companys information system will protect audit information and audit tools from unauthorized access, modification, and deletion. You may describe, for example, how the Companys audit information will include all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. No digital-based system can ever be 100% secure from unauthorized tampering, thus we following safeguards described below: The alarm system logs are independently produced by the alarm monitoring company, using the landline connection to the system, and sent to us weekly. The ability for us to manipulate is therefore extremely limited Access to the server logs requires Administrator access, which is only granted to the General Manager and the IT Manager The alarm system, video surveillance system, and server are all independent from each other, and the logs from each can be used to corroborate the others 7.7 CONTINUOUS MONITORING Instructions: Describe how the Company will monitor the security controls in the information system on an ongoing basis. You may describe, for example, the following: How the Company will use continuous monitoring activities such as: configuration management and control of information system components, security impact analyses of changes to the system, ongoing assessment of security controls, and status reporting. How the Contractor will assess all security controls in an information system. In terms of continuous monitoring IS and employees are, employees accessing the facility afterhours when no one else is here to observe must successfully pass the alarm system. The alarm system logs are the main trigger in terms of unusual activity that needs to be looked at in further details. As per the SPP, the alarm logs are reviewed weekly by the General Manager, who will direct further auditing follow-up if unusual activity is observed. 8. CONFIGURATION MANAGEMENT POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Contractor entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls. XYZ, Inc. has a limited IT infrastructure, consisting of one physical server and approximately 10 workstation computers in less than 5000 square feet of office space, also less than 10 personnel. No classified or export-controlled data is stored on XYZs IT infrastructure, nor does XYZ, Inc. share such information with anyone outside the XYZ, Inc. facility. There are very few shared applications running on our server, and the overall IT infrastructure configuration is very stable, with only minor changes such as adding user workstations expected over the next several years. Whenever anything is added to our IT infrastructure, e.g. new software, new computers, new communications equipment, etc., both the General Manager and IT manager (who have security clearances) are closely involved and highly sensitive to any security concerns. Therefore, we do not consider a formal Configuration Management Policy to be necessary for our company. 8.1 MONITORING CONFIGURATION CHANGES Instructions: Describe how the Company [Contractor Name] monitors changes to the information system conducting security impact analyses to determine the effects of the changes. You may describe, for example, the following: How, prior to change implementation, and as part of the change approval process, the Company will analyze changes to the information system for potential security impacts. How, after the information system is changed (including upgrades and modifications), the Company will check the security features to verify that the features are still functioning properly. How the Company will audit activities associated with configuration changes to the information system. Monitoring configuration changes and conducting security impact analyses are important elements with regard to the ongoing assessment of security controls in the information system Changes that could impact the mitigation strategy by allowing additional sharing of resources or IT related services with either the foreign parent or affiliates requires prior approval by DSS (e.g., FTP sites, SharePoint or other web based collaborative platforms, VPN access to internal networks, and Corporate participation in social networking sites). This includes any item that would affect the separation from US entity and its foreign parent or affiliates. Changes to the network that do not include sharing new or additional resources with the foreign parent or affiliate do not require prior approval from DSS. Changes to the network that do not affect the security of export controlled information on the network do not require prior approval from DSS. Changes to the network must be documented in the ECP Revision Log (Attachment 4) and controlled with the established configuration management procedures. The configuration management procedures and ECP Revision Log will be inspected by DSS during the annual inspection. Anytime there is a major change to software, hardware, or other infrastructure on the IT systems, both the General Manager and IT Manager will make evaluation as to the improvement / degradation in overall security and make other changes as necessary to compensate. 8.2 ACCESS RESTRICTIONS FOR CHANGE Instructions: Describe how the Company will: (i) approve individual access privileges and enforces physical and logical access restrictions associated with changes to the information system; and (ii) generate, retain, and review records reflecting all such changes. You may describe, for example, the following: How planned or unplanned changes to the hardware, software, and/or firmware components of the information system can have significant effects on the overall security of the system. How only qualified and authorized individuals will be able to obtain access to information system components for purposes of initiating changes, including upgrades, and modifications. IT Manager, in close cooperation with the General Manager, will make changes to our IT system. 8.3 LEAST FUNCTIONALITY Instructions: Describe how the Company will configure the information system to provide only essential capabilities and specifically prohibits and/or restrict the use of the following functions, ports, protocols, and/or services: [Provide applicable list of prohibited and/or restricted functions, ports, protocols, and/or services]. This section is not applicable because, all users of our IT system require universal access. However, the privilege level for each users access is limited to the minimum required based upon that persons duties, as described in the Access Control Policy document. 9. INCIDENT RESPONSE 9.1 INCIDENT RESPONSE POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls. You may describe, for example, how the Companys incident response policy and procedures will be consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. Note: The Contractors incident response policy can be included as part of its general information security policy. Incident response procedures can be developed for the security program in general, and for a particular information system, when required. The FSO and the NETWORK ADMINISTRATOR will investigate the following ECP-related incidents: Threats reported during the daily monitoring of the IPS device Vulnerabilities coded Medium or higher reported during daily monitoring of the IPS device Suspicious activity on the network resources/servers discovered during daily audit of the server event logs Unauthorized hardware and software changes made to associate workstations Suspicious activities found during regular audits and reviews of the FSO Mailbox and Keyword Search mailbox from the Ironmail device Suspicious activities found during audit of the Electronic Communications Log or the Call Detail Report from the telephone system recording log Unauthorized entry door access alerts as reported from the security access log Suspected violations of the Export Compliance policy Classified spills via emails from the outside 9.2 INCIDENT RESPONSE TRAINING Instructions: Describe how the Company will train personnel in their incident response roles and responsibilities with respect to the information system and provide refresher training [Provide appropriate frequency, at least annually]. Security Awareness training addresses incident recognition and the requirement for the reporting of incidents. See Section 6 for more detailed information. 9.3 INCIDENT RESPONSE TESTING AND EXERCISES Instructions: Describe how the Company will test and/or exercise the incident response capability for the information system [Provide appropriate frequency, at least annually] using [Provide appropriate description] tests to determine the incident response effectiveness and documents the results. You may describe, for example, whether the Company will use NIST Special Publication 800-84 as supplemental guidance on its test, training, and exercise programs for information technology plans and capabilities. Incident testing is performed manually by the NETWORK ADMINISTRATOR and the FSO. Each situation listed in Section 9.1 has been tested. Any new items added will be tested in the same manner. Results of the testing allow the routine audits to have greater validity. 9.4 INCIDENT HANDLING Instructions: Describe how the Company will implement an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery. You may describe, for example, the following: How the Company will incorporate the lessons learned from ongoing incident handling activities into the incident response procedures and implement the procedures accordingly. How the Contractor will employ automated mechanisms to support the incident handling process. Note: Incident-related information can be obtained from a variety of sources including, but not limited to, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports. The following are the procedures for handling incidents. If the FSO, NETWORK ADMINISTRATOR, or any other employee suspects or discovers a violation of any policy or procedure, by any of our associates or the affiliates; the discovery shall be reported to the FSO for investigation. If the incident is IT-related, it is turned over to the NETWORK ADMINISTRATOR to investigate and report back to the FSO. The FSO and/or NETWORK ADMINISTRATOR will address the issue with that associate or affiliate to determine the seriousness of the incident and to determine the next step. In the case of Classified spills, if Classified data is received in error by any method, the FSO will follow the instructions specified in the Office of the Designated Approving Authority (ODAA) ISFO Process Manual, Appendix S. 9.5 INCIDENT MONITORING Instructions: Describe how the Company will track and document information system security incidents on an ongoing basis. Upon discovery or a report filed, the incident is recorded in the Incident Log spreadsheet located in a secured file on the server. The Incident Log does not replace incident reporting, mentioned in Section 9.6. The Incident Log will contain the following information. See Section 9.1 for standard reportable incident types. Separate tab for each type of incident Date of incident Description of incident The name of the employee involved (if applicable) The name of the affiliate employee involved (if applicable) Assigned to (the investigator name) Result of investigation (includes contacting the involved personnel, if applicable) Disposition Date closed The incident log is supplied to the GSC on a quarterly basis for review and is available for audit at all-time requested by the GSC or DSS. 9.6 INCIDENT REPORTING Instructions: Describe how the Company will promptly report incident information to appropriate authorities. You may describe, for example, how the Company will use automated mechanisms to assist in the reporting of security incidents. After investigation of any incident, if it is determined that the incident requires escalation, an Incident Report is generated and supplied to the XYZ COO and the Chairman of the GSC. If an employee or an affiliate is involved in the incident, a copy of the report is sent to those individuals. The GSC Chairman evaluates the Incident Report and determines the disposition of the incident and whether the incident should be reported to DSS and other appropriate authorities. 9.7 INCIDENT RESPONSE ASSISTANCE Instructions: Describe how the Company will provide an incident response support resource that offers advice and assistance to users of the information system for the handling and reporting of security incidents. (The support resource is an integral part of the Companys incident response capability.) You may describe, for example, how the Company will support incident response through (i) a help desk or an assistance group and (ii) access to forensics services as needed. The FSO should be contacted for information and advice regarding incident reporting. 10. PHYSICAL AND ENVIRONMENTAL PROTECTION 10.1 PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls. This facility is a secure facility. Entry to the facility is controlled and monitored utilizing an access control system configured to allow only employees self-entry in the facility. A security badging system is employed, which consists of a picture ID and a programmable key-fob. The picture ID must be worn on the employees person at all times inside the facility. A local, bonded security vendor provides the 24-hour security monitoring for the facility. Affiliate visitors may be allowed inside the facility if a Request to Visit has been pre-approved by the FSO and GSC for such visits. The visitor must be escorted at all times, must present valid identification at the time of the visit, must sign into the Unclassified Visit Log, and be badged according to the policy. Guest visitors, such as customers and vendors, may be allowed inside the facility, with advance notice to the FSO. These visitors must be escorted at all times, must present valid identification at the time of the visit, must sign into the Unclassified Visit Log, and be badged according to the policy. 10.2 PHYSICAL ACCESS AUTHORIZATIONS Instructions: Describe how the Company will develop and keep current a list of personnel with authorized access to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible) and issues appropriate authorization credentials. You may describe, for example, the following: How the Company will define the appropriate authorization credentials (for example, badges, identification cards, and smart cards). How Company will promptly remove from the access list personnel no longer requiring access to the facility where the information system resides. How designated officials within the Company will review and approve the access list and authorization credentials [state appropriate frequency, at least annually]. The information system is located inside the secure facility. The NETWORK ADMINISTRATOR, with oversight by the FSO, is responsible for the practicalities of establishing access for employees, and will provide the access key-fob to the employee. In the event of termination, the NETWORK ADMINISTRATOR will terminate and deactivate key-fob access to the employee. The deactivated key-fob and the picture ID is turned over to the FSO for destruction. 10.3 PHYSICAL ACCESS CONTROL Instructions: Describe how the Company will control all physical access points (including designated entry/exit points) to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible) and verify individual access authorizations before granting access to the facility. You may describe, for example, how the Company will control access to areas officially designated as publicly accessible, as appropriate, in accordance with the Companys assessment of risk. Entry into the secured area is controlled by the security access system via secured doorways. A key-fob must be swiped to allow the employee self-access to the facility itself. The Information System resides in a locked area. This area is secured with a keyed-lock and is accessible only to the FSO, NETWORK ADMINISTRATOR and the COO, each of whom have been supplied with a key. 10.4 MONITORING PHYSICAL ACCESS Instructions: Describe how the Company will monitor physical access to the information system to detect and respond to physical security incidents. You may describe, for example, the following: How the Company will review physical access logs periodically and investigate apparent security violations or suspicious physical access activities. How response to detected physical security incidents will be a part of the Companys incident response capability. How the Company will monitor real-time physical intrusion alarms and surveillance equipment. Facility Access Control System: Entry logs are downloaded weekly and reviewed by the NETWORK ADMINISTRATOR and FSO for any irregularities or potential incidents requiring report. The NETWORK ADMINISTRATOR regularly reviews the contents of security video recorded by all security cameras located within the secure area that monitors all the entry doors and other general areas. 11. CONTINGENCY PLANNING AND OPERATION 11.1 CONTINGENCY PLANNING POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls. You may describe, for example, how the Companys contingency planning policy and procedures are consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. In the event of emergency or other occurrence (such as fire, vandalism, system failure, or natural disaster) that causes damage to the Information System or other communications equipment, the appropriate individuals must act to support the restoration of operations, computing resources, and critical data. Evaluation of the level of emergency and the level of response is the responsibility of the COO, NETWORK ADMINISTRATOR and the FSO. 11.2 CONTINGENCY PLAN Instructions: Describe how the Company will develop and implement a contingency plan for the information system addressing contingency roles, responsibilities, assigned individuals with contact information, and activities associated with restoring the system after a disruption or failure. You may describe, for example, how designated officials within the Company will review and approve the contingency plan and distribute copies of the plan to key contingency personnel. Currently there are no redundancies of network hardware, application software or other computer resources, but the critical data is backed up on a regular basis and stored in the following manner. PGKserver and other servers are backed up on a daily, weekly and monthly schedule. Daily backups are incremental backups and are retained for 30 days. Weekly backups are retained for 30 days. Monthly backups are retained for 1 year. Daily and weekly backups are retained in a fire-proof safe that is locked and secured. Monthly backups are retained as follows: 1) first 6 months are secured in safety deposit box at the bank; 2) last 6 months are secured in a fire-proof safe located in the facility. Symantec backup software is installed on all critical computers. Daily incremental backup of user data and emails files are automated to backup on a regularly scheduled basis, without user intervention. The resulting backup files are stored in the protected backup folder on the PGKserver server. This software provides an additional layer of protection from data loss. In the event of hardware and other computer resources are destroyed, procurement of replacement computer resources will be implemented and installed as mentioned in Section 11.3. In the case of damage or destruction of the telephone system, procurement of replacement telephone hardware, switch, and voice mail system will be implemented and installed. The company-owned cell phones will serve as a contingency until the phone system is installed and available for use. 11.3 INFORMATION SYSTEM RECOVERY AND RECONSTITUTION Instructions: Describe how the Company will employ mechanisms with supporting procedures to allow the information system to be recovered and reconstituted to a known secure state after a disruption or failure. Depending on the evaluation of the level of emergency and the need for replacement network hardware, applications software, or other computer resources, the critical data mentioned in Section 11.2 will be available for the Network Administrator to reinstall in order to reestablish computer operations and communications. Simplified steps to recover from emergency follow below. Procurement of new equipment and software. Install and cable equipment. Configure routers, firewall and ISP device. Install Operating System on all servers. Configure new domain controllers. Configure new email device. Configure new data servers (email, FTP, data storage, mobile device) and place them on the domain. Restore data from backups to the servers. 12. SYSTEM AND COMMUNICATIONS PROTECTIONS 12.1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls. You may describe, for example, how the Companys system and communications protection policy and procedures will be consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. The NETWORK ADMINISTRATOR, as mentioned in Section 10, is physically located in a locked Server Room in the access-controlled facility. Information system hardware itself is physically accessible to three individuals, the NETWORK ADMINISTRATOR, the COO, and the FSO. The information system resources are accessible only by employees who have been set up with accounts, rights and privileges to use the resource, by the NETWORK ADMINISTRATOR. A number of devices serve to protect the information system from unauthorized access by affiliates, outside and inside threats. These devices are the Firewall, the Intrusion Protection System device, and the email device. The NETWORK ADMINISTRATOR is responsible for monitoring the use of the information system on a daily basis. Review and audit of the event logs, reports and the standard Operating System monitoring tools is performed daily. The Telephone System is a stand-alone system physically located in the locked Server Room in the access-controlled facility. The telephone line, switch and control hardware is physically accessible to three individuals, the NETWORK ADMINISTRATOR, the COO, and the FSO. In the secure location and separated by its own switch, the telephone system is accessible only to company associates who are set up by the NETWORK ADMINISTRATOR to have access. The NETWORK ADMINISTRATOR is responsible for monitoring the use of the telephone system and is responsible for the upkeep and security of the system. 13. APPLICATION PARTITIONING (IF APPLICABLE) Instructions: Describe how the Companys information system will separate user functionality (including user interface services) from information system management functionality. You may describe, for example, how the Companys information system will physically or logically separate user interface services (e.g., public web pages) from information storage and management services (e.g., database management). Note: Separation may be accomplished through the use of different computers, different central processing units, different instances of the operating system, different network addresses, combinations of these methods, or other methods as appropriate. The IS is comprised of multiple servers that separate functionality of the various components of the system and multiple user workstations. Separation is accomplished by physically segregating certain functions to separate servers, each with its own internal IP address. This separation is transparent to the system users. The servers are as follows. XYZ Domain Controllers (PGKserver and MKserver) Function: Authentication of user login credentials to gain access to the network. Email Server (KMKserver), Function: Processes and serves incoming and outgoing emails. Data Storage Server (MMKserver) Function: File/Printer server and the only data storage server on the network. Secure mobile email Server (PGMKserver) Function: Processes emails arriving from email Server and sends out to mobile devices. FTP Server (PGKFTP01) Function: Provides File Transfer Protocol file system to allow XYZ, Inc. and its customers to pick up and transfer files that are too large to email. PGP Encryption Universal Server (PGP.EncUniSer.COM); Function: Centrally managed configuration Server for PGP Whole Disk Encryption Policy Deployment and password resets. Accounting/Finance Server (SMKserver); Function: Processes all Accounting transactions, Financial reporting, Time-Keeping and Costs by Program. 13.1 INFORMATION REMNANCE Instructions: Describe how the Companys information system will prevent unauthorized and unintended information transfer via shared system resources. You may describe, for example, how the Company will control information system remnance, sometimes referred to as object reuse, or data remnance, in order to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after that resource has been released back to the information system. All laptops, workstations, and servers being disposed of have all storage systems erased using DOD approved methods, and removed, by the NETWORK ADMINISTRATOR. Computers being redeployed for other uses or functions are formatted and the default OS is reloaded on newly purchased hard drives. Secure mobile email phones being disposed are wiped and erased and then have the SIM card removed. Secure mobile email phones being redeployed are wiped and with a newly purchased SIM card. 13.2 DENIAL OF SERVICE PROTECTION Instructions: Describe how the Companys information system will protect against or limits the effects of the following types of denial of service attacks: [please list types of denial of service attacks or reference to source for current list]. You may also describe, for example, the following: How the Company will use a variety of technologies to limit, or in some cases, eliminate the effects of denial of service attacks. How the Company will use boundary protection devices to filter certain types of packets to protect devices on the Companys internal network from being directly affected by denial of service attacks. How the Companys information systems that are publicly accessible will be protected by employing increased capacity and bandwidth combined with service redundancy. The Information System utilizes the functionality of the IPS device to avert DOS attacks. This device offers packet filtering to protect the network resources from these attacks and will automatically limit and/or block the port(s) that it is attempting to access. Refer to Section 14.5 for more information on the device. 13.3 BOUNDARY PROTECTION Instructions: Describe how the Companys information system will monitor and control communications at the external boundary of the information system and at key internal boundaries within the system. You may describe, for example, the following: How the Company will use connections to the Internet, or other external networks or information systems, that occur through managed interfaces consisting of appropriate boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels) arranged in an effective architecture (e.g., routers protecting firewalls and application gateways residing on a protected subnetwork commonly referred to as a demilitarized zone or DMZ). How the Company will use information system boundary protections at any designated alternate processing sites provide the same levels of protection as that of the primary site. How the Company will consider the intrinsically shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. How the Company will use commercial telecommunications services that are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may include third party provided access lines and other service elements. Explain how the Company will use the following control elements to protect information system boundaries: Physical allocation of publicly accessible information system components to separate subnet works with separate, physical network interfaces. Prevention of public access into the Companys internal networks except as appropriately mediated. Limits on the number of access points to the information system to allow for better monitoring of inbound and outbound network traffic. A managed interface (boundary protection devices in an effective security-architecture) with any external telecommunication service, implementing controls appropriate to the required protection of the confidentiality and integrity of the information being transmitted. An information system that denies network traffic by default and allows network traffic by exception (i.e., deny all, permit by exception). The Information Systems utilizes the following boundary protection devices: CISCO ASA security device (router and firewall) Palo Alto IPS device (firewall) IronMail (includes a firewall) 13.4 TRANSMISSION INTEGRITY Instructions: Describe how the Companys information system will protect the integrity of transmitted information. The network is comprised of commercially available hardware, software and protocols. Transmission integrity is protected as follows: Inside the facility, domain authentication and encryption. Additional layer of integrity is provided by the firewall device. VPN connection transmission integrity is protected by IPSec. 13.5 TRANSMISSION CONFIDENTIALITY Instructions: Describe how the Companys information system will protect the confidentiality of transmitted information. The network is comprised of commercially available hardware, software and protocols. Transmission confidentiality is protected by Transport Layer Security (TLS) protocol through the Internet Explorer browser. 13.6 NETWORK DISCONNECT Instructions: Describe how the Companys information system will terminate a network connection at the end of a session or after [state appropriate time period] of inactivity. You may describe, for example, whether and how the Company will apply this control within the context of risk management that considers specific mission or operational requirements. Remote sessions that are inactive for 30 minutes are terminated by the remote server. 13.7 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT Instructions: Describe how the Company will establish and manage cryptographic keys (when cryptography is required and employed within the information system) using automated mechanisms with supporting procedures or manual procedures. Not Applicable, because XYZ, Inc. will not establish or manage crypto. 13.8 COLLABORATIVE COMPUTING Instructions: Describe, if applicable, how the Companys information system will prohibit remote activation of collaborative computing mechanisms and provides an explicit indication of use to the local users. You may describe, for example, how the Companys collaborative computing mechanisms, if any, will include, for example, video and audio conferencing capabilities. Note: explicit indication of use includes, for example, signals to local users when cameras and/or microphones are activated. No video conferencing equipment, thus XYZ has no video conferencing capabilities. Public collaborative applications available on the internet, are prohibited by policy and further, are blocked by the firewall. 13.9 MOBILE CODE Instructions: Describe how the Company will (i) establish usage restrictions and implementation guidance for mobile code technologies based on the potential to cause damage to the information system if used maliciously; and (ii) authorize, monitor, and control the use of mobile code within the information system. Firewall services, Antivirus/Malware software and user education are utilized to minimize threats from mobile code. Additionally, rules in email server are used to block executables, scripts and macros from entering the system. 13.9.1 Internet browsers default to higher security settings. 13.9.2 Users are regularly informed by security notices about the dangers or threats that they may receive, and are warned about specific executable scripts and executables that may arrive in emails or on websites. 13.9.3 Email utilizes internal spam filters to screen spoofed emails or mail with possible malicious attachments. 13.9.4 All workstations and laptops have virus protection and firewall software that is automatically updated on a daily basis with the latest .dat files. If a workstation or laptop is found to contain malicious files, the machine is immediately disconnected from the network and the NETWORK ADMINISTRATOR is notified. 13.9.5 Office applications default to a higher security setting where macros are disabled by default. 13.9.6 All files received by email are automatically scanned for malicious content when accessed. Users perform virus scans on all external hard drives that the users access. 13.10 VOICE OVER INTERNET PROTOCOL Instructions: Describe how the Company will (i) establish usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and (ii) authorize, monitor, and control the use of VoIP within the information system. Not Applicable because, no VoIP device is permitted. 13.11 SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) Instructions: Describe how the Companys information system will provide name/address resolution service and additional data origin and integrity artifacts along with the authoritative data it returns in response to resolution queries. You may describe, for example, how the Company will enable remote clients to obtain origin authentication and integrity verification assurances for the name/address resolution information obtained through the service. Note: A domain name system (DNS) server is an example of an information system that provides name/address resolution service; digital signatures and cryptographic keys are examples of additional artifacts; and DNS resource records are examples of authoritative data. The network utilizes DNS server to provide name and address resolution, ensuring complete control & security of the network DNS request records. 13.12 ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE Instructions: Describe how the Companys information systems will collectively provide name/address resolution service for the Company that are fault tolerant and implement role separation. You may describe, for example, the following: How the Company will use a domain name system (DNS) server as an information system that provides name/address resolution service. To eliminate single points of failure and to enhance redundancy, how the Company will use at least two authoritative domain name system (DNS) servers, one configured as primary and the other as secondary. How the Company will use two servers located in two different network subnets and geographically separated (i.e., not located in the same physical facility). If the Companys information technology resources are divided into those resources belonging to internal networks and those resources belonging to external networks, how the Company will use authoritative DNS servers with two roles (internal and external). Explain (i) how the Companys DNS server with the internal role will provide name/address resolution information pertaining to both internal and external information technology resources while the DNS server with the external role only provides name/address resolution information pertaining to external information technology resources and (ii) specify the list of clients who can access the authoritative DNS server of a particular role. The network utilizes DNS server to provide name and address resolution, ensuring complete control & security of our DNS records. There are two (2) servers dedicated to DNS on the network (primary, backup). 13.13 SESSION AUTHENTICITY Instructions: Describe how the Companys information system will provide mechanisms to protect the authenticity of communications sessions. You may describe, for example, how the Company will focus its session authenticity controls on communications protection at the session, versus packet, level in order to implement session-level protection where needed (e.g., in service-oriented architectures providing web-based services). All sessions require valid user authentication via internally controlled user IDs and passwords. Passwords are required to be changed every 42 days. Sessions are invalidated upon user logout or session termination. 13.14 MALICIOUS CODE PROTECTION Instructions: Describe how the Companys information system will implement malicious code protection. You may describe, for example, the following: How the Company will employ malicious code protection mechanisms at critical information system entry and exit points (e.g., firewalls, electronic mail servers, web servers, proxy servers, remote-access servers) and at workstations, servers, or mobile computing devices on the network. How the Company will use the malicious code protection mechanisms to detect and eradicate malicious code (e.g., viruses, worms, Trojan horses, spyware) transported: (i) by electronic mail, electronic mail attachments, Internet accesses, removable media (e.g., USB devices, diskettes or compact disks), or other common means; or (ii) by exploiting information system vulnerabilities. How the Company will update malicious code protection mechanisms (including the latest virus definitions) whenever new releases are available in accordance with Company configuration management policy and procedures. How the Company will use malicious code protection software products from multiple vendors (e.g., using one vendor for boundary devices and servers and another vendor for workstations). The Intrusion Protection System (IPS) mentioned in 13.15 offers real-time protection from malicious code. The IPS malware, virus, and spyware database is updated weekly to provide current vigilant protection. The IPS also offers threat notification, if malicious code is detected. In addition, McAfee ViruScan Enterprise edition has been installed on all network resources and user workstations. The NETWORK ADMINISTRATOR has configured each server and workstation to update the signature files on a daily basis, to provide the greatest protection. 13.15 INFORMATION SYSTEM MONITORING TOOLS AND TECHNIQUES Instructions: Describe how the Companys [Contractor Name] employs tools and techniques to monitor events on the information system, detect attacks, and provide identification of unauthorized use of the system. You may describe, for example, the following: How the Companys information system monitoring capability will be achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, audit record monitoring software, network monitoring software). How the Companys monitoring devices will be strategically deployed within the information system (e.g., at selected perimeter locations, near server farms supporting critical applications) to collect essential information. How the Companys monitoring devices will be deployed at ad hoc locations within the system to track specific transactions. How the Companys monitoring devices will be used to track the impact of security changes to the information system. How the granularity of the information collected will be determined by the Company based upon its monitoring objectives and the capability of the information system to support such activities. How the Company will consult appropriate legal counsel with regard to all information system monitoring activities. How the Company will heighten the level of information system monitoring activity whenever there is an indication of increased risk to operations, assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information. How the Companys information system will monitor inbound and outbound communications for unusual or unauthorized activities or conditions. Note: Unusual/unauthorized activities or conditions include, for example, the presence of malicious code, the unauthorized export of information, or signaling to an external information system. The tools and techniques used by the IS to monitor events, deter attacks and provide unauthorized use of the information system are as follows. Network Firewall Device The network is protected by a firewall appliance that prevents and monitors certain information flow originating from external IS, direct computer connections (such as peer-to-peer), and Internet connections. Intrusion Protection System IPS (The device is a Malo Klto 5000 (MK-5000) has been installed to allow the NETWORK ADMINISTRATOR to monitor and control employee access and intrusions on a real-time basis; and to provide another layer of security to avert outside threats. The device provides a layer of security in the monitoring of Internet traffic on the network. The MK-5000 provides administrative control over the content relayed through the device by supporting user authentication, to control web access and to ensure that Internet usage conforms to the acceptable use policy. The IPS also provides the following control to the Internet access. Denial of access to, or blacklisting of certain URLs to which policy prohibits access, including all web-based email and social networking sites. Monitoring and logging of Internet access and usage by users to provide detailed information about the URLs accessed by specific users and to monitor bandwidth usage statistics. Capable of generating detailed reports. 14. MAINTENANCE 14.1 SYSTEM MAINTENANCE POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, information system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the information system maintenance policy and associated system maintenance controls. You may describe, for example, the following: How the Companys information system maintenance policy and procedures will be consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. How the Companys information system maintenance policy will be included as part of its general information security policy. How the Companys system maintenance procedures will be developed for the security program in general, and for a particular information system, when required. How the Company will require maintenance personnel to be a U.S. citizen under direct contract with the Company or through entities organized and existing in the United States. How the Company will require each maintenance personnel to be a U.S. citizen and under contract with the Company directly or through entities organized and existing in the United States. The NETWORK ADMINISTRATOR is responsible for all aspects of the Information System. All purchases of new equipment, repair of existing equipment, and maintenance of all computer and network resources must be implemented by the Network Administrator with oversight by the FSO and the COO. 14.2 CONTROLLED MAINTENANCE Instructions: Describe how the Company will schedule, perform, document, and review records of routine preventative and regular maintenance (including repairs) on the components of the information system in accordance with manufacturer or vendor specifications and/or Company requirements. You may describe, for example, the following: How the Companys maintenance activities, including without limitation routine, scheduled maintenance and repairs will be controlled. Whether the Companys maintenance activities will be performed on site or remotely and whether the equipment is serviced on site or removed to another location. How Company officials will approve the removal of the information system or information system components from the facility when repairs are necessary. If the information system or component of the system requires off-site repair, how the Company will remove all information from associated media using approved procedures. After maintenance is performed on the information system, how the Company will check all potentially impacted security controls to verify that the controls are still functioning properly. How the Company will maintain maintenance records for the information system that include: (i) the date and time of maintenance; (ii) name of the individual performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) a list of equipment removed or replaced (including identification numbers, if applicable). Controlled maintenance of Network resources is the responsibility of the Network Administrator. The Network Administrator performs all maintenance that he can perform within his scope of knowledge. All servers and workstations are updated regularly by Windows Update, and asset management system. McAfee ViruScan Enterprise installed as virus protection on all workstations and servers as mentioned in Section 13.14. In the event that the maintenance of the information system requires the expertise of an outside authorized device maintenance contractor, the Network Administrator contacts the appropriate approved company to schedule service. The Network Administrator retains a record of all maintenance and repairs performed 14.3 MAINTENANCE TOOLS Instructions: Describe how the Company will approve, control, and monitor the use of information system maintenance tools and maintains the tools on an ongoing basis. You may describe, for example, how the Company will address hardware and software brought into the information system specifically for diagnostic/repair actions (e.g., a hardware or software packet sniffer that is introduced for the purpose of a particular maintenance activity). Note: Hardware and/or software components that may support information system maintenance, yet are a part of the system (e.g., the software implementing ping, ls, ipconfig, or the hardware and software implementing the monitoring port of an Ethernet switch) are not covered by this control. The following tools are available to update servers and workstations with all available patches and hot fixes: Asset Management System Windows Update (WSUS) Antivirus Update Portable Document File Updater Java updates Microsoft Office Update PGP Encryption Universal Server 14.4 REMOTE MAINTENANCE Instructions: Describe how the Company will authorize, monitor, and control any remotely executed maintenance and diagnostic activities, if employed. You may describe, for example, the following: How the Companys remote maintenance and diagnostic activities will be conducted by individuals communicating through an external, non-Company-controlled network (e.g., the Internet). How the Companys remote maintenance and diagnostic tools will be used, and its use documented, consistent with its organizational policy. How the Company will maintain records for all remote maintenance and diagnostic activities. How the Company will use other techniques and/or controls for improving the security of remote maintenance including without limitation: (i) encryption and decryption of communications; (ii) strong identification and authentication techniques (such as Level 3 or 4 tokens as described in NIST Special Publication 800-63); and (iii) remote disconnect verification. When remote maintenance is completed, how the Company (or its system) will terminate all sessions and remote connections invoked in the performance of that activity. How the Company will audit all remote maintenance and diagnostic sessions and appropriate Contractor personnel review the maintenance records of the remote sessions. How the Company will address the installation and use of remote maintenance and diagnostic links. Not applicable because remote maintenance is prohibited on any network resources. 14.5 MAINTENANCE PERSONNEL Instructions: Describe how the Company will allow only authorized personnel to perform maintenance on the information system. You may describe, for example, the following: How the Companys maintenance personnel (whether performing maintenance locally or remotely)will receive appropriate access authorizations to the information system when maintenance activities allow access to Company information or could result in a future compromise of confidentiality, integrity, or availability. When maintenance personnel do not have needed access authorizations, how Contractor personnel with appropriate access authorizations will supervise maintenance personnel during the performance of maintenance activities on the information system. The Network Administrator performs all maintenance that he can perform within his scope of knowledge. If an authorized service contractor or consultant is required for certain maintenance and/or repair functions, the Network Administrator will verify with the contractor, prior to scheduling service, the citizenship of the individual who is deployed to service the equipment. When service personnel arrive at the site for the appointment, the Network Administrator verifies the credentials and ensures that the service personnel are eligible for entry and access to the IS. The sign-in procedures are followed requiring photo identification and declaration of citizenship. 15. MEDIA PROTECTION 15.1 MEDIA PROTECTION POLICY AND PROCEDURES Instructions: Describe how the Company will develop, disseminate, and periodically review/update: (i) a formal, documented, media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among Company entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the media protection policy and associated media protection controls. You may describe, for example, how the Companys media protection policy and procedures will be consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. Protection of all media introduced into the computing environment is ultimately the responsibility of the Network Administrator and the FSO. However, it is imperative that all employees act responsibly and follow the guidelines established that prohibit use of external media until it has presented to the Network Administrator for a virus check to be executed. 15.2 MEDIA ACCESS Instructions: Describe how the Company will (i) restrict access to information system media to authorized individuals and (ii) employ automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted. All authorized individuals have access to the following types of media: CDs and DVDs Thumb Drives External Hard Drives 15.3 MEDIA SANITIZATION AND DISPOSAL Instructions: Describe how the Company will sanitize information system media, both digital and non-digital, prior to disposal or release for reuse. You may describe, for example, the following: How the Companys sanitization process will remove information from information system media so there is reasonable assurance, in proportion to the confidentiality of the information, that the information cannot be retrieved or reconstructed. How the Companys sanitization techniques, including clearing, purging, and destroying media information, will prevent the disclosure of Company information to unauthorized individuals when such media is reused or disposed. CDs and DVDs are shredded. Thumb Drives are scanned for malware and viruses and then wiped a minimum of 8 times. External Hard Drives are scanned for malware and viruses and then wiped and formatted. PGP Whole Disk Encryption software on all user workstations hard drives to prevent unauthorized access to the encrypted hard drive in case workstation is lost or stolen. IS media is reformatted a minimum of eight (8) times prior to redeployment or disposal. All drives that are reformatted and not immediately reused are stored in a locked cabinet in the IT area. 16. EXPORT CONTROL PROCEDURES Instructions: Describe or reference the document containing the Companys export control procedures as applicable. If a third party provider is administering the Companys network, please describe the Companys procedures in place to ensure that export control violations do not occur with respect to the third party providers administration of the Companys network. Reference Document: Technology Control Plan (2002-TCP-003) The Technology Control Officer (TCO) has the responsibility for Export Control of all facilities. Although an occasional need to ship export-controlled product from the United States, thus requiring a DSP-5 be approved by the Department of State; the majority of exports is Technical Data. Technical Data also requires either an approved DSP-5 (Proposal stage) or Technical Assistance Agreement (Program stage). TCO monitors network activities including emails, FTP, and other resources to be vigilant that export rules are being followed. If during the monitoring process the FSO or Network Administrator discovers a violation of export restrictions, by any associates, affiliates, and/or customers; the Incident Reporting procedure mentioned above (Section 9) will apply. Copies of all approved Hardware Export Licenses and shipping invoices are maintained by the TCO and are available for audit at all times. Copies of all approved Technical Data Export Licenses are maintained by the TCO and are available for audit at all times. As mentioned in Section 4 and recited here, the Network IS is not an accredited Information System. To that end, only certain classifications of data may be stored, received, or transmitted over the network resources. Rules regarding the classifications follow below. Classified Data is prohibited from storage to the any server, workstations, and external devices used for storage. Classified data cannot not be transmitted or received via the network resources. Controlled Unclassified Information (CUI) may be stored on the server in protected, limited access folders, but may not be stored on user workstations or external storage devices. CUI data may be received and transmitted according to the TCP and Export Control Policies and Procedures, if approved by the appropriate US Government export authority, approved by the TCO, and if appropriately marked with a notification statement such as the example that follows: NOTICE: ITAR RESTRICTED DATA: IF YOU HAVE RECEIVED THIS INFORMATION/DATA IN ERROR, PLEASE CONTACT THE SENDER, DELETE THE MESSAGE AND/OR RETURN THE DATA. This communication and/or attached data, in electronic or hardcopy form, contain EXPORT CONTROLLED information and are subject to control under ITAR. The transfer of technical data and/or defense services to facilitate response to xxxx RFP # 10MS060for a specificCommon Intelligent Display, is authorized only between Barco Federal Systems, LLC in the United States and Barco, NV in Belgium and Barco View Texen in France , in furtherance of DSP-5 Export License No. xxxxxx. Communication and dissemination of the ITAR information contained herein is allowed on a need-to-know basis in accordance with said Export License approval provisions. Please address any questions or concerns to your local Barco US Export Control Officer/Empowered Official. CUI information must be stored in protected folders on the network with individual access assigned by the Network Administrator, with approval of the TCO. An exception to this rule is the FTP site; CUI technical information may not be stored on the FTP at any time. CUI may be transmitted by the sender via electronic mail or contained on CDs or DVDs that are delivered by the US mail service. The primary contacts for receiving CUI are the FSO/Export Compliance Officer and the Director of Programs and Proposals. These two individuals will be responsible for protecting the contents of the CUI and placing the CUI in the protected folders on the network as mentioned above. If the CUI has been emailed, the contact must move the CUI marked email and/or attachments to a protected folder on the network. The email will be deleted from the users email box on the email Server. If the CUI is received in the form of CDs or DVDs, the CUI may be stored on the server in a protected folder. The original media will be given to the FSO/Export Compliance Officer to store in the locked Contracts file room. Unclassified Data may be stored on the server and user workstations and may be received and transmitted. Careful consideration must be applied as to sensitivity of this information in any case. 17. ADDITIONAL FOCI PROCEDURES 17.1 TELEPHONE PROCEDURES Instructions: Describe how the Companys maintains a log to reflect telephone activity between it or its subsidiaries, on the one hand, and its parent or affiliates of the parent on the other hand, in accordance with the specific requirements of the applicable FOCI mitigation agreement. Teleconferences will be treated as telephone activity. Subject to the express terms of the Companys mitigation agreement, which may allow some discretion or variation in this respect, DSS assumes that video teleconferences are also visits subject to each of the visitation requirements set out in the Companys mitigation agreement. In such case, video teleconferences need not also comply with any applicable telephone procedures. You may describe, for example, the following: How the log will be reviewed by the FSO, the GSC and DSS. How the log will include the Name, Position/Title of the Individual maintaining the log, the Name, Position/Title of the individual parties to the call, and brief remarks that reflect the general topic of the conversation. How a summary of this data will be prepared in support of the annual meeting report. Telephone Activity and Usage All office landline and mobile telephone communications between any associates and the Affiliates are subject to monitoring. Telephone calls are defined as incoming and outgoing calls using office phones or associate mobile phones. Associates personal mobile cell phones are not to be utilized for work-related activities. Monitoring Responsibility The FSO and the GSC share the responsibility for monitoring this access and the review of these communications. Monitoring Method and Review All associates and representatives will maintain an Electronic Communications Log (ECL) to contain a daily record of these types of communications. The ECL will include the Associates Name, Position/Title of the person maintaining the log, the Name, Position/Title of the individual parties to the call, and brief (Unclassified) remarks that reflect the general topic of the conversation. ECLs for the completed month shall be submitted to the FSO at the completion of each month for audit purposes. For the landline office phones, a Call Detail Recording (CDR) report is provided to the FSO on a monthly basis by the Network Administrator. This CDR itemizes the successfully connected calls made to and from the office phones, segregated by phone number. For the associate mobile phones, a call detail report from the mobile phone carrier is downloaded from the carriers website, itemizing the successfully connected calls made to and from each mobile phone, segregated by phone number. The FSO audits the submitted ECLs monthly. Approximately 20% of the telephonic communications are audited for the entire group of all associates. The audit process for the ECL will entail a random comparison of the associates ECL against the office telephone records and mobile phone records, and a random review of the content disclosed in the subject line of the ECL. The ECLs are submitted to the GSC for monthly review upon completion of the FSO audit and report. The FSO and the GSC may require further explanation from the associate as to the content of the phone call. Reporting Requirement If during the review of the ECLs, the FSO or a member of the GSC discovers the improper use of telephone communications, the discovery is reported to the COO, the Chairman of the GSC, and if validated, to the DSS. 17.2 FACSIMILE PROCEDURES Instructions: Describe how the Company will maintain a log to reflect telephone activity between it or its subsidiaries, on the one hand, and its parent or affiliates of the parent on the other hand, in accordance with the specific requirements of the applicable FOCI mitigation agreement. You may describe, for example, the following: How the log will be reviewed by the FSO, the GSC and DSS. How the log will include the Name, Position/Title of the Individual maintaining the log, the Name, Position/Title of the individual parties to the fax, and brief remarks that reflect the general topic of the fax. How a summary of this data will be prepared in support of the annual meeting report. FAX Activity and Usage All FAX communications between associates and the any affiliates are subject to monitoring. FAX calls are defined as incoming and outgoing FAX communications initiated or received by the FAX device. General note: This technology is used very rarely between the associates and the Affiliates for purposes of communication. Monitoring Responsibility The FSO has the responsibility for monitoring this access and the review of this communication. Monitoring Method and Review All associates are required to log fax communications onto an ECL. The ECLs are submitted by associates to the FSO monthly for review and auditing purposes. The copy machine contains the facsimile device. Each associate is assigned a PIN for outgoing FAX calls. A report of all fax numbers called and received is generated as needed, directly from the FAX device, by the FSO for audit purposes. On a monthly basis, the FSO will review the FAX report and compare to the associate ECLs. Fax communications are so rarely used that 100% of the fax communications are compared to the ECLs each month during the audit. Reporting Requirement If during the review of the FAX report, the FSO or a member of the GSC discovers the improper use of FAX communications, the discovery is reported to the COO, the Chairman of the GSC, and if validated, to the DSS. 17.3 COMPUTER COMMUNICATIONS Instructions: Describe whether the Company will use Microsoft Outlook email, computer fax, VTC, instant messaging, FTP, and/or other applicable computer communication tools. You may describe, for example, the following: How the Companys computer communication systems will be monitored and controlled to ensure compliance with the mitigation agreement. How the Companys computer network server for unclassified email of the cleared company will be owned by the cleared company and monitored using [describe monitoring software]. How the Companys firewalls will be used to protect [describe specific access protected by firewalls]. Note: Computer-based video teleconferences must be described here. Subject to the express terms of the Companys mitigation agreement, which may allow some discretion or variation in this respect, DSS assumes that video teleconferences are also visits subject to each of the visitation requirements set out in the Companys mitigation agreement. In such case, video teleconferences need not also comply with any applicable telephone procedures. However, all other applicable procedures related to how the Companys computer communication systems will be monitored and controlled to ensure compliance with the mitigation agreement will nevertheless apply to computer-based video teleconferences regardless of the device used to access the Companys computer communication systems. EMAIL COMMUNICATIONS Email Connection and Usage Window based electronic mail (email) software used for all email communications. Associates are required to log in to the secure server system with a company-assigned User Name and a user-created complex password, to send and receive emails, using one of the following access methods. LAN connection inside the facility. VPN connection, utilizing a RSA security token issued to authorize users by the Network Administrator, for access from a remote location. Web Access to access email software or email communications from externally, are prohibited. There are no subsidiaries that require email monitoring. Monitoring Responsibility The FSO and the GSC share the responsibility for monitoring this access and review of this type of communication. Monitoring Method and Review The email monitoring process will entail review of the text of emails and attachments, to ensure that the information received, conveyed or disclosed is not classified information or an unauthorized export of controlled unclassified information. Review will also ensure that information being disclosed is not subject to special authorization, limitation, or restriction, and that no attempt is made to improperly control or influence, in accordance with the provisions of the SSA. Email monitoring device is used to capture all email traffic between associates and the Affiliates. A copy of each email sent to and received from the parent companys domain is collected and placed in the FSO Mailbox for review by the FSO and members of the GSC. For the primary email review, utilizes a keyword search program. Emails which contain one or more of these key words in the subject line, the body of the email or contained in any attachments to the email, are routed to a Keyword Search Mailbox for immediate review by the FSO. Currently, 100 percent of these emails and attachments arriving in the Keyword Search mailbox are being reviewed on a daily basis by the FSO. (It is recommended that each contractor work with DSS to determine the sampling percentage that may effectively mitigate risk based on the volume of emails.) The keyword search list is regularly reviewed by the FSO and is submitted for approval on a quarterly basis to the members of the GSC. All changes to the keyword search list are subject to GSC approval in advance of implementation. A revision list is maintained on the server for audit purposes. As a secondary email review, the FSO Mailbox is randomly reviewed. A minimum of five percent of these total captured emails communicated between the associates and the Affiliates is reviewed by the FSO and GSC. The FSO reviews emails in this mailbox on a weekly basis. In addition to the FSO, members of the GSC shall participate in the review of email communications on a monthly basis. To accommodate the GSC review of emails, an archive software program is utilized to move randomly selected emails to a secure folder on the FTP server. GSC members receive notification by email from the FSO that the files are posted to the FTP server and are available for review. A password is required for access to the email review folders by the GSC members. Metrics for email communications resulting from the FSO review are reported to the GSC on a monthly basis. Reporting Requirement If during the review of email, the FSO or a member of the GSC discovers the improper transfer of information or an attempt to improperly influence any employee (a violation of FOCI), the discovery is reported to the COO, the Chairman of the GSC, and if validated, to the DSS. COMPANY-OWNED SECURE MOBILE EMAIL DEVICES A secure mobile email device is the standard. All these devices are company owned. Authorization for associates to have access to a company owned mobile device must be approved by the COO. The Network Administrator is responsible for monitoring and controlling this access and this resource. Phone calls originated and received by the company owned mobile device between associates and Affiliates must be reported according to the Telephone Procedures in Section 17.1. All company email is distributed through the company server(s). Company email is served to and from the mobile device by the email server through the mobile email software located on the secure server. Emails received and sent via the device between the associates and the Affiliates are captured and reviewed according to the email communications policy discussed above. Security of communications for the mobile email device is primarily provided by the authentication and encryption services built-in to the company owned mobile device suite software installed on the network controlling mobile email distribution. S/MIME encryption has been enabled in the suite to add an additional layer of encryption. All company owned mobile device must be requested through the Network Administrator. Repair of company owned mobile device must be referred to Network Administrator for disposition. Associates personal mobile devices are prohibited for work-related activities. Network Admin retains control of all mobile devices via the email server. In the event that the device is lost or stolen, all data on the device is wiped and the device is disabled. COMPUTER FAX Computer fax capabilities are disabled. INSTANT MESSAGING Access and use of public (external) Instant Messaging services is prohibited by the policy on company-owned connections or equipment. The IPS device has a configured policy enabled that prohibits this service. VIDEO AND WEBEX TELECONFERENCES VTC are not installed inside the facility. From time to time, associates may attend VTCs outside the facility. WebEx teleconferencing inside the facility in not installed. The video connection is accomplished using the WebEx communication tools available on the Internet to present a PowerPoint presentation. Voice connection for this type of teleconference is provided via the telephone system using a Polycom. Administration and Monitoring Responsibility FSO shall preform the oversight, including monitoring and review of WebEx communications inside and the outside of the facility between the associates and the Affiliates. The Network Admin is responsible for all the internal WebEx meetings. Approval Method, Monitoring and Review WebEx conferences initiated from inside the facility, a Request to Visit be submitted in advance as required by the SSA. The request must include information regarding the content of WebEx to ensure that information conveyed or disclosed is not classified information, an unauthorized export of controlled unclassified information, or otherwise restricted information. Upon approval of the Request to Visit according to the visit policy guidelines outlined in the SSA Implementing Procedures, the Network Administrator will set up the WebEx, and create and communicate the access point to the participants. Associates who participate in WebEx or VTC communications outside the facility with Affiliates are required to submit a Request to Visit in accordance with visit policy guidelines, as detailed above. The request must contain enough information regarding the WebEx or VTC visit to allow a determination to be made by the approval authority that information conveyed or disclosed is not classified information, an unauthorized export of controlled unclassified information, otherwise restricted information, or is a FOCI concern. Associates are required to report to the FSO any concerns regarding content of these teleconferences. Upon completion of the initiated WebEx, the Network Administrator will obtain a report that details the date and time, the participants, the purpose and the length of the WebEx. This report is provided to the FSO for review, audit, and record-keeping purposes. Reporting Requirement If during the review of these communications, the FSO or a member of the GSC discovers the improper transfer of information or an attempt to improperly influence a employee (a violation of FOCI mitigation), the discovery is reported to the COO, the Chairman of the GSC, and if validated, to the DSS. 6) SOCIAL NETWORKING AND WEB-BASED EMAIL Access and use of social networking sites and web-based email service is prohibited by the policy on company-owned connections or equipment. The Malo Klto MK-5000 Intrusion Protection System device is utilized to block the access of those services. A message informing the user that the service has been blocked will appear if attempt is made to access the prohibited service. 7) FILE TRANSFER PROTOCOL (FTP) FTP Access is available for storage and communication of large files that need to be made available for exchange with customers and the GSC members. The content of the files placed on the FTP site are subject to policy and export restrictions. Administration and Monitoring Responsibility FSO is responsible for oversight, including access approval, monitoring, and review of FTP usage inside the facility. The Network Administrator is responsible for the administration of the FTP site. Approval Method, Monitoring and Review Associate access to the FTP site must be requested and set up by the Network Administrator. A password is assigned in order to obtain access to the file transfer system and a folder is created. Anonymous login to the FTP server is prohibited. Each folder is assigned a owner. A subfolder and separate password for access is created for each owner. The owner may share those passwords with customers who work on programs that have a need to share data. Data to be uploaded to FTP folders by any user requires prior approval of the COO or FSO. Data added to folders on the FTP by customers must be reviewed and approved by the COO or FSO retention. The following restrictions are imposed on users of the FTP site. CUI and other sensitive files shall not be uploaded to the folder/site. FTP is provided for external sharing of large files that cannot be emailed due to its size restrictions and is for temporary storage; the FTP is not a permanent storage or archive. Files should be deleted by the folder owner within 10 days of uploading. If files have not been deleted after 10 days, the owner is notified that the files are removed by the Network Administrator. The FSO will monitor the FTP site and the folder data on a semimonthly basis. The FSO and the GSC have the authority to determine the appropriateness of the data that is allowed to remain on the FTP site. Reporting Requirement If during the review of the FTP site, the FSO or Network Administrator discovers a violation of FTP site permissions, content, or export restrictions, by associates and/or customers; the discovery is reported to the Chairman of the GSC, and if validated, to the DSS. Further, if it is determined that an export violation has occurred, the file is immediately removed by the FSO, the employee disciplined (pending further personnel action), and the violation reported to the COO and the Chairman of the GSC. This type of violation will require notification to the appropriate US Export authority. Additional ODAA recommendations Two laptops are available to any international travelers that are kept sanitized. Each laptop is loaded minimally with Windows XP, Microsoft Office, VPN and anti-virus software. Each laptop is available for reservation by associates. The Network Administrator will upgrade the computer with all patches and updates, prior to associate departure date. As mentioned in section 15, PGP software has installed to encrypt (Whole Disk Encryption) to deactivate the hard drive if a user workstation is lost or stolen. XYZ, Inc. does not employ any associates who are not U.S. citizens. An email disclaimer is used to notify the person receiving the email that the message may be privileged and provides instructions if the message has been sent in error. Disclaimer example is as follows: DISCLAIMER:This emailcommunication and any attached files are XYZ, Inc. proprietary and may be legally privileged.Export-controlled information shall not be disseminatedwithout proper authorization and proper export-control markings, per XYZ, Inc. export policy. If you have received this transmission in error please notify the sender immediately and then delete this email and all its attachments.If you are not the addressee, any disclosure, reproduction, copying, distribution, or any other dissemination or use of this communication is strictly prohibited. Thank you. ATTACHMENT 1 NETWORK DIAGRAM  EMBED PBrush  ATTACHMENT 2 EXPORT RELEASE FORMS At present time, uses an email from the TCO as the only authorization of approval to employees to release Controlled Unclassified Information. ATTACHMENT 3 USER ACKNOWLEDGEMENT Special Security Agreement Electronic Communications Plan Acknowledgment I, _______________, hereby acknowledge that I have been briefed on the purpose of the Electronic Communications Plan and my responsibilities under the plan. I understand that it is my responsibility to abide by the policies and requirements set forth in the Electronic Communications Plan. I am aware that I can seek additional guidance from the Facility Security Officer. ____________________ __________ Signature Date ATTACHMENT 4 ECP REVISION LOG DateRev.Para-graphDescription of ChangePerson (Company if Applicable)Update Requires Approval by DSS in accordance with ECP Section 8.1 Yes/No9/30/114.042 additional servers added to Network configurationJon MicroNo9/30/114.05.4 (3)Addition of Whole Disk Encryption log in detailsJon MicroNo9/30/114.013Added two additional servers and their functionJon MicroNo9/30/114.014.3Addition of PGP Universal server informationJon MicroNo9/30/114.015.3Addition of bullet on EncryptionJon MicroNo9/30/114.017.1Addition of info regarding call detail report from cell phone provider, under monitoring method and reviewJon MicroNo9/30/114.0Page 37Bullet 2, ODAA Recommendation. Updated to include PGP Encryption informationJon MicroNo     PAGE  PAGE  PAGE ii ODAA MSSP Template MUSA May 2008 PAGE  PAGE 2 February 2012 DSS SAMPLE ELECTRONIC COMMUNICATIONS PLAN (ECP) This sample document provides a comprehensive example on how you could articulate your draft ECP and is not meant to replace or restrict your ECP development in any manner. In this example, you will find italicized red fonted items which are the original text from the DSS ECP template. Verbiage in black font provides examples of how you could fulfill a particular requirement, but does not serve as a recommended or particular solution. Every ECP will be unique. When drafting your ECP, you must try to be as detailed and clear as possible to expedite the entire process. For more information regarding ECP development, contact your Industrial Security Representative. Defense Security Service Office of the Designated Approving Authority Defense Security Service Defense Security Service Defense Security Service )*+,EctaL7(hjQhS61;B*CJOJQJaJph(hjQhy;B*CJOJQJaJph%hjQh]~B*CJOJQJaJphhjQhS CJOJQJaJ,jhjQhS CJKHUaJmHnHu#hjQhS CJKHaJmHnHu(jhjQhS CJUaJmHnHu(jhjQhlCJUaJmHnHu(jhjQh+[&CJUaJmHnHu(jhjQh ECJUaJmHnHu *+,Eklm~$d$If^a$gd~D $da$gdS61 dgdS61$d^a$gdS /$@&^a$gdS cdjklmrtu}scsP=P*%hjQhv_B*CJOJQJaJph%hjQh+xB*CJOJQJaJph%hjQhS61B*CJOJQJaJphh#fB*CJOJQJaJph%hjQhlB*CJOJQJaJph%hjQhB*CJOJQJaJph%hjQh7B*CJOJQJaJph(hjQhS615B*CJOJQJaJph(hjQhS61;B*CJOJQJaJph(hM;hl;B*CJOJQJaJph(hjQh\Z;B*CJOJQJaJph   1 2 3 4 Y Z [ \ x y z { ƳƠƠƠƙwhw[RNR>[Rjy>h5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JUhjQhSNB*CJaJph&jhjQhSNB*CJUaJph hjQh5v hjQhvkQ hjQhu]%hjQhv_B*CJOJQJaJph%hjQh:B*CJOJQJaJph%hjQhS61B*CJOJQJaJph%hjQhS B*CJOJQJaJph%hjQhY'B*CJOJQJaJphj$d$If^a$gd~D$d^a$gdS61nkd]<$$Ifl$l$ t0644 la<p yt~Dn$d$If^a$gd~D $da$gdS61nkd<$$Ifl$l$ t0644 la<p yt~D  n$d$If^a$gd~D $da$gdS61nkdk=$$Ifl$l$ t0644 la<p yt~D    2 3 Z M * {{{{ $ gdC B dgdS61nkd=$$Ifl$l$ t0644 la<p yt~D     8 9 : T U V W X Y Z [ \ x y ־־־־־j@hvSUjm@h5a-hvS0JUj?hvSUjs?h5a-hvS0JUhvSh5a-hvS0JhfhvSCJOJQJaJjh5a-hvS0JUj>hvSUjhvSU hvS-y z { + , - G H I J K L M N O k l Խ٪ٚԍzlclhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHujBhvSUjaBh5a-hvS0JUhvShfhvSCJOJQJaJjAhvSUjhvSU hvSh5a-hvS0Jjh5a-hvS0JUjgAh5a-hvS0JU l m n   # $ % ' ( ) * + , H I ɾׇ~hɾVׇ~#jDhvSUmHnHu*jUDh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jChvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*j[Ch5a-hvS0JUmHnHu I J K d e f   ɾׇ~hɾVׇ~#jFhvSUmHnHu*jIFh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jEhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jOEh5a-hvS0JUmHnHu    0 1 2 L M N P Q R S T U q r s t ɾׇ~hɾVׇ~#jHhvSUmHnHu*j=Hh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jGhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jCGh5a-hvS0JUmHnHu S m)N\r6p>agdC B $    /012JKLfghjklmnoɾׇ~hɾVׇ~#jJhvSUmHnHu*j1Jh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jIhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*j7Ih5a-hvS0JUmHnHu "#$&'()*+GHɾׇ~hɾVׇ~#jLhvSUmHnHu*j%Lh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jKhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*j+Kh5a-hvS0JUmHnHu HIJfghɾׇ~hɾVׇ~#jNhvSUmHnHu*jNh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jMhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jMh5a-hvS0JUmHnHu +,-GHIKLMNOPlmnoɾׇ~hɾVׇ~#jPhvSUmHnHu*j Ph5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jOhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jOh5a-hvS0JUmHnHu     ./01jklɾׇzqmq]zqXNXANXj~RhvSUjhvSU hvSjRh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu#jQhvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jQh5a-hvS0JUmHnHuǹǹnXOKOhvSh5a-hvS0J*hfhvS:CJOJQJaJmHnHu#jxShvSUmHnHujhvSUmHnHuhvSmHnHu*jRh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjh5a-hvS0JUjhvSU9:;UVWYZ[\]^z{|}Խ⮛ncTcBTc#jlUhvSUmHnHujhvSUmHnHuhvSmHnHu*jTh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjrThvSUjhvSU hvSh5a-hvS0Jjh5a-hvS0JUjSh5a-hvS0JU 2345OPQklmopݹݹ}ݹgݹU#j`WhvSUmHnHu*jVh5a-hvS0JUmHnHu#jfVhvSUmHnHuhvSmHnHu*jUh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHujhvSUmHnHu!pqrst/01345ɪɟ~hɟV#jTYhvSUmHnHu*jXh5a-hvS0JUmHnHu#jZXhvSUmHnHujhvSUmHnHuhvSmHnHu*jWh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHu!5678TUVWz{|ɪɟ~hɟV#jH[hvSUmHnHu*jZh5a-hvS0JUmHnHu#jNZhvSUmHnHujhvSUmHnHuhvSmHnHu*jYh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu!MNOijkmnopqrй򪗉j_P_jhvSUmHnHuhvSmHnHu*j\h5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjB\hvSUjhvSU hvSj[h5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU789;<=>?@\]^_vwx}kU*j^h5a-hvS0JUmHnHu#j6^hvSUmHnHu*j]h5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#j<]hvSUmHnHu {q{dq{qUGh5a-hvS0JmHnHuhfhvSCJOJQJaJj*`hvSUjhvSU hvSj_h5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#j0_hvSUmHnHu>?@Z[\^_`abcҿ败}g败U}#jbhvSUmHnHu*jah5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#j$ahvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*j`h5a-hvS0JUmHnHuh5a-hvS0JmHnHuhvSmHnHu!+,-/01234PQRShij񽮽Ȇ}g񽮽UȆ}#jdhvSUmHnHu*jch5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jchvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jbh5a-hvS0JUmHnHuh5a-hvS0JmHnHu!2@]+n_-M !!!9""'#gdC B $ 9:;=>?@AB^_ɾׇ~hɾVׇ~#jfhvSUmHnHu*jeh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#j ehvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jdh5a-hvS0JUmHnHu _`a   ɾׇzqmq]zqXNXANXjghvSUjhvSU hvSj}gh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu#jghvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*jfh5a-hvS0JUmHnHu0123stuǹǹnXǹB*jqih5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#jhhvSUmHnHujhvSUmHnHuhvSmHnHu*jwhh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjh5a-hvS0JUjhvSU:;<VWXZ[\]^_{|}~ײ}kײU*jekh5a-hvS0JUmHnHu#jjhvSUmHnHu*jkjh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHu#jihvSUmHnHujhvSUmHnHuhvSmHnHuh5a-hvS0JmHnHu!  $%&()*+,-|r|er|rVHh5a-hvS0JmHnHuhfhvSCJOJQJaJjlhvSUjhvSU hvSj_lh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHu#jkhvSUmHnHujhvSUmHnHuhvSmHnHu-IJKL{|}ҿ败}g败U}#jnhvSUmHnHu*jSnh5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#jmhvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jYmh5a-hvS0JUmHnHuh5a-hvS0JmHnHuhvSmHnHu!KLMghiklmnop񽮽Ȇyplp\ypWMW@jphvSUjhvSU hvSjGph5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu#johvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jMoh5a-hvS0JUmHnHuh5a-hvS0JmHnHu<=>XYZ\]^_`a}~´´{i{{SJFJhvSh5a-hvS0J*hfhvS:CJOJQJaJmHnHu#jqhvSUmHnHujhvSUmHnHuhvSmHnHu*jAqh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjh5a-hvS0JU hvSjhvSU~   &'(*Խ⮛ncTcBTc#jshvSUmHnHujhvSUmHnHuhvSmHnHu*j5sh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjrhvSUjhvSU hvSh5a-hvS0Jjh5a-hvS0JUj;rh5a-hvS0JU*+,-./KLMNopqݹݹ}ݹgݹU#juhvSUmHnHu*j)uh5a-hvS0JUmHnHu#jthvSUmHnHuhvSmHnHu*j/th5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHujhvSUmHnHu!   * + , F G H J K L M N O k l m n ɪɟ~hɟV#jwhvSUmHnHu*jwh5a-hvS0JUmHnHu#jvhvSUmHnHujhvSUmHnHuhvSmHnHu*j#vh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHu! !!! ! ! ! !!!+!,!-!.!a!b!c!}!~!!!!!!ɪɟ~hɟV#jyhvSUmHnHu*jyh5a-hvS0JUmHnHu#jxhvSUmHnHujhvSUmHnHuhvSmHnHu*jxh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu!!!!!!!!!!!!!!!!!!!!"""""""2"3"4"6"7"8"9":"ߵ~hߵV~#j{hvSUmHnHu*j{h5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#jzhvSUmHnHujhvSUmHnHuhvSmHnHu*j zh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHu!:";"W"X"Y"Z"|"}"~""""""""""""""### #!#"#$#%#&#'#(#)#ҿ񴥴}g񴥴U}#jv}hvSUmHnHu*j|h5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#j||hvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*j{h5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu!)#E#F#G#H#################### $ $ $$$$$$$0$ҿ败}g败U}#jjhvSUmHnHu*j~h5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#jp~hvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*j}h5a-hvS0JUmHnHuh5a-hvS0JmHnHuhvSmHnHu!'##$u$$E%%&o&&('''E(()r))-***R++,,,0,gd3 +gdXgdC B $ 0$1$2$3$R$S$T$n$o$p$r$s$t$u$v$w$$$$$$$$$$$$$$$񽮽Ȇ}g񽮽UȆ#j^hvSUmHnHu*jh5a-hvS0JUmHnHuhvSmHnHu*hfhvS:CJOJQJaJmHnHu#jdhvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jh5a-hvS0JUmHnHuh5a-hvS0JmHnHu$$$%%%%"%#%$%>%?%@%B%C%D%E%F%G%c%d%e%f%%%%%й򪗉j_P_jhvSUmHnHuhvSmHnHu*jՂh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHuhfhvSCJOJQJaJjXhvSUjhvSU hvSjہh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU%%%%%%%%%%%%%%%%&&&&&&&&&3&4&5&6&L&M&N&h&}kU*jɄh5a-hvS0JUmHnHu#jLhvSUmHnHu*jσh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#jRhvSUmHnHu h&i&j&l&m&n&o&p&q&&&&&&&&&&&&&&&&&&&&&'''!'}kU*jh5a-hvS0JUmHnHu#j@hvSUmHnHu*jÅh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#jFhvSUmHnHu !'"'#'%'&'''(')'*'F'G'H'I'^'_'`'z'{'|'~''''''{q{dq{qUGh5a-hvS0JmHnHuhfhvSCJOJQJaJj4hvSUjhvSU hvSjh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#j:hvSUmHnHu'''''''''''''''''(((("(#($(>(?(@(B(C(D(E(F(G(c(ҿ败}g败U}#j(hvSUmHnHu*jh5a-hvS0JUmHnHu*hfhvS:CJOJQJaJmHnHu#j.hvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jh5a-hvS0JUmHnHuh5a-hvS0JmHnHuhvSmHnHu!c(d(e(f(((((((((((((((((((() )񽮽Ȇyplp\ypWMW@jhvSUjhvSU hvSjh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu#j"hvSUmHnHujhvSUmHnHuhvSmHnHu$jh5a-hvS0JUmHnHu*jh5a-hvS0JUmHnHuh5a-hvS0JmHnHu ) ) ) )))))-).)/)0)O)P)Q)k)l)m)o)p)q)r)s)t)))))))))̸՘k`Q`jhvSUmHnHuhvSmHnHu*jh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu$jh5a-hvS0JUmHnHujhvSUjh5a-hvS0JUhvSh5a-hvS0JhfhvSCJOJQJaJjh5a-hvS0JU hvSjhvSU))))))))))))) * * *&*'*(***+*,*-*.*/*K*L*M*N*j*k*l**}kU*jh5a-hvS0JUmHnHu#j hvSUmHnHu*jh5a-hvS0JUmHnHuhvSmHnHuh5a-hvS0JmHnHu*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#jhvSUmHnHu *************************{q{dq{qUH?hC BhvS0JjhC BhvS0JUhfhvSCJOJQJaJjhvSUjhvSU hvSjh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU*hfhvS:CJOJQJaJmHnHu$jh5a-hvS0JUmHnHuhvSmHnHujhvSUmHnHu#jhvSUmHnHu*++++/+0+1+K+L+M+O+P+Q+R+S+T+p+q+r+s+++++++++++˾ˮ˾ӣytjt]jtjNhfhvSCJOJQJaJjhvSUjhvSU hvSjuh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JUhC BhvSCJaJjhC BhvSUjhC BhvSUhC BhvSjhC BhvS0JUj{hC BhvS0JUhC BhvS0J hC BhvS++++++++++,,,,,,,,,,#,/,0,1,й򪏀qf[P=%hjQh!B*CJOJQJaJphhjQhy^JaJhjQh^JaJhjQh%l^JaJhjQh%lCJOJQJaJhjQhTnCJOJQJaJ4jhjQhSN5B*CJOJQJU\aJphhfhvSCJOJQJaJjhvSUjhvSU hvSjoh5a-hvS0JUhvSh5a-hvS0Jjh5a-hvS0JU1,>,D,E,O,n,w,|,,,,,,,,--<-@-ٳƠٍxeUEU5hjQhr86CJOJQJaJhjQh 6CJOJQJaJhjQh T6CJOJQJaJ%hjQh5BB*CJOJQJaJph(hjQh+x6B*CJOJQJaJph%hjQh#B*CJOJQJaJph%hjQh 7B*CJOJQJaJph%hjQh2 B*CJOJQJaJph%hjQhyB*CJOJQJaJph%hjQh+xB*CJOJQJaJph%hjQh|>B*CJOJQJaJph@-J-k-p--------:.C.a.c.@/A/X/x///ߺnn[n[n[nHn5%hjQhB*CJOJQJaJph%hjQh^bB*CJOJQJaJph%hjQh_eB*CJOJQJaJph%hjQhNB*CJOJQJaJph%hjQh!sB*CJOJQJaJph%hjQh2 B*CJOJQJaJph%hjQh!B*CJOJQJaJph(hjQh!6B*CJOJQJaJphhjQh6CJOJQJaJhjQh T6CJOJQJaJhjQh /6CJOJQJaJ0,-245788Z::;<>{?A BBCCCgd $xxa$gd|wX;$xx7$8$H$a$gd|wXxgd%gd3 $ & F'xxa$gd3  $xxa$gd3  +$xa$gd3 /00000004111111111h2i2z2{222222222ٶ}jZjh>0DB*CJOJQJaJph%hjQhcB*CJOJQJaJph%hjQhB*CJOJQJaJph%hjQhUB*CJOJQJaJph%hjQh"B*CJOJQJaJph%hjQhVB*CJOJQJaJphhB*CJOJQJaJph%hjQhB*CJOJQJaJph%hjQhNB*CJOJQJaJph222223333*3E3O3V3W3g3o33333334444484ɶܣɣܐ}}}j}ɐ}W}D%hjQht'B*CJOJQJaJph%hjQhB*CJOJQJaJph%hjQh!UB*CJOJQJaJph%hjQhyB*CJOJQJaJph%hjQhG.B*CJOJQJaJph%hjQh6XB*CJOJQJaJph%hjQhSW6B*CJOJQJaJph%hjQhUB*CJOJQJaJph%hjQhNB*CJOJQJaJphhjQB*CJOJQJaJph84;4444444444445$5(5/5F5\5e55555555555556ƳscSSSShjQh/*&6CJOJQJaJhjQh 6CJOJQJaJhjQhSW66CJOJQJaJhjQhbg6CJOJQJaJhjQh-7k6CJOJQJaJhjQh*'6CJOJQJaJ%hjQh*'B*CJOJQJaJph%hjQhB*CJOJQJaJph%hjQht'B*CJOJQJaJph%hjQhG.B*CJOJQJaJph 666$6,686F6G6d6v66666666777777%7.737s7z7777777߿Ͽ߿߿l\h>0DB*CJOJQJaJph%hjQh|>B*CJOJQJaJphh%h|>6CJOJQJaJhjQhi6CJOJQJaJhjQhp6CJOJQJaJhjQhSW66CJOJQJaJhjQh9p6CJOJQJaJhjQh/*&6CJOJQJaJhjQh*'6CJOJQJaJhjQh~(6CJOJQJaJ!7778 8%8:8W8v8w8x8|8888888888889999Y:Z:F;b;e;f;@AǼ|||g`\`\`Xh%hC B hjQhl(h%h m6B*CJOJQJaJph(hjQhK6B*CJOJQJaJph(hjQh m6B*CJOJQJaJphhjQh^JaJhjQhSN^JaJhjQh%l^JaJhjQhyCJOJQJaJhjQhlCJOJQJaJh>0DCJOJQJaJhjQh|>CJOJQJaJ"AABB BaBlBBBBBBBBBCC#CϺlaVK6(hjQh +^6B*CJOJQJaJphh%h-^JaJhjQh'X^JaJhjQh%l^JaJ(h%h|>6B*CJOJQJaJph"hC B6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh-7k6B*CJOJQJaJph(hjQhv_6B*CJOJQJaJphh%hv_CJOJQJaJh%CJOJQJaJhjQhlCJOJQJaJ hjQhl#C$C(C)CjClCsCzCCCCCCmZE0(hkFhjQ6B*CJOJQJaJph(hkFh-6B*CJOJQJaJph%hjQh-B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh_6B*CJOJQJaJph(hjQhyTH6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph(hjQh +^6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh N6B*CJOJQJaJph CCCCC $Ifgd- $IfgdjQCCCC,## $Ifgdkdi$$Ifl4\, $Z >       t (0644 lap(yt%CCC DDD&D'D(D6D7D8D@DADBDEDHDIDWDXD`DaDiDjDtDuDDDDDDDDDDDDʲrr_%hjQh-B*CJOJQJaJphhjQh.6CJOJQJaJhjQh!16CJOJQJaJhjQhjQ6CJOJQJaJhjQh*F6CJOJQJaJ.jlhjQh-7k6CJOJQJUaJhjQh-7k6CJOJQJaJ(jhjQh-7k6CJOJQJUaJhjQh-6CJOJQJaJ$C(D7D8D9D>D?D@D?kdg$$Ifl\, $Z >  t 0644 lap(yt% $Ifgd@DADBDFDGDHDH???? $Ifgdkd1$$Ifl\, $Z >  t 0644 lap(yt%HDIDJDUDVDWDH???? $Ifgdkd$$Ifl\, $Z >  t 0644 lap(yt%WDXDYD^D_D`DH???? $IfgdkdŘ$$Ifl\, $Z >  t 0644 lap(yt%`DaDbDgDhDiDH???? $Ifgdkd$$Ifl\, $Z >  t 0644 lap(yt%iDjDkDrDsDtDH???? $IfgdkdY$$Ifl\, $Z >  t 0644 lap(yt%tDuDvD}D~DDH???? $Ifgdkd#$$Ifl\, $Z >  t 0644 lap(yt%DDDDDDH???? $Ifgdkd$$Ifl\, $Z >  t 0644 lap(yt%DDDDDDH???? $Ifgdkd$$Ifl\, $Z >  t 0644 lap(yt%DDDDDDH???? $Ifgdkd$$Ifl\, $Z >  t 0644 lap(yt%DDDDDgEHC>94gd%gdQgd5vgdkdK$$Ifl\, $Z >  t 0644 lap(yt%DDDDDDDEE!E.E2EHAHBHQHYHwfwfwfXfwfwfwfwh2sB0J7CJOJQJaJ hjQhJz-0J7CJOJQJaJ hjQh*t0J7CJOJQJaJ hjQh[S0J7CJOJQJaJ)h}ShJz-0J7B*CJOJQJaJph#hC B0J7B*CJOJQJaJph)h}Sh*t0J7B*CJOJQJaJph)h}Sh2sB0J7B*CJOJQJaJph)h}Shf0J7B*CJOJQJaJphYH]H^H_HkHyHzH{HHHHHHHHHHHHHHHHHHHHIII6IAIiIIII JJJJ3JDJrJJJJJJͿޮͮ޿޿ޮͮͮ͌͝͝{͌{{{ hjQh(0J7CJOJQJaJ hjQh]r0J7CJOJQJaJ hjQh`:0J7CJOJQJaJ hjQh| 0J7CJOJQJaJh2sB0J7CJOJQJaJ hjQhJz-0J7CJOJQJaJ hjQh*t0J7CJOJQJaJ hjQhjQ0J7CJOJQJaJ/JJJJJ K(K1K7K8K9KdK|KKKKKKKKKKKKKKKKKKKLL9L;LELRL\LМuuuu``)hjQh-0J7B*CJOJQJaJph#h 0J7B*CJOJQJaJph)hjQhJz-0J7B*CJOJQJaJph)hjQh[S0J7B*CJOJQJaJph hjQh[S0J7CJOJQJaJhV%0J7CJOJQJaJ hjQhJz-0J7CJOJQJaJ hjQh(0J7CJOJQJaJh 0J7CJOJQJaJ%\LLLLLLLLMMMM"MFM[M\MaMdMpMwMMMMMMMN.N0N5N=NMN\NlNsNtNNN³zn____hjQh %CJOJQJaJh9CJOJQJaJhjQh CJOJQJaJh CJOJQJaJhjQhJz-CJOJQJaJhjQhwCFCJOJQJaJhjQh-CJOJQJaJ%hjQhJz-B*CJOJQJaJph)hjQh-0J7B*CJOJQJaJph)hjQhJz-0J7B*CJOJQJaJph%NNNNNNNNNNNOOPPPPQQ9RSSDSESISSSSS񴥴xmX(hjQh^6B*CJOJQJaJphh%hm^JaJh%^JaJhjQhQ^JaJhjQh%l^JaJh%hCJOJQJaJhjQhw{CJOJQJaJhjQh(]CJOJQJaJ%hjQhJz-B*CJOJQJaJphh9CJOJQJaJhjQh %CJOJQJaJhjQhJz-CJOJQJaJSSSSSTTgUiUjUVVVVVVpaZVO:(hjQh-q6B*CJOJQJaJph hjQhmh% hjQh]hjQhw{CJOJQJaJ(h%hw{6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhm6B*CJOJQJaJph(hjQhPe6B*CJOJQJaJph(hjQhQ6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQhw{6B*CJOJQJaJphVVVVVWWDWFWGW{WWWWY Y.Y1YKYLYxYyYzY||mm^WSL hjQhmh% hjQh]hjQh{CJOJQJaJhjQhCJOJQJaJh9CJOJQJaJhjQhp$CJOJQJaJ(h%hp$6B*CJOJQJaJph(hjQhZm6B*CJOJQJaJph(hjQhQ6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQhp$6B*CJOJQJaJphGWXXY Y.Y1YLYzY[\\|^__abc|de & FgdQ & Fgd$xx7$8$H$a$gd|wX 7$8$H$gdzAgdQgd]W $xxa$gd|wXxxgd|wX $xxa$gd|wXzYYYYYYYY Z Z ZZZ*Z(h%hm6B*CJOJQJaJph(h%hD6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQhD6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h%h U hjQh Uh%h4ZCJOJQJaJt9 7$8$H$gd% & Fgd% & Fgd( 7$8$H$gd(gd]W $xxa$gd|wX & F7$8$H$gd% 7$8$H$^gd% & F7$8$H$gd( & F h7$8$H$gd(ww^wpwrwswuwww*x+x,x2x5xxxoypyyynnYDD(hjQhm6B*CJOJQJaJph(hjQhw6B*CJOJQJaJph+hjQh(6B*CJOJQJ\aJph+hjQh\6B*CJOJQJ\aJph(hjQh(6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh\6B*CJOJQJaJph(hjQhD6B*CJOJQJaJph(hjQh /6B*CJOJQJaJphyyyy{6{7{;{W{X{Y{h{i{{{~iT?*(hjQhw6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h%hwh% hjQh( hjQhSlh%h|>CJOJQJaJh%CJOJQJaJhjQh4CJOJQJaJ(h%h46B*CJOJQJaJph(hjQhm6B*CJOJQJaJph(hjQh}6B*CJOJQJaJph{:|g|h|y|{|||}}~}}} ~+~~~~~~01֬묗sgXQJ hjQh( hjQhSlh%h CJOJQJaJh%CJOJQJaJhjQh CJOJQJaJ(h%h 6B*CJOJQJaJph(h%hw6B*CJOJQJaJph(hjQhh6B*CJOJQJaJph(h%h1 6B*CJOJQJaJph(hjQhw6B*CJOJQJaJph(hjQh(6B*CJOJQJaJphЁсCTr.4[eYZsօ˶wewwwPwwPwPwwww(h%h>96B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh>96B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h%h>9h%ZJ`Ո1ُ| & F 7$8$H$gd-i 7$8$H$gd-i & F gd% & F 7$8$H$gd( 7$8$H$gd( 7$8$H$gd{Q0gd]W $xxa$gd|wX & Fgd% & Fgd>9)0IJO^_`opDuoZE0E0(hjQh{Q06B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh% hjQh( hjQhSlh%h CJOJQJaJh%CJOJQJaJhjQh.QNCJOJQJaJhjQh CJOJQJaJ(h%h 6B*CJOJQJaJphuԈՈڈ 27LǸu`K6K(hjQh6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h%h|Yh% hjQh( hjQhSlh|wXh.QNCJOJQJaJhjQh.QNCJOJQJaJ(h%h.QN6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJphLahÉщ'+0=[\r}ъQXӾӾӾөӾmX(h%h.QN6B*CJOJQJaJph(h%hm6B*CJOJQJaJph(hjQh6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh|Y6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph+hjQh(6B*CJOJQJ]aJph+hjQh|Y6B*CJOJQJ]aJph ӌ !;NSҍĽ~iTi?i?(hjQh-i6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh% hjQh( hjQhSlh%h.QNCJOJQJaJh%CJOJQJaJhjQh.QNCJOJQJaJ"02@Dai؏ُ{|ݑ 48mu$`abhįįįĚįįįįįįįpahjQh.QNCJOJQJaJ(h%h.QN6B*CJOJQJaJph(hjQh.QN6B*CJOJQJaJph(h%h-i6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh-i6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph"bLϛ:ɝ'@Tס & F gd%gd4 & F gd  & F gdq 7$8$H$gd 7$8$H$gd(gd( 7$8$H$gd%gd]W $xxa$gd|wX & F 7$8$H$gd%hŔؔݔ&7Chmĕ̷xcxM7xcx+hjQh(6B*CJOJQJ]aJph+hjQh6B*CJOJQJ]aJph(hjQh6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh% hjQh( hjQhSlh%h.QNCJOJQJaJh%CJOJQJaJĕ+U]h͖זߖvɗįpp[LhjQh.QNCJOJQJaJ(h%h.QN6B*CJOJQJaJph(hjQhc6B*CJOJQJaJph(hjQhl@F6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh[F6B*CJOJQJaJph"h%6B*CJOJQJaJphЙëëlWB-B(hjQh6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph(h%hm6B*CJOJQJaJph.hjQh(56B*CJOJQJ\aJph+hjQh(5B*CJOJQJ\aJph+hjQhSl5B*CJOJQJ\aJphh%h(6CJOJQJaJ )5EG`p}BIKL͛Ӿj[O@92 hjQh( hjQhSlh%h CJOJQJaJh%CJOJQJaJhjQh CJOJQJaJ(h%h 6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh46B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph+hjQh(6B*CJOJQJ]aJph+hjQh6B*CJOJQJ]aJph͛Λϛޛߛy{,9˶wbPbw;w(hjQhv,26B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh[F6B*CJOJQJaJph(hjQhq6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh%9:ȝɝޝ&'-?@ERSTcue^WSL7(hjQh^6B*CJOJQJaJph hjQhmh% hjQh( hjQhSlh%h CJOJQJ\aJh%CJOJQJ\aJhjQh CJOJQJ\aJ.h%h 56B*CJOJQJ\aJph+hjQh(6B*CJOJQJ\aJph+hjQhq6B*CJOJQJ\aJph(hjQhq6B*CJOJQJaJph(h%hq6B*CJOJQJaJphcd{؟ڟݟ .Π֡סm[F4F"h%6B*CJOJQJaJph(h%h46B*CJOJQJaJph"hb6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh46B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQhS 6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJphסZ[qɣʣ67Mpqv뫖k\MF?;h% hjQhE= hjQhSlh%hCJOJQJaJhjQhCJOJQJaJ(h%h6B*CJOJQJaJph+hjQh46B*CJOJQJ\aJph(h%h(6B*CJOJQJaJph+hjQh(6B*CJOJQJ\aJph(h%hW1W6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQh46B*CJOJQJaJph[ʣ7q gd% & F 7$8$H$gd 7$8$H$^gd% & F7$8$H$gdK> & F7$8$H$gdE= 7$8$H$gdE=gd]W $xxa$gd|wX & F 7$8$H$gd% & F 7$8$H$gd(¨Ȩv}۩$,s{Ϻ~iT~?T?T????(hjQhK> 6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(h%hW1W6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph(hjQhyi6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhm6;DKQV6KPYcӭ֬mXXXC(hjQhj6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh86B*CJOJQJaJph(hjQhYC6B*CJOJQJaJph(h%hY=6B*CJOJQJaJph(hjQh JB6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph(hjQhK> 6B*CJOJQJaJph(h%hK> 6B*CJOJQJaJph &Үc֬ւ֗֗֗mZG%hjQhE=B*CJOJQJaJph%hjQhv,2B*CJOJQJaJph(hjQhm6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph(hjQhj6B*CJOJQJaJph(h%hK> 6B*CJOJQJaJph(hjQh-U6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQhYC6B*CJOJQJaJphȰ1;Ʊα)2Ƴqqqqq[L=L=hjQh`CJOJQJaJhjQhCJOJQJaJ+h%h6B*CJOJQJ\aJph+hjQhv,26B*CJOJQJ\aJph+hjQhK> 6B*CJOJQJ\aJph+hjQh#t6B*CJOJQJ\aJph%h%hE=B*CJOJQJaJphh%B*CJOJQJaJph(hjQh#t6B*CJOJQJaJph(hjQh /6B*CJOJQJaJphõŵǻmXCX.X(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh\Y6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphh%hmB*^JaJphh%B*^JaJphhjQhE=B*^JaJphhjQh%lB*^JaJphh%hCJOJQJaJh%CJOJQJaJ,4ºThؿٿݿįyyrkg`K(hjQh^6B*CJOJQJaJph hjQhmh% hjQhE= hjQhSlh%CJOJQJaJh%h$CJOJQJaJhCJOJQJaJhjQh$CJOJQJaJ(h%h$6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQh\Y6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph۹._ҺٿgDgd% & F 7$8$H$gd%l & F 7$8$H$gdE=gd]W$xx7$8$H$a$gd|wX6$ & F xx\$a$gd|wX $xxa$gd|wX 7$8$H$gdE=#$8<ckYDkD(h%huJ6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph+hjQhE=6B*CJOJQJ]aJph+hjQhuJ6B*CJOJQJ]aJph(hjQhE=6B*CJOJQJaJph(hjQhuJ6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJphcfgBCDST묝pdU@+(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphh%hmB*^JaJphh%B*^JaJphhjQhE=B*^JaJphhjQh%lB*^JaJphhjQhy2CJOJQJaJhjQh$CJOJQJaJ(h%h%l6B*CJOJQJaJph(hjQhuJ6B*CJOJQJaJph(h%huJ6B*CJOJQJaJph(hjQh \6B*CJOJQJaJph Tlq 8;jr[\`pqr֬֗֗sdsTMFB; hjQhmh% hjQhE= hjQhSlh%hhCJOJQJ\aJhjQh/CJOJQJaJhjQhhCJOJQJaJ(h%hh6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh;u6B*CJOJQJaJph(hjQh56B*CJOJQJaJphD\ru-s#8T>m 7$8$H$gdI $xxa$gd|wX 7$8$H$gdio$ & F,dxx7$8$H$a$gd|wXgd]W$xx7$8$H$a$gd|wX 7$8$H$gdE=r0459lV@+hjQh-U6B*CJOJQJ\aJph+hjQhh6B*CJOJQJ\aJph(hjQhc]6B*CJOJQJaJph+hjQht6B*CJOJQJ]aJph(hjQht6B*CJOJQJaJph(hjQhE=6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJpht2ƹƩ{fQ<(hjQhio6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQhio hjQhSlh%hi&CJOJQJ\aJh%CJOJQJ\aJhjQhi&CJOJQJ\aJ+h%hi&6B*CJOJQJ\aJph%h%6B*CJOJQJ\aJph27#"#CJ78<RST֬֗ym^WPLE hjQh}h% hjQhI hjQhSlh%h=CJOJQJaJh%CJOJQJaJhjQh|wXCJOJQJaJhjQhE0CJOJQJaJ(h%h=6B*CJOJQJaJph(hjQh{A>6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhio6B*CJOJQJaJph(hjQht6B*CJOJQJaJphTcds{|38=>Bklm^RC<51h% hjQhI hjQhSlh%hm6CJOJQJaJh%CJOJQJaJhjQhm6CJOJQJaJ(h%h6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhI6B*CJOJQJaJph(hjQht6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphlm|}HSϺ{eO7e.hjQhI6B*CJOJQJ\]aJph+hjQht6B*CJOJQJ\aJph+hjQhI6B*CJOJQJ\aJph(hjQhc]6B*CJOJQJaJph(hjQhI6B*CJOJQJaJph(hjQht6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh} ':ټwbM8(hjQh5 6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQh5 hjQhSl hjQh5vh%hm6CJOJQJ\aJh%CJOJQJ\aJhjQh<*PCJOJQJ\aJhjQhm6CJOJQJ\aJ+h%hm66B*CJOJQJ\aJph{gz>=L & F7$8$H$gdf~ & F7$8$H$gd5 $ & F-dxx7$8$H$a$gd|wX$xx7$8$H$a$gd|wX $xxa$gd|wX & F7$8$H$gd & F7$8$H$gd5 7$8$H$gd5 gd]W:?wx4?Dfmo֚nnV>.hjQh5 6B*CJOJQJ\]aJph.hjQh'}P6B*CJOJQJ\]aJph+hjQh'}P6B*CJOJQJ\aJph+hjQh5 6B*CJOJQJ\aJph(h%h'}P6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh5 6B*CJOJQJaJph(hjQh'}P6B*CJOJQJaJph<G_`adz{ии{fQ<(hjQh5 6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQh5 hjQhSlh%hICJOJQJaJhcCJOJQJaJhY"[CJOJQJaJh%CJOJQJaJhjQhCJOJQJaJ(h%h6B*CJOJQJaJphBCpuqyz~֚vjv[TMIB hjQh}h% hjQh5 hjQhSlhjQh(a1CJOJQJaJh%CJOJQJaJhjQh,=CJOJQJaJ(h%h(a16B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhY"[6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh5 6B*CJOJQJaJph(hjQh=6B*CJOJQJaJph.=?NXx:<=EOp[F1(hjQh JB6B*CJOJQJaJph(h%h=6B*CJOJQJaJph(hjQh .6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh5 6B*CJOJQJaJph(hjQh=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphOT<>?,KLP~|m^RCh%h}B*^JaJphh%B*^JaJphhjQh,B*^JaJphhjQh%lB*^JaJphh%h,CJOJQJaJh%CJOJQJaJhjQh*CJOJQJaJhY"[CJOJQJaJhjQhf~CJOJQJaJ(h%hf~6B*CJOJQJaJph(hjQh5 6B*CJOJQJaJph(hjQh=6B*CJOJQJaJphLEiXi & F7$8$H$gdCvO & F7$8$H$gd, $xxa$gd|wX & F7$8$H$gd2< & F7$8$H$gd- & F7$8$H$gd+l & F7$8$H$gd,gd]W$xx7$8$H$a$gd|wX 7$8$H$gd,gd%DE-.FsgXQJC?8 hjQhMh% hjQh, hjQhSl hjQh5vh%h2<CJOJQJaJh%CJOJQJaJhjQh2<CJOJQJaJ(h%h2<6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh .6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphFGQWP\aghip[F(hjQh+l6B*CJOJQJaJph(h%h+l6B*CJOJQJaJph(h%hf 6B*CJOJQJaJph"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhf 6B*CJOJQJaJph(hjQh,6B*CJOJQJaJph(hjQh JB6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph'E )8WX/K)K~֬֗ւm^R^Fh%CJOJQJaJhY"[CJOJQJaJhjQh2<CJOJQJaJ(h%h2<6B*CJOJQJaJph(hjQhS6B*CJOJQJaJph(hjQh2<6B*CJOJQJaJph(hjQh!`(6B*CJOJQJaJph(hjQh~L6B*CJOJQJaJph(hjQh-6B*CJOJQJaJph(h%h-6B*CJOJQJaJphîoZE3Zo"h%6B*CJOJQJaJph(hjQh56B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh,6B*CJOJQJaJph(hjQh=l 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h%h}h% hjQh, hjQhSlh%hv /CJOJQJaJghi֬yunYD/(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQh, hjQhSl hjQh5vh%hCvOCJOJQJaJhjQhCvOCJOJQJaJ(h%hCvO6B*CJOJQJaJph(hjQh,6B*CJOJQJaJph(hjQh=l 6B*CJOJQJaJph(h%h=l 6B*CJOJQJaJphi1:P}PU$9gu$ & F.xxa$gd|wX $xxa$gd|wX 7$8$H$gd6Wgd%l 7$8$H$gd,gd]W$xx7$8$H$a$gd|wX-01:>OPST{|}zk\MF?84- hjQh}h% hjQh6W hjQhSl hjQh5vhjQh6WB*^JaJphhjQhr`B*^JaJphhjQh%lB*^JaJphhjQhCvO6CJOJQJaJhjQhCvOCJOJQJaJ(h%hCvO6B*CJOJQJaJph"h%6B*CJOJQJaJph+hjQh,6B*CJOJQJ]aJph(hjQh,6B*CJOJQJaJph(hjQh4~6B*CJOJQJaJph}u})+XY\ >BghmXXCXXXX(h%hU96B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQh.t 6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphfgkʻʨzeP;e(hjQhU96B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQh6W hjQhSl%hjQhh B*CJOJQJaJphhjQh CJOJQJaJhjQhh CJOJQJaJ(h%hh 6B*CJOJQJaJph"h%6B*CJOJQJaJphATqtu>?@Oտpibi[WP;(hjQh^6B*CJOJQJaJph hjQh}h% hjQh6W hjQh5v hjQhSl(hjQhh 6B*CJOJQJaJph%hjQhh B*CJOJQJaJph(h%hh 6B*CJOJQJaJph"h%6B*CJOJQJaJph+hjQh6W6B*CJOJQJ]aJph+hjQhU96B*CJOJQJ]aJph(hjQh6W6B*CJOJQJaJph@BMd\ l;tz`y > e $ & F/xx7$8$H$a$gd|wX9$a$gd|wX 7$8$H$gd.t & F7$8$H$gd.t & F7$8$H$gdY= 7$8$H$gdY=$xx7$8$H$a$gd|wX 7$8$H$gd6Wgd]WOPgmjl"AkVVD"h%6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhp6B*CJOJQJaJph+hjQh6W6B*CJOJQJ]aJph+hjQh.t 6B*CJOJQJ]aJph(hjQh6W6B*CJOJQJaJph(hjQh.t 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJphABp-LMQbcdst,<صخr]H3H(hjQh6W6B*CJOJQJaJph(hjQh.t 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h% hjQh6W hjQhSlh%B*CJOJQJaJph%hjQh B*CJOJQJaJph%hjQhh B*CJOJQJaJph(h%hh 6B*CJOJQJaJph<[q   &kl:;Z[tٯٙn[K[: hjQh gCJOJQJ^JaJhY"[B*CJOJQJaJph%hjQh gB*CJOJQJaJph(h%h g6B*CJOJQJaJph+h%h.t 6B*CJOJQJ\aJph+hjQh6W6B*CJOJQJ\aJph(h%h.t 6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQh.t 6B*CJOJQJaJph"h%6B*CJOJQJaJph@_`dewxyпu`K6(hjQh6W6B*CJOJQJaJph(hjQhT6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h: hjQh6W hjQhY= hjQhSl h:h gCJOJQJ^JaJh:CJOJQJ^JaJ hjQh gCJOJQJ^JaJ hjQh CJOJQJ^JaJ        . / 0 ? @ W Ƴ~wbM8(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h: hjQh6W hjQhSl%h:h gB*CJOJQJaJphh:B*CJOJQJaJph%hjQh gB*CJOJQJaJph%h:h gB*CJOJQJaJph%hjQh%8B*CJOJQJaJph%hjQh6WB*CJOJQJaJphe v     t    0  K!Zgd%l$xx7$8$H$a$gd" ;$xxa$gd|wX 7$8$H$gd6Wgd]W$xx7$8$H$a$gd|wX$ & F/xx7$8$H$a$gd|wXW ]         K떃mfWG4- hjQhSl%hjQhqB*CJOJQJaJphh:B*CJOJQJaJphhjQhqCJOJQJaJ hjQhq+h:hq6B*CJOJQJ\aJph%h:6B*CJOJQJ\aJph+hjQh6W6B*CJOJQJ\aJph(hjQhRS?6B*CJOJQJaJph(hjQh%86B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQhT6B*CJOJQJaJph !01IN*4QTįppp[ppppI"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh},6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQhw>6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h: hjQh6W:YZ_hkع~zs^I4(hjQhw>6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h: hjQhM hjQhSlhjQh6WB*^JaJphhjQhr`B*^JaJphhjQh'BB*^JaJphhjQh%lB*^JaJphh:B*CJOJQJaJph%hjQhqB*CJOJQJaJph(h:hq6B*CJOJQJaJphb&'>DIJ~iT?(hjQhq6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh} hjQhq hjQhSl hjQh5v h:hYh: hjQhY(h:hY6B*CJOJQJaJph(hjQhw>6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJphy4t3  !." & F7$8$H$gdV 7$8$H$gdV $xx7$8$H$a$gd" & F7$8$H$gd: & F7$8$H$gdq 7$8$H$gdqgd]W ;$xxa$gd" 7$8$H$gd:Jixyz134Tsxį믚įįo\L\h:B*CJOJQJaJph%hjQhYB*CJOJQJaJph(h:hY6B*CJOJQJaJph+hjQhw>6B*CJOJQJ]aJph(hjQhq6B*CJOJQJaJph(hjQhw>6B*CJOJQJaJph(h:hw>6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJphxMb%&>C'ɶwbM8(hjQhq6B*CJOJQJaJph(hjQh"{6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h:h  hjQhq hjQhSl%h:hYB*CJOJQJaJphh:B*CJOJQJaJph%hjQhYB*CJOJQJaJph%hjQh B*CJOJQJaJph'(r23BIc x          yjc\XQ<(hjQh^6B*CJOJQJaJph hjQh}h: hjQhV hjQhSlh:hYCJOJQJaJh:CJOJQJaJhjQh'CJOJQJaJhjQh CJOJQJaJhjQh8CJOJQJaJhjQhYCJOJQJaJ(h:hY6B*CJOJQJaJph(hjQhq6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph    g!i!!!!!!,"-"."3"c"m"x"y"""""p[F(h:hV 6B*CJOJQJaJph(hjQh:6B*CJOJQJaJph(h:h 6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhV 6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph.""##z$$$P' )")*+,],,,--;$ & F0xxa$gd" ;$xxa$gd" 7$8$H$gd,gd]Wgd%l$xx7$8$H$a$gd"$xx1$7$8$H$a$gd" & F7$8$H$gd: & F7$8$H$gdV """"#V#k######y$z$$$$龫n[L=.hjQh6WB*^JaJphhjQh'BB*^JaJphhjQh%lB*^JaJph%h:h'B*CJOJQJaJph(hjQh'B*CJOJQJ\aJph(hjQh'6B*CJOJQJaJph%hjQh B*CJOJQJaJph%hjQh'B*CJOJQJaJph(h:h'6B*CJOJQJaJph+hjQh 6B*CJOJQJ\aJph+hjQhV 6B*CJOJQJ\aJph$$$$$$$$%%%&&&&&0'O'ҽ~~iiTB"h:6B*CJOJQJaJph(hjQh,6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQhRP6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh}h: hjQh, hjQhSlO'P'''(( ) )) )!)")1)2)I)O)E*j****+/ĽҶwbMbMbMB; hjQh@hjQh@B*ph(hjQh,6B*CJOJQJaJph(hjQh;I6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh} hjQh, hjQhSl h:h'h: hjQh  hjQh8 hjQh'(h:h'6B*CJOJQJaJph-3// 1?12T33334*4L4h444 5a5"8 7$8$H$gd%=gd%l$ & F18xx7$8$H$^8a$gd" 7$8$H$gd:gd]W$xx7$8$H$a$gd" ;$xxa$gd";$ & F0xxa$gd"/// 1 11=1>1?1N1O1f1k1l1122}h}SA,(h:h'6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhz86B*CJOJQJaJph(hjQhF6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQh} hjQhz8 hjQh'(hjQh@6B*CJOJQJaJphhjQh@CJOJQJaJ hjQh@h:2e243S3T34444444 5%5_5`5a5p5q55ݳݳ¤|gR=(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h:hMh: hjQh%= hjQhSlhjQh%=B*^JaJphhjQh%lB*^JaJphhjQhTcCJOJQJaJh:h@CJOJQJaJh:CJOJQJaJhjQh@CJOJQJaJ%hjQh@B*CJOJQJaJph55l6t6G7H7v7y7778!8"8&8;899999::i;y;;;<<==<=Q=a=f={====묚~w~w~ws~w~o~s~w~h~ws~w~sa h:h@ hjQh6 ]hY"[h: hjQh  hjQhZ(h:hZ6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQhTM6B*CJOJQJaJph%"89:;b==&>@B"BRBBBBCmCCCDD;$8xx^8a$gd";$ & F2xxa$gd"$xx7$8$H$a$gd" 7$8$H$gd%=gd: ;$xxa$gd"==%>&>5>6>P>b>g>>> ? ??#???@@ҽ~i~iTi~i~i~B"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhP6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphh:hY=B*^JaJphhjQh%=B*^JaJphhjQh%lB*^JaJph@@AB"BmCCCCbDiDDDGEoEEEEEEEEFFFɻɴɰjU(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhY= hjQh%= hjQhTn h:h=h: hjQh8 hjQhTc hjQh\. hjQh=h:CJOJQJaJhjQh=CJOJQJaJ(h:h=6B*CJOJQJaJphDDGEoEEEHI]JJJLLWMMAO[OTPR & F7$8$H$gdYQ & F7$8$H$gd: 7$8$H$gd%=$xx7$8$H$a$gd" 7$8$H$gd}gd]W;$8xx^8a$gd"$ & F2xxa$gd"F0F5FFFFFG+GHHZIoIIII J]JpJJJJJJJJ묙vccPPvI hjQhTn%hjQhkB*CJOJQJaJph%hjQh\.B*CJOJQJaJphh:B*CJOJQJaJph%hjQh B*CJOJQJaJph%hjQh&B*CJOJQJaJph(h:h&6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhP6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJphJJJJJJKKKyKKKKKKKKįoYD//(hjQhc]6B*CJOJQJaJph(hjQhB6B*CJOJQJaJph+hjQh%=6B*CJOJQJ]aJph+hjQhk6B*CJOJQJ]aJph(hjQhk6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhY=h: hjQh%=KLLL L LLLLLLLLMTMVMWMjMMMMM!O@OAOFOYOZO[OįĚĚĚĚĚĚrbr[TPI hjQhmh: hjQh%= hjQhTnh:B*CJOJQJaJph%hjQh .B*CJOJQJaJph(h:h .6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhk6B*CJOJQJaJph(h:hk6B*CJOJQJaJph"h:6B*CJOJQJaJph[OjOkOOOO$P&PEPSPTP[PcPiPlPmPPPRp[F1(hjQhYQ6B*CJOJQJaJph(hjQhY"[6B*CJOJQJaJph(h:h6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphRR9RRRRSSSSSTTTTTUoZE3"h:6B*CJOJQJaJph(hjQh$k6B*CJOJQJaJph(hjQh /6B*CJOJQJaJph%hjQhY=B*CJOJQJaJph(h:h6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(h:h6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhYQ6B*CJOJQJaJph(h:hYQ6B*CJOJQJaJphRRSTUUUVWXiXXXXXjY 7$8$H$gd%=gd]W$ & F3 8xx7$8$H$^8a$gd"$xx7$8$H$a$gd" & F7$8$H$gd: & F7$8$H$gd%= h7$8$H$^hgd: & F7$8$H$gd%= & F7$8$H$gdUUUUU[UgUUUUUUUUUUUVVVVVVVWWWWWXiiSii+hjQhk6B*CJOJQJ\aJph+hjQhs6B*CJOJQJ\aJph(h:h%=6B*CJOJQJaJph+hjQh:6B*CJOJQJ\aJph+hjQhtn6B*CJOJQJ\aJph+hjQh%=6B*CJOJQJ\aJph(hjQhY=6B*CJOJQJaJph(h:hY=6B*CJOJQJaJphXXXXXXXXXXXXYYY2Y7Y֬~iT?*(hjQhLt6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhh: hjQh%= hjQhTn(h:h .6B*CJOJQJaJph(hjQh .6B*CJOJQJaJph%hjQh .B*CJOJQJaJph+h:h .6B*CJOJQJ\aJph7YJYiYjYnZZZZZZZZZZ [[([G[ıu`K6(hjQhLt6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhh: hjQh%= hjQhTn h:h . hjQh .%hjQh .B*CJOJQJaJph(h:h .6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJphjYYnZZZH[\3\]]'^_Z_y_naAbSbctd 7$8$H$gd1' 7$8$H$gd! ;$xxa$gd" 7$8$H$gd%=gd]W;$ & F4xxa$gd"$ & F4xx7$8$H$a$gd"$xx7$8$H$a$gd"G[H[[\\\1\2\3\B\C\]\o\t\\\p[F[0+hjQhLt6B*CJOJQJ]aJph(hjQhLt6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhMh: hjQh%= hjQhTnh:B*CJOJQJaJph%hjQhPB*CJOJQJaJph(h:hP6B*CJOJQJaJph\\\\]]]%])]*]{]]]]]]]%^&^'^6^ԿԿԘ|rkd]YR=(hjQh^6B*CJOJQJaJph hjQhmh: hjQh hjQhTn h:hPhjQhPhv hjQhP(h:hP6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhLt6B*CJOJQJaJph(hjQh%=6B*CJOJQJaJph+hjQh%=6B*CJOJQJ]aJph6^7^N^__Y_Z_`_x_y_______J`L`}voZE0E0E(hjQh!6B*CJOJQJaJph(hjQh_6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhm hjQh! hjQhTn(hjQhP6B*CJOJQJaJph%hjQhPB*CJOJQJaJph(h:hP6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJphL`Z`~`````mana@bAbFbRbSbbbcbsle^I4(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhM hjQh1' hjQhTn(hjQh@o6B*CJOJQJaJphhjQh@oCJOJQJaJ(h:h@o6B*CJOJQJaJph(hjQh!6B*CJOJQJaJph(hjQh!6B*CJOJQJaJph(hjQh_6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJphcbzbbocccd'dTdsdddkeeeeeeg1g>gggVhtdddQd>dd%hjQh B*CJOJQJaJph%hjQhGB*CJOJQJaJphh:B*CJOJQJaJph%hjQh<B*CJOJQJaJph%hjQhQB*CJOJQJaJph(h:hQ6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQh1'6B*CJOJQJaJph(hjQhY46B*CJOJQJaJph(hjQhSl6B*CJOJQJaJphtddee?ggWh{hiiDjmmmnjo8pp & F7$8$H$gd{R ;$xxa$gdx} 7$8$H$gd{Rxxgdx}$xx7$8$H$a$gdx} 7$8$H$gdgd]W$xx7$8$H$a$gd"VhWh]hyhzh{hhhhhiiiiҽ~iWB/%hjQhGB*CJOJQJaJph(h:hQ6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQhtZ6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh hjQhTn(hjQhQ6B*CJOJQJaJph iiii jAjCjDjSjTjnjjǺkVA,(hjQh6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph(h:hm6B*CJOJQJaJph.hjQh56B*CJOJQJ\aJphhjQh0JOJQJhjQhG0JOJQJ(h:h6B*CJOJQJaJph%hjQhGB*CJOJQJaJphhJoB*CJOJQJaJph jjjj0k2kakfk llmmmmmmmnn!n5n֬s^I4(hjQh{R6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh{R hjQhTnhjQhBmB*ph(h:hBm6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQhtZ6B*CJOJQJaJph5n:nsnnnnnnnno!o#oiojooo7p8pQppppp}qqqqqqrr)s+s.s2s3s?sss֚֚֚օp(hjQhBm6B*CJOJQJaJph(hjQh0Y6B*CJOJQJaJph(h:h[o6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh{R6B*CJOJQJaJph(hjQh[o6B*CJOJQJaJph'psat}t.vw(wwx^z9{{}~V~Y 7$8$H$gd)| $xxa$gd]W & F7$8$H$gd*U & F7$8$H$gd: 7$8$H$gd{R$xx7$8$H$a$gd]W 7$8$H$gdgd]W ;$xxa$gd]W & F7$8$H$gdBmss`tatgt{t|t}tttttt u u:u]ueufuuuvžjUjU@UjUjUj(hjQhc]6B*CJOJQJaJph(hjQhK6B*CJOJQJaJph(hjQh{R6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh{R hjQhTnhjQhBm6B*ph hjQhBm(h:hBm6B*CJOJQJaJphv-v.vww w&w'w(w7w8wRwdwiwwwʵr]H3H3(hjQh*U6B*CJOJQJaJph(hjQh{R6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh{R hjQhTn(hjQhBm6B*CJOJQJaJphhjQhBmCJOJQJaJ(h:hBm6B*CJOJQJaJph"h:6B*CJOJQJaJphwwwwwwxxx\z]z^zszz{6{8{9{N{P{R{{{|}}}~įįĚįįĚįįvjv[vhjQh CJOJQJaJh:CJOJQJaJhjQhBmCJOJQJaJ(hjQh)|6B*CJOJQJaJph(h:h*U6B*CJOJQJaJph(hjQh{R6B*CJOJQJaJph(hjQh*U6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph~~"~T~U~V~e~f~~~)+JXZhlҽ~iT?-T?Ti"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh%ye6B*CJOJQJaJph(hjQh)|6B*CJOJQJaJph(hjQh%86B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh)| hjQhTn(hjQhBm6B*CJOJQJaJphuwxXk}ԁցׁKMNV%Ą&묗kk+hjQh)|6B*CJOJQJ\aJph+hjQhZ6B*CJOJQJ\aJph(h:h}6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(h:h%ye6B*CJOJQJaJph(hjQh)|6B*CJOJQJaJph(hjQh%ye6B*CJOJQJaJph%YxׁNzdwa$xx7$8$H$a$gd]W 9$ & F5a$gd]W 9$ & F6a$gd]W 9$ & F7a$gd]W 9$h^ha$gd]W ;$xxa$gd]W & F 7$8$H$gd}- & F7$8$H$gd)| & F7$8$H$gd:&-zd·ڈ܈ވ߈OyhyyhyWhyhyhyhyhyHhjQhBmCJOJQJaJ hjQh CJOJQJ^JaJ hjQh}-CJOJQJ^JaJ hjQhBmCJOJQJ^JaJ#hjQhBm>*CJOJQJ^JaJ,hjQhBm>*B*CJOJQJ^JaJph hjQh}- hjQhBm(h:h}-6B*CJOJQJaJph(hjQh)|6B*CJOJQJaJph(hjQhZ6B*CJOJQJaJphOX`arwȋ͋΋;jU@+(hjQhv,26B*CJOJQJaJph(hjQh1 6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph h:h5v hjQh6W hjQhTnhjQh5vB*^JaJph(hjQhBm6B*CJOJQJaJphhjQhBmCJOJQJaJhjQhgCJOJQJaJ arMˎk֐h) & F"7$8$H$gd6W & F#7$8$H$gd6W & F$7$8$H$gd6W ;$xxa$gd]W & F!7$8$H$gd  & F!7$8$H$gdP & F!7$8$H$gd6W 7$8$H$gd6Wgd]Wgd5vhjߍLM_ʎˎގhijkppօp[(hjQhP6B*CJOJQJaJph(h:hPw6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhPw6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh4O6B*CJOJQJaJph<SVlrzԐՐ֐ב֬mfb[TMbF h:h hjQh6W hjQhTn h:h6Wh: hjQh (h:h 6B*CJOJQJaJph(hjQh 6B*CJOJQJaJph(hjQhx6B*CJOJQJaJph(hjQh4O6B*CJOJQJaJph(hjQhtp6B*CJOJQJaJph(hjQhPw6B*CJOJQJaJph(h:hP6B*CJOJQJaJph#$;A!)68Wghlwzړ"mXXXXCmCXC(hjQh6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(h:h6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph"()x|$͘Θ/xmxbO%hjQh B*CJOJQJaJphh:h B*phhjQhdB*phhjQh B*ph h:h h: hjQh +hjQh 6B*CJOJQJ\aJph+hjQh6W6B*CJOJQJ\aJph(hjQh6B*CJOJQJaJph(h:h6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJphΘ3YqǞߞޟ$ & F8xx7$8$H$a$gd]W 7$8$H$gd6Wgd]W$xx7$8$H$a$gd]W;$ & F4xxa$gd]W ;$xxa$gd]W 7$8$H$gd  & F"7$8$H$gd  #)Ûěԛ؛Ŝȝҽ~iTi~~B"h:6B*CJOJQJaJph(hjQhd6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQhc6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmh: hjQh6W hjQhTn'(?EžmXC.(hjQhKe6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQhHx6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhifh: hjQh6W hjQhTn%h:hdB*CJOJQJaJph%hjQhdB*CJOJQJaJph(h:hd6B*CJOJQJaJph ϟݟߟ%elѠ !"7~qs7įįįąąąįįįįįįįp(h:h6W6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(h:hKe6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQhKe6B*CJOJQJaJph"h:6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph$ޟ"9 U֪G 7$8$H$gd'Bgd5v & F7$8$H$gd & F7$8$H$gd 7$8$H$gd6Wgd]W$xx7$8$H$a$gd]W & F%7$8$H$gdd & F%7$8$H$gd6W89OϤ   ӽӨӒl\lUNJC.(hjQh^6B*CJOJQJaJph hjQh:.h hjQh6W hjQhTnh:B*CJOJQJaJph%hjQhdB*CJOJQJaJph%hhdB*CJOJQJaJph+hjQhm6B*CJOJQJ\aJph(h:h6W6B*CJOJQJaJph+hjQhv,26B*CJOJQJ\aJph+hjQh6W6B*CJOJQJ\aJph+hjQhKe6B*CJOJQJ\aJph38ȥ˥̥ͥ#=AK|p[[[p[(hjQhv,26B*CJOJQJaJph(hh:.6B*CJOJQJaJph"h6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh6W6B*CJOJQJaJph(hjQh:.6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph5T+-sԪժ֪صإ|uqjU@+(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhmhiW hjQh'B hjQhTnhjQh5vB*^JaJph%hhB*CJOJQJaJphhB*CJOJQJaJph%hjQh(zB*CJOJQJaJphhiWB*CJOJQJaJph%hjQhB*CJOJQJaJph(hh6B*CJOJQJaJphͫի٬FGîĮŮ뗂s^WPLE hjQhmhiW hjQh'B hjQhTn(hjQhis>6B*CJOJQJaJphhjQhis>CJOJQJaJ(hiWhis>6B*CJOJQJaJph(hjQh'B6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQhv,26B*CJOJQJaJph(hjQh1 6B*CJOJQJaJph(hjQh96B*CJOJQJaJphŮ4Z cf)HgdiW$ & F:xx7$8$H$a$gd]W & F h7$8$H$^hgdis> 7$8$H$gdi5$ & F9xx7$8$H$a$gd]W$xx7$8$H$a$gd]W 7$8$H$gdis>gd]WŮԮծ;<ACK3mWA.%hjQhis>B*CJOJQJaJph+hiWhis>6B*CJOJQJ\aJph+hjQh'B6B*CJOJQJ\aJph(hjQhiW6B*CJOJQJaJph(hjQhis>6B*CJOJQJaJph(hjQh'B6B*CJOJQJaJph(hjQh:.6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph 349YZij­nYD/(hjQhc]6B*CJOJQJaJph(hjQhi56B*CJOJQJaJph(hjQh'B6B*CJOJQJaJph(hjQh1 6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhm hjQh'B hjQhTn%hiWhis>B*CJOJQJaJph  .2FK|~%|fi()֬֬֬֬֬֬o\oI%hiWhis>B*CJOJQJaJph%hjQhTcB*CJOJQJaJph%hjQhis>B*CJOJQJaJph(hiWhis>6B*CJOJQJaJph(hjQhi56B*CJOJQJaJph(hjQh'B6B*CJOJQJaJph(hjQhc]6B*CJOJQJaJph(hjQh(6B*CJOJQJaJph(hiWhi56B*CJOJQJaJph).GHWXq͵ٵҽ~iT?T*T*(hjQh#6B*CJOJQJaJph(hjQh&%v6B*CJOJQJaJph(hjQh4I6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh%C6B*CJOJQJaJph(hjQh!F6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJphhiWhC8B*^JaJphhjQhr`B*^JaJphhjQh%lB*^JaJph2ضy +NQI֗ziXiziB+hjQh>5B* CJOJQJ\aJphP hjQhICJOJQJ^JaJ hjQh>CJOJQJ^JaJ#hjQh>5CJOJQJ^JaJhiW hjQh>(hiWh>6B*CJOJQJaJph(hjQhe^6B*CJOJQJaJph(hjQh#6B*CJOJQJaJph(hjQh+6B*CJOJQJaJph(hjQh&%v6B*CJOJQJaJphH :FQrgdiW $xxa$gd]W9$ 8^8a$gd]W$8xx]^8a$gd]W9$ & F; a$gd]W 9$ & F;a$gd]W ;$xxa$gd]Wgd1I0C$:NkJKPQrƵƵƤƔpaZS>(hjQh^6B*CJOJQJaJph hjQhy hjQh5vhjQh"'B*^JaJph(hjQh>6B*CJOJQJaJphhjQh>CJOJQJaJhjQh>5CJOJQJaJ hjQhTcCJOJQJ^JaJ hjQhICJOJQJ^JaJ hjQh>CJOJQJ^JaJ(hjQh>>*B* CJOJQJaJphP%hjQh>B* CJOJQJaJphPr# hv;$ & F> 8`hxx^ha$gd]W;$ & F= 8`hxx^ha$gd]W;$ & F= 8hxx^ha$gd]W9$a$gd]W & F& `gdw & F& gd6 & F& 0gd6 & F' 0gd6gd]W *3{|>LdmmmXC(hjQh66B*CJOJQJaJph(hjQh[6B*CJOJQJaJph(hjQh9p6B*CJOJQJaJph(hjQhR6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh`6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph# ghL[uy:OP||||k hjQhwCJOJQJ^JaJ hjQh( hjQh4hjQhwPJ hjQhw#hjQhw>*CJOJQJ^JaJ(hiWhw6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph(hjQh66B*CJOJQJaJph(hiWh66B*CJOJQJaJph$ i:P&Ayy & Fgdygdygd]W $xxa$gd]W9$a$gd]W;$ & F< hhxx^ha$gd]W;$ & F< hxx^ha$gd]W;$ & F< 0hxx^ha$gd]W;$ & F< hxx^ha$gd]W P%&,APQhnesιzePz>)ze(hiWhh6B*CJOJQJaJph"hiW6B*CJOJQJaJph(hjQh (6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph(hjQhh6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph hjQhy hjQhTn(hjQhw6B*CJOJQJaJphhjQhwCJOJQJaJFKXrYnoDEab{{lWPI hjQhPe hjQh5v(hjQh;6B*CJOJQJaJphhjQh;CJOJQJaJ hjQh;CJOJQJ^JaJ hjQh( hjQh;#hjQh;>*CJOJQJ^JaJ(hiWh;6B*CJOJQJaJph(hjQhy6B*CJOJQJaJph(hjQhh6B*CJOJQJaJph(hiWhh6B*CJOJQJaJphXr}YoEbAgdx,gd]W $xxa$gd]W;$ & FA 8hxx^ha$gd]W9$ & F? h^ha$gd]W;$ & F@ 8hxx^ha$gd]W;$ & F@ 8hhxx^ha$gd]W9$a$gd]W & Fgd;bqrz 28mXC.(hjQhc]6B*CJOJQJaJph(hjQh]6B*CJOJQJaJph(hjQhiW6B*CJOJQJaJph(hjQhno6B*CJOJQJaJph(hjQh76B*CJOJQJaJph(hjQhP6B*CJOJQJaJph(hjQh&l6B*CJOJQJaJph(hjQhSl6B*CJOJQJaJph(hjQh6B*CJOJQJaJph(hjQh^6B*CJOJQJaJph8@w!)[\yz'ٯٚٚٚٚٚٚمp[pF(hjQh `6B*CJOJQJaJph(hjQh!`(6B*CJOJQJaJph(hjQh[6B*CJOJQJaJph(hiWh!`(6B*CJOJQJaJph(hjQh76B*CJOJQJaJph(hiWh&l6B*CJOJQJaJph(hjQhiW6B*CJOJQJaJph(hjQh&l6B*CJOJQJaJph"hiW6B*CJOJQJaJphAz $DhS5;$ & FC 8xx^8a$gd]W9$ & FC 8^8a$gd]W;$ & FFxxa$gd]W;$ & FExxa$gd]W 9$^a$gd]W 9$ & FBa$gd]W & Fgd!`( & Fgd&l & FgdiW $<Aevw!05?OS_51=_ii)7~zoghjQh Z>*hjQh ZB*phh hjQh ZB*ph hjQh8W hjQh Z hjQh(#hjQh Z>*CJOJQJ^JaJ hjQh ZCJOJQJ^JaJ(hiWh!`(6B*CJOJQJaJph(hjQh `6B*CJOJQJaJph(hjQhu6B*CJOJQJaJph('j"'Qu&f?;$ & FGxxa$gd]W 9$ & FBa$gd]W 9$^a$gd]W;$ & FC 8xx^8a$gd]W'.5HQZagm}SZad #37%@ Ieܱܺ hjQh ZhjQhPJhjQh ZPJhjQh^PJ hjQh\.CJOJQJ^JaJ hjQh^CJOJQJ^JaJ hjQh ZCJOJQJ^JaJ#hjQh Z>*CJOJQJ^JaJ9+0=A0Oz 4CUV})*;<稾֌}hjQh ZCJOJQJaJhiWCJOJQJ^JaJ hjQh : hjQh9b#hjQh Z>*CJOJQJ^JaJhiW hjQh hjQhCJOJQJ^JaJ hjQh ZCJOJQJ^JaJ hjQh ZhjQh ZPJhjQhPJ1PX) 9$^a$gdiW;$ & FIxxa$gd]W;$ & FHxxa$gd]W 9$^a$gd]W;$xx^a$gd]W 9$^a$gd\. 9$ & FBa$gd\.N$T   Z  ;$ & FKa$gd\. ;$ & FJa$gd\.$ & FD87$8$H$^8a$gd\. 9$^a$gd\.9$ ^a$gd]W9$ ^a$gd\.$^`a$gd\.mp* 7   / 3   ( = >   ョϽ{hiWh ZB*^JaJphhjQh ZB*^JaJph hjQh4 hjQh Z hjQh hjQh CJOJQJaJ#hjQh Z>*CJOJQJ^JaJhjQh ZCJOJQJaJ hjQhXFCJOJQJ^JaJ hjQh ZCJOJQJ^JaJ0Z ( >  .B$$7$8$H$Ifa$gdP_zdd[$\$]zgdVzdd[$\$]z^gdV $ & FMa$gd\.$a$gdiW ;$^a$gd\. 9$^a$gd\. ;$ & FLa$gd\. 256?MWXYnoC[ ./>ϼϼϼϼtttjaYUh 3^jh 3^UhVh Z0JhVB*aJph%hjQh5NB* CJOJQJaJphP%hjQh ZB* CJOJQJaJphPhjQh5NCJOJQJaJ%hjQh*5]B*CJOJQJaJph%hjQh ZB*CJOJQJaJph%hjQh5NB*CJOJQJaJphhjQh ZCJOJQJaJhjQh*5]CJOJQJaJ>?@ACDEhij!m =FGIѾuuj[O[[[h 3^CJOJQJaJhjQh ZCJOJQJaJhjQh Z^JaJ+hjQh Z5B*CJOJQJ\aJph hjQh ZhjQh5N5hjQh Z5hjQh Z0J^JaJhjQh ZB*^JaJph%hjQh ZB*CJOJQJaJph%hjQh5NB*CJOJQJaJphjh 3^Ujh 3^UjN ~R h 3^UVBCDijkl !klmnzrrrzz;$a$gd Zgd Zgd5N $7$8$H$a$gd Znkdx$$Ifl$h% t0644 lap ytP_ n =>CHSi$r&`#$/Ifgd 3^$r&`#$/IfgdA5xgd Z$a$gd Zgd Z $7$8$H$a$gd Z3!!$r&`#$/IfgdAkdy$$Ifl4ֈT <#)VF 6`r0|) 4 layt 3^"$r&`#$/Ifgd Z$r&`#$/IfgdA"#+/0$r&`#$/IfgdAkdy$$Ifl4YֈT <#)VF 6`r0|)4 laf4yt 3^/7hru$r&`#$/IfgdAuv~0$r&`#$/IfgdAkdz$$Ifl4YֈT <#)VF 6`r0|)4 laf4yt 3^$r&`#$/IfgdA0$r&`#$/IfgdAkd{$$Ifl4YֈT <#)VF 6`r0|)4 laf4yt 3^ $r&`#$/IfgdA0$r&`#$/IfgdAkd~|$$Ifl4YֈT <#)VF 6`r0|)4 laf4yt 3^ AKN$r&`#$/IfgdANOW[0$r&`#$/IfgdAkd[}$$Ifl4YֈT <#)VF 6`r0|)4 laf4yt 3^[`$r&`#$/IfgdA0$r&`#$/IfgdAkd8~$$Ifl4\ֈT <#)VF 6`r0|)4 laf4yt 3^;EH$r&`#$/IfgdAHIJKM0++)gd lkd$$Ifl4ֈT <#)VF 6`r0|)4 laf4yt 3^IJKLNOQRTUWX^_`bceflmnpqwxz{|ýýýýýîýýýth E5CJ$\^JaJ$hM;0J)OJQJmHnHuh"h E0J)OJQJ!jh"h E0J)OJQJUh E0J)mHnHuh E h E0J)jh E0J)Uh jh U%hjQh ZB*CJOJQJaJph%hjQh lB*CJOJQJaJph+MNPQSTVW`abcdenop| &`#$gdI  h]hgdB &`#$gdBh]hgdB &`#$gdB gdS $a$gdf$a$gdB$a$gdS &`#$gdI h]hgd"wx;<=>?PQRƷƨƙƷƑrn[%hjQh ZB*CJOJQJaJphh h EB*CJ&^JaJ&ph!h E5B*CJ&\^JaJ&phh Eh E6hf56B*CJaJphhM;56B*CJaJphh E56B*CJaJph#h Eh E56B*CJaJph hM;h E5B*CJ aJ phh E5CJ aJ h Eh ECJ$^JaJ$ :;<=>?@ABCDEFGHIJKLMNOPQRgd l$a$gdB$a$gdS C$gdBC$gdS gdS E 000P&P:pB/ =!"#$% Dp6&P1h:p9c/ =!"#$% n !^JBsI|PNG  IHDRaa?PLTEY[>hh8vt3#/T#/S&1T*4U.8W4=Y/9O;DZ=IM"Oz"S~1XzEK^CYZNRGOl\okNUYdS]zLQaNfaQlb]ffTtbV|a\{gYb~hhhwugiwla^K.}d|VV_U_OYR]S^QZS[UZN\OYQVPWQYRYV`W`V`V`[d[dehek|m|lowrmhztsutjp_b..;:5ٻʳȫ)ʶ-ַ'ȫ8ó4˸0˳4ٹ72 ''(68UKN\XTX^YZTOLFEBFXhwlfncemvžVƧFԭKٶIȤUԯRȳuDRLDGW]Solddlxs}r,x4zks^f.,;8!%,4:>=\USYHMISbaksDsJTZgzqϕɹξȱĜǑقیׄކߊܔݛĈǭ˸аާ۷ଈ֔ůƴŖ۶ҹXbKGDH cmPPJCmp0712HsIDAThCZ{TSw&*(L 2K[c6Vbk"qnل\[IO)G%=ZC BۃbUl">j 3]O[|-JP/MB@PgL}?~4o 5#wn߼9p_GDUSn4Ol#<½ h^E@*[@ƪy(ͳFt9V_ru1ez<zV3de?-Pzd3@!q !˹0hj7644YUH[  |@zOB[no2VV~<6 ikWȴeH.ui^7ip (W#v i (GbV7`(7Kq}*feW)!O##٬tcJì*$آnH4 ;cW lL).R2{4z2mcո O6ЇIܩzOnjXY N; H8?P<§@؃WǸ^`7~tP_A[}Z[A1/P&d=,h)0.O w&_%4LxGc˰_#Ůf dޱyI+|%|{mxwarGFĊPxC8/̚xKnl?SXf, a # T>.iGAD~?y"w"S܇w`7IՄFAyM!V6`E z21jvTb;ud<񳺘s̉y:&*flig(_ );0-y*ӝksWv.}sZ(*A.a߬RyVlG!!Ԁ+A<2 "oF<ºM]6QJJ=Oißt~ua,-- gٔda}<fLXvsw [bƒ͎o /Z܎-vTlv_zWf8 e *`b"tlA b5 J)\Ud0Vs>)45v8%%ERC  ˣ2 I@q|XajT`I>#BA,l:ݥ]NWVWUOcX rf'Q(ϥnBAD8MQTt~ߑ-l(LέV3I_p;nσ!ܒZ{EEES՛rXHK ^Kiؑ( 8'" J+*%ջ+T>wJs,EwA# h,a,` Bu>n~׹ LԚWz?#(`FCQX]GAf,W70)DgݥNv~iF!CI`wDXjZsؖ»|Ti2^Rf| RX$z\H$XXZ]NcIn[< I)z&&i"^WDYp$Ӱ{!^>WQd4l~bb;5`6+vSz5*>NpkzR#B8ЌD˘BR=Y$g 4e-0+ș|b(.[G׭"jdٳØZ/&~֕C ce'䑫|JÛ1!-Z;[,eM/߆[жJ.%1WP:n ^ 7Tu} m)NU%]Sf@T#d .AO*u^(#fGhKn#Pk׋ٽYz205d_?&3_'RO('Dh$?5aUa,&Έzܞh-ά¹e[!la<ԈxK&/BĈ2)gOጠ{b,qR҅ &@`5JߌUV mUMH]F"%BYI]bI6%{(jRRӀ[N <(QP{R,Iq I[Tqtk3N:}:)6ܖhj2g7Q$}N܋}^,c|TDJݐp[rrz21/Ţ-UV: ;{j*:\ Q iB19(BφŽU鋗Ģ7Ue; NgΝ;ow}o;+@EFO,L%[-P B?"=O-0E$E%eR3s[Nܜ_vuWtűq"ȕc ,k% ȯ+e€A@0 ^.<\2O?XmALۮLH"/c,; Kͤ7 ß4uSi@PXƌq#7SAEdj5Hѡ/D1J}bY?^+ZתL2˻*Aq$(>/Y"'6N$ u2!deD܏bq[{r3B?< R&RUu';_ir %{ S?.JvL{[c>NҢU- -?v+`u3P Jxf+{g?^xkqGҖpY FR˄;*(eiZb^"TGُ%:/MYv""&a&$q;,|Z0cQ28SPJp3OU<6jKR!C#&/%y)5C'ԛA܉EK!Wk )/$KG?ZP[ GNo 07IO]/6%`'d,I5 ,R{`4MѦRF2bWϛ #Iaba3Ri-cqҌAl'/'%/!^9z4ȉmCdsv !F r[\@`.'=|t"WCff>Y|>]oo_oWp0[ÁxLP{9 9Vt"~UĐ,%n7Ʈքd") ֽ J~Ŕ$,}yɡѾֽ]NtR?x90ݴF&Tq)kr@BM X (cAF*8ˎ`?ז-~!9CI.+MaB?a;aT.P(#_H Ol)=1o啫7 Y7[{1 D)*4D2*Hop(TB_Xpy,LIO_vtLVIM`7Xik2~  ߻2JOŶHHK7Wț!8WZK7 :Y)8o>NZz,9v#87QL} 4q ~;E`[#CCcgFGăa=ģf ƪɓ dO<a[P:6{@T',iȲ6N>=(F9 >i{{8z@˾ؐ"e,`I+|u1,LO>Y/aå1Hn-vd`3n\yf- ",-8hM7衑! x-@uIM6ձ]GF"<ڥqY*IENDB`]<Dd  d2D  3 A?"b;>AA!h;Dn;>AA!hPNG  IHDR\H9PLTE!!))11199BB!B!J!J!R!R)R)R)Z)Z)c)c1c1c1k1kQ2bKGDH cmPPJCmp0712Hs8IDATx^y6g2sL*$yH$ݻ-Zn["A kowmlm0;섮.TN/qok] v|C-_иYd{dnj K~VDLFj=r;/Z/^#-Vf(Chv|>Ͷ'JXAv; ~L9:쪅umF1|=>[m]G}7݋`T)V٪Ҧjtc+JW>9 wLIͺQBY&h?tJ $,x5( BDYmzd@r *i0(* XeEkQBu[Шm嬔{tll*&u.\kZSF&4pk75.KRZ+\]y񩾊u-7!Ó(DQ٥2Yd06noJ\'燼P> @ڟʭ-0  l?8Z,f55(Wס:0Rgd9ͷ庻l(Yf$RyqΙV~T HQ&aI4u(Eh'sI,fe$IhPPL€m`[+Q;lڬ%Uó!y2Y9rj6 k mR&or[ 6[YwN7z7]$f]X[eZ&=#k-S(-gQ7 XS38c8EčL6UmrԨ%,:)|b1 ñex Ŵ)tkIK1o1Sa IF,&1$Lݰ乷XjHn5,vV>1:XPT9ɦ* -uU^֫=ħ8!Y:Jrez\iʔqf:`[@Y@C[cO倩ҳ4Q_L{wjB HBR)5Z$:6^|ZxwU4R܊0*K¸;Y qZP8 YA~YsK!B묆{1CNgD8İH2Љp"`(!dAsv. L՛gJ #eU} (Ew )]rô,޹BkEH:+׊WІ_&3^k㏺0_9Q:x<9950 K(@$ CD1BFF`ؠHi@sDDQ>y[gH;Nw645ʓ r_V!Ƈyp!ye4æ9LnDجF}C~KrX@qst8S\"QTAj!56~tw6i|JÙ^QK2=s|֎^{k;N:>ld^Xw.8+x1b|μ J{<%q){^yP\*wj1{ߙ.|x.|nulQ*y9V3%78;՞j7=s>/ؘzq56"7'ȐX)FH$R3o1x\/C)XG+:8/[PO! m[F3Iop;zCF^d.PY;Y??yǽ',}ŭ!쿽fƧm-.#L9٪:lHqDEopsЁIu80cK8ۇv>g>odN4r'ں>aa).ưcp x䐋n>\Z8캥BɔJD]̉=pj1XÖ<ϨPl91kδM-#3!4K,K1hOn>J>wb8wh Oυ!f/>b[u[se}Fo ]ρteRm8;,C٥KԋhBjWC\_X't5g,3E-I%G?߇H]DOV4ڱ+A].v͇"ѭ+xO|.z\8"hFq&:L' ק`쌉yI9u#6d%x%< S̓\_x4#(+67֡8r϶|F}6ouTgOF{|0yч]T­tWE>4a}]mcrXK">\Ze 'C] K}|#0"]ӵD۰r} Tˡ$J+>ݠRϕλOzق}]SK>Bϕv{}ꣁ<*B}S9V!sWBT2k܇s+v12 է~GћY8&yS|}\M'Z/4Re_ݘBDo׋_yLL@F N5)}& >DuckddOPNz8$FO]z">)373oJ_4튜>ߒϓVQh|G4tsA'=Ľ׌ϼ(nt~|Q\,io=<)|έ4F|>*j@Yx"JВ<r}Oăχ~0P|͞h??YQ\|>+5xxV翞N|0 O (Jzly]h%2L D/ՁvݮNg8 ^@j}.NmȖ!jxU˴#$>wWdž|.ڌ碌z>Wd"{:εe#j]:'c؋|Ns5FO46tE$+M6'<ׯz>@48@q'>\o)r)k|%[A|2"U\C[Hwi؇NE yg^ 3;/NН]|ޙ7|q ΄yoCP)^ǎ3`[O6EdgERz1>W<5Q"4t#8,8;sǎS_R1Ҽrc§@"4)=Ղ3>]gpH)(jrH$rX]9'yu}>TmB_7>Vz1Gɂ8eA3Ǔap|#́4 ;$;3$B@v}A*Dp'ϰ6KQH\͉B _֧(k+#3J ֍`Zߠ~[5>~zM.625W#JM/|jU& х'X$.&ϰ,j[sJ58Jk$Zj*8j2)X'x 0dWl7o<.kQzyy \=#k/>/>ϘKgdCn?]s-ϟ;?]]G̷&|m @uԆVG|zcCro? 2 ?Hé F:#oħƼf{ByX 'H]GLFOi/w3nrzn|Z0ZZ=9sƶ^|)ɺ]X4ـzfڥޑ T>8w6wcH| '?$ \Z@}5mcg)cB؇B q`~9}6COc899XVxPJ23,^g?7$|?pd(!j. { j͠<$]S!(aceCY固 Ҍ2Э,{b?U@w:<p3[K;_ݤ|hZ =j&PI7 iwBʊp()$OYGɅ00-]uZs& Ȫ !ќ|q :؂ţ|zdEDR'$a֤9XAk6,я^M=~nzm[6n2HCm]$CziyP&uBMl!Ք@\>g@wqMJ5?~sfl6/zD bm >QfSH4E@IAQBsta2>k}&R 3RM wNt*՗!$rYԑK9P.&+C}v&߀! /G|"l| wqStۺ^]XF)^?WV??|.q}.^ҭ>u*+3:tDk2ʺm}w[\8עt{F1_|^|1nՇ.^=c.ݞ~/>4FkUb!u=iv.Vhg6D">Fp:ۅe.(vUݮh~k i2}3Fz[[#)P\-8he2 TRzEXC׌^pxSA ʙse4"kF|N@h/7j|!B3N4B~N)QuV):x]ٱE;c>G)szeis=.a>UVG!(Z2IJz4寛: ZJrz@s2Ċ5i:H =D G*5 ^Ej/ɶY77K >aLCM֝O5h}dv^zԈb\EO (}6bn}T|v$#@*o4?.jxʭoMWmW8/o4ϧ:S,TʁOSvFi(ísr`#NJ ϜϢ7Ϸ?5\w:$u O} ^H E0)(o1:8O<4؜[~`>36?L{`gɻ5r|Gyl-ۼi]3AY=B8k,Tf ?+U%B9]3oI;L * i>p9k%\Wm|D꠬aHуm跚hM]h33a-F3e{N8|׭*13%# ,0, 0>?:|*\fX|kEE(U3R--*V*_铊z8];ѝ|B]50:[zO-; Q%Ƭ`'|zO>ݓ*ZP%iS"rэ\o N]PZ,=aǖDH}dB&&0\`g:,| XF rrw zP CϴjD9%4[-}X>S>-ׂ kΌQ<7*Q= `Gљ)%}A\K]j5s( EJёT_L'ArhvlhA]Nrj=s:BS;KrIuwd >]:rZE|α!()::Qˡ<{>5L#u%zI}׏S46}5l}Z0T~8rKk1KCZ0n:9< 8lF0!6s̀=PE'\n(̔Aj[qt@k6-ԧ]* TA48T6猲QH%։z *bE+OjHT2K*S6[YĉD,a%+i^j~aH%GeZѱ=Eum}ccupl,y"|\r7~l貰qqi[,]$]޼ qPL7E1/8 lC}e%HtJJz5ms"a6;jk]G´~|"1U}eS:#IBuDyx6ݯ>1&lTy ]B. zLIUr ,t_$[]m+s<. -˶m%lzmaV4ѭ!uF5< g%=vuՆ+P`;ՓQW 25>LΉ%KQ2Z2 D "fe V[xBv\|F>W&r' dŘ DL]0pI;и>Q 1aΊ ud9 [ί Yn$z]J}^LmDՉ$׬bH=cf iGiJ⃾c p˻]*fɠv8|7ֲ2Dt؏9}CZ?Xqé,`JCw:~~d#+ZT:ZS{8bVpRU/>ϘKgdm3p]}to-[&-|9 /OfsU7HbPtL> 75쨖UJ}D+*y(ɕҕ~o@El<󏆣IG73 -;9HCt;Иf @ 7>Hcri;24>ȟ҇Dr# J\R1+# mPif&ٶL/?CgF\{M2) mVUЯqa1SAא r Ц4E#yo`3v|Z5JjatcDFl 9?fD?-՟4erˆYq nY - !+-G,B4^W( t!X sGl)aS@eKi$Z#kKtGmV ?ӎϱgقG7+Is_YqPY LcX4ijl'd9]p1=(Tj?Z}U #,)vv*(2юC2Ú{DJUS%",f ~ߢb9L 7I%QXdG3\\C#zNstkLȆ8z߻ jDFV q`׶ȭE:؅ڑcÐҡR}R ~$-Ac- A6x4P 90hxII-*]fcklXH.!11ʩt{.B.+GPT%G"y*l.Wn{RF$D BUOPVW맽|>jP1?xsgE"d8$r!]VY@#ׂ=*TuR6 R*A6 (ӧ!!P!~Iujh#5(wZRվ6>_>Z!7 q{DO 30U[?ns|!y?pNO㞇5e 9 L2B{ Q+p`&̸hRjX آ ˧ qtQĺ":WBZW*E΋FA"ttx@J*^iu6kmww@lvՍbfba~8g??58f+QkosϠU"xRwy𷹖 2 $lA}Iؑ°r𷹖Lz:LӾ et%u'XܹX'&6S 򋂐! ]'͝rJؔ^Sm9%vziW1䝶s'v+6@5G|\q*N7>[)“[1Y k;|T-q9Y)3 ~ZI~04bq%&D*9/T80ޣgJ(B #\ߠJrR@e.!xW|>%rЛs5wW.=3ڐHID!>AlX!j0uőR$Fp(0PVZo.c$TKqm,/WTy~TS0c~&׸yerw0 &ce*5]_e^*`,j9t]qQhr'$s*AS@(U&b |jѱ>.ʏm[+)">`>ϣ Oe>ׄ)| ՠ~"/W1!vwƻ{x f,|@=U9=g84Nax? uFcp_Yj@'x]>D"7'YwI4&zlAaCYmEHsv4v-9|ZwY`8?*\caimF yit{fw:F歮<3z+V_"?p7t?^jMit+¸Gnˠ)>khc:#!&OW~Hr̡ Ȼ;. s)L\]LOHz)Db + J脂}RtG?h.@ak-ux`mIxIq8QFۊm&v 1m-6q>xeXڗw@O B`4'E0a|Բa"!>0(h &&2]Ǩf< z gExz yYSR,rOYr=޽RCPɡ<LCn>GQuz QN<>J= 4p>0J>?Nn G|O"Z&t(p1]3nt=py)S{E[{` x#b=Hz7z]Wt:Ћϵ9-9|lsڙD|Ҽ3<~>xІGל`yӶ/2)7*Lw!A4 '݊BOd?4a? B4>OWyգ}lgs'ߍ>2r|R'*!tKw_8;6cPUsC(izQ|Bq+CF_OtA>)8)|^>5wyRyFy:y.DP?Y>S@}i|8gPB[¹g36߿Z5~:&-||wŋ1R]J粥)l3O\POK#O+Ո#iRΉWr(V*CFo' QvW5l| alΆrJyh{M)BKHxwZranohp|OonL~Uӧe튇bVE5GH~_)S(:yfLOU6 =ǯ`ȵxO䩬Q>÷{N»qfZv&OЋ~GxZfx m;*5 oխD}{pHAin^Z;R6ڣ?PyFUdLƅmQTJķX?ž2cDv=N ʥV;EutNBy[g#,dKDkL7l&u<tY͗@JGDDN"B5mb5a95tM9M$|Ti64;@"NFV3(3,16*҆Yw`#\*3oZLӖ1|(U9:ϺvYm4Xsp,'Fpq '̧b3B[j4-u21]HU@pL c)2S$*lm w<C!(Tdl a C# qHφ§[;,LX@|DZ+N_3.]zPv$Wet"'r;aIΚMHR 7I>Wo3";pi>C&Fks6éJ$%Mٟ>8NA L#UoR$:Jyf:KPkNovgŰruĐ;\4.0o֑sJq0+8(:'i'I=,9TCF hQ:$ͻ?Ⱦ%8̗^bNdy^MSLjaª:?=iLX<4)`':D#Ȣ =b:S@/)ԺEހ59P+{Ru;ZnФm /s]E&$S<đOH)ѹx@UCH&% n'5Q}k?o]mRrfnA\GIz,JZp%t&z&vEF}a@ ٰ+l4NyO#:Tp u a{\і_;"Lah. g!kY"=k|w2%TD ێmχGiNMNțgc+bC! iw(%cY3R]:y¶0O;jKn]>r~ޭ̻c> c z|תϻup{ 硧;QJ`}<aq?p2[Dǃz=}mbOj78F8/>Wŧy<32OċϋO{P<:?ϣV1Wo_[UW}^yW?[m?1v;w@|..\seef>ׄZ As)|uEs<=|]|||c|| G<yP >WD>_s|]s Z_|^|1$Ap*IENDB`$$If<!vh#v,":V l t065l$a<p yt~D$$If<!vh#v,":V l t065l$a<p yt~D$$If<!vh#v,":V l t065l$a<p yt~D$$If<!vh#v,":V l t065l$a<p yt~D}DyK _Toc311452427}DyK _Toc311452427}DyK _Toc311452428}DyK _Toc311452428}DyK _Toc311452429}DyK _Toc311452429}DyK _Toc311452430}DyK _Toc311452430}DyK _Toc311452431}DyK _Toc311452431}DyK _Toc311452432}DyK _Toc311452432}DyK _Toc311452433}DyK _Toc311452433}DyK _Toc311452434}DyK _Toc311452434}DyK _Toc311452435}DyK _Toc311452435}DyK _Toc311452436}DyK _Toc311452436}DyK _Toc311452437}DyK _Toc311452437}DyK _Toc311452438}DyK _Toc311452438}DyK _Toc311452439}DyK _Toc311452439}DyK _Toc311452440}DyK _Toc311452440}DyK _Toc311452441}DyK _Toc311452441}DyK _Toc311452442}DyK _Toc311452442}DyK _Toc311452443}DyK _Toc311452443}DyK _Toc311452444}DyK _Toc311452444}DyK _Toc311452445}DyK _Toc311452445}DyK _Toc311452446}DyK _Toc311452446}DyK _Toc311452447}DyK _Toc311452447}DyK _Toc311452448}DyK _Toc311452448}DyK _Toc311452449}DyK _Toc311452449}DyK _Toc311452450}DyK _Toc311452450}DyK _Toc311452451}DyK _Toc311452451}DyK _Toc311452452}DyK _Toc311452452}DyK _Toc311452453}DyK _Toc311452453}DyK _Toc311452454}DyK _Toc311452454}DyK _Toc311452455}DyK _Toc311452455}DyK _Toc311452456}DyK _Toc311452456}DyK _Toc311452457}DyK _Toc311452457}DyK _Toc311452458}DyK _Toc311452458}DyK _Toc311452459}DyK _Toc311452459}DyK _Toc311452460}DyK _Toc311452460}DyK _Toc311452461}DyK _Toc311452461}DyK _Toc311452462}DyK _Toc311452462}DyK _Toc311452463}DyK _Toc311452463}DyK _Toc311452464}DyK _Toc311452464}DyK _Toc311452465}DyK _Toc311452465}DyK _Toc311452466}DyK _Toc311452466}DyK _Toc311452467}DyK _Toc311452467}DyK _Toc311452468}DyK _Toc311452468}DyK _Toc311452469}DyK _Toc311452469}DyK _Toc311452470}DyK _Toc311452470}DyK _Toc311452471}DyK _Toc311452471}DyK _Toc311452472}DyK _Toc311452472}DyK _Toc311452473}DyK _Toc311452473}DyK _Toc311452474}DyK _Toc311452474}DyK _Toc311452475}DyK _Toc311452475}DyK _Toc311452476}DyK _Toc311452476}DyK _Toc311452477}DyK _Toc311452477}DyK _Toc311452478}DyK _Toc311452478}DyK _Toc311452479}DyK _Toc311452479}DyK _Toc311452480}DyK _Toc311452480}DyK _Toc311452481}DyK _Toc311452481}DyK _Toc311452482}DyK _Toc311452482}DyK _Toc311452483}DyK _Toc311452483}DyK _Toc311452484}DyK _Toc311452484}DyK _Toc311452485}DyK _Toc311452485}DyK _Toc311452486}DyK _Toc311452486}DyK _Toc311452487}DyK _Toc311452487}DyK _Toc311452488}DyK _Toc311452488}DyK _Toc311452489}DyK _Toc311452489}DyK _Toc311452490}DyK _Toc311452490}DyK _Toc311452491}DyK _Toc311452491}DyK _Toc311452492}DyK _Toc311452492}DyK _Toc311452493}DyK _Toc311452493}DyK _Toc311452494}DyK _Toc311452494}DyK _Toc311452495}DyK _Toc311452495}DyK _Toc311452496}DyK _Toc311452496}DyK _Toc311452497}DyK _Toc311452497}DyK _Toc311452498}DyK _Toc311452498}DyK _Toc311452499}DyK _Toc311452499}DyK _Toc311452500}DyK _Toc311452500}DyK _Toc311452501}DyK _Toc311452501}DyK _Toc311452502}DyK _Toc311452502}DyK _Toc311452503}DyK _Toc311452503}DyK _Toc311452504}DyK _Toc311452504}DyK _Toc311452505}DyK _Toc311452505}DyK _Toc311452506}DyK _Toc311452506}DyK _Toc311452507}DyK _Toc311452507}DyK _Toc311452508}DyK _Toc311452508}DyK _Toc311452509}DyK _Toc311452509}DyK _Toc311452510}DyK _Toc311452510}DyK _Toc311452511}DyK _Toc311452511}DyK _Toc311452512}DyK _Toc311452512}DyK _Toc311452513}DyK _Toc311452513}DyK _Toc311452514}DyK _Toc311452514$$If!vh#vZ #v>#v #v:V l4      t (065Z 5>5 5p(yt%DyK Joseph.smackers@xyz.comyK Vmailto:Joseph.smackers@xyz.comyX;H,]ą'c$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%$$If!vh#vZ #v>#v #v:V l t 065Z 5>5 5p(yt%zDd 8"~0  # Ab;"l85߁Yn;"l85߁PNG  IHDRHKsRGB  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012345789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ 2GRoot Entry  F0C8wData 6WordDocument kObjectPoolpu w0C8w_1383992142 Fpu w wOle PRINT8- CompObjM  FPBrushPBrushPBrush9qOh+'0h   $ 0 <HPX`(      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./01F?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~\<4+ y ^H yA H^H(H, ffffffffffffffffffffffffffffffffffffffffffffffffffffff꘧fffPjj~}}hfffWxwԸ񄮯|fffZfffTۣ}fffTޡ}fffT~{fffUyfffWݫ{xfff^~^8[[;]]@bcB^aH_dE[`5X^Xvuᵵ趶fff䬬۲㳳Ūd~@A77Pwv#DE1UWOwy9fiYjn|||~~~fffzzzrrrΌlllpppΎ왙vvvφmmm~~~XXX~~~߃bbbeeeXXXӿeeeooogggc!LOsiSQfoѯ򻻻ھ־fff̫Цʕvvvbbb𶶶벲ͽfffpppXXXhhhaaaӫuuu邂ZZZiiiEEE^^^ꝝeeḙ___ۛ;;;TTTaFHk\PMriplllssslllKKKiiiԲkkkmmm~~~ sss|||mmmQQQtttgggsssDDDːwwwjjjmmmYYYqqqzzz]]]QQQnnnqqqҗ󔔔ﵵЫpppkkknnniiiyyyfff~~~gggǃRRR틋bbbŒ\\\ggg󎎎룣xxxwwwVVVꤤkkkfff`$TTd3|{nqfffɑ򔔔fffpppપxxxuuuȐvvv<<>>nnn{{{ffftttxxxlllfff`{ލ3ki:xyإluyyyձaaalll嬬]]]ccc{{{㴴fffsss߉fffhhhАϓjjjdddwww~~~}}}ڲ]]]lllaaaЬ͞oooddd祥össswww礤rrrޟǺ___yyyttt܍qqqfffYS5VW-GH <>E[_/FLBptsuفmmmXXXGGGȽOOOzzzvvv賳mmmjjjzzzHHH\\\ԡjjjjjj~~~׼VVVttt~~~Ɩ~~~xxx___ֈuuuzzz^^^|||kkk___JJJ퐐mmmlll???{{{xxxkkk///픔ooooootttBBBwwwvvv샃uuutttyyyڸqqqooowwwuuuqqqfffV#kj]CklKNͲvsännnɾ꼼ίaaazzzҸױϳ߾www~~~ڱOOO䴴܃᷷ǰЭfff~~~pppX.zx=kkUyx3^_wUsvOOخqr娨㫫򽽽橩fffڮӭlll곳SRzz#9;*SR9mk3`acnq@@@---......///..............................///............///.........///---<<<֙ڕfffۂlllccchhhoooYYYؓ{{{hhhoooqqqԿiiibbbkkkÛ﨨bbbᮮooosssIII혘愄^^^eeeOOOϫ___aaadddR~ߥ}ZU}~xԬnn ㅅ{{{|||ffftttnnn􂂂ΏhhhPPP>>>|||æќVVVbbb옘tttJJJwwwcccꌌppp˲lllIIIsss111űRRRUߤj1]_/[]JxynĞsp ָuuu∈qqq񷷷ⶶjjj맧mmmݩoooӈtttnnn\\\ᅅkkkzzzsssѺ󡡡fffRRR}}}傂yyytttЊӹ|||fffrrr}}}񤤤~~~YYYxxx霜vvvvvvnnnmmmЈcccwvvTߨrAkl!'!MotdddIIIJJJNNNMMMHHHLLLLLL666...SSSNNNHHHKKKNNNLLLIIIccctttiii```YYYёxxxwwwFFFlll񛛛𪪪oooGGGpppLLLtttfffSSSՏɌŏzzzcccfff޶ďh^\]`]T[\Z__TqDDDooohhhsss{{{\\\\\\wwwbbb~~~www듓wwwbbbIIIrrrzzzGGG]]]eee៟tttkkkzzzIIIfffnnnӈ^^^R~ߨpGqq4cc>bfKlonwwbbbZZZfffccccccbbbeeeeeeMMMGGGiiiddd___ccc```eeeZZZkkkvvvbbb```uuuyyyŞAAAaaa񚚚便jjjJJJcccUUUddddddÙʆVVVrrrsssfff̓_MMPUSHOSQTRBdtttxxxnnn[[[sssnnn~~~fffzzzxxxҢpppfffjjj|||}}}nnnRRRpppjjj⍍iiiDDDuuu畕kkk{{{{{{yyybbbꉉ†hhh}}}R~ߥV+0 HHdΣ}x&&&nnnvvv<<<xxxWWWvvv|||ooo}}}ȣ덍www𜜜ЩKKKćrrr[[[mmm[[[rrrXXX<<B[uw'''CCC{{{Мxxx׎___eee[[[eeeǻdddjjjrrrxxxɪyyy򍍍ZZZЃfffʂؙNNNtttӖyyyQQQҀSSScccHHHqqqttt]]]͘UUUVVVfffЀ{{{aaafffQQQxxxfff廻򵵵\\\uuu~~~Wߢၸ\&MP*.)ADVps+++FFFttt{{{|||WWWaaaݵֿ|||hhh???ǽDDD̐mmmdddhhh菏Үwww~~~eeeߚjjjsssaaa䬬yyy}}}uuu}}}{{{vvv㤤ِzzz{{{iii333fff毯߱Tߡ]5hj7mlZޡip***㛛vvvzzz|||zzz|||}}}||||||||||||zzz|||zzzyyyzzzFFFlll֮nnn⾾dddصmmmڸ鷷䳳۴第ȩ򻻻ܶ混ҰWWWfffXLnZؠgo000RRR"""...KKKʣ⣣󿿿fff`}ߖ{5hf|i5:-19rspr+++ᄒFFFfffV{{ݜ2llMwx>^b{tPQͮnt***谰KKKfffVxߜ(``[y<\`n*kjިlv,,,HHH    HHHfffgUBE269=4LR9>>yzrw***񻻻EEEfff}}}a}ߥpPqtVx{StxGsvcux+++IIIfffooozzz޹Ƿùŵܺ]{~n~}u}Ùwy,,,MMM """HHHfffkkk}}}aaaHHH]]]oooжKKKMMMXXXkkkxxxSSSVVV\\\aaaeeeRRRjjjКUUUSSSxxxФPPPZZZ}}}ެTTTUUUiiivvvccciiippprrr[[[dddb|I%dc1hhArs@rs;lnVT VX)VV&WT%[Z&TU$RSOus.--iii456688688:=;9<:9;;99998:::;888;;;:::999<<<555GGGFFFſfffmQEBEGFJEBJG5{ZxxxqqqZZZ򒒒ppp׌|||wwwŕҨfff~~~㒒gggLLL::::::SSSZZZ֥򣣣hhh444cccd~o^fkebhhxǘot)++ghi0/16889;;=@=:=;:::;;;<;=;;;>>>:::<<<<<<===222FFFHHH͸κfff{aRMRXYZWVYQAgdddXXXoooRRRttttttlllȞeee```lll{{{EEEɊooo|||qqqĩWWWllliiiWWWܕgggwwwLLL߃vvvyyywwwb~lt*)*GGGԽɭgggCCCTTTYYYPPPPPPSSSSSSSSSSSSSSSTTTSSSRRRRRRSSSSSSUUUSSSUUURRRSSSTTTRRRRRRWWWKKKxxxfff|||VVVӲȥ[[[ɖȗUUU秧ĪQQQyyy󮮮՜a~qt1,-݁~SSTZYY^\[`^]\ZYZ[Y[[[YZ[ZZZ[[[]]]\\\XXX___[[[cccHHH~~~AAAfffwwwwww鷷ڹXXX\\\tttlll`{st+++PQR $   (((HHHۿ졡'''BBBfffa|ߙpt#*(GGGHHHFFFNNNLLLUUUGGGHHHUUUNNNNNNOOOMMMOOONNNfffc}ߛnt%,+III򖖖cccjjjjjjooo```(((  000aaaooojjjnnniiiccchhhhhhfffd~qt-*+ACF       FFFHHHgggfffc}pu1+,릦GGGdddTTTfffb}ou0+.HHHppp^^^fffb}ou**0FFFƎeee]]]fffb}ouy"2GGGXXXfff```fffb}ou叾ҙ֚ۜޙ┾㒾┿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿╾ᖿ▿▿▿╾ᔾᕾᑽߙX{!;[EEEȓfff\\\fffb}oup5mDwPM|Fy=w9u9u>>gggKKKԹkkkxxx뷷iii]]]fffc}ou$$$%%%Y:...JJJʨÐhhh\\\fffc}ouY:***HHH籱xxxhhh\\\fffc}ou------Y:***FFF䗗hhh\\\fffc}ounnnYYYYYYZZZSSSPPPWWWXXX666222SSSXXXTTTQQQWWWWWWUUUtttY:HHHqqqoooiiifffeeeddddddccccccccccccddddddeeeeeeccceeecccaaammmxxxMMM...hhh\\\fffc}ouNNN[[[xxxuuuuuuttt|||}}}fffDDDDDDDDDAAA@@@BBBDDDAAAHHHbbbxxx}}}vvvsssuuu{{{aaa___Y:###:::RRRFFFQQQiiinnnlllkkkkkkiiiiiiiiiiiijjjhhhjjjhhhiiimmmpppjjjWWWGGGSSS;;;222hhh\\\fffc}ou!!!zzzω;;;Y:;;;WWW>>>$$$]]]www!!!<<>>HHHRRR%%%===徾???JJJ>>>iiifffc}ou)))CE?U7婆:k===III>>>***333@@@lllfffc}ou***IIH_;䨉Cs111XXXݎ{{{QQQbbbfffc}ou---GFItR挑5h---rrrhhhZZZfffc}ou***FEIrS꒏/c333eeeaaa```fffc}ou)))NMOmN珎/c666IIINNNUUULLLJJJ!!!aaafffc}oueee+++PY8u7SUHBDB?ABCCCDDDDCCBCCBBBCDBBFEEEBcIH\HBBDFEFGFCDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDCEGBDCCC( Z999TTT^^^fffc}ou;;;111S[:n+k#vMG@B?>>CBBCCCDDBCCBBBBBBCCDDBB>bNA]HCBBDDBEEDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDBDGFGI6e333888bbb]]]fffc}ounnn222QMOe@䳑Xۂ??? '''111******))))))******************+++(((***)))...hhhfffc}ou~~~ϛ+++HAMhGE~fffc}ou邂+++KDO풊oN퇔/rfffc}ou,,,JFHۃ`BꡓBxfffc}ou|||***HHB~^?鬑Iyfffc}ou܀(((HIB|bA말Cwfffc}ou񍍍)))DEB𞠢cBꓒ{|{򡠢}|죏>tfffc}ou...BBB>>>EEEAAAAAA[[[GFG狌_=onpكۃ{z{륏>sfffc}ouzzz---ccc!!!EEE{{{[8AAAYYYXXXWWWߜꓓlllTTTWWWî尰\\\UUUUUU݁]\\mmmkjj\\\vvv\\\\[[Ϙuuu^^^ttt\\\WWWttt֏RQQlkk٦HHH꩑Atfffc}ou뀀+++eee FGE~~~Z7uuv󹹹yyyԁuuu]]]z{ynnmhghsrs)(*srrٵomm֐~~~cbb}{{{zz}}٣lllkii{yy̏zzzttt888髒Brfffc}ou(((fff$$$EEEY:z{{~~~وyyyttttttYYYvuvgggUUU||||||Ábbbuuu澾~~~Ə΃gggjjj묓Btfffc}ou}}})))ccc!!!EEEY:}~~<<qfffc}ou؃:::%%%,,,((($$$######!!!   !!!%%%))))))'''%%%JJJ󤡟Z5eeehhhooopppqqqFFF???kkkrrrkkkmmmjjjjjjjjjzzz쩓>pfffc}ouĽ½fff^7璒ooo|||{{{~~~oooQQQMMMPPPLLLIIIIIINNNLLLKKKkkk~~~~~~yyy~~~xxxeeeOOO묒@qfffc}ou΁~^9ީ999鯓Ewfffc}ouŀ~~~py}^>FFF豔J{fffc}ou凇{{{yb>HHH鱕G{fffc}ov}}}dAlll555:::666888999888888888888888888888888888:::>>>GGG좖4pfffc}ou|||ᒈ[?zzzIIIQQQMMMKKKMMMLLLLLLLLLLLLLLLLLLLLLLLLOOOKKKQQQEEE顔HԂfffc}ouzzz|||ۀ{xd7HHHEqfffc}ov~~~Ȅf:xxx<<{5X=751301334554332222222222222222222222222222222222222222222222222222222222243/'#(49/1EL5ޕ:fffc}yvŽ„|Z:TTTߩ```tttۀMU>@lZ[XQTVXYYZ[[ZYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY[[WNEGU^WUaL~ޕ:fffc}Pjkü~~~Z:aa`픔IMF輦&ޕ:fffc}s/GH}}}Z:aaaչGBQ~{ޕ:fffa~ߘ\O`cZ9ddcxyzHGIyޕ:fffa~ߘ~%NQl}[9mmmHHH›yޕ:fffa~HCkn|||\9hhgronܻHHHyޕ:fffb@Lzzz[9FFEIFEݜGGGyޕ:fffbU3{xxxZ9FFF}|Ƹ{{{$$$GGGyޕ:fffbr$f{vvv[:CCCݾȼۆGGGyޕ:fffbߗ7F{ttt]:dhi00/Ͼ(((GGGyޕ:fffbߖY<|uuua:|RRQ###񏏏'''&&&***'''&&&:::GGGyޕ:fff^~ޚy3qͨxttt`=jji&&&uuuGGGyݔ9fff]}B_uqqq^<~xiih'''~~~GGGyޕ:fff`DUunnn[>dcc&&&􁁁HHHyݔ:fff_T:vnnnZF{yxcbb'''zzz IIIyݔ9fffՅ]z2q©wwpppf>>zzz}}}lllxxxzzzﳳ///fq3~ϵoyjjj0P%Qbaa(((======FFFMMMQQQIIIHHHNNNMMMEEE999VVVHHHyڌ*yfffddd꺺[[[iii|||kkkpppzzzɻjjjjjj|||󖖖{{{hhhuuucccĸ666mmm===k1~}hqwhhh4Ecbb'''HHHy㵱yfffLLLzzz222IIIZZZ{{{KKKuuu~~~|||gggOOOqqq```bbbppp^^^```cccOOOKKKccc򘘘zzznnn~~~yyyaaa444uuuπwBNouhhh\dx/`Hbab'''IIIyfffFFFSSSrrrpppqqq~~~ǂ񣣣~~~zzzTTTffflll׎рzzzEEElllggg̍{{{ݚuRGouhhhs}`Ccbc)))HHHyfffaaaxxxuuupppʹҦވttt{{{ꌌgggeee҂sssssstttuuu옘sssƆlllqqq;ϦѭFRU%nkدoueee|wzb8bac!!!mmm222yfffOOOqqq/>>>>>===>>>>>>===@@@@@@===>>>@@@>>>>>>@@@???;;;777===000yᦧﺺfff񊊊sss~~~qqqFWYܴou\\\󠝙_7aab333TTTYYY???oooƊQQQIIISSS444y؆tstwwwnnn믯fffNEKXprou^^^zws\8bbc///NNN***UUU???===yɔҢگ檪fff歭몪౱gggƯfff~^}ߠoucccꄊ\5bbc...___^^^)))yyyIII:::\\\>>>ynnn===|||mmmfffޛsssoooqqqppp|||ܧeeejjjccc[[[bbbfffqqq676gggsssVVVbbbwwwmmmmmmuuugggJJJfff|||풔d~ޛoujjju{]6bbc(((JJJy}}}mmm|||iiiݱyyywwwooo拋231vwulll}}}oooŴ```fff򘘘jjj]|ޝpurrrrw{\8bac+++LLLy}}}⋋}}}666TTT[[[[[[~~~~~~wwwrrrooo~~~JJJOOOYYY[[[wwwxxxfffFFFPPPXXXRRRqqqē񜜜KKKOOO]]]עfffPPPeeeNNN]]]VVVuuu{{{VVV[[[򁁁...vxx]|ޜpuqqqፌY9bac###]]]vvv111y|||蘘vvvggghhh|||෷pppppp։ccc___܄kkkeeekkk~~~rrrɅzzz߯SSSfff```僃cccź~~~噙uuu'''ttthhhܚ˄ïrrr燉`|purrrwvs[:bac ddd y~~~քǚXXXwwwrrr譭oooiiiHHH\\\؞lllqqq}}}նWWWxxxrrrzzzggg{{{mmmFFFpppyyypppqqqcccbbbȯffffff󙙙􍍍Άɗfff{{{˥DDDbbbnnneee___OOOllljjjzzz $$$c}puvvv̓z\8bacNNN yvvvzzzoooɺ纺ήkkkqqq𽽽вIJ󀀀lllöٱfff<<ccdwxxsttsttsuurrryyy^^^qqqfffżӸqqq333%%% 000CCCc}ouY:cbdѠ̘᪪Ѡס쿿췷쵵庺VVV١Ι򱱱yuuu###ºĿ¼þlllBBBfffǛͼqqq333ۊyyy{{{AAA풒c}ou{{{Y:cbdyyyJJJgggpppcccqqq```dddڌ```aaauuukkkjjjMMM񡡡򗗗ˌnnnrrrzzz[[[{{{aaafffXXXtttTTTzzznnnQQQɟqqq999ԑqqqxxxԅvvvyyypppkkkRRRyrrr111FFFfff⌌᜜qqq333???c}ouY:cbdqqqiiiwwwppp}}}TTTeee𧧧򟟟nnnʧ|||vvvя___nnnpppʟXXXrrrnnnuuuͫkkkНuuuqqqyvvv000FFFfff˕Țqqq333???!!!))))))&&&&&&&&&&&&&&&&&&'''''''''''''''"""EEEBBB̀c}ou~~~vvvY:cbdtttuuuxxxꁁJJJXXXUUUiiilllqqqwwwzzz̋xxxVVV\\\|||~~~rrrnnn\\\zzzYYYhhhpppfffBBBnnnmmmjjjpppuuuyrrr///rrrVVV^^^```___]]]^^^^^^]]]^^^```\\\[[[^^^___WWWnnnEEEfff󮮮❝qqq333cccNNNUUUQQQSSSUUUTTTTTTTTTTTTTTTTTTTTTSSSOOOJJJmmmBBB膆c}ou|||uuuY:cbdvvv۹}}}ӼUUUyyyՂzzz؄mmmfff᧧pppeeehhhrrrxxxӦbbbᖖ|||ОXXXxxx^^^mmm```zzzmmmۚeee\\\UUU^^^tttyzzz000PPP+++...000000...//////...///...///000000---***JJJEEEfffᕕٜqqq333CCC􏏏c}ouyyyY:cbduuu|||xxxmmmlllܖqqqttt󚚚kkk^^^qqqccc⎎Ӥkkkiii666􉉉ooo^^^xxxfffzzzwww͓pppeee|||xxx휜lllxxxFFF㉉}}}~~~חiiiiiittt|||yyy~~~rrr}}}^^^}}}666yxxx000CCCfff̑qqq333VVV;;;???BBB@@@@@@CCCAAAAAAAAA@@@@@@@@@??????;;;\\\EEEc}ouwwwuuuY:cbdsss~~~ܜeeeܠҩ歭䪪֩𵵵SSSͤᨨ١Ѧڞ驩̬ߧݢȝ___ywww111׊yyyzzz|||||||||}}}}}}|||||||||zzz|||~~~~~~xxxCCCfffѦqqq333???&&&///+++...///,,,,,,,,,,,,,,,++++++,,,,+,"""KKKEFFӂc}outttY:cbd```lllwwwsss빹yuuu111666  !!!888EEEfffWWV 222qqq433BAB􉊊c}ouqqqY:cbdywww111CCCfffFDD  !"sqp743ҏuss{zzzyyxvvxxxwwwwwwwwwwwwwwwwwwwwwuvwrwvuuqMFHc}ounnntttY:cccyyyy000浵EEEfff񥡢}~~}~~|~}rpo)(%ihd}~|~}{}{}~|}oqq444+++64/KH@zzxc}oulll􇇇Y:^^^yvvv333,,,///IIIfffVXX9:;oqr444뭭𖘑IJ=Խ肂c}ounnnY:```IFDgghefheeedddeeedddccccccdddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddcccbbbbbbbbbbbbaaaaaaaaabbbdddeeedddbbbbbbbbbccccccdddcccbbbcccdddcccbbb```aaacccddddddcccbbbaaaaaacccfffeee[[[yxxx222EEEfff྿JKO./2qrp643BD>ɻc}ougggxxxY:˳\\\yxxx000BBBfffLJG&),&,4*/9*-6,*07-,8..5.06042.12.13.04/10,-2//633,(( *&'76503//1.02..0,13/13/-/,/2.112015.26.27.27+.0-/,45.trn950=CIypc}ou[[[Y:oooyuuu///@@@""""""######"""""""""""""""!!!$$$###"""$$$!!!;;;FFFfffurm:507>>===;;;<<<<<<;;;<<<:::;;;:::::::::555TTTFFFfff&#! q_Rغ໕ݹܻܺںۻںۺۺܺڹ۹ܺ۹ܹܹܹ޺ݹܹ޺޺ݹܹ޺ڵ޸۸eQI fm{,4@񰡙GEA@f,sgb~puXXXsssY:vxxx///YYY555>>>===BBBAAA???@@@>>>@@@??????>>>===>>>666TTTFFFfff#"!n_طܯըը֨֩֨թժ֨צצ֧֧֧֧֧ԪԬլԬԫլԫԫ֮ԭذ۩u]O Td!0E򫝑LI;QudcpuVVV㄄Y:{vvvv000CCCfff!""}gU˨ӜΕ͕ΕΗ͖͖͔͓͗Δ͔͔͕͕͕̖˗̗˖˖̗˖˖͘̕ЙЖoWDvFnAt:v0u)v2wEwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwDwFxN|Q}Z~m6Dp>OI>̾[hnf}puVVVzzzY:ȿʷœ{vvv111ރooovvvppprrrrrrqqqtttrrrrrrsssqqqrrrrrrtttpppDDDfff " hT̤՘ѐёђГϒϒϑΓ͔ΕΕΕ͖͗͗ΔВВϑϑВϑϑѓЏӓѓpXCو˃{trpooooooooooooooooooooooonrw{݁׎ӓ@Sx&DOEϿc*n}a~puddd~~~Y:qqq !!!|wvw001FFFfff"& iSͤԝϙ̝̞̟͛͠͝͝ˡˠ̠̠̠˟˟̝̜̜̜̜̜͝͝Ϟ˛ΠОmWKons527JCDJ$qϏcpufffzzzY:yyyNNNZZZYYY___```--- CCC___VVVXXXVVVWWWZZZ]]]uuuwux103HHHfff % jU֛ͥϕ͙̞̠̞͜Λ̞˟˟̞̞̝̞͛̚͜͞˚͛̚˚̚ϝ̛ΟΛjVGxss=54ABE[>uriߟpueee뒒Y:wwwpppwww{{{yyyKKK&&&$$$%%%###$$$$$$###"""333cccyyyuuu{{{uuuuuutttkkktttșߌ{x}214HHHfff!$ iṲә̛̛̛͔̗͙̙̙̘̘̘̘̚͘Θ͙̙̚˙˙̚˙˙Λ˙Μ͘iVDqpq644摐eeefffgggfff```ACEZh`k~ߡpufffyyyY:ܟvvv111ƛ/ۆvxt211FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFppp455::::::CCBo)uRh}punnn؂Y:7772WRX]\]\\\\^^Y\d^Ydjb][\b^ad][]^]]\]]\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\]_a^\]^_pXp79D.FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444CCCEEEAAAhvHb|puuuu򔔔Y::::3-20--......1/+.0,,/((*+.-((**+,,..------------------------------------------.--.//0@Ln=K-FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444FFF@@@BBBp'^|{puwwwxxxY:{{{iiimmmkkklllkkkkkkkkkjjjjjjjjjjjjjjjjjjjjjeeevvv888ቖ2ܚq{d14*FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444DDDAAABBBv%s<[}wpuwwwكY:ٰAAA$$$'''((()))'''&&&'''(((((((((((((((((((((!!!===999䝐$ڭxu./-FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq333===:::DDD"lx\~{puzzzY::::ڭvn4-CFFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq333lll+++111///333---iiiBBB%u.|apu}}}Y:ٕ888ݣwp/$FFFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFrrr333CCC!wxhޙpu刈Y:ٲ777!!!!!!  444777wp3)BFFFfff"# hSˣќ͖͘Ι̛͙͙͙͙͙͙͙͙͙͙͙͙͙˚̚˚̛̛˙͛˙ϜΙiXFrrr333랞uuu~~~yyyBBBooǽj{۟puY:ݿ:;:zzn17"FFFfff"#! hU̠ҙ͔ϖИϘ̛͙̙͘̚̚̚̚̚̚̚̚˜̜˛˜͝˜ʚ̛̜ΝΖp\B qqq555tttDDDDDDLLLLLLMMMMMMKKKIIIIIIJJJGGGAAA=? xr|4/6BBB>>>FFFfff !  gR͢ѝ̙̙͙͙ΙϘИΙ͚͚͚͚͚͚͚ΛΜΜ͛ΜΜΜ͛ΛΘџ̛eUDrrr///⍍FFFSJt׍gyݦpt|||Y576:vs~1/7BBB;;;FFFfff"" hU԰ӨΤ͢ˡˠˠ͠ΠΟϞϞϞϞϞϞϞϞΝΝϞΝΝΝϞΜҘ֣ӤjZIwwwOOOfffhhh]]]UUUWWWWWWUUUTTTTTTSSSTTTUUUUUUUUUTTTUUUTTTUUURRRUUUdddjjjfff<<<<<角www000铓```fffvvvxxxwww{{{|||xxxuuuggg^^^FFFfff窮qqq***~~~KKK7r0 {'~ty>>>yyy`Bÿ̓jjjnnnnnnmmmmmmoooooonnnnnnoooooooooooommlijj:;:뢓yyy111ꐐWWWXXX^^^YYYYYY[[[\\\ZZZ]]][[[UUUFFFfff|||777AAARRRTTTAAAEEE""">>>c;a4|tyZZZ]<ĽŸЯ #9<4ꘒyyy111EEEfff 999v݇<b.nxzúY7ڦ;;8쎒 ttt444FFFfffppppppsss444s|ݦDk$ewzW5¹ھ>8? zzz+++ۉFFFfff!!!"""  !!!!!!!!!!!!!!!!!!!!!!!!"""######OOOdܝN q"luzLx墿۞ޖ拸劺㋺䆸銷ꎷ获获获获获获获获获获获获获获获获获获获获获获获获获获获获获获获萷嗹ᕾߗߝߞޒί׵㻻?6Gy HHHtttmmmaaaWWWTTTUUUTTTWWWUUUVVVXXXSSSYYYZZZWWWUUUVVVXXXUUUTTTbbboooooo666;;;fffΩK}݊Mv'muyʵC`@tMqOrIvu=u>>YYY||||||}}}|||{{{||||||{{{||||||~~xxxSSS777MMM555;;;fffʽImWl.sxzttt   ! " ;;<@gr䗸蓼퐼蓿㔿ޕ㌿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿䊿爾熼膻ꇻ狽䏿ߐv?PLL652/,***-.-,,++++*****************************************,.-('xxx666~~~KKKfff`k Wxʐ䀀WWWiiieeejjjddd+++OOOjjjcccbbbccccccfffddd< n8:5www333GGGfffcN 3zssssssqqqxxxzzzWWW777333333444555444555222EEEjjjyyyxxxxxx|||wwwrrr]]]vvv<n깹:<6|||)))yyyEEEfffcZ_]֫lll:::< nǺ:8=(((444IIIXWX///<<<888fffb~x2)xzDDD< m껻:9:*+*111fffahf&s~EEE<m}}}JJJ;<: cccrtn000fffa/l?roӼWWWKKKMMMNNNKKKMMMMMMNNNMMMMMMNNNMMMKKKMMMNNNFFFdddEEE<m㾾мQQQ***888&& '%%JJJfffc}|jS,qwմCCC000444444333555666555444555555444444555444---MMMCCC= msss,,,:::سqk6sfffc}ll_tuAAA= mrrr+++RRRWWWVVVWWWOOO|||:::৘Xfffc}nm@+rڇjjj\\\______]]]^^^^^^___^^^^^^^^^^^^^^^^^^]]]WWWzzzDDD= m¿qqq,,,III999:::ߝBfffc}|ve7qw׵===...333333///111333///000111111000000111///)))LLL@@@= mttt///JJJ444:::ߖ8fffc}u~T3k܄EEE= mooo---OOO999:::ߎ5xfffc}Z-riֈ}}}|||DDD= mppp,,,JJJ999:::ߏ6|fffc}ioV)y^׭### 999>>>= mooo---CCC666:::ޓ7fffc}gpn mL峳BBB= mooo---uuu999>>>>>>???999iii:::ݕ;fffc}oxl!nO峳FFF= mooo...:::ޕ;fffc}qzfbGԭ!!!999>>>= mppp---熆TTT[[[qqqvvvssstttuuuvvvuuubbbTTT777ޕ:fffc}pxooFՇ~~~<<<= mrrr...腅TTTUUUZZZXXXZZZ]]][[[YYY[[[\\\SSS888ޕ:fffc}pwl#lGݬ뾾BBB= mrrr---;;;ޕ:fffc}pww(pDy֪&&&&&&"""!!!$$$"""$$$""""""""""""""""""""" >>>CCC= mooo...===ޕ:fffc}pw5tI֫ٸYYYPPPSSSVVVTTTVVVVVVTTTUUUUUUUUUUUUUUUUUUUUUSSSlllDDD= mppp)))ܛ666ޕ:fffc}px7{A|BBB= mwwwFFFdddccc]]]RRRSSSQQQPPPQQQQQQOOOQQQQQQOOOOOOQQQQQQQQQOOOOOORRRWWWhhhbbb@@@'''ޕ:fffc}py){R˨¿ӽUUUSSSXXXZZZWWWUUUVVVVVVUUUUUUUUUUUUUUUUUUUUUSSTkkkBCB= mvvvFFF<<<222^^^{{{~~~{{{}}}|||{{{{{{{{{|||{{{||||||{{{{{{|||QQQ555666888///ޕ:fffc}pwKQΓʻҫ$$$###!!!"""#########!!!###""""""""#######"""!! >??BAF=orrr---ppp333"""%%%333XXX???ޕ:fffc}ou?Hˢ׻˸϶A=C> nvvv+++^^^nnnPPP999ޕ:fffc}ouYaտʨ?AF6 iqqq***Ɲ999ޕ:fffc}ouiPwѸϛ:?R÷zufrzeuglll---<<<ޕ:fffc}ntfjȧ𱱱F@DT]W^Z ^ab] httt&&&Ί;;;ޕ:fffc}ouڏ󭭭{{{>>PPP''')))+++ޕ:fffc}ouݜߋ@AVg2}uuu''''''ޕ:fffc}ntԷ69Ic%zssslllvvvޕ:fffc}nt<;FY󋋋 >>>ޕ:fffc}ouܾCBGo!|Ƽޕ:fffc}ouDAEn{ޕ:fffc}ou;֧GACjwޕ:fffc}ouٰVVVKKKIB@½pyޕ:fffc}ouŴCCC888JB?½q }ޕ:fffc}ouʿ[[[999JB?½kzޕ:fffc}ouYYY===ggg999===888777977pnnIB@gxޕ:fffc}ouXXX===111><>>DDDAAAiwޕ:fffc}ouXXX;;;)))<<>>EEEiwuuurrrěoooȤaaa|||xxx[[[|||lll܇VVVxxxÐ蘘tttvvvxxxΝyyy666vvvuuusssfffTTTGGGaaasssJJJeeeJJJfff[[[uuulllijOOO^^^\\\јƂiii]]]̀ݗ```OOO}}}llldddޕ:fffc}ou[[[///ƿrrr@@@iwxxxyyysssկiii󷷷ӫ㻻𳳳XXXߝ̘lllڂʃppp끁xxxhhh===ooo'''ҁ}}}rrrVVVSSS}}}{{{xxxyyyؐ~~~nnnzzz{{{ޕ:fffc}oueee AAAOOOLLLIIIGGGCCCBBBDDDDDDEEEEEEBBBDDDDDDBBB@@@@@@BBBEEEFFFFFFLLLPPPKKK""":::iw䛛۝׶aaa}}}|||lllşԶ}}}qqqз{{{\tttөaaaᩩxxx䴴Ƴޕ:fffc}ou```"""]]]JJJBBBvvvaaa;;;NNN;;;DDDiw㋋dddzzznnnۦޕ:fffc}oufff777WWW]]],,,JJJQQQiwޕ:fffc}ouggg999ddd***...kkkBBBJJJJJJiwޕ:fffc}ouYYY;;;ЁEEEiwޕ:fffc}ouZZZ;;;BBBiwޕ:fffc}oubbb&&&ccc>>>iw===%%%***)))))))))***))))))))))))******))))))((()))******((()))+++(((((()))(((111Ϳޕ:fffc}oueee:::777999iwޕ:fffc}oufff+++$$$:::iwƾޕ:fffc}ougggLLLkkknnnkkkjjjgggnnnoooiiiooooooqqqmmmfffjjjkkkpppKKK333iwcccSSSQQQRRRQQQOOORRROOO333 222SSSTTTOOOQQQRRRNNNPPP\\\ȾĹޕ:fffc}ou...000888777...333:::222000---444333///444000---,,,///:::666111...666:::888555ccciw^^^XXX___]]]ZZZ]]]ggghhhHHH CCCfffggg^^^]]]```aaa\\\bbb´ͷޕ:fffc}ouiw)))hhhAAAޕ:fffc}ouiw$$$AAAؼޕ:fffc}ouiw***DDDͻޕ:fffc}ou晙hy***www~~~~~~}}}>>>۽ޕ:fffc}ouyyysssiiilll꯯]]]bbbxxx域ծqqqsssooo𭭭jjjfff쫫iiifffaaaxxxooogggٱzzzooobbb߰jv###SSS @@@ޕ:fffc}ou)))%%%gggkkk΅XXXyyy______lllxxx֕XXX͆BBBNNNǃ˅uuumx###ɭCCCޕ:fffc}ou[[[kkkqqqWWW]]]xxx\\\rrrUUUǠuuuoooJJJdddÖOOOjy'''@@@ޕ:fffc}ouڟtttxxxrrrttt000---yyyҿXXXxxxꄄQQQIII憆^^^źGGGyyy___mmmSSS\\\}}}ix(((III@@@ޕ:fffc}ou뜜yyyjjjpppvvvvvv|||ѓQQQ~~~Φkkkqqqwwwooo```tttzzzrrraaa}}}ăuuuFGGiw)))쳳BBBޕ:fffc}ouSSSjjj򝝝~~~|||ީŌ~~~}}}rrrĂ||||||sss||||||򵵵zzz{{{|||Ëո~~~{{{vvvjy'''BBBޕ:fffc}ou虙HHHRRRņؓuuui{$$$OOO???ޕ:fffc}ou򯯯촴쿿hw%%%采XXX\\\_____________________```aaa^^^^^^```]]]ddd???ޔ:fffc}oulu&&&AAAߓ:fffc}ouhx$$$lll999===<<<<<<<<<<<<<<<<<<<<<<<<:::;;;>>>===777GGG???ޕ:fffc}ouhy###hhh777888666666666666666666666777888666777777666>>>@@@ݖ:fffc}oup w&&&BBBݙ>>ɬIwfffc}oui^c khkmkimnlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllkfbfjn+.bW===Iwfffc}ou$"3AAAHvfffc}ou4&AAAſIvfffc}ou(&#@@@¼Hvfffc}ou#&%@@@½½Hufffc}ou$$'@@@пɾHufffc}ou&$'@@@˾ͺHtfffc}ou&%%@@@δHtfffc}ou$'$wwwzzz@@@ٻܴHtfffc}ou$&$qqq@@@ʹުHsfffc}ou%%%zzzAAA˼Hsfffc}ou$$$|||AAAŖHsfffc}ou%%%vvvAAA嵵mmmHrfffc}ou&&&pppAAAٟzzzHrfffc}ou%%%###!!!<<- Ole10ItemName1Table                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  - BM, 6(H, ffffffffffffffffffffffffffffffffffffffffffffffffffffff꘧fffPjj~}}hfffWxwԸ񄮯|fffZfffTۣ}fffTޡ}fffT~{fffUyfffWݫ{xfff^~^8[[;]]@bcB^aH_dE[`5X^Xvuᵵ趶fff䬬۲㳳Ūd~@A77Pwv#DE1UWOwy9fiYjn|||~~~fffzzzrrrΌlllpppΎ왙vvvφmmm~~~XXX~~~߃bbbeeeXXXӿeeeooogggc!LOsiSQfoѯ򻻻ھ־fff̫Цʕvvvbbb𶶶벲ͽfffpppXXXhhhaaaӫuuu邂ZZZiiiEEE^^^ꝝeeḙ___ۛ;;;TTTaFHk\PMriplllssslllKKKiiiԲkkkmmm~~~ sss|||mmmQQQtttgggsssDDDːwwwjjjmmmYYYqqqzzz]]]QQQnnnqqqҗ󔔔ﵵЫpppkkknnniiiyyyfff~~~gggǃRRR틋bbbŒ\\\ggg󎎎룣xxxwwwVVVꤤkkkfff`$TTd3|{nqfffɑ򔔔fffpppપxxxuuuȐvvv<<>>nnn{{{ffftttxxxlllfff`{ލ3ki:xyإluyyyձaaalll嬬]]]ccc{{{㴴fffsss߉fffhhhАϓjjjdddwww~~~}}}ڲ]]]lllaaaЬ͞oooddd祥össswww礤rrrޟǺ___yyyttt܍qqqfffYS5VW-GH <>E[_/FLBptsuفmmmXXXGGGȽOOOzzzvvv賳mmmjjjzzzHHH\\\ԡjjjjjj~~~׼VVVttt~~~Ɩ~~~xxx___ֈuuuzzz^^^|||kkk___JJJ퐐mmmlll???{{{xxxkkk///픔ooooootttBBBwwwvvv샃uuutttyyyڸqqqooowwwuuuqqqfffV#kj]CklKNͲvsännnɾ꼼ίaaazzzҸױϳ߾www~~~ڱOOO䴴܃᷷ǰЭfff~~~pppX.zx=kkUyx3^_wUsvOOخqr娨㫫򽽽橩fffڮӭlll곳SRzz#9;*SR9mk3`acnq@@@---......///..............................///............///.........///---<<<֙ڕfffۂlllccchhhoooYYYؓ{{{hhhoooqqqԿiiibbbkkkÛ﨨bbbᮮooosssIII혘愄^^^eeeOOOϫ___aaadddR~ߥ}ZU}~xԬnn ㅅ{{{|||ffftttnnn􂂂ΏhhhPPP>>>|||æќVVVbbb옘tttJJJwwwcccꌌppp˲lllIIIsss111űRRRUߤj1]_/[]JxynĞsp ָuuu∈qqq񷷷ⶶjjj맧mmmݩoooӈtttnnn\\\ᅅkkkzzzsssѺ󡡡fffRRR}}}傂yyytttЊӹ|||fffrrr}}}񤤤~~~YYYxxx霜vvvvvvnnnmmmЈcccwvvTߨrAkl!'!MotdddIIIJJJNNNMMMHHHLLLLLL666...SSSNNNHHHKKKNNNLLLIIIccctttiii```YYYёxxxwwwFFFlll񛛛𪪪oooGGGpppLLLtttfffSSSՏɌŏzzzcccfff޶ďh^\]`]T[\Z__TqDDDooohhhsss{{{\\\\\\wwwbbb~~~www듓wwwbbbIIIrrrzzzGGG]]]eee៟tttkkkzzzIIIfffnnnӈ^^^R~ߨpGqq4cc>bfKlonwwbbbZZZfffccccccbbbeeeeeeMMMGGGiiiddd___ccc```eeeZZZkkkvvvbbb```uuuyyyŞAAAaaa񚚚便jjjJJJcccUUUddddddÙʆVVVrrrsssfff̓_MMPUSHOSQTRBdtttxxxnnn[[[sssnnn~~~fffzzzxxxҢpppfffjjj|||}}}nnnRRRpppjjj⍍iiiDDDuuu畕kkk{{{{{{yyybbbꉉ†hhh}}}R~ߥV+0 HHdΣ}x&&&nnnvvv<<<xxxWWWvvv|||ooo}}}ȣ덍www𜜜ЩKKKćrrr[[[mmm[[[rrrXXX<<B[uw'''CCC{{{Мxxx׎___eee[[[eeeǻdddjjjrrrxxxɪyyy򍍍ZZZЃfffʂؙNNNtttӖyyyQQQҀSSScccHHHqqqttt]]]͘UUUVVVfffЀ{{{aaafffQQQxxxfff廻򵵵\\\uuu~~~Wߢၸ\&MP*.)ADVps+++FFFttt{{{|||WWWaaaݵֿ|||hhh???ǽDDD̐mmmdddhhh菏Үwww~~~eeeߚjjjsssaaa䬬yyy}}}uuu}}}{{{vvv㤤ِzzz{{{iii333fff毯߱Tߡ]5hj7mlZޡip***㛛vvvzzz|||zzz|||}}}||||||||||||zzz|||zzzyyyzzzFFFlll֮nnn⾾dddصmmmڸ鷷䳳۴第ȩ򻻻ܶ混ҰWWWfffXLnZؠgo000RRR"""...KKKʣ⣣󿿿fff`}ߖ{5hf|i5:-19rspr+++ᄒFFFfffV{{ݜ2llMwx>^b{tPQͮnt***谰KKKfffVxߜ(``[y<\`n*kjިlv,,,HHH    HHHfffgUBE269=4LR9>>yzrw***񻻻EEEfff}}}a}ߥpPqtVx{StxGsvcux+++IIIfffooozzz޹Ƿùŵܺ]{~n~}u}Ùwy,,,MMM """HHHfffkkk}}}aaaHHH]]]oooжKKKMMMXXXkkkxxxSSSVVV\\\aaaeeeRRRjjjКUUUSSSxxxФPPPZZZ}}}ެTTTUUUiiivvvccciiippprrr[[[dddb|I%dc1hhArs@rs;lnVT VX)VV&WT%[Z&TU$RSOus.--iii456688688:=;9<:9;;99998:::;888;;;:::999<<<555GGGFFFſfffmQEBEGFJEBJG5{ZxxxqqqZZZ򒒒ppp׌|||wwwŕҨfff~~~㒒gggLLL::::::SSSZZZ֥򣣣hhh444cccd~o^fkebhhxǘot)++ghi0/16889;;=@=:=;:::;;;<;=;;;>>>:::<<<<<<===222FFFHHH͸κfff{aRMRXYZWVYQAgdddXXXoooRRRttttttlllȞeee```lll{{{EEEɊooo|||qqqĩWWWllliiiWWWܕgggwwwLLL߃vvvyyywwwb~lt*)*GGGԽɭgggCCCTTTYYYPPPPPPSSSSSSSSSSSSSSSTTTSSSRRRRRRSSSSSSUUUSSSUUURRRSSSTTTRRRRRRWWWKKKxxxfff|||VVVӲȥ[[[ɖȗUUU秧ĪQQQyyy󮮮՜a~qt1,-݁~SSTZYY^\[`^]\ZYZ[Y[[[YZ[ZZZ[[[]]]\\\XXX___[[[cccHHH~~~AAAfffwwwwww鷷ڹXXX\\\tttlll`{st+++PQR $   (((HHHۿ졡'''BBBfffa|ߙpt#*(GGGHHHFFFNNNLLLUUUGGGHHHUUUNNNNNNOOOMMMOOONNNfffc}ߛnt%,+III򖖖cccjjjjjjooo```(((  000aaaooojjjnnniiiccchhhhhhfffd~qt-*+ACF       FFFHHHgggfffc}pu1+,릦GGGdddTTTfffb}ou0+.HHHppp^^^fffb}ou**0FFFƎeee]]]fffb}ouy"2GGGXXXfff```fffb}ou叾ҙ֚ۜޙ┾㒾┿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿▿╾ᖿ▿▿▿╾ᔾᕾᑽߙX{!;[EEEȓfff\\\fffb}oup5mDwPM|Fy=w9u9u>>gggKKKԹkkkxxx뷷iii]]]fffc}ou$$$%%%Y:...JJJʨÐhhh\\\fffc}ouY:***HHH籱xxxhhh\\\fffc}ou------Y:***FFF䗗hhh\\\fffc}ounnnYYYYYYZZZSSSPPPWWWXXX666222SSSXXXTTTQQQWWWWWWUUUtttY:HHHqqqoooiiifffeeeddddddccccccccccccddddddeeeeeeccceeecccaaammmxxxMMM...hhh\\\fffc}ouNNN[[[xxxuuuuuuttt|||}}}fffDDDDDDDDDAAA@@@BBBDDDAAAHHHbbbxxx}}}vvvsssuuu{{{aaa___Y:###:::RRRFFFQQQiiinnnlllkkkkkkiiiiiiiiiiiijjjhhhjjjhhhiiimmmpppjjjWWWGGGSSS;;;222hhh\\\fffc}ou!!!zzzω;;;Y:;;;WWW>>>$$$]]]www!!!<<>>HHHRRR%%%===徾???JJJ>>>iiifffc}ou)))CE?U7婆:k===III>>>***333@@@lllfffc}ou***IIH_;䨉Cs111XXXݎ{{{QQQbbbfffc}ou---GFItR挑5h---rrrhhhZZZfffc}ou***FEIrS꒏/c333eeeaaa```fffc}ou)))NMOmN珎/c666IIINNNUUULLLJJJ!!!aaafffc}oueee+++PY8u7SUHBDB?ABCCCDDDDCCBCCBBBCDBBFEEEBcIH\HBBDFEFGFCDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDCEGBDCCC( Z999TTT^^^fffc}ou;;;111S[:n+k#vMG@B?>>CBBCCCDDBCCBBBBBBCCDDBB>bNA]HCBBDDBEEDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDBDGFGI6e333888bbb]]]fffc}ounnn222QMOe@䳑Xۂ??? '''111******))))))******************+++(((***)))...hhhfffc}ou~~~ϛ+++HAMhGE~fffc}ou邂+++KDO풊oN퇔/rfffc}ou,,,JFHۃ`BꡓBxfffc}ou|||***HHB~^?鬑Iyfffc}ou܀(((HIB|bA말Cwfffc}ou񍍍)))DEB𞠢cBꓒ{|{򡠢}|죏>tfffc}ou...BBB>>>EEEAAAAAA[[[GFG狌_=onpكۃ{z{륏>sfffc}ouzzz---ccc!!!EEE{{{[8AAAYYYXXXWWWߜꓓlllTTTWWWî尰\\\UUUUUU݁]\\mmmkjj\\\vvv\\\\[[Ϙuuu^^^ttt\\\WWWttt֏RQQlkk٦HHH꩑Atfffc}ou뀀+++eee FGE~~~Z7uuv󹹹yyyԁuuu]]]z{ynnmhghsrs)(*srrٵomm֐~~~cbb}{{{zz}}٣lllkii{yy̏zzzttt888髒Brfffc}ou(((fff$$$EEEY:z{{~~~وyyyttttttYYYvuvgggUUU||||||Ábbbuuu澾~~~Ə΃gggjjj묓Btfffc}ou}}})))ccc!!!EEEY:}~~<<qfffc}ou؃:::%%%,,,((($$$######!!!   !!!%%%))))))'''%%%JJJ󤡟Z5eeehhhooopppqqqFFF???kkkrrrkkkmmmjjjjjjjjjzzz쩓>pfffc}ouĽ½fff^7璒ooo|||{{{~~~oooQQQMMMPPPLLLIIIIIINNNLLLKKKkkk~~~~~~yyy~~~xxxeeeOOO묒@qfffc}ou΁~^9ީ999鯓Ewfffc}ouŀ~~~py}^>FFF豔J{fffc}ou凇{{{yb>HHH鱕G{fffc}ov}}}dAlll555:::666888999888888888888888888888888888:::>>>GGG좖4pfffc}ou|||ᒈ[?zzzIIIQQQMMMKKKMMMLLLLLLLLLLLLLLLLLLLLLLLLOOOKKKQQQEEE顔HԂfffc}ouzzz|||ۀ{xd7HHHEqfffc}ov~~~Ȅf:xxx<<{5X=751301334554332222222222222222222222222222222222222222222222222222222222243/'#(49/1EL5ޕ:fffc}yvŽ„|Z:TTTߩ```tttۀMU>@lZ[XQTVXYYZ[[ZYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY[[WNEGU^WUaL~ޕ:fffc}Pjkü~~~Z:aa`픔IMF輦&ޕ:fffc}s/GH}}}Z:aaaչGBQ~{ޕ:fffa~ߘ\O`cZ9ddcxyzHGIyޕ:fffa~ߘ~%NQl}[9mmmHHH›yޕ:fffa~HCkn|||\9hhgronܻHHHyޕ:fffb@Lzzz[9FFEIFEݜGGGyޕ:fffbU3{xxxZ9FFF}|Ƹ{{{$$$GGGyޕ:fffbr$f{vvv[:CCCݾȼۆGGGyޕ:fffbߗ7F{ttt]:dhi00/Ͼ(((GGGyޕ:fffbߖY<|uuua:|RRQ###񏏏'''&&&***'''&&&:::GGGyޕ:fff^~ޚy3qͨxttt`=jji&&&uuuGGGyݔ9fff]}B_uqqq^<~xiih'''~~~GGGyޕ:fff`DUunnn[>dcc&&&􁁁HHHyݔ:fff_T:vnnnZF{yxcbb'''zzz IIIyݔ9fffՅ]z2q©wwpppf>>zzz}}}lllxxxzzzﳳ///fq3~ϵoyjjj0P%Qbaa(((======FFFMMMQQQIIIHHHNNNMMMEEE999VVVHHHyڌ*yfffddd꺺[[[iii|||kkkpppzzzɻjjjjjj|||󖖖{{{hhhuuucccĸ666mmm===k1~}hqwhhh4Ecbb'''HHHy㵱yfffLLLzzz222IIIZZZ{{{KKKuuu~~~|||gggOOOqqq```bbbppp^^^```cccOOOKKKccc򘘘zzznnn~~~yyyaaa444uuuπwBNouhhh\dx/`Hbab'''IIIyfffFFFSSSrrrpppqqq~~~ǂ񣣣~~~zzzTTTffflll׎рzzzEEElllggg̍{{{ݚuRGouhhhs}`Ccbc)))HHHyfffaaaxxxuuupppʹҦވttt{{{ꌌgggeee҂sssssstttuuu옘sssƆlllqqq;ϦѭFRU%nkدoueee|wzb8bac!!!mmm222yfffOOOqqq/>>>>>===>>>>>>===@@@@@@===>>>@@@>>>>>>@@@???;;;777===000yᦧﺺfff񊊊sss~~~qqqFWYܴou\\\󠝙_7aab333TTTYYY???oooƊQQQIIISSS444y؆tstwwwnnn믯fffNEKXprou^^^zws\8bbc///NNN***UUU???===yɔҢگ檪fff歭몪౱gggƯfff~^}ߠoucccꄊ\5bbc...___^^^)))yyyIII:::\\\>>>ynnn===|||mmmfffޛsssoooqqqppp|||ܧeeejjjccc[[[bbbfffqqq676gggsssVVVbbbwwwmmmmmmuuugggJJJfff|||풔d~ޛoujjju{]6bbc(((JJJy}}}mmm|||iiiݱyyywwwooo拋231vwulll}}}oooŴ```fff򘘘jjj]|ޝpurrrrw{\8bac+++LLLy}}}⋋}}}666TTT[[[[[[~~~~~~wwwrrrooo~~~JJJOOOYYY[[[wwwxxxfffFFFPPPXXXRRRqqqē񜜜KKKOOO]]]עfffPPPeeeNNN]]]VVVuuu{{{VVV[[[򁁁...vxx]|ޜpuqqqፌY9bac###]]]vvv111y|||蘘vvvggghhh|||෷pppppp։ccc___܄kkkeeekkk~~~rrrɅzzz߯SSSfff```僃cccź~~~噙uuu'''ttthhhܚ˄ïrrr燉`|purrrwvs[:bac ddd y~~~քǚXXXwwwrrr譭oooiiiHHH\\\؞lllqqq}}}նWWWxxxrrrzzzggg{{{mmmFFFpppyyypppqqqcccbbbȯffffff󙙙􍍍Άɗfff{{{˥DDDbbbnnneee___OOOllljjjzzz $$$c}puvvv̓z\8bacNNN yvvvzzzoooɺ纺ήkkkqqq𽽽вIJ󀀀lllöٱfff<<ccdwxxsttsttsuurrryyy^^^qqqfffżӸqqq333%%% 000CCCc}ouY:cbdѠ̘᪪Ѡס쿿췷쵵庺VVV١Ι򱱱yuuu###ºĿ¼þlllBBBfffǛͼqqq333ۊyyy{{{AAA풒c}ou{{{Y:cbdyyyJJJgggpppcccqqq```dddڌ```aaauuukkkjjjMMM񡡡򗗗ˌnnnrrrzzz[[[{{{aaafffXXXtttTTTzzznnnQQQɟqqq999ԑqqqxxxԅvvvyyypppkkkRRRyrrr111FFFfff⌌᜜qqq333???c}ouY:cbdqqqiiiwwwppp}}}TTTeee𧧧򟟟nnnʧ|||vvvя___nnnpppʟXXXrrrnnnuuuͫkkkНuuuqqqyvvv000FFFfff˕Țqqq333???!!!))))))&&&&&&&&&&&&&&&&&&'''''''''''''''"""EEEBBB̀c}ou~~~vvvY:cbdtttuuuxxxꁁJJJXXXUUUiiilllqqqwwwzzz̋xxxVVV\\\|||~~~rrrnnn\\\zzzYYYhhhpppfffBBBnnnmmmjjjpppuuuyrrr///rrrVVV^^^```___]]]^^^^^^]]]^^^```\\\[[[^^^___WWWnnnEEEfff󮮮❝qqq333cccNNNUUUQQQSSSUUUTTTTTTTTTTTTTTTTTTTTTSSSOOOJJJmmmBBB膆c}ou|||uuuY:cbdvvv۹}}}ӼUUUyyyՂzzz؄mmmfff᧧pppeeehhhrrrxxxӦbbbᖖ|||ОXXXxxx^^^mmm```zzzmmmۚeee\\\UUU^^^tttyzzz000PPP+++...000000...//////...///...///000000---***JJJEEEfffᕕٜqqq333CCC􏏏c}ouyyyY:cbduuu|||xxxmmmlllܖqqqttt󚚚kkk^^^qqqccc⎎Ӥkkkiii666􉉉ooo^^^xxxfffzzzwww͓pppeee|||xxx휜lllxxxFFF㉉}}}~~~חiiiiiittt|||yyy~~~rrr}}}^^^}}}666yxxx000CCCfff̑qqq333VVV;;;???BBB@@@@@@CCCAAAAAAAAA@@@@@@@@@??????;;;\\\EEEc}ouwwwuuuY:cbdsss~~~ܜeeeܠҩ歭䪪֩𵵵SSSͤᨨ١Ѧڞ驩̬ߧݢȝ___ywww111׊yyyzzz|||||||||}}}}}}|||||||||zzz|||~~~~~~xxxCCCfffѦqqq333???&&&///+++...///,,,,,,,,,,,,,,,++++++,,,,+,"""KKKEFFӂc}outttY:cbd```lllwwwsss빹yuuu111666  !!!888EEEfffWWV 222qqq433BAB􉊊c}ouqqqY:cbdywww111CCCfffFDD  !"sqp743ҏuss{zzzyyxvvxxxwwwwwwwwwwwwwwwwwwwwwuvwrwvuuqMFHc}ounnntttY:cccyyyy000浵EEEfff񥡢}~~}~~|~}rpo)(%ihd}~|~}{}{}~|}oqq444+++64/KH@zzxc}oulll􇇇Y:^^^yvvv333,,,///IIIfffVXX9:;oqr444뭭𖘑IJ=Խ肂c}ounnnY:```IFDgghefheeedddeeedddccccccdddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddcccbbbbbbbbbbbbaaaaaaaaabbbdddeeedddbbbbbbbbbccccccdddcccbbbcccdddcccbbb```aaacccddddddcccbbbaaaaaacccfffeee[[[yxxx222EEEfff྿JKO./2qrp643BD>ɻc}ougggxxxY:˳\\\yxxx000BBBfffLJG&),&,4*/9*-6,*07-,8..5.06042.12.13.04/10,-2//633,(( *&'76503//1.02..0,13/13/-/,/2.112015.26.27.27+.0-/,45.trn950=CIypc}ou[[[Y:oooyuuu///@@@""""""######"""""""""""""""!!!$$$###"""$$$!!!;;;FFFfffurm:507>>===;;;<<<<<<;;;<<<:::;;;:::::::::555TTTFFFfff&#! q_Rغ໕ݹܻܺںۻںۺۺܺڹ۹ܺ۹ܹܹܹ޺ݹܹ޺޺ݹܹ޺ڵ޸۸eQI fm{,4@񰡙GEA@f,sgb~puXXXsssY:vxxx///YYY555>>>===BBBAAA???@@@>>>@@@??????>>>===>>>666TTTFFFfff#"!n_طܯըը֨֩֨թժ֨צצ֧֧֧֧֧ԪԬլԬԫլԫԫ֮ԭذ۩u]O Td!0E򫝑LI;QudcpuVVV㄄Y:{vvvv000CCCfff!""}gU˨ӜΕ͕ΕΗ͖͖͔͓͗Δ͔͔͕͕͕̖˗̗˖˖̗˖˖͘̕ЙЖoWDvFnAt:v0u)v2wEwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwCwDwFxN|Q}Z~m6Dp>OI>̾[hnf}puVVVzzzY:ȿʷœ{vvv111ރooovvvppprrrrrrqqqtttrrrrrrsssqqqrrrrrrtttpppDDDfff " hT̤՘ѐёђГϒϒϑΓ͔ΕΕΕ͖͗͗ΔВВϑϑВϑϑѓЏӓѓpXCو˃{trpooooooooooooooooooooooonrw{݁׎ӓ@Sx&DOEϿc*n}a~puddd~~~Y:qqq !!!|wvw001FFFfff"& iSͤԝϙ̝̞̟͛͠͝͝ˡˠ̠̠̠˟˟̝̜̜̜̜̜͝͝Ϟ˛ΠОmWKons527JCDJ$qϏcpufffzzzY:yyyNNNZZZYYY___```--- CCC___VVVXXXVVVWWWZZZ]]]uuuwux103HHHfff % jU֛ͥϕ͙̞̠̞͜Λ̞˟˟̞̞̝̞͛̚͜͞˚͛̚˚̚ϝ̛ΟΛjVGxss=54ABE[>uriߟpueee뒒Y:wwwpppwww{{{yyyKKK&&&$$$%%%###$$$$$$###"""333cccyyyuuu{{{uuuuuutttkkktttșߌ{x}214HHHfff!$ iṲә̛̛̛͔̗͙̙̙̘̘̘̘̚͘Θ͙̙̚˙˙̚˙˙Λ˙Μ͘iVDqpq644摐eeefffgggfff```ACEZh`k~ߡpufffyyyY:ܟvvv111ƛ/ۆvxt211FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFppp455::::::CCBo)uRh}punnn؂Y:7772WRX]\]\\\\^^Y\d^Ydjb][\b^ad][]^]]\]]\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\]_a^\]^_pXp79D.FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444CCCEEEAAAhvHb|puuuu򔔔Y::::3-20--......1/+.0,,/((*+.-((**+,,..------------------------------------------.--.//0@Ln=K-FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444FFF@@@BBBp'^|{puwwwxxxY:{{{iiimmmkkklllkkkkkkkkkjjjjjjjjjjjjjjjjjjjjjeeevvv888ቖ2ܚq{d14*FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq444DDDAAABBBv%s<[}wpuwwwكY:ٰAAA$$$'''((()))'''&&&'''(((((((((((((((((((((!!!===999䝐$ڭxu./-FFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq333===:::DDD"lx\~{puzzzY::::ڭvn4-CFFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFqqq333lll+++111///333---iiiBBB%u.|apu}}}Y:ٕ888ݣwp/$FFFFfff"# hSˤќ͙͙͙͙͙͙͙͙͙͙͙͙͙͙͗͘̚˙̚˙̚̚˙͛˙ϜΙhWFrrr333CCC!wxhޙpu刈Y:ٲ777!!!!!!  444777wp3)BFFFfff"# hSˣќ͖͘Ι̛͙͙͙͙͙͙͙͙͙͙͙͙͙˚̚˚̛̛˙͛˙ϜΙiXFrrr333랞uuu~~~yyyBBBooǽj{۟puY:ݿ:;:zzn17"FFFfff"#! hU̠ҙ͔ϖИϘ̛͙̙͘̚̚̚̚̚̚̚̚˜̜˛˜͝˜ʚ̛̜ΝΖp\B qqq555tttDDDDDDLLLLLLMMMMMMKKKIIIIIIJJJGGGAAA=? xr|4/6BBB>>>FFFfff !  gR͢ѝ̙̙͙͙ΙϘИΙ͚͚͚͚͚͚͚ΛΜΜ͛ΜΜΜ͛ΛΘџ̛eUDrrr///⍍FFFSJt׍gyݦpt|||Y576:vs~1/7BBB;;;FFFfff"" hU԰ӨΤ͢ˡˠˠ͠ΠΟϞϞϞϞϞϞϞϞΝΝϞΝΝΝϞΜҘ֣ӤjZIwwwOOOfffhhh]]]UUUWWWWWWUUUTTTTTTSSSTTTUUUUUUUUUTTTUUUTTTUUURRRUUUdddjjjfff<<<<<角www000铓```fffvvvxxxwww{{{|||xxxuuuggg^^^FFFfff窮qqq***~~~KKK7r0 {'~ty>>>yyy`Bÿ̓jjjnnnnnnmmmmmmoooooonnnnnnoooooooooooommlijj:;:뢓yyy111ꐐWWWXXX^^^YYYYYY[[[\\\ZZZ]]][[[UUUFFFfff|||777AAARRRTTTAAAEEE""">>>c;a4|tyZZZ]<ĽŸЯ #9<4ꘒyyy111EEEfff 999v݇<b.nxzúY7ڦ;;8쎒 ttt444FFFfffppppppsss444s|ݦDk$ewzW5¹ھ>8? zzz+++ۉFFFfff!!!"""  !!!!!!!!!!!!!!!!!!!!!!!!"""######OOOdܝN q"luzLx墿۞ޖ拸劺㋺䆸銷ꎷ获获获获获获获获获获获获获获获获获获获获获获获获获获获获获获获萷嗹ᕾߗߝߞޒί׵㻻?6Gy HHHtttmmmaaaWWWTTTUUUTTTWWWUUUVVVXXXSSSYYYZZZWWWUUUVVVXXXUUUTTTbbboooooo666;;;fffΩK}݊Mv'muyʵC`@tMqOrIvu=u>>YYY||||||}}}|||{{{||||||{{{||||||~~xxxSSS777MMM555;;;fffʽImWl.sxzttt   ! " ;;<@gr䗸蓼퐼蓿㔿ޕ㌿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿㍿䊿爾熼膻ꇻ狽䏿ߐv?PLL652/,***-.-,,++++*****************************************,.-('xxx666~~~KKKfff`k Wxʐ䀀WWWiiieeejjjddd+++OOOjjjcccbbbccccccfffddd< n8:5www333GGGfffcN 3zssssssqqqxxxzzzWWW777333333444555444555222EEEjjjyyyxxxxxx|||wwwrrr]]]vvv<n깹:<6|||)))yyyEEEfffcZ_]֫lll:::< nǺ:8=(((444IIIXWX///<<<888fffb~x2)xzDDD< m껻:9:*+*111fffahf&s~EEE<m}}}JJJ;<: cccrtn000fffa/l?roӼWWWKKKMMMNNNKKKMMMMMMNNNMMMMMMNNNMMMKKKMMMNNNFFFdddEEE<m㾾мQQQ***888&& '%%JJJfffc}|jS,qwմCCC000444444333555666555444555555444444555444---MMMCCC= msss,,,:::سqk6sfffc}ll_tuAAA= mrrr+++RRRWWWVVVWWWOOO|||:::৘Xfffc}nm@+rڇjjj\\\______]]]^^^^^^___^^^^^^^^^^^^^^^^^^]]]WWWzzzDDD= m¿qqq,,,III999:::ߝBfffc}|ve7qw׵===...333333///111333///000111111000000111///)))LLL@@@= mttt///JJJ444:::ߖ8fffc}u~T3k܄EEE= mooo---OOO999:::ߎ5xfffc}Z-riֈ}}}|||DDD= mppp,,,JJJ999:::ߏ6|fffc}ioV)y^׭### 999>>>= mooo---CCC666:::ޓ7fffc}gpn mL峳BBB= mooo---uuu999>>>>>>???999iii:::ݕ;fffc}oxl!nO峳FFF= mooo...:::ޕ;fffc}qzfbGԭ!!!999>>>= mppp---熆TTT[[[qqqvvvssstttuuuvvvuuubbbTTT777ޕ:fffc}pxooFՇ~~~<<<= mrrr...腅TTTUUUZZZXXXZZZ]]][[[YYY[[[\\\SSS888ޕ:fffc}pwl#lGݬ뾾BBB= mrrr---;;;ޕ:fffc}pww(pDy֪&&&&&&"""!!!$$$"""$$$""""""""""""""""""""" >>>CCC= mooo...===ޕ:fffc}pw5tI֫ٸYYYPPPSSSVVVTTTVVVVVVTTTUUUUUUUUUUUUUUUUUUUUUSSSlllDDD= mppp)))ܛ666ޕ:fffc}px7{A|BBB= mwwwFFFdddccc]]]RRRSSSQQQPPPQQQQQQOOOQQQQQQOOOOOOQQQQQQQQQOOOOOORRRWWWhhhbbb@@@'''ޕ:fffc}py){R˨¿ӽUUUSSSXXXZZZWWWUUUVVVVVVUUUUUUUUUUUUUUUUUUUUUSSTkkkBCB= mvvvFFF<<<222^^^{{{~~~{{{}}}|||{{{{{{{{{|||{{{||||||{{{{{{|||QQQ555666888///ޕ:fffc}pwKQΓʻҫ$$$###!!!"""#########!!!###""""""""#######"""!! >??BAF=orrr---ppp333"""%%%333XXX???ޕ:fffc}ou?Hˢ׻˸϶A=C> nvvv+++^^^nnnPPP999ޕ:fffc}ouYaտʨ?AF6 iqqq***Ɲ999ޕ:fffc}ouiPwѸϛ:?R÷zufrzeuglll---<<<ޕ:fffc}ntfjȧ𱱱F@DT]W^Z ^ab] httt&&&Ί;;;ޕ:fffc}ouڏ󭭭{{{>>PPP''')))+++ޕ:fffc}ouݜߋ@AVg2}uuu''''''ޕ:fffc}ntԷ69Ic%zssslllvvvޕ:fffc}nt<;FY󋋋 >>>ޕ:fffc}ouܾCBGo!|Ƽޕ:fffc}ouDAEn{ޕ:fffc}ou;֧GACjwޕ:fffc}ouٰVVVKKKIB@½pyޕ:fffc}ouŴCCC888JB?½q }ޕ:fffc}ouʿ[[[999JB?½kzޕ:fffc}ouYYY===ggg999===888777977pnnIB@gxޕ:fffc}ouXXX===111><>>DDDAAAiwޕ:fffc}ouXXX;;;)))<<>>EEEiwuuurrrěoooȤaaa|||xxx[[[|||lll܇VVVxxxÐ蘘tttvvvxxxΝyyy666vvvuuusssfffTTTGGGaaasssJJJeeeJJJfff[[[uuulllijOOO^^^\\\јƂiii]]]̀ݗ```OOO}}}llldddޕ:fffc}ou[[[///ƿrrr@@@iwxxxyyysssկiii󷷷ӫ㻻𳳳XXXߝ̘lllڂʃppp끁xxxhhh===ooo'''ҁ}}}rrrVVVSSS}}}{{{xxxyyyؐ~~~nnnzzz{{{ޕ:fffc}oueee AAAOOOLLLIIIGGGCCCBBBDDDDDDEEEEEEBBBDDDDDDBBB@@@@@@BBBEEEFFFFFFLLLPPPKKK""":::iw䛛۝׶aaa}}}|||lllşԶ}}}qqqз{{{\tttөaaaᩩxxx䴴Ƴޕ:fffc}ou```"""]]]JJJBBBvvvaaa;;;NNN;;;DDDiw㋋dddzzznnnۦޕ:fffc}oufff777WWW]]],,,JJJQQQiwޕ:fffc}ouggg999ddd***...kkkBBBJJJJJJiwޕ:fffc}ouYYY;;;ЁEEEiwޕ:fffc}ouZZZ;;;BBBiwޕ:fffc}oubbb&&&ccc>>>iw===%%%***)))))))))***))))))))))))******))))))((()))******((()))+++(((((()))(((111Ϳޕ:fffc}oueee:::777999iwޕ:fffc}oufff+++$$$:::iwƾޕ:fffc}ougggLLLkkknnnkkkjjjgggnnnoooiiiooooooqqqmmmfffjjjkkkpppKKK333iwcccSSSQQQRRRQQQOOORRROOO333 222SSSTTTOOOQQQRRRNNNPPP\\\ȾĹޕ:fffc}ou...000888777...333:::222000---444333///444000---,,,///:::666111...666:::888555ccciw^^^XXX___]]]ZZZ]]]ggghhhHHH CCCfffggg^^^]]]```aaa\\\bbb´ͷޕ:fffc}ouiw)))hhhAAAޕ:fffc}ouiw$$$AAAؼޕ:fffc}ouiw***DDDͻޕ:fffc}ou晙hy***www~~~~~~}}}>>>۽ޕ:fffc}ouyyysssiiilll꯯]]]bbbxxx域ծqqqsssooo𭭭jjjfff쫫iiifffaaaxxxooogggٱzzzooobbb߰jv###SSS @@@ޕ:fffc}ou)))%%%gggkkk΅XXXyyy______lllxxx֕XXX͆BBBNNNǃ˅uuumx###ɭCCCޕ:fffc}ou[[[kkkqqqWWW]]]xxx\\\rrrUUUǠuuuoooJJJdddÖOOOjy'''@@@ޕ:fffc}ouڟtttxxxrrrttt000---yyyҿXXXxxxꄄQQQIII憆^^^źGGGyyy___mmmSSS\\\}}}ix(((III@@@ޕ:fffc}ou뜜yyyjjjpppvvvvvv|||ѓQQQ~~~Φkkkqqqwwwooo```tttzzzrrraaa}}}ăuuuFGGiw)))쳳BBBޕ:fffc}ouSSSjjj򝝝~~~|||ީŌ~~~}}}rrrĂ||||||sss||||||򵵵zzz{{{|||Ëո~~~{{{vvvjy'''BBBޕ:fffc}ou虙HHHRRRņؓuuui{$$$OOO???ޕ:fffc}ou򯯯촴쿿hw%%%采XXX\\\_____________________```aaa^^^^^^```]]]ddd???ޔ:fffc}oulu&&&AAAߓ:fffc}ouhx$$$lll999===<<<<<<<<<<<<<<<<<<<<<<<<:::;;;>>>===777GGG???ޕ:fffc}ouhy###hhh777888666666666666666666666777888666777777666>>>@@@ݖ:fffc}oup w&&&BBBݙ>>ɬIwfffc}oui^c khkmkimnlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllkfbfjn+.bW===Iwfffc}ou$"3AAAHvfffc}ou4&AAAſIvfffc}ou(&#@@@¼Hvfffc}ou#&%@@@½½Hufffc}ou$$'@@@пɾHufffc}ou&$'@@@˾ͺHtfffc}ou&%%@@@δHtfffc}ou$'$wwwzzz@@@ٻܴHtfffc}ou$&$qqq@@@ʹުHsfffc}ou%%%zzzAAA˼Hsfffc}ou$$$|||AAAŖHsfffc}ou%%%vvvAAA嵵mmmHrfffc}ou&&&pppAAAٟzzzHrfffc}ou%%%###!!!<<?@ABCDEFGHIJKLMNOPQRSTUWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ pHYsodIDATx^Ugt IPzQ)vAE((bzU@z %@ 'W?}7ٽ]gc3;;f}E=wWB *PBOhD[TޠB *PB UC T(P @4?^* T(P@ T4PB *TV*PB *<ʛT(P@ @h%(2*PB *`M{|>\3% cWVHYaJvV٩<(DN0@ErA4kA.;va8Ыl ,Ca[>Z+Z9cPSbݛ"_$A 7sbkܕyTm+U(0()P1EnE5l+Wa,"M9F ̘q?ڸtU(u e],?^Cvʕ+*۠rQG}s:sz4;_\x-L3U(BhǺتac[!rW4A^p[dC&,n&/830 4AH+)yOrIJm?Z捊HKSM~H>"9ZEaSԢ B˚:j])*6Qr2B|.\E b\4X\~  PA;Vbެ0F&fVr K*i劳my=Su TLdd,H$˧A:2iBEPf9? hh6/W$DQ:yT)sX$,)Oҟh4w;:83qqLr )T|؁tz r征ɝ:u@fY+6@;}$8$0 rD"jg|)4l)X.ל6䳍drY47͚URPkxh`[X!m&x .BF5SL]+#,dEk`;Q<Zogdj|eU~B&FPŢ\0ޜ3X" } wĮF%s>^{mͤ#xLq&ejٹ]NdDSo<-EW[xqCCC&VN#]777'#FIuuuFg}6h#fqp0nyV"렗Zo`|sR %Ԭ?r՟.~ k3yA.Hdȼs1$ddsc쭷f9O 41NF>Fr( lXA&.:>db9rdMMب fp ͞=[X8~_|Ic٬ޖx0y-LrͿl9\>W̽lhlwv,Z8d&HgmWxm4.16b"*s5GyvڅTKsq2$T^U`kկΟ?_җtbdaU083,Xӟ^әگ#8UZMiXתR-j-?I /[.V,Lԥ3?#{M!$u+(*5'{{~mXu}qd ZGi%$:t:Mla$ "K#$f[ܙx%,Ymk秦T*%RkM+ӈ%t;m;wHd}ݻ Z9;D/r̙3y3f̚5O>k^E68;x6H3+%+}8>1 V9j(G}s'I! fdYDpsE&CU*/ xўgyN /}:3|҉D-Ya }X{5<#iӦm6&L'eMо!/DԲ?j|G|VYejƌꫯGAՆ@7tRJGCd/ve5ޢtO%ֱ_wO{81e8&x?K/azvb|?XNJ$$Q/"GP|I3Vs!zn)0[o@y'o6l!gkb4s;4^wܹs}f︶%d`fMy*PS#?@EJzEɀcvX7Ol[m54?dn7hMjl1!F ?mo=A?8ME8u-@1+%&B$0w\^Mvm~W_}xC߰v/u*Gt/.* ?=\~̉_oujGͦE9!i;|}䙧_LEI1і[Vf 5{n  2"^rdmYv8={G}4TrǁN|+˗6o޼~u #?aX+ &l-F;OTP+ˁ_Mxlr(HicU<M#b;ÆnKn[9E3x^ pxћzݺ~YT@K,AN?LxLG$(TDEO5]DvhBS]wݝviر*/-nH{|}6T4!n5Z%:G.|;_H!+5H1kq|p' ?x46}48jE]ʢ,#\|]^Ջ ռQ\]M`G bT6 C@ZZ2mPsU(3Q-S~@siflsqOq:"}N;t"#$=CV=!a%0孥Qy[* š'-BGF azG 7D]rGF *`|0J`HPg% $W^yO{8'l*q(J;)FzAT[?7)V8Lo-5Km 0h5N;GHBҷ0O]- r}}GV *P`y(Ϛ7 /=t.\:Mijx;`\XK9lOBW/9ԋ"7ߤڅaz~yLO$WZ%i>G6T_wMμ}®5^1Evn*X)=>\<؅KB+)1X56$6P'|Tt@[iI 2aGI5j|A_!KBZzJHwQN+jaPX`c".)}Sm!^VeH* mϢH~iS?ZǓp=R1EܥBFX+ld\m9wuG2  B5~;(E~'2e MԺ6^]R1EvppVN[)Hu]0$nrKSU啉|$g, lwpN&&fɆ{).0=餳UOF)OH['QJz8";ZFSwg|-*Q,_%MM&ׯtl(_;)$)NMΤ֝}Tik%0lI}Gn[q#0^YN}HH6B"iʸzQt.,m'ϸa!BO# a6wT;s4;m#z]M*`D)(^XzAiX5@%h%w;yZy(%zwUԥZ 7}l?iDCq&ZvûUOlati?.+B-9*ӨrFmQI`t9̀p9Tӫz*eJne"svd"۞*F$NM2`L09Rz)oNjÀ:"ɸJn 5t&ZW Tx0ͷ}C.`%* D\rQu9lȱQyE[g D{y/_x; \,Lˋ;-CL?k~er/iZ&LVG`RWVcmk]8 =sሢ$҄ `T-a^\ $9,SiӨ>?-pc=v˧SV@ Q䶙. [ Ӓ,0hl+m(f Sn#aF9g l`\4ϟVZZKVcr&+WZk] 7i,fF"dk~/pΝKM4-@EнX?G-逸˜OHd;gH>elegD9-vleWޢȀeYB}+ 8&2g:G< 5^SaⶽBH6H/+^op.eΧi$|}䙧_l-Ec0gGXJ$U_Хͣ 3 AtIiioHu6'c& (s5_#1=aB oDh{Ws9X<29 ZWrraшqAљګ5o9a!NuJ]7m~a (c<`{rz"Cno:Gpvغ-&X4M|ȝU&NWWEd,f#x2Mś2͢|O}A<'S!գ~{ßtܗaM]q$[$>n{w]PNRaɶvwm4(w ZkŒl}JﰕDEjӧjtfBX7M" 3<b.EQ&K$CЩl"׀8lM #*E{K `H%[|OR=qkfd1DA2#-EhIn5Pxv\hPHj /̿﷝u:xl:qQ;#BHGu+vY@-w,2=952LF_% Xo|rH-,` \'E l&&#U#΀ϟil #מ#Sd5N[R+"M#t$ibA4ѐj^rWyэƎ$98DF޽/Z?n|H _J u+q.*+M\}G"4[ۃ3HdGQ".ul bH hUUs\.l>䂚,XL1\\*vdgZ.t@CSLvNlk# *>~uyغ;̗Y6Њ.a[j{7Y #Ljs`~;KXdu&Eqz`l.Z Yj \sOu"I"q&$JӀ {|XvT>~20Sz%7jjj:蠃>/hw!C#ͧM ^x^Hs9f"\cd;4l*ҐTN&f5,dw5&$~3٘YY0w2lw`>UtVzoױ?l& V]y޿ `z):\czWtEH4!H5яt1Gi6u+Ca~i{ezW}GTx Θ d@l 4cڜ%K^aCl:SΥQ\C""G>xg:z=]cL 7IH3AԽ+==՟Z[F>R`.'c,[4WK"|C_ròͫ-"$6,K/חWҏ\r_N R*\^~'3|浙l:ҷ*)n3-3XcX9 ޡgU[,т1%=ݔ`1gQ.}7۲{:޷nbV *<DЏ ,ՙHu&V6r'g*&6*[ϧQAH~y?[o^|/_~P⩣a۴|á+AռT\h{ItO(I}F4"iIcI$-*u˟f0}ɫu1nT .&m0+;Ǝ4էhU4s|L0ƃU_|rj"Aܢlb:@5-UԟV*f: D烡+N{O]'L rSͫ:zmL1بXHޛ 4GydL7&1`ۈ#0vS]m=S B,~sM5VWHX@,j`=)iY[虺k6ZrA4OHn[#>\WJBWADͬH*il;$(N4a0JX6U>ppSnL&b0$9W/:lPil&ommH ed0Vǽ ^~M|xGґ|*o`wßEP~UG(eGɘQ{EJ.(nR0 j-9](xliMӘuTPhQ`IgYBm*GA5Dl^X4͔~'{qQ['EFoOtvOozXq ͝`ވ?= Rm m|tH.RTA8N-t߬l&Y.S`r+\xss b%ìܖV ̣@RVf13xVUL<:-o)"1HR^*e% nw>: QLTq)k[g T|rip7lH|Q[} iD`N2ltEi[_$d* ɛrF*wP v1=S+K ]vx@ZLYycKVpV9F:#uYicַo[?L;Iz j:UqjYi1lZ]$9A]bx+Ogk X%ҝ*9zU^Y) L46j_m uѠ)%3w+k3"WW37ʟO)F5_|񩧞z)`c,N>d~qviL*U]n+ݰy\V6ҹ7QɈ6Phea,Y$nF:Aʩ++Mb7) Y]X;ZpQ!յN[]/L6GнJF~kUUkjjHf%9yH-!К +'|.(PN;s-3JΓlY劕jBAqyg97<9cKq, QckϽՔU=nܸw?(/ ?a H"e}[oL5Z6]9ߜ!²N=J&OYsBY5Jddzc$61r޾8~7|0BaxK/QBRkvOZ,熭j%C =.G㲥qD=YaGUuŜ8 YĂ܆%@h=uۨX]p^x!Rş}6?rюOaf:e[`ah$ґdp,.r`XUEͳ &&Zhg3$dd4 ;uNߣrঀx\ï*kT}E6Xo+t;,(͛OTy-Z OM3gΚ5KxwsԩSi\'{=o[ooA|kqA!N˫f̘A|;fhZ0v4&jZ8{pkJɾ=s bh2"sy},[Ƭ^{=qfzokU|cdOAU'_l7]?D3v:j^{-1t\ZnSkP#$ I&>裴FdqR &M/K+h#yCXDF8q<=G3k1i׼~~MzPJ+**Z=[Ec*,Jp?b7z.4?"?TNNk `7޸+9 `ci.p3Grx+<vm?CT37p5X#> G_}.$ӣr V|Z{ J$Hsϡ/n&Xhahy,_~)SjmJf} Af9NlFFtm sFm{fn톭7H;SXz8pZz rvmB:$/J9V(*[{Q?Ǣկ~h(EB[/~ ~~Ư\GK+-6ysnAz /Yo=tغeV)u ' t dꪫpatM =#|g?o|݈XJP +%'?[A~p1omv@sq_uVJ)VJԉ +N%0Q8ֶf 5c)GxZ׵?N5`b倧H9k|fl?ikäpiwAset4-lnx>#?X#=1Z#<[ S,[3hP8Cñ)+@ I 4`zS{ gfHz(X L"|'^{xP*I??(V+F_ 9hopCpKd4eLX cL I,d4ӔyG%><:nmznB?9 ) ; $,a|VdxH~eCGADwek| DXӓdG₩&$gL_0y ɿhԹnz׎!Ԋb1J y[%\<'pE$&)8'L@&En;0ޙ)3&0)+!'p>_(5Qف, ~ӸUեG o97x/l0HMM2 OS98.'pG$p N"Q8Hoo'-T RވO,eT(ّ%\lKs`o^󲅞Ao iR8QTV\UZn~*j<{aj<1}oD߈oCT`Xs yR)JާtGDO+x1 70G"z8 ?U/iJ'Tn]Hm_JHnMEDžt5)aa҉ J}x#M%<0TnA F~=@9ۣ4Ád]҈Z(0LzY+l%W֪%K<$;ƴ!؃_cRFL9T_gZ|Z#jk_V_ƓQd3Pfu4ayxs6(ކQ,&x[oFD,SSjD#}D4x &Yd'G%{Okl`(_OӾfL[˵Ma ڑ8)Mq0q8Lr80Ya+q\KBʭ9µ.Ah;zJlr@ЙP?t< '5@]KDI1v>!:kY!Fv%bJǧA9T{@B%([I).~{٢}H, GEdOM"XD3ji4U"'i5{:*zTӃi+Pw hS :zS ,jS`B BPb&0V)}, +wQ2'ϟyYVZA"؂RI[3Әyi KT!$:HE'0"elUhH ؗRjʵ:NaK_S[}&]$T8a aT 4{-o cKi֨A%MےQ"I {I'г{2&jhlf@FG<zLxSs[3h="?b f<:Mb.:tR65B7);;6gCO'F˄#8 zfو?zM.2XƅĆ aE'zE1B2=bq<ܡ]>}s]7tɻ#i?Xaާ_KW&9 RB¨%̒)+&~6n/LvsדC +eyυI1DVG +X=ަDQsI]P >ГSg򡫱ǧWU6y7O* KOC@z i:Ed0-ٔ* =͋ 2gF٢5 ;4M$k#kG| -맴2+/b&ͱ ӜrUs7}c+yL>*V녀rZy.' -?pDžŝrDv?{z~!8(r=BDvJQ]出h"9@7t)!lV= lS vPBI|蹎m#q[qy5` b L:aa֦U*T 4]Z$REg-_XVJDϲA} |F^c 7/*K#P R~6lP 8 RѤɨ(!܃)T6;R5}Ew=n^rJBLz_d=3k\^|Pda%ưmp nE OUjgͅab&tzxG?XV]+D9y7uwpG*a^X+4D]/=ö3G؞$+eeN~xj[LuIϣVYG]KM`ƳiB;odt{|sHD:vcVk<->zy\%V;S0l$ `|J[zj+AUЋu@M܋ -l EI_A[I} _DJ+ω.XCO׵Vkt\ l Wf> ?3)Jgtq} a`dz:(U;uag༰Qx"0DB jY<4LfmȲv0V)%@j (he=a)0_ Zx}8j F O' PDw NOy}0܂ W48:*43(*;i)" 8Ϡ'6LHy 1<8Sl< y,|cE^I] /t; u;I+ vm{XkǃPRY9)W=}V{ ?rۓQ9 <*5`phdu-T¶A`rd4A;԰o,op[N'!$qUW]µX`0C:\ ;ƥe_zfet(S2GQ2\ND!tlji!Uc&͢4sH? cIeK'p XA#@fԌ|h>^4 W4["*m[%8'Y0 X>9%LZ8{|!S<&'F!~B'b1}53M)*2̞<`pp@؟GMQR* 5Ts"*N1yp!VOlA+%z!8&! ٓsi J6O3pkl @r%Xh#Ī`5EST̅T폮^aI G֪|I Q N^VE>y>0?q(yqrQZ`c4q_^9}9`!-20k THg[*"{a`-@Ho!i<)V/.g+_A'@qsEm'i'Gq2갱$F%"3Ѡ׊ xἁ;E~jP Cw܁b_瓺-\7#hu@#1 ah=10k7 `WlF8ik!-%c> 1[8x$]O׊ vP?|gDc%ʙ^P/gIܑPPs48+p0B6(6GH/FEOpTD~|H} aN|ߝ4o'v9| ݹDa]ua[rIx?}pO;.G-A2@w&xi@%WF5R꜒AW53=sD SUArl~pI\eKdM6 7<\= a>"|v0B_Z M젍$NKs71AZr&?o;8nqAϠ}W J<:A!w#y*M%-IEaъ;{pag-.>&`c'N ?ZS~y0+MLGJAEf<MQ3f 8`=].aGh$ϋ:7`_^71zOQb'] :_SHk=_%*afjT+^[_`aIU8';zGO[|Z ?&-@HjضAċ)eaKW)`uDU(u#e52Z'D[Vm XܱӽXrAb" ´9<(Kɠ2+  8!PcN~&#@ lsI@3!˄8s!j@ly|ܗ~Ҫ&6Ͷ~Gi׉)K6á.AUh9kʧ|&ɧ#oMق7p^W"Vb֯%5|m .(Evį=Z:_NGOɅ%h Xxу:_}\}זECGY/R~Il߷'Wa!/[3575L- 0S=F|ȅ"xndI?ᕜAxN#чHt.D)qR72ueRU^(~$PikاEŢ18&&lA=uQsrx6Db͡E&lk[}!_Mgdٕ6l%J.,LGJ0(dž vmpn9d%UT`{+:a?も7J4\E9{oJ%[nG&NT@)ef [?Jz$l\.@+L:I"wXV7p@#*!.e V~93L)lJVb|,g ALF?<8-|?s9a6ZҦ0z aI,agTˤ\X@tLAW56,֛^d|[d3{\V:%SʱM9WL$Nads Z$Ž7~G2x"062 .Is;,I%rM 5G~C\(ݲQ4F”|;}ޢO6l]VeĮ5'j`뇝2  fM7bwXceixIp'd> .SB1rӔás %@65q9κysba4-58t<ȣX6i:[Ic$Ȏo+޺ m ?bU[׶*t}K^/nq+aᄑ9Hug c**loA]%="qRBQ^s%| Gxp3AɜA!pB6D Lc1 G5J: jx|Ggϭ-'xќ97%,U_K c7NG aPÌDv?jS?|U;Oj-7"l^RByMp7i+^׊$L$ҢyS羻њm_;HMY5jW=ȝwʳT537VVkӧ%<X`ǑmF!lO#Td"f;~8gѢ&mcHJĪ\"KY %xjz_: ĩuKlt0giw'i8n~pÍ߻]?t>Gd?lZV ws7?;n9nESXY  vUaHMV+-J y]Yc Rz@CE]DF;top>xVׁV˖kHx9ebA}.%p/55.[4+ QTw|joƺ wuTT}6-ݑ2R{v|]ݱ7V~\Ft@9󎐼j"M$h~sUGUI t $] -㹛 +ּCNlUK$@$2uuKRuKKE//HDذ e1O>d}tI|j l<"RE}rEVJٝU ^/B]U'kXByK٥opFU^HHݒRZ u/(5D0.%Hb+ۘ ]X!`"X|4홺Ϊ3Csr<`߾<'-m-|} An#}q|+12U:KՊqMC =pH*\*5 ګ|]y<(s\pŢHj[S ^bqcE"^zyɂExg 2.o5A[VH -FIV|&ܟY6(~vK9HYxIcd:[T57/hƂ}2>i'oNH&G h$?݅(Xgv^̛" Kᴋ/R/]v5UPU(+OJϜ{k(4RAkge쌕+tr^BimXGsE" UuS,da[ RsO`+&x\Ce)j|eћn=^ )Օ0D1,űh"?b䦻Wz}1fo{ژLZ.,YYqM"82O׼YXG(BO=ԕW^yW+ *Vaj<7/͊-9͑.ԹXx nX6޿t>^25է67טcF ޳yos?ilhP*2%4E`IrQ $ڊ#F@IqtZMPF;ތ3.z(8“/;lD<^H'Ē#"!TCKF>pTduoKXI=mK<䓬:D_PK x:7>rq#{ yon7<6 Q-6fV W\ˆkm̘1%u}J OJm> %h?3՜vOE(k|2OUr5zcT|C ìY\=[u▹Ĉl:ɼ f7t53efǩ%KS@2 t"Ixi(Eix*UmD3ٱ5'q#.RNhO ´ jS<w Upo>e2P*Oęwe7!R&FH"jݚBu.N25q(>,ˠFC9/Dzm MK/}=+V9 tv:θ#ӑ,рl2U6tH"I3_ѫ7eo*R8K#ٖS}dϟxV[miGtP{dSbCW t\+!k`.PP^ΧGj0vK7Wp =`' hKgxH%oLe*@EaO{E1}%9&J} FZ$)EV~Ω*;>ފ[ӪN?g#F|1FQL:eA9@ 5N>y{nM' rl&E"O>`-'nnߨP; @< Uy,,y5N/x.PUa 0 Ȕ:cYhCc{9E-Uذ6½ދE),uė6DB#;i|ɵX??Dog呬$"hw]m7Dy\I[#oFvQUY)B{f;r m-L>K'54TUgᅬJwbHGW!O-|ύbi0j~_p.T1(uJ@6p+lk* 8F>$%!1V7\x6Q<]D|6Ogc_,R;qaGn6eH9]y5`D3 ufү3 $,26sW[|:[d$|4%zTڴ(yql m[b@o`(m@NKHGM?vP vm7|lѽO+|gvLuGTjx= U/bv^F;w.?BPJ%8H"WQՏD j'S`&Bf kR UḦxj},~ > @HN5ː(ds0,˄PkW%VX[23i%/V&P5ScOiw֝0sU4@-Ҕ5 WJŤcYs-^2a–(igʭ0 HhM /pa˒v%A2dw܁VA bWGڛD8 "+g*|¡@4t{jrd)AvRVOKv¨V/g&4*LL?&ãP-)WW(!~`1*ҊXUGZ1[&˭m% 6]aV[k*3j.i8KcLeXFV͒m%p}E[=ܚ;UvuYWd# T&D|38վSTyꩧ~_d_k}տ;ʖMv~߿ykOƒVῤKjmq/piR+#yXBn@Ƶ2,OROU.(M,Dvae+CWN7/Y` 1Z9+yǬ!:Y% X4 ,HFc0zLCt" 5)r]=o6uܞ_ɯ}1ZK~4AA=.d`YRT)rkn;N?3<ϯ~h;3>(xGSKn*s3x$e^JvjP.ȋ,AM7zAAF@TD9k*?%(*Z ]mR\sD4"1|d;蠃h;CwuWgCGdH,10D HQT IRi+Pi0UaQ]hL6EDd$meS,1V7M+^fSA$Y2ɏEU9J߻ѿ9ǾȒLen3~m~l#Z"<ذogV]P=|7L/Q Oƃm9DcB|tl*]Oq@a&9^)BO[vKۿncAUeX_R] $ۋnżVؘUrYԹl*NHJBiFe:j(ڲDT5`b0н l쨒+^j_j_;l^ccR8STy/" ?G}VQ_&"hPTΤD'BLj D 4 8ƭcRr zq0ׂm6*7 JlNij܊Á^,^6. ƒU Ifj?A>C]wE>t~OcvD]Dlmb<Ԍӿ|I߿MKX3G dUPWD:e/3X4IW\/e av(VniJ9 s D՛8>>j|rJ(^{ ""B{J~h{֔AÊh9 <3&ԊdX;<1f`G ̸)6O "$)~~_#a U{zU I2}}1BHL$ofǬ_>i"(-k%.*d{6#`t}`3[$Hl 8Ig?ԷXp~-;~!R-XǕ'! àb)Dg!"Yy! 4[<\hկ^('mgu7~" W c+p\i^a.Z'ȭ%0yMh")[epO0#+¥&r X 'ylniX:ȾҤȫt`oC&#%񩼚l>P!#=t WS!!7Gmn~m|F+[ <^q+\V|Gf%단%H蚱ܸĈ~[ogY3v?5ܔF)R,LJ- !fO˰)ϗQN eEӢ.W Qa#{| pjէ9`c)r пKhHlFƢ/!0ھ36Hw1=T,^;TI/IflVc&jaEt$x:/L{Lc: (v Ж&NO}."S1EvSgu3!ɥǖs_}F7E#Xl}h E,R=*pƯ=vUE*jP(Bm# 4ޜ(Jن0AY#uk1dλs{[R%q 23i1HKZ(/@6q 1 ZFHS]Ӱ#FY։)U-trO4rg20T/tp>F%Z]71eKel:;ْF@,f4g!vk?\4ۮMΠsQ'O aU0-Q.I#[ca֙TKjI'!hgD[} uk5|_KvڹA.iXIE1 "Ts JE#⩚VᡛfX26jr0dmc!zK&$j$ q +&3yA<';.Ui@;aCbyb(i}Y:ۿRA)Pd 6V\O<ȱC]P %GdN9{6jm %  -w#f@9WHV#Q+09؂gSK2+\l9J t"Pi?Iw%QPI m3GP,X&BE pO m|.Y&d!fBB{OMnnW%W^d*YdKXAϟ37%`=b <#m!%+RãO%x= :YntIp͚7n5&bOoZ5f?$ƽ̥ NvXXxHsJ@hƤM4nB.a7tCaD)ԦK.K/%xL@KT ЅBY~wdNF *Ֆ[9kG[Ij]UuF QQ LKֆ}1BFTxuFE,KLq#"x'2@*0KYj+[Ҕ-p.R0[w!ٹٙ?6|\F>eg ?I7mn8VŁ kxtlE+JM{$l t\:ᘲ{>mH"z٧{pl2v$On]4Uo@\~#9}z+jnGXm<k6gP(lj*M>~)?+uN+KsI'`rĊNF o+"ƺ*y)#eGa"hMQ|8(VA{=<*Rvmsr @|0` 2MD }}u˥ꃪEuO>j^{¥GޚZT pHb;Ǒ&nY7t&^yMxrN7l|zaɸzQ(ZxSs 2Il9=z[lBPv5p+;Ϫ{0;*,ƁȑoێΞɨi3ХOGYY6x7^]}o^UUcXGHS2tuDf/ ̄[: ޼&0z*oK0O:'8K)[Vs+[yx6^Qߖ;YDמÌya@O;<Րy.a #&C,ö YԸU^ZAgGT=(`o}kI:)a.AIpR!w<ªsn,U.=CJቑ^>Z:Eɭ*?btQbK9LW.Ө: pg Yɜ~RsreZDf5)S_?a dZ/ilN-~{^cܘ`C +K'{zp%-`*:lN PY}<!c1;h1PA2zH$eF=ti!,(ctaJsrhfY'SD$rDdC/F]8b|U$Dv[sqfuǭ=n-h;2t]oQmV7y*raQ aF&Z"=m4"Qt fq(ӊJ 3v[D/n뗿~=vgtil`r1

^L*u7l{_ZAt$Pj @x@0 |"C@.,X[$~8 F~q۬n>NG=lbª-D67 [؂)t6YR1F0!*lTc13ķiƵ'ni!Jg #E@u/iʩܶ* 2 %c>263s^v;/ Fmƶa]{xu;6nޒٳ_F&jF͚o7551bUVAVd2\7?=[m x6:4B751ߠ2 զaY]wW眳A6##k͂EdԜCSPnɫ?zџWGMtAZI(!VچүsAwG>]/\MIq(_GQONcSַEk]e4`3U p@CM TU6Vz굻ؠ(46 YF$v "1=e.XrB3voCBX&4WUy>-2{w%y5:wMAI؏{ףXdx(`~ v5NwAC&M=X"a: )Oh>0)FR ?WGNj[.[ةT83sR~f3ku7ܸvwiCY-Y(6YhȐBcH؄ƶ"B `S"6A|rG"ߠe!f%7qlC'mmq_uEKcs`qP rj\טOW:A/嘋; G.^{/ފ#ˍW6[6i(G`cizR.PdJcZq]wuȊg}4ۚ=I;jmWĞ_.$7! b/6e0I3P{U.B՛'2% +["ҐdlkO>{#ܑk滞O&y>S!67Ī#UU,ǥ0Jw]^Uf#/vijpU*ő $3%NVuΈ)T;rܜZCjә|"nL?_0Ta؇H'kTGDRI"\˾V("إ+eDl&*pz $gq߃1> n5~ya1_]zO=SJO/|6 X.kT"SYY07߸ *\1z`;e OYhd^g;`JW46cLc#&˳WRw3%]MH>[#46nчuKZ .v)X+yaR"zn:ۑ3v*kwy,dbG'O&/oykKliIC~i5GXiS^y~k71kE;<6v%U7g# W̧lsy聩3H~Of#[](_Jtj%E?bIMD~`tH0C* u,jBt-qڹͨΛ5Vf ?[54!+Ro~_m*U)#>dX%Q@+0=Q:@ŧ Fh[HӻNJcJm~<˦cpg)$Kgo 9oc{(".\yoS^Lk{NtRH"j"w޻µ>uꪓ)#;6ck ؐ)e\⹐DqMpQL#S)e社)o~hToc?o}f5'H"Y͐#iMnUJfrsB+#oSNw>.c^z 'o9&qR|c =cW >ضz0iK0iX&T,4NڤF xڣ/m>M?5b!DUda.ژR7&CЭ(EoLqOMآu[%̄iSdJ$+&/@xX ?I >`6@JӍ3r&lVyn.UClHP`BnA";kѿɌ 'WIЩ{uHszw+tpRc8T&ZH6R\e`7h]Rؤcy5ڟP^슨e3[wBC42LA+D%)Zk.[5l3tD>w<>c~Es8̡#]EdjotVg91{gA&I-js{>vk~ggcb.-ߚ"}'r%^n\oDW6F0*PC=OBJXD )<'t{q7u dj%%~ۯ|+ bg6 ڶv^e6z d3X+k$EƔ#)=-{Z{I3kY[&Pr?Me6{3!ΏFg;HK4­?/9󌟹B)Y=G)?jA|>MC#h];oҧ4a'igh=˘r%Y "'jY݅7zo6#;TfWх3`pyoNpuO ,ޞĘ,n-Mʶ+V,2^d#ٳ7߽.կ>OO,e(NRSQAHAI_6TSdncDžHCcUVFFGGV_K$GGFcJ䘠jgq'Zj\%R3"V=&ZaU:iCb(tќuN5 3y1HKm 򃖆 G?\ PaߖʖeEuͪرE9St'ޱ:}1c*2ST6BHY(clqT"e hBdb]VMƅ/%|Z ؤIJ% K!ک-?_tL Yn$bU!/A(sY[,oVRSAIG6iGuzs`NQ ܾ|y槹1_=,{C'ZQd%KO=-D_H}|Ù5elr 4FbGaԷO dY?.m6Hǎ۷ڟv# 2ӬTFvpsO-#Tb2?2¥U\fiH^(#,^=i<3\qƂ¤ F4LLs)z?ꨣX.B!K be0O(n\JR){YŇnͶni.jovf-d;6?I:x(IY{&i*5l⭧nKnM#ןObgyk   N "4tF#Χp%Oo[3sd?[\?~iQV]^}5JPԦFdK3V#ڥ4Gu{:mZ7rqx "$Mbw)hS8SvHONG`\&p.FԼ_{AmG]]} P4`3`:r3OKHEt@sV;guת!\o7ܴ:oxoK@ )"o[DY(3_1Tc%2i5,ػ`{K Ps]Qs;+tqzY;L2ݙ?m.ԹZ\Yi\p_{㙫OֲN,6ָ֤Рo[ѝ(K.m]mvNdJd=a}aZU~WUF LDZk+Nc>p){t~͐qw1fes$H%Vxvd[pD<_{nKOˉ'-cFR#0E?G;&R zE-`*L+ӧJVH}5aSL)0ȅϡ#(^{!3]Ĭu?൪yw_sLnx22u9l,Dy $dݏL}!aF)eVOCv>bp59LC9x t nl.ŢќԺO/1k3F~Yl)@^ܞ9ršwuDnႳ,m>[ꀭl`a@6K-m^+y&fT>n%pp'ZbQgJoUcV=c4uw2xy{ﳏ F₽ d.Nl-pAܬ!6%.Ƥ3*>WΏi}7|ﯵW$"h3ެ)YOVi}Tuƀ.APK/ӻ҄B8mPc='pNn%UAOMq`9Vj7.&ضDCS1]ߔo7 MAc:G8pC:OGґ%R >,&l ΤS@olK |N橊lQ®ȾopO69c $} oȻ@Q45Bkly\?waJlnٜkUѳMh6.!d]Z>SX⚉hl$g}lȮ{d43M}&aoehTa-)QSO\s֠MB4u8ٱ>HM҃ ϰ̫TvNd g4n^ST7 v0=7t@|} 3bn# WWQ;6IO!2mRHF\|̒|1)-1/٢Ld&Ǜ@Lergbhјsi!݅Y`#(fU uiBʀM+b}Z:_xk¤'ѥOTSމu)m;\' e?10KLE"&j:`ƽ2f.OG/bvX 1(s869qtl쐯psV8t[&mb`L mnLȼ;^Tw0|U40hN5G2LHRQWC5l$yӕV}܏/ZDc!y6J̘1C dt7P?ތN3gaZqy@U.BSHZG\qj*qj-G5jA $|^>7}m{Gvu(0`n',l|4כgq3妄bA}4X(~aT8PHz$4IxV `X,cBd 7U"+8p}c_2-9pko5=4U}r3jhv摒Nwr3.Lfֵn[5%Iowݴ/ _nn4M7w#hB !:> F2 >;kOD-Ȋ@| ǜ%iM5Z}7jg6mRʻڪliO~I]mjw؞ B&C4Q) j1Ld8A.G(ׇEgiD"U/y'  N!;d&I[ 'qx91[묅fFIxȼp^"\q+jN8F|7ֻg!7cęfn}=ԍcX*RHXWZ1bC#deLr2yPb,.%@fd HSq<p?Oe8`wVͯEUMӶ`3tY,)[gZܥjYr;sv,j$2VK;Ԅb/49B f mDZwi!HW]N;UoJh<<7_7^дxϝ2t/cIL+AZV ]ȳl+xac׮tA@-О3IUԍO%mWX4,2˰3˰Jsm N)`XqmXd;j3.ld^C"f| >W+6|'[R͖#T@"ɡf$o91C6+P3؂f AtDϣ[C ܚ?jmL|:h4B gt}In! 7&{aPa)_xU9~HO;'uD-E2:v眕d焓Ik-0VGH3 E s`‚]){PL{n7֚2gW'8̒{9Ul Tw}Iǯ@#ҾÂBnm?9MzX(5k !K&7/'Cpnw@sh҂XU&G3S[J kF~J3[%s^se :_͋E*|BdzO*o%bYvJs٢{BsvN{M]ʾ ]#j\f^snQt>'SD5*Y4K^3U4WHFn#P맺8db-7h|:ɍ"Cl~)c4ՒjGLV6\B҈}H2]ϭ1er LƬh'r"<63dpGb@w8eR7TVcw0!X`yXnNM0/]E)%ÄrKzarZۊ<ØW a"x@ ȡe626;8>`ATq7lJ+[dA>m$'Vc{N/ ޿f;~SL\x*uVҞ# YD䋌@/ ȕP>LFiDP^ 0<^Z$ ݺrq) ޘLf^lXկc6_V[Q6F֚RrYPWQiylY`;KuAߪkWodYeʖ}(3A+vc*P뀯'K|~`Iib9,rAd||\:Js34z[$‚F͖0-(JvPn81 C&sk 6jX< H1LX[XNFsXYW+ 7<.3@Lxndi|&vm\[7LOzIaJ!QruT ɘ&VV6?͕IGH4Y2#{QrUuj򉍱#j)R"ߒ",m<2nQO6} pX0{G^:!{s m{]Mݤ6Z$l,':ohrd|rX^xݢ2ſm!M}C`Zkő(!$ \xyt4?LNuslHs6Dk505t'5h0Ka3*:Brҷ` ڹDG91|L=o\ {lDtaRϏɦ5K-_2-1\ E 1^}D]KT--Z,Еѧ RU% l:PE '4AUCS |oUqU #=j›+۔2rbǪ֚:4ԽZv݂YdYN߻%3NoZVj1kkmKΏe^<-hFi%^,Zjj%3RKN-v2KNƥ3ӰE켛Y:+hvӒ3K>H6gYrQ˥x T †i{!ҁ]FFnvjjBc}~=jV9|򷚒CƽyW"lY&6Oֿ,w΢)A3ze/ܓ:R\pRlqƊ_җH>Qy\Τ%vy#,Ӯ_m~u%V]3RYϜK^sؚFyjn=<1.0rFB^|'zcUbY.B'dn>i3Oud ^{ur]k  Q 6:?đ.2ay O:1WC)N"ן[~ođhe]ey ]W.AekR#<Oe7Vϣo9b#a_?beLX˧KJӊwD(f悲1r>Ѭ.J1,Ƴz\m0!\`(FI&\@͟4׏͎(CBMѪ+Z p+0r \^5ڛZk9쉌.,:i,Ⱥ[w_~O?慣k S-")RFng"?,nUXi(+LxS!EVcP_PhMKMl#e5LY U#5+V{2U~a[84|LL];Mbಋ%Wo*"[YcmQ֤u'Ԭ3v3gqvgA'jh:e^75h[(v֙\ۅ9Dj(yϿM*,毿I_P $ tWٵ, (b<'˟L r|ӌ-tGZge V&³Yl4R۵7])SXhVeE%n>g &'WM'ۘS &6U*˧I1zH{/>ףtWcC[l ,=z^`jұfn&Ô7/v,'t҆nr^-*]؆I-[nrilhH믿_3.w%V'Z[Ş3J~(ako^<ӯ,TIft$k֗ӏ+nc֝Hlif1l(ɚ5G _2T#.΀хVA_-j,w%>\o%j {8[T.~\_n8U{WpZi˙-ñաJҷ zYgiQ?߻{|l]O-^\^3K3cع-ht) $|:_OaDb5)&ݟ:|jE(8]q #dyHqBGX6וC:ܕHU4!1I_Yu'xőXeJ|iAi`XG Al*]Д~D4{y)G׉U'drU7#*T-ƆC6M$O=yWy.nKvEqe=m}79V`N|MQv``l 'JO+p6/WԔCb-(')IjA_%a(0ʛ+@YxgHx饗p^uUZ[l|]w9OWq-zV۴UX-J r.vtњ"5r,1:(|$$W&WMTL&VVO$GW'WI$F'kVZz! ^U3:Yp*XHJ$Gx8JWǫǪk_Lā փP nyX*· _AΠC/`aTUmءt$Y }6vq&>CpON+34F*z_LP;ܪ VG~ujNYsjt9-"X(UfM;FWGJӮ8YrĶEe5=@ͅnWʠ̥S衾RO>ěbIDVlO8 Z Vm* `g"p2O)R{aE. -,ȨevuF zI TV׆f?pu[jI ~ۡp~<#◢I" ª[xM,QۚL3%%u46p#,!QP3VC}35 e oO'jy-o~OŎ8WۢlHoҟ|UE/<$>.;zsǶe@ͷg#XN 2OQ qg(I ~sI_w !5Z:=X 9=4lc*e&G}TwM"|x 8aZ]ȍ@Pzp TcُW ;_8gyzpEf_H,ͳR7*;DQڇq65 ),Nov:~p~ 56,Ϭ"J5{'𲋄"5lJhlvA{ؼ[C?v8 ojF؉H5 زU.ıa\[eӛuY7Ww`H:üW\65Tcw_Şa-Rl!6 =(ikV4N5uKx+7Eܲ IJL"6hdŃ7u8q͇ljbݰ-Yp*TS:}ڪa o97kl(7`y"*A#ι“˘"9)r屡sFQA%L1-<Ă9Oqԕ'M6]0E8qVy^By-{&Bbf7 6)1~)b-(ƾ@N%x%Q 9 Rׂ.9\ uP!AppC}:WO09f/ .1` 26 .wWTDp?AFi4nIˠʠ4N^3R":'G2~wwUc+0kM1k6Gt{`#eȸ_{͖kcCswxBWږ tVd?.Fw W)byo9 iο_>D3:43hJ fH5-< S_&X5(Bn+wV +[1 EsSΛooW^vD_M>UO6SI&Ӆ, λhPKSsǜVGa1‰ApWR˾*Vr`B@6.VW,frAAM;Y۞\ c;w͉s" yK Bۣxt&Jn}0/ L _p5QLu ϒuMF[GׇM ApCbcK}wt ƀ 5ٚ1GݼLalT7 ̑<>Ȇ\h]yWN8Ll[x۴< H1tNv+8dT<\xǞ_#-lkehm! I"E~xt q};,g@ ɚƾcD;zHc> ܠs<%da^mlk;FuP(Av>_qG}T41wk__[}2EtFnafsD]CÜ?u meRYU 1A"ZѬ8-<%wM5]x)Q !ȍ.tshUIq?fh{K$H D O!V֫[B<cğɓ 䣝L]@%܏U[n?'ݖܿ^quCSG9n2͇鍎{[x4ҙ"1ٓrq}mëw "CA<-a9{Ïmldv2&xQ1s-QѣnBq_M-xGՑH_LM Ŧ)u'-/lVaY_~Γblf"x"`"1ho L 2QB95ն3]1/Q| Neh>@r sΘĪ`5>];ߎ_~[Md1DIBeݬt&Z4~u.9ҬN1݅k~Hm/G=eҤ6o{U:x-<\^4˱n6N^kjK|οݷ&_)OU?+/`tQ6[jlTĈApfmp;I?Q^{5Sq  9\<do|>xa0=e`//o ʃ\aJV>٬bqGCpWp"f UqՇrt]:=$xX'0mr-|m% \6'8IM,[,Z w=·ARnR6N`x$>K ڠx trɦ'#IDxÌC=攆b>VX@`CKX"ejgϞs 'ֻ!p;\uǽ\"[AG?_46"N} 0ɿUUI'f"jՇ\lV;h}6lts߯m/!qf}d#[kXYyg42xr^clnV"‚iꫯ&_|8t8=eV~#OdRlp{ri*,k zdhlT;O&o(~Ș&!%!!'NH?F Ua?8%Ѻ+{iY9T_Cqe,84zTMm 5F1l 6bqcǭ@*F2tF7dКꚑcFz$V?4CH7FDd1Zuˎ(:2:^{}9Î:c=c.;lw1'p챇uӓd*]ߠxRΰRGӀP!2t`_!^h"HT0Lg[o5w/FqHccW1 6('L%X-l-dDdײv|ZH&Pk^N2Vj%>3|aE{~[Aj{>u밖̓Dm馄kard'hWQ2 "kkkw?a&`KWPa ^dG1T+NvQhT;9&K$l5Փ'M&>F2sfWA߼}=d>`BX&446~kr])S^ffVǫzmQ2J@/$8 ,8y뭷zmQZPݾDFT >7&2lƺ_ VQf5=sk9ѱs;ׅtSvaZ৞aOvJܓ-HiR$;#I^wf<;:ON(|oԠV﫷\H'{]$]v*[C/<F|lT[Q%j[^H)@Z#~;Ñ<=SxZ8,!Ɇ}6Caj1ĉ{>`}VTUcqe#h7۱>r D/wD8t&mR hTn}A;@ }yf 1uǵOq=4` qWGy ϲoע>1 G5!eApbNp됻 ia̹ŶnOQ~.j%ighЯMy^(rQxSL?'m&{F{9Ak};[Q5mXÉ⪭ +ocC| mCS5[8w(m ,$Pp>&dp4p?TP^!2!MLm?V: @ ^,]PEO\CC}7G5YzXִ-@Ok<G`׿ˎ(VG/^s ڦvO[ŧ+6UP8Z Ywu90LX; >!# kD\TO}Sa#:NAIIjT;]fzrܯc h^lsXCYѣv:!T-T .P6êk_356+%Z_y1 ЍncfAG~ѝTIS!~|*5sӲilExe`Ra%Gp2Csb:S  y aO38Jlt`Dn ?*+́E2+&GJ@;8iS`ljaPEAhJf(0``- ++4= 4<xZ};74 }3&la0}Uu%:~`,%^}M!m hl68xF$C?6f |b(S_9A oM'E4C}Y.@c;/|&T5PÂP0J)8Y.HZh`#W2oԳ\1k3PJc/a6ʶN;ax"H-;Inl> ~d żf4_d J!QJJiYpfwX t$5aM?\MBUqiht,T4LDIổ}Nx衇Dbq!Xxi<$ r= Lʘ%yGl)x.2rg2Gg3ŝE3;;Vhy<Z~\vel_6v^"M '(plA`\2! Y} Z_uDdPjOD@A_pIx*0 gE 51GkpEϙOLaHϴ 84UU>ӏ ).>/#`i>Ѻ޴6+`v+D>*z4Xdň8ud?$H[S3#kkpeV aR'?93vLzBi Bƀ͆IA&zCWEx">RX)8/lp̷~;" }#*t l/ b"a݂g*LDž3#ؖȯЁybY:]C'COW6#|Zrgz Qb:3q"z 8x%yZ6sVt6mi;@e#Aѥ{7GE⌡3da &$Fl ̇6 0ZbajjG\[ѕ^_<BwT$/Q6 &_=:aq2|!0>ܪfjQ6>@a.p5Jd8 X8x C"ӊiίʖ@D;%vpS=}Q}ʍ~1ir Ћ JTdx6R}`\mnÃ1)G 1 J&KQy/+wG|^܂_ivNsdËJTd -!/&d(OGo(07ެ>xgKtf|{ߟ{m:Ho5p# 3!0ѳt^x{"iK-.,8{|vt@UX%/#՞5 CbX^Q#w#J"yk,Y(ai灹Y2ȉ}.D0ŸHgsHSSB͘q iS =kF6ب5z*ĆAjm)gDr+*k'j%.d3wk{l=V0d^#Ҏl3y@ FcFb@2`"8ޝ9i$Im͹9+Njin.cVɎْJ&Oף[1VLW2xJ@a_a针{ԎtL}mu~;߂1ːκ:;՗^CErDBVZ?q"WImNՑB8`dGRPw$‘;2|M H~Ψ C0bޚbSVڸhqMQdM "!#A&I]{f]U2 + Ԣuߚ>^|^~_|_| /+?<ߜjڴ7Ma"jWfuBy)JaTO:E@Eނi7ҢI5pS6<D 7zB4LA6:xeB40>=z^Y☣]{WwQ>K@246?"Qx?v%\Zx: ۙ~Ïy$(}T??ZF6u (yRG]{֡ te"'liMך$~6tOhk걺GƐܭFFTrqŔ|;]@>TϠ=BkDӌ 5ؙgI *3w 8R+Emiՠy1[ˢqt>bi^eA ;jzm?cuv?j?>ו̾%ndio4Ŋ(&ʎܨq"tA|h#bȝ=hmL.˧t.MLCy|8]iw].o F; r!v#eˇo=[Q Hx`FPڍú! &fudc F6}զ#lxʵ`4Y7kFz;6MJ *cVAlX?k'OCW~Vn]v֌g~Ƴ.:k"ts#l:|`xpm*iSs\=ž8?O48%)/GG(K 8hӍ6lM7h6|dQ믽Foɦlɦ\Į[P)RTǜuV˝0eYuf=CQ%<>µwJE#x3q),B3ʻ2۴R$wc/tj>eb, >+8xr3 KmuDrorÞp~8{I'8/dES27[#arz3[ s͈0ߺUQ1Eލ^QpMh*ejX4fHS4Yxkl>|t,dք$J:Tav < rSE~zGVQUA|JUMsepwL7(L%4#̀PL8s>dAT@[EseE$هZi'!ȶjS_yeDVjE"%d cLd=yah'SO 9Z\OR4%3gh{J{C96hql&Ƌ 0H}jbʦ(k6_/kCr{M^ O`PP|RXu:2rPJT卭=Jj[[™Jaa+ *$la~P&Td{rU>k' HI)#}WP{G, Xw}{ ,״GyNÃq\"lݶӧԩ:bH;['xnQTGo)rHgqR.%#%4N4/=ڟʹMiL_) ̔VTI wklv&%dGWNX{tSS.>Ǐ$XEV7P @y+lf~(P&RA5jR{ 5Bp Bam% Ngmb:i >C`߿^89?।qi-#%LSż17S"YR{~Obz6%] IR^ IhlJgs\ּn.b:~wdq?9ڠ>6ԅ3jO}k 3Fel##VKI7OESd[=% ~# ~4"C: J:JG"(FF3 (<1V8,rT =ӈKh=TOIPeIdKd ÎLN DߑPV;$ɼZNeT4TLu´@/-ilֱP/SDkpCLc?c9N n6LU,1E>=q*#Gq b 뱱TD|裁S#\Go.3Ve=[K0R\9 '.h\ズѡ7@CC݃?{ WUFJ:*T ESϿXAA?Q슊Q@DQ!twRHl̼{rgwe%sY&w{#Nn?6M3lӤbMcYd*ey䮥',anvlBjxxY7)mHRv$]f%ud J V^_xt!!j~j;ckaRLt8.}J@9 `x 0ǝU"QfLJA'M*VN;8p'D MVST|ʯW<&KҸLVxٖ*r+.S:QD.@ސVmHL!@ (Rx!Fv864rD}56\<]JZN8Nǒ?C]wE;lPJ,Tr|b >/Cr$d6_mwb$=|'*|hcO}9{9YCG5Ma%7~f|/ͷE]o~Y'vf6MGJ|t*(qf2y-ߦ!W+/]8Z_a*eդhWtX첯,U!;0pg ICT 1;FKw1+,Y_(sI5ON (c23t,ĦlBD(h:?l3Y`1B@Iހp!IS3X4E"Z^q>5H) =^+ L푡-Ttl6 L`ޚeQ*z4 l ,9_k+CW }ӭbX~PO1'>g>!@֜}sUIzFOf1zek~IyAϞ3cJ:ni~f,OĄffyr k90%6nh1V①W蓴q [shCi0NX@A5mV /(*4"II% հfSD;3yH6@ӖHR(l 4Ǡe I+uю,{J8 ^҉r 9rcW8=EDhy:o9hV D p%WzT'LtX>q4vh)@e@V+s|2"PyY*W%b9(xRGB,Y%O羣{hE8jmD&f O0ӲɃ[ 7tBZWpRޱ(Vj#h28: z ´"4d\"-H5X`'=bQ0ad .#~=yGiqTܔQȁg|eA!8~B]=D z l& ͕ȱBHS^9&怜OBGN"!G\dd :S+` "-qebcm(M>j5F|J* YVF DVr 'pfȢWd+7y-Xa+R^Q9չ.{/Q݇yo`*pR\yP3sR!(9g)U*7r 2M^W*`t#1<ۚA= Va]8_ 0۬ ʰڽ]!<}tF@)/? $C@d%'|A ma0i\0Q]-ZC7W l,oS aǚ" R+C=HқDqH{F#)iZB:Pos+493Ank$0uh(lmQޑЯ:":A]X}OFHIWGl1cW9ѧ`3+ЗZPJ[>"yJ2 T"~~0!z|C} -MK m..`&.lk$6S"]sݎ/4KUxUVqk4JߡbCQq ¤x\O.G9I @0 S4b F|axA1=,ei8gviJ@ЅR  d$Vf'G1Yt:*Z `K7;dOފbA`D*h00փ^%j:P5S.ЄhR3m$0G~0YiMM.FkEm&gdoЍzSw& '͋?}?_?<Gڒ oxk2 mʇyeHO*T纮6BcR r;|h6/{'؄&^_u,bYliBNE"Qg `n)ԑ673wKho?X_sBdvA_ pRCc)&Elbg^l / 4wU-wDDᲁ ZLE$P|+Z}Ư0!i:Ĝ A@|-t쐖RXl1͈5^p$/[8pE0tJaKC BYOo# @fE܀FvRtyWϢ#~ P!9E+<%").Iu؁~hխ h.A+R_0 p Qd%Zx@1y#RӹBԾh.gEC/QX~(-,Hg`)(r(wՈ%!:jH>ACknj96֥)()Œ3f,]}70\P1%C\muM tᛮyT|Yho1DIl|U݃tLl4|D{X2C8Ndo҉pnÎkD \E{ dUCRZB#3eWa_ya3>5 HoFBfp) {1Q_[7A`@5mpb?+뜃0)f!F\DCOPc j~K$|`(ph'd PDc(IB{ ) aY ϭGiA v1$F#ÏxC9+"*؆ /xa{CrbzBUyzԌڴ?86 ϥBEхR3^=Ȃ< SO=)9ܩɍf.-/j8Nʏj5~rxd,.Ι@3{RW!Ek:`4+>;<xi 'V=v9MymܮR4|/lȾa{`9BNDOW^y巾-RdqHnCtY'kEͨ[ObO*=OTZ{h9HޭG:κ[k*4]` xCP "-v p]@ Ưp-H=J- (@ %/ZԌPl,ýaLmƌn Q9ѹ9cH? F0v[-ګ" t)=;r~ԬWV-{Կ׬^#IN;ƾXi" Y\TI+l7$ROvI:T<LLB58=K vb451'qa>L{gǢs&Rj5wpYuzH79k=_^E3wjl]# ^e=i6v,EgR|p%w/jrd_ ًڴC 5P2eє=1؝IDAT䊬Oʀpj8њKdChuM h8s^-r;|^xy5h 3\&]HkXH=]b.&K($ َ'{O>Ě1j@AVAnHi_7 TЧjP8p]؁MhB>D t{~Du.uHu6#Km$&|OhD{VʊS؀Z"6[cv}g޻ `AFkT/H%]5U=n γ="5{i~_}m<~dBQ և6iM' yMTMN:Ӓ sbIismæw$*0roJezc6  BlJ6¾P۹(A-$4\ :)5F=W-4 O;KF想͢X'N%GַO߇|br](|r%K=-rHWHq[:>2}1z I.o*#jjN)G岸<4+1x_TrP.9&ҽuKc|[>:ucGCoSGe%fvС;~r [T& AlAyf%q^媰'E(zA1enL ԍCN~ֱ΅$u>dQR)ۋq%HcH`0ًbQ> yZvqU+eIjE6l-tYWGKyX AuNd > Y/eJuf/P.fl]:k t2I"lԎi;u}j=pRm{߽$[#z8 iqVyb$k5U4P IUºT|Ed42a`BMB!(т^%6Z\mT?[BId>>7qW<Ǧmxq$f;o \)zV Vz+zl]!h D# |[hPGK~JfjWrae[Q؍+KfϞēOU95)^\2=A7(65hY?ϥpuN>%fO%ǒ $$*I6r9l"*JyUW3νp6wy2 G:zG(RǧRv0qY=k[ƫj<٘&@{%Ϗ{YF%qd6IC_&O_zU5 37 /8SN:rٜ#16Z"Tɵ[IO:~+س'W'{Zh!Ų qGn[xwW&BZO(Vg5|.ImO.QWEXE=xv:[ E=2Z)Q {6zDO3߾͉'wB$؅* nSs;&wRxغqt;ѭ6'%c:lU2w#}VbCoΘ/^䢋4ܴOR<"y fU;-.KYZf`96|Cu9l(gΜv,4PˆDO pcW4^#$EK5~%ɓO>I7**-#BY-Ez yjp~~_k}33sV=OK}m6Jfu=}`c;2DmU<3ykҀ\nӵdjAQ3dln,y-`+ mژ*i9 mlsKxs4b?:eֻ>yUfͷf9kmŸGr0 dWVdVʅG# ;ҤmZ؀ib/=W{%vedd>A.Tz G.`itȣFY,nٵxc5UɆUGu}P>$|cAҷ:`sz$:`sfKCoMR}g _x~I/x)`#FRo C|[YR>jɽܽe$At#'ɭ eAKsyR ȳQ3`cCXi;z _|˿q!G|銯9/%gWt޾ #6ÿ\_vZE5L!:JԆ7zHaC,TA^,[|)ն;v̘};yIbn%I!fwR`|}s/ǸA(۞{ȺVtkos|zG{&e39PՉUC╣kzbc~ʧRbp߿mi<6wުi"hɬ[oWM?Sa +ߪg!Lf~el[;$Mξ>u<']'==w;cF+@o{$' T"ŋò#Y2Ĩɣ(C>5J|_W #ܐ Ͽ?`K/o|㐃}ѿv:qN&8- \J3qP92˜Bty▄SG W;]?K"um@^B|$> 87Wd O3zFPn+. mB9XE ǿ~dvN#E+q`b{$ 't h\\6 4`!C+xR駟䩧0ُ"$Č#j=u`F {9"'q$(~J-;R 0з_슻s?K`w9Ӽпd@FJhǹdžX-=gyo}qi}& VfLo-q_z*^Pd-0ΕߛYiJ :,. "Im6M;JIlX*WDR_kMpogիӯ&[{{%b>EDm[wp]5/Ƹ=eiȧ)ojH5)dtӀn˧vTDo{G yqbYw5Dzk-H-,Mv_{Gmdas n[a]6(hK! K C͞gUW]XnT:e8 @t Iݕœ0 D͑3t1N5-㢿N .+tś5;GcڽHϐ! Tejk$&sKٺ>UűlmUsҋ{]Rxa8/zs2N+dAS魲JF !᎘:J/#͘1* -=\WTnw@ew@֪k,\|]w.tHQԫ4+Ih-WhЍnO:BdKxsN{ ;fÛ79|*=\ Β(q$B~HN!N rxˤbTKMj}z?#7Kr-w1`mLT\p8s\\QAm*V^»AqkV!àB T$H2sQ$ːHkjXlg+Q0]Uj!C7=*wQ5@b]11p>qzgA2X~_]r%_~W/}KIǗ._? QI#GD{ [ ƧW}# <)}#=yI85ؐ|bH,U%6%80+IZ? W6܋]"iT.'II2CP#ɀּ M{n KaG%Bx͘[C4dj|4p%nIXGl_a5~rlmXVhZ[q‡y睑۞yUssdS{ĬJ*Ͻv<+ 6=WS¢΂]ϥ\f=RWgs}>.[ x!͒`kKomPe5W 0'mw4wQ%9蠃18qDbd*ߡ}gt_F>.s*2Ǭ{=Rd$=oi89㩜_INa_ZuBxkGF(7#zG?Q9|p}٧vYgum'F[bnI#DV">69 |kqOy{T$T,F ;/{ =FdZl*E,ԉ]Fǎ?f.dN4#K,AAʧkEm(I]~aסT! N8 gHP(c!q͠1m b*@娹dE .c6u]q7id(褆ZZ8EDCx!HbDwQڳԝ.?D.$<>Dg-q'-).=Fi@oɏ58),b  ?1P7(d+Xʞœ \s;ӹ%&-sB6EKjr}.V^u}݆~3|%nIg+hVt#MDO-8iбh#1կʫs[![sN+ŎgcsFF}G(H= =<cC_&w7}}6; lb`qi;FeG޻l^UCK/? ]o/RL[/2]WZ.BZyFK..ۙgIląi5t?{ԁ洟Ķdm/j3g0p(^ʭlg@*:9E(PZ~#fo~* ֙rv;L!+%S>228%xC{eI{a{&k\5xjE&͞{o02㲑$iJ6 yzhw/IDۢ@f/x!4D:ezj[CT'czgM?~Y5f+fbw ]Z ; 5`Sq<%`c~:d)~*.6mMg)HWbN<]9L#S΅~+jq&<kw5WmI(րLf`61>/O6k3HibY2 ĉ{Wܶ8ԙΙ}f7\T]xmU4I"pM|i\VJ$6{$[{z@]JDd~<Վ&٦:(Յe7{+,Hy;:G }Ft`՜׫{c["RnnEnV2f$Xahyw jo^PbI(}q͕uȈEOQ(R+h=any'˯CwXp;I"DF %R"qS[$L.կgqj'>#l1:mڴS<?Iك(7K8Fw}Qy>!.Ԓjab3kcx" s"8gi}XuOJwO:>NܷȇtZ>?Hng<<#!ulIr;H#n+JB.E7!hh\17$M$ ^(ߋ||Un'[݀hb=+"3< ݾMLzow1p}T],JDO]V׿7ķÝt[':lp&$D#Zh/D Y _|Le # Є09R'5.ָȠ0dCubV{3xu3v_U֕Jzbc7 d1#_՚ש[kzwD`k# @#H$8QPyh"Ua~;~ӟ.Z]4PXM)2HjHsO!N峙[ҬZ;3wO^tC2$<'8t]'3u@mo6-krZ% ?Ba+r1䈈j%,rBs=wy'ǹ7ޘ4i&p $JF9Ia8  Ua1U2lB%3=޽GnO""zm2|2=YMݴowzީmMv7 J6m/,1cђ¶5H.ϞъDZ  ?74d=/X4O<8#p9":ٞOH?2'.%9'M3"@0B@BB 8zhQPUf>07|3VZGS[Ǫbjv?% ϕ*VĆRNo* lJي!r0J#=膸rRR]i3ԒRwDEV[1lH]/`7Zl#6#0?el\FxVvTsȕxO?= Q@_H\e-T$\Rw4leY]A{'ds;Zꫯ⸁lyU?7Wivi0$m&|iFHG9'bv_) n6Xl&ւo-xOt:m^J^"Gآ2Xl 9D%iIb0bHΊJH]A$c^>g!/+8\W#;2^C=??X $w&^g_7[R9K\U]vz-`뮚؜{1ѐ3Tjk# {M|3!6&`2xG)/{$hLD a&;A$*z˭sjj1HkBJEӖvUY?~}H'{:0 ՍX+9Am(ȶ~JiPx#z:yժU_$8*N:®~:u{_Ov9G\ ^3l'fl`뤁"7AW*R@13w;dfT{F(Yyb„ H!<61BB)A1|W*Y34e4q3f<唓A59IWxjfzl" b rx4.SLyRhp \\<+΍h%!0$`Tjkmo,p'M9>vj@ =*֓F׶KB D}פzmTUh1lKԠ63g}~{g.Ю*]x]a,Mi0.h9 UHo<pVC|MD OKQHԆ"5j(,m#?!s/Rm@W@ٻl=811B_n=C6_# U!SK ""nHBZ9ϒ!PqTB wr!L$17%ĺ@[M riZmHW8`.-}c=p]8(ύdFVwQ|mԫMB~h)8 A~gT)Yz ~͒Yי!Z]$6Q~ӟJ {r(# |2\@ DCuv sC ~8-0]xkܰ $?{)i[%~LS3 8bI>ʻ{imU\2~K4+E?I"z@1jYCx%IR삾갮SoJatBi&8* 7uҞXo6@L0{W[A*U啣 ?+C![ʀFf";??c|jm+m1 ;P6?񏯹暫{ޏ~#> Md7͍=L c75nq6#82tdqiH۔|Ġ4Be0IJ ɜ-v:odcF,dA1,GiɤH,qxkR@'B\>Ҟ Z.Ge\8Wƥ TF{lJm%X}'Lts"}S̐$ِ΁=¼9LcRKoC tI;Q)) q5#Ӓ$6 xHvš {O"YSڬ1/E||FPm46ma#P10+66 <5U'NJTB8]*=PiFDm$?xD3b\+Iu7/pF"y7NtrB8CU7#B\}6">r)%4e, ! T&NTF|Ѳrf Eҕ2n ՓRBR픲zY""5oM.M+b dbd BHIE/ m&U  0'!;%(\KquE ؇aݱFk>Xtny'cw[Ӧᅬhk1cåЯVþhGG{( v_WɉE /Fp}B!}mQ#vze+,ȍ!) 1/2+m֏7) als67do sN<*G̍d ɓ[jaY+~8`"[Wض:xpcT({_Μ´PRGEb߈9\$%`:)D XA4b𘌅w@qaLk9@v)uVm"q\BH,u]E}Zy @XȊ3@] Dj jU\A~PDy!"uQ<)9RFh2l$f%U҂PU DE qٷTBYh/GNBi (G} 3JhA;N;#i3HO*VZ> h@"0=ԓC6nx'zju+/r6頨{} z p 7Y ͛p7qM8VDc"V5W[+ښb\UsEw!c$ __8~Ir:?8P|GP 9Ym a{~_}l/<|j.M`[fO9ř<9PCV`r10s 0]%3d8Bl cV!-PA#^f@W._qsێ,d&6kLdMD̚}@H~}_@]r ԮYKxT2laѼu\NVX]C Ent R"ZUu-]F"I h5c&b8ׯ?ޅfo5b-=gM+wҧ_T"hw%<7Oǒx__vMZ!*Kިm\m6#RX#_ܚPחZAБ62vD4D2H3Np xDqBHpK /|MB rɌ -_C<1ӯ>[a/8$9%,>"9>ps$V idA9x1!|]{'۩AlSUS>viu !"ҁj(Q1_.G +|q/=k]vroǝwc=jXG84zf 2d ־>54C'n3rƎ\A5nUˮjp0 Cᅶv OQCu5(' sƟ t)i'0@mk8ҶcZ=*,(WU!d2}FUeGXs[`xVjhC0o{tV8!dknk2Hi躁"+'nVޭ+!",{ںZK3fGM6!{1;,7ZR(oC,,X!PyԀ)f0OraFX9'>󬳆o9Br"s/alZUM >qc֦ޔU JȿxjG;-*vĢQB:Gm ,aY|+敮S3q~]Gʁ$mlId|"MT[dnF6LJQEaX !\ɮ u}oORQuZᭇC9QTl8W@I _&Ŝ0{~'?ꩧov2oRYA4s(o)s8kb|6[œepC`H |ЄN-t$,Z>ł# OrG⩐;'0ѢăH_(%T,X%$z.)U'^ꭞNa7o{}z)˱Dϒ"l{؍w ıhӹDo#`@PHmn *Q(`4D$6R .[`ᕀRb:liI>{bD*`$ ߚĄ:`^{ DI%Ӊ  ܟcN"vC#Dp} w/^,#g= f 2wo6PygAh9J?!/yaoL!{ xni\(5r<}`zW̡#nry钳h|]<:_ա{Czw<[({ b:K;G4UV^Ruc@u99cmo`ksUnxP$&Gp[)-@;-^0xu.^j0[‰=4rG~$_B;19AE5: bx~X_,OXvgH4Ko9Gyhthd20ɚ2Dy-iɡ30y ]X豄XC"F6X!o(`WL:HWz=vZTwսGtS=p׉Ĺ{"d<z}z&ccٱ̒S^` /y(RLw%B\g[C(J-C\*k4,`S%: :M߉^M7kAeIfj $H$kiK;vgn/?3>[hgsvaX>`**& SU#O #.H]pml]<{Y_ ZugUmPڒVM\[M%&,{l]]^ l2I6BIs^2Zmv^hrߟrxM~ǟN.oX(S9m8+<vQvpX_|ϧ2ta(Te:ґk EK%P{gK~'?IOEO_\oȻpQ['2N+du#9NL<6i#QiO{{p}g~$j/90?|}ߺܲ~{O}5Up6v#';vxt;CS]DLezu3DÀ\DvM,^gWLMTv 'eM&⵱D&$U`Frv'q1N5 [} ~l%S({;fR~ӟ&G>(u) fmH"T*Vf1rcVS`E:`h< UjXtEe\M^͑j6d yX`o8/8;A'9uu6 peܕ"oX`Sr&Zן1KL; ܒ"W2,K05YIW!Q66Ed2JC|ܱ=:ؘ0r2~$lդSIzEbnM{b]q{F"kJ7xO?ܳnu  'ճ7!. "߽߃pI|@5'a *ʤlU%>߿0 lMa_1F7%b iם^re"v)~y⾻{6nOa$JER\t'{$]v䅛S*'> RGTt\Bв6hI'IlˇTGqNyT;{s݋M ^WEPKٲ>0Wݶ.s}ٵ|s.EKKOᤃ WjvD+FQq bQ͝춟ls~Q8sFx~sQ,Ǣm2\ɑ@5,F>٤GXU<#j "$IYw䲑LUb:i0>ܐLl\j\j\!lc&|\DXrh.Yn,2 lD ]&_.(ax^1To~sW&L-sR]^YmRe-0ԏRwM>Ir'dЕ=7B ["6S&0Tau+`څD+ŜY oyaW5rD">碪F:3# jiHUKlM>@_9UnttG ::VlmmH2Irmf\-'lh!rEeDɾOi Ku!{J.\3a;h{VYY==`L4캂E#-hi{j%DHJ ΥH/ºN>=)cCG ?G_DJ9ρ7-u&%:yK}\ p)eb>7?wA59ܲdrt2.kԉny3.m8 #sXі*tEǶyVC8tA;]a%r W0=$P~=P%<#j}#^[cNb[o^שPnIxƍVgCaF}<{7 nNP2F%ț.:DK~eY?~}|= N$tn8GLlD)K;`2r]8c͡D#Q&iz~vBm,]Y ZD@D.Q&NX>Z2i\!n P̤RDsj*?4d3ꪫv*[gMJ7-$cc1і` @ρ?Nt|}QIbeEZu"{ D{rC9gět dZԟ䮃j !U Yqe@8@ ⓅK'8ɴ\+ :[G<"S؍zĶ^,Il@bcQrEs9{g_FW(3 x^xs _ L0<"u2zX\Hl.sNbgm B].HlNYaЭmM~[eoql|0z~<IK"-R)) D$U Plu弣"7+uuBc2BhI ƃO"L]|7)OhH=J=n\qlp6@х̔E{c>y-Vq&FjmZB O 5>zEM.r_9 SƔRtQsPCb3V[Z??sn QGg091y_K] ͫpY{3W6-ke;8V/2տtR}WM' rދ/~֦Ԓ UE86ݷW]W=`tP|VKC_(x#7'pS{j%Khz]{8dތ^9fE!ź9QVdV(VL1~)cI:~z_|?CZ~.v?|3_&%#eYّJ*֑ޫ[0^Z~Bplo/$':1aCT4JuETS7mSpՀ#j9Ӗ>@9+4PEr-DG.O.EP1Zݛn:JJ..#y| zF7`lm!A|'Xo>Ǎ @tpS-.)F!~DjX2iHۧ*#i5 lH HO>rkhFL-c6){%3--0P 乄Qu]#H %$AQiuKz @ Fh#"kYc#u"mĊ6?l4E5@ yq[]W im`'8|mu2[jVԹ-bkrBN_KZ ?Ї>9wDC[(QYI#d] 8c fa)&9`)@#08d\+@9$%R?g$:{jm'? q=6mu'JƐ8Q*n}azr~Q$ÛK^?c;ԓ;cO8?:c:z!VU mÐ׼MM2 yW @Nh""3ɤNJ2g+& krjRqƃQ+,\}$ٝ1 Jf/6=4e%"1cƢ%DV.BudI&=Uv}w!n{N/ŧN.‡WVRpIPuҲ+$ŽSKH1i Eo5}}b:f x}o(ٯL6ydF9vqYO( f^낝?/\,v.!+VX|f2$mb: hn^.zh Qhq`D.Ju>1Crq 8PI. We c-&yH8vmd@>裑ԞPn OO(ЌF4u9HнbcJU:x@9, 2H4"-cU,N?!l[u  qh"66іbck4bG<PdL6nQnV_x \j-[ $6}&Nƽlo9Boh *Q2I2jMlKF72'V T!b0cWU+)-d: sa{L9#]ĉ)Xig(֨=R$rH3u _-F:r@#QCC.vnxO{ɯ9Eb#QܦPۉ;Q!vFL=FTMz͇q/#FP$ 7zx2^ !ٿw 1u]nI i>S ([&FZM3Ya:AJGurh8ק)5{YDpij[\G`K{#-ru}W?x)_qsNt~&=-֐A6>/ rp*z-BI1..y :<B[9~zOZW5$W!b/x@ A!nA8";+w5ц@i)IY%-dO^S`ucCnl2Uc<#lQ@8?'|rkxG8Pdl]M&+&Ψd˅[^":˼N@&#(;k(Xa7 o{5f,߭ڊ~daDDR!Sչ&W>Y (V/ZP'4S>7̋<ҙwV3{Rw{0k V>hik)O6//(X5I_)G(Ejɐ,g{7! dƒL9,I2&]!_ 8nF={BvjBCgt#)M"4R*1MUgE `xyo5tyE"ְF8tA'w#z󈖍) ED. "d*-ȁVrдaUYTGE'8~gkTDWN#[.8 KA5}Rh}ۺW`;\3-3!E6[~/U(pvs9њ9>d&F֪]غqWm:E8k,x hSqL8sl0:WPn J:!`kO~(ƌƘj6t@=Cw.R Q$A!TRe饨&^|4x ^P SD+NxQ6V^^$>ay)԰&H:8u{Eb+WOzzfkX?"UY>JjQ U 㵌<ĢRob =ʇ|#WEV@y>1!ci욣%( :Ft c!2Amgַ{KjJ`6&D:G]^~^tӒ1bHDw$;6^J5ҫ{YJ# -fV0 u#X\HOX6)p5~̈́# P--ln` %!S|dBQE[2?!Q98b4ҲRu=?[r)͉aҕMl.rLs}bńLB5D'xՈɠDr*ؒRu /*X r-aI ]'R*f%u&D3|znu]|Nx%u(x8A؂s#}s\~$HbnF=uĈ0j&gqNֻz0+180jb4Ih2؄,%l6lk%G v ~ W.\(}Y{?*NX\eREcI-j-&ljI# C<'Ay! #c£& _j -F"2S}ȣ$0Hc E HK̜Y~P+rFPG*bكUZغ;= ؘriPr!3lKI' Q!ڜkMአKI˹65y ߨٙ(N@^@x<@ar@3Ac9:_I27JI>SuL!i!_y0W>< 1$%iG 8ߦ$|P% r;ƲS kYjea%Ȩ.c0϶ج",rJДJEEaMa(e> x"q1`k!/V]x%AL~4zNjzĦ!]aH B*"%žpyv XvKiym5*iyS*^mÑ6G&5_dQQkĎk򧌘!fDPE 6Nke(! m t UY_ 1%6%?yAPp!¤U ]h,!a?)pi47(fND$u4VWJQA;Ed'|2lL<)B<+b9S`+ozB Xr`ʢ )6dnlL"0sPEW1%O"[ٜ]RF$.2(J0pcT1qغfٔ4P9'22ш؃;ZФnC)uLG 8hdwTnMr\҈i|zi$pHU)x#ƹHUîܨBeQ'bCkT{3ރW 'L) ` \) CN<^wd 57qilrIz<}k$d2p!27BQLb5d65*Ƌ`*# 8)1cޚOquJ8$~z뭷@t4KhJ1 i)mګNGlt}$U5OZbա)AxլR8߸s$6s R =}=ѧ-l0tM '8HaT4DcZ6UA ƶ2C H$Sy|$KaN=`'s]̀({ cuhȩ3BFi &((.~?|NHa7Ϋ+b(3 4&R3V2/'BMB$9y; 3w%w؁IHW&M vk-;N(u'ʮΊ )l72PK/rhwS>>mN YC3 AxqzJ+9^xչn7rnb#}ܾ*.fFHɄ oNy(OX.#D)Vn C[GƒI`rXp{Y~˒ae_lp;N[#;1L nx BþjDA*/ &b?L ~ %_;ӟypcguxIg \2p;gM]pU}g<׉`OLʻM`Mڎni4u9('sd㛋ūߚPYUI[\=5 uSlI$9Cw},2Xpawt' ?M*h]-F-t@6Lf,?OBΙ*p9hhLx .B=0gTvw]t"YqO;a)4|E!)}&¡PxH8.l"=1z"R֋ݤLz[o9rB׀a<~0:H hGyT6 z p XO39-\O8Qܽ#HfxC i]( {RDL<3 ͩ27Mgkcd>V,,y{?v^sOn/ݥ\'"΢y]$7y+Ə?7Ru.!B]E-8&2ݦmfW܏Ȏڙg+:GS :>fTATEv%  w\>:%,ˀ*@Umt:v~N=F}Y'cd WaIc~~*b(Yix&,*+#gh.KN0` q;wھP4v4ArOHxʴkrKIsOCWT&-\)9?EL,k/wWezҿ8 wNSpCx$|r!Efw 5+fi5ѺkCaEF`(viɧWYDu]^i|\& O;`uhgT>)Uwk4,TB')^U$6vPWZ@2( R \ 88Y, $ MJnD>YiAr s\?'PJBr y\TUUXH r$!" E[XlyknoVQצck-ek4y-7gEVTy# sDŽjG@e)5jaz2AșZ`ZJ\4xBcDGAg3d $֦Sɕ/$c+SUUDlR\J[TfquޥMEa<G0H3 :`@8Ǎ7Ɍh (^MSāz̥bʯFdž䫅Y)2;xZ6 !5If*L&a˕V}n\+[)|;M\ mps["'mnE_iZ 3k^Ki68FMs DTphhs d_tmCQCVw[0%!djSRCȭ7'cnl7 Ϟ&dmhW՛<<9 sX`B`WЉo%-:L u'P34Ԋ<Y[bFfTE#Df\_$@s,)ڤseO\uik/*{'C:XNIp%q\3a翻:JMg!މy; -qAA _|&y=:i|OerD /<bIlt:f0>A[n 6Zөz*`f\k3nؗ\H7 ey)sPu8lĕ)2b)TF'@db2 |sW$k6x[#pz6ƨhfe 5bO4l }B9Ūj68Hc(_^_*R) . λZpnp[tH'nRBprx~5x|orզ3kQ dhi,^hsoNVq9~wW|g~Z"ϸ%)PWbz?g[y&AJ4V(x׃G*&Bk\ bckYu >Ϣ!q\=VW'XO<Vr1-eC&O|D:}/o+1.!&wBp{H>kaPlhlA`5l]R/Ti8WvЖ$k,B'vPDPHI WH@HI0(w!o;6 &oHL.ݨ&n +[)\F M}q.ot=re&Sr+Kϝ?o̘ ";eۚ֏Q/YlhOeH<$2x ”khOHsoݙz{vy.{o_>qu> 8r㴸x NUK٪4jŢmkȀF"kTZ~c+וօ̻?/$k_ <좮!L{. ;ka'Ly[<|, -|i[a N+VXj 5bԚ4 #ý~AlJ/9cq?(K{6+ÚK.cX0x*ʻDxM\:Ro`覍st$\_8Cwm Q.>Ѓ?g'Mzn$$?śWr}%Ea+>Ts4"n=2“VJf`+?yBQLg퓞`  |D˰vm P4ٍ~ r'U|E8'|< y8V4CE֣,mQLN%CB`:QbfBG3KB~}\ Fm;h{)q1?1B,| oN}l-/9OQ<†҉ Q*؜nY,TJ5K\kAǏil邇8u>qDԳYRhX pRR@"f`I|*k9 oA`H: rl8K-mR oA/'*߬!j3n s.r!Y+iPY)D{G"& ZRt'~ 0iW7R ,ܾ@ۚ:cȩD`#!R` E6^܍Fݖ 5e')[a]J'ʜ`9S4T,Q}#tfka6'Y1a/`e`Ί;d3&:=$Z/ݺ&$bܟ;wdž EpGC?q>߸q#~:p0kX(s X+>4¨s/EȌ-I*lmŀ wF "v%,#RJR~qTΎ$;w.I6O'Q[谮n_$ FoM #P'Re᪇>uA2D6B2cB&~VR# |'BFʄ%;<Uz]W>~5?Nx)Ɖ 30+rUnp N% =`n,RڧI9bU&rª^`9s^j͸d3/=C꼋wf!>=+'P$kvd$rr~m;PbqPrmŐ9X0 "^r=9I6o "io O>UV)L688d!2đ|8p;7 U&k`  k6nt$Ɖ 6]4t5Xc"Msɣ!V9'@Xk-gZH+"~wsI7QS=s7[۰6S,YkX__]_[ KԴW]=Li (i>u`pܸqJ3P&p $cJn+ZVRRBJ"JVWBΨ+]xLg@P}B` C V8C Ix"PM$ 4|l79cV^| $™3}I̮1DV0[Hz 2QLTP0s%c7  Nٽs'>qVX"VP~C;>/w.VID6SzN[~!ӟd&އa-uK:)ðimѨ8f[l@JvmUtdY=R;d>c$y_3V >m`Cv41k.RXϨٻo */O fɂs#~l* 1ɗ&<|##GXSVǵ5d}&S 9U $֎b0Jo6'">__UW"fy c@:Rr#euyn $fQr +#8ȗƘ zo As @d5JZQfE+} p/cqf.@E^Y(|$lIw陨J L(4 ^jn<l^([o9`Yaء 6%E`s 5S_;{*NH#OPID\nҚ-vK:~A=(y*WzG?O, dO4 q[&zxTHGƘ G%Jx3F!Bm@G3]'? LwS'wh7Iڑ•Xxwb~CϩN*$XˉeTϛ3wܽ׀M+)MCrE1ɧޚ=x'FUf#G smTyߙ,P`[t6uaiT[oEDo__~lKM>?L㶙MSxq0,m2)/ i,İJc._ T8ԃsOBRa ]gd0a.!>Bd L{cvbNNPxΊ$$Kga:N{ÙG5Lmp4bȽnsC^Gmq[y{8tÇst68lW%7q}$! `|$Ў`N i5%\'$ ,"hW`VCjQ!1THQ2!Z!NE<6h&4pqu%\*ԙ=ɬ1<Ċkp|jc̣$Kt/4טhժ+W>Q)AΟxg{X2뮉'>3}3wfL2Wgthoi,ͣTaEيuᵶݠLM_ _7x͓g}^F![EK G?S|% \j"XZeE:D=K[1j]ZDF' BEYɝ@d zpQ+vfKnW%:YW 2H:q vNT,r]wQ[p7Sۄ ǯڥ Ƚ<2]&esn֐N2YsunNPpsH:$$x;Mȁ!C Zc3 W24HCb 0" +;Nm Cay$?@S 87sQ 7JQ0I]JJSDӟvd!SwC}(@5 ~l QhCdgoT g޼kϻx-I-Z:5 Kr:Icn>fnR5>ܴiK/Klda_qR]ȵ uig~`%k{Uy/ 4h7?AyGBlKW'.*YP( e"öe]I; I3PFT0\I#)X6Q}mwzM#_au#؜S>xbX ; 3d7i#Y*;*82/x+xם ՚HfW`B" $DE68>#-1!ٱ1B%V7 nB+cug ECIc@Dv>(EToJI0z+9pe"vicTTP)efS`u#oY#%iwXuM'>iޟ3{ѬYNywʔSy&ˮ;RHlK?E ;[Y,ɓcu蘜 _o$4Y|G39\Z#MdܒU ~BcŹ"L(~ S'-4*l+C 7 Z5ʡu0E54+ٚ[Z -9zͷ>ibE$4u${'j7a%;3!yu|4f2i`^ \EX<˃ -c)l5u4$י7?.$-&ilDLWX*(鞻h ȄVS[FiPЋ mT<H%}L8Pfk3QoYb^xyjᓞ{w{jPPuVv5lb5+Rz $6~+ń3H|%1(ꫯyd6gIDp1KctaC7g Ս\w!uy|*nˡ7sMzp- #2[y49*ac0Y*e`#ow_㶣FU'/\yO*-_[pA=Ф)~*rcv(xnUl^y (QȔ6jkQ;%^5 3JoB h=t]<!Xֿz@Xop2x?4>}1d;BeMk?Lgw\p șW{@{\,>Mm~Z '] Y*Ov/7 ' aa/`$) x0a¸V{&My{ֳOS}\4@mJB"4F'ƒ<8I&<‡Orwx-QQ_껐(KaDE ;@FueD5ښ!e;d1 \ &45h_wQ9g8\OɆjPYƐQI΍/+D'!XhgL-B#Up+VLijptW`ȇ~Rx$EkGyg>{o}g/[x¹.7Z`i6%ڃѮ0O}K/_<u+ '"a_167kb0:.*)uLEY?]'|WޒR+(7vV2y0+F%~&Νa€4˚w.2Ip&mXM7.rݜJ1/|_ ^p1ϐ,O0{ԊU+m>|dY"^5o΢>XA7yF@Td\њ-zFsm H2?я~_1qg?׉ZcSfqlϞ~GeDk+} vG<ˬM" I/<ѨQ5%rh'95dn%mg`s'ȯs]`m #;4sL{{5bpr9RW$ij9"@0>uW۬gM yMSGU|CȉaJ$pvY c8dfc 6jmQ}'OE'gn:0ZI0\RBEVJ!,XY0$lQ*. $E :-Q67lp"vx\o*r8| * \T}씸XG5,]]Z<3lִ9vڶg/Y#=k\8G?~\'`&A%N.@7œ{ٯxݑrט+;Cp ~0JcV/+$\a&akO0`45b`f<nYyJ u)ba|ʵT;§r`6Ι'vcKF oX|Ͼ˳xsA&ĚD<1cƂ%KRwn Af@z;b+MIH(pp WpLxp##*s٪fBq{ w '-T-{ D"H Bv# & Q@ɳQBEz# D#'n/r/'zwAHSjq26 CiɬE ]Ht/i"&R[2e~^ȳh WBH&N:4!An4<ȄWjmtw]dQZZVTV.J1,I͎|R@E(WDGy$vOpjCdR `׆ːx0S"`@$  liXa∔% (p@-@="Š$pG~78hv;Ԡ=IE\gxR?@wRR$u}K1bJUB4=?EXϠNVJXam4(mSx=4[c˹) 6jdT_A]SX@2`$ba AKaO@*A3T,~:gwѢ[}G%C1Hb u&-a'zJP-f/ OJky"14f G˙ IFi`U2%eDls31h&A'+WgX6\B?=z̖{9>}%1XPa[tg@H#+ <3 νk1omր$ BbP?cz!@ DAq(@@2/Cs($'.B=muHvq 7Ȯ ȡƃѧJ K0|aH0%4!_<JEA~A/B@{oXK@S!4 RLiry\vn^mv3`+ 2Wy JxL+2u2'=lr3ؖyћt7>>MdF\s$g0{A&Ů'M)r0h6~]phX;n0BvʃXt\f "( Ks q4!Ȃ=t Aԣ$A 8 `$t2bc XuG@j 㑨$EUremfd! 3rA`F W(S駟5;4LY FK:h,-<nI s{ZP<6RmgjWi \P~6d3qe@C~H]~@CkX{(HmD` I HKLR1 Pnh6 ށ%W F<m p΄c0f0O~ Be=/ߋ>rsOO'<f7H[ U)qb5arU]#"sV ''8 i)Hfi#^@@#I zun5Β2uP! A v$؀"_2 ‘STJ9 ;ܮzu }kZ6n6p+m'`r^e%Z h!'C{Mx4jfPo@" Ca,/V>#?ǿqǿqYWѫ|k~|䲣μ} .=7r >MAI9-I hik~( P=#IG/3N9e6ڨaxd\FFٿSfI3~L2>PZ~t܌=e0/>y4N7N^A$bvϱ;p2F>6ջ;ox|%HDhu^Uo= .[> #kv86'њ|Ce(̡mV[|$lvԭq`QA!,xkC"JύIJz "]qQb=cz~R:*ȗvx MڍA`i*ND`F O3F `9uBxIpk3%ڃKV?SI[ypH iM:u\6x9:7xdrXjX254,HK6%$&S[$R%҃ɡ윛Lߴie \Cq/7t 3)E|~HLf k(*ϐߵ-hЈpMw&Ů `zq6'U$<DuTx`* .eo&4w湼):q#[Rl?ͩ"MԞ{ 4?d*n]SFA1ϞvqclR ݘ9k?|W+#zv}˙H]ZP,V,L闌2!c}Ii ^YxU֗?Li!]pBQ!B(   !PFVpHIhG=@9+d/vJZ_d,v"Ch B#(@b12"Ijq@{&j"q .ţ WD!X11aIǰxf Bir8d런4Y:b$Y#9莂zeepS$&$W:PP =6 40@RkOZhrг8\pLBК%a#w3)p<*YhT`3J`c~FgYZZR.fPErG%49A#mLvc0 @rc &ϙ#M6d.EX>Tp ǽl v=B &VrJg'` b1+;\)>Em4l/sfr+漋0+3ҝw假:%~%?9p$111e rӋ.i1:B(O!U5crSЈLV'zVwd= ]U/dEC&*;┫CT3^ A&p,$i: -HNg3H&Za#(nֱH=oh5s%LBSWE&@5i IddȐ+xGBϒTs:666stypDic|uUމ~+#ET6MIk iއs(\V-pqn]ቭR]d$H`#l=[A1L0R 儍ͅhC?yoiO1v&j2 kjxpr;)Yr0jM,fi zp~,殱6ZWȊEubFxœshi *7BѻhYm<򎬴Ʋ rݰ~f8n*"~sy [ c" <ZN΍G+Cy|@ $<.VU#{FP kBtS W~@x^ >0ټ 7v#Jb.մ͚GԥJ :)o)*dʈYנqV _&6YV/&fJ'Ӄ4{Nq-[fuգm`15Ǎ,Bw㫼V<؋sN{ 4/J2dŋW?-VY;>[_G蟍}0kŋE`s,+[[O]sFMR.ytC@Ԅs.rW?]ժGMmD3\W%#Hdԉp TVlzulU J`+f."ЃPAq٣C} 4 ^H?K#x`qsD7` q74$'0yǍ(@P H h i Q(` 6ёi v ZB5TEx/%]  q;mFAA .EN"8 XM/&KPbı Y ud&<⍖b8M9z1h0g iPUٰS+J Vu]&j.[Ĕg @=ܐe;ky?MW}v6k-剋/E]-rYw;2l{"|fSqL9mIlÜ1c&-5Z}ډ]FWօHO[vQoU\Ɓ ڪU$v_t0`m~3;8N!8@ _*ᄋ pxƗ{p\Qm`T \ ;*È1H2Xi6lEF"l`S`.Uaj<('w).舆z5"x4_@f$9$" h~Ď4ٷntt*a Aww:@چT4),FnQp,oG1w}]؜3{O䶃nL]ǟ_&Jkв>|ЄWKzBmlڇ91eCDP(K  ̄gw %!Rr[@R]=!\icc_a1aD*ɒ}g\¡Lم CÆ B ;-K eRES1 N*R4Ս Ԃa4<:/q l4q4ֲˊf-"RS-N-OslQ+rсlzM`v!tjMC@j, :UAK)& 2&x#HU\WR'ɎT#CH+-+5hk̶7)5Od[h=a*pgk ʠUP4H^~ >/ "/B'kn,k[`x"K4N2j&Y,U$(gsʤa2|%jh-(FR IreU\j] ؼOؽG :d֬o1ϊen2p`}ItVÈtbڅ86cVFR֝Ui1Q@ٙޘ"O,(X0pDP? Y xTQ^X,dA rNk1XR6tam'.Rx :i5 ]a"-aq2{T< ֖yqʽQ}!`!Sh Wʸ6o$E% υ[7sUŨGJcUE|dJ /\1@#3HT5DUԘYHl%1Ʌ*AkΜ`]1a+ЦeSFWN;hNږ8#O\'I nl8)w`bdh Q+XBx4J*d&=aJX|<XO(gXBb  ᏘL<YD-VWOiW諳N97~1k o] 3dn=aq䁧vҧ>}ş\}[߻T~:bdEcns` b(J ?qœgFp @f+.@p/kbm"9i9rYMzn~Ȃ}D%ţa@?<K*%hG <: %ĄIh :@c<tJT*Z/*/1gu2գ! t;DVU"a, ŹuN"5qQShxGSEU,N6[ ~ {k NDŇ _%dIPiNΙLb/ KVWeΪ f넧:,ε͍2I{6BsOa)-Y(KtQ@/0]<ihx ~0?G\^QSoiي9CtAggm}ۤ伒} GHCۘ}3)tvt !rqIdam**m(H^>_TXb8K?w~(RNզe[TȽe6|*2wʁ'R,a6ՠ:QIz@WB%xc>tHĆpX),K0Y=*`(bfVi(F 3:ωyXaW+T'kɑmvK"qb3ԁ]W8~`av.='SbȏЂCajuieJ̦<T4ڃT˞6X4E#PFKՀv`ceju.q'pH~m˱~J7ʸjVű5kt\Vw>VNll,NBrO,j(r P֦L|bGx+p`ű^u?Ol1s^)б#'UF=B^qtVp)aQAQ9aA,r<|߹]0ŤJoFtBU,dQ[yP5A=ihPŎ/*\ֵƄ6|2 / '; `*Te`X'h#T2CF&!ߏA9I+)'dBր|eߡ.S8QS"K sxO&( ^PA 0zP@fڸ n!iߐ7Bs~ -WOG@<+ ?t<vR'l#N6V W`U;} 26oܙᄚYλ^{yAz,NXl̹Kw擎l,zD&X3!ۘxRRa?Jf; b([7rL0,",y ksq5s O[H0 XV+)kJTE1ZC)GL4R hM=q#Tů ƧI|dPD5"W&5Yje"r6&rn7K,R]͏Gu"% a!ʁȄX\@p!ȑ loP$ vXQd`6QvvgUEuOOm{fwgFWUzި"AQĈ(Eƈ:]'$'9вњZ3O]iÿd #Zs/~z3Gم7|_N v4SaT1솗 XK`K ڠ8u^&9K  0&ebB&1e/VZDs4Y <~+?d ҇|F]䡘bSfV7S8߼&r@lb|)cg5_*'Kè[َͅ3;)E[TVfT1Dv-=3dX.sX[3>O@3wN|J@ɭ@brşML_{o_0.yH~c?wo#WZ\gqqޏV.߸?bpn"jlQvd@qY㒃ٷ 0a"1ebΒx(џE $&yᔐlJҤɤtE))=E&Z J/7wLJˋ2ا԰Jw }88tXpG?-=,>V]EʄN)_XmN"٧xHD P*k>H5O#;!gg.&|EN|)k&YY9>ѱD*P/O0qWH)g4s\YkubV^aҹvo{] /[ PQ{ƇƦA;f##_\GɨZ* #2b̓;@U%t\43>0OK6OiCi_ꕕ?:cK\L_D͆Qm8L8%Co?o%˿M[uXsd\XC *"VξKlpLأ]Hp%6&ehPvc4$/&Sn7- a~tNS`K73h}{نzQ H>iKW.;ǏMjm統Xm s^?¹Yx¯ndˊ堚 !ȑt B\>': &>G0g e'X~E1OH%a|V_%)T){Y(V֏J=Zս@'Hҷ]_:2{CpE>-8#Eě C~\kVKWQqbJ@a-Lx2c hֆ=6 .IyF)ܦU݃;aq̻ %!1_-.P9ɨ(|sҜC/2ύV\h٘i=hlZcnmmv9h?OmH`* k]hDCt5Z_\x:ZF`ks>ٮ'N} P*gc5XFZp] {Q{̑(dr '(D`49Zǹ?:mЛr~~/$ >AuŶObhmڟeVxKY?4A ^0p>UԢ)(*u@~#b NqEX)5U$; 0IA` 6lKC \`= a5>S+JjO%OTKNR." ĶѦ&,cbuH2Ǣ >Hk5"%0 /y  ` 6!́m2Xd#2ISߦCO`_W>;d;pڄ4) Ob+zlX)&VQE T5TDPZ")JʣDA/=۞aRp{kX|T_ \X6iRQjbj90<A@9Bl#x@6 wzVLܭt=ͻ]y n$A@!1(SA !67$  6&%b  ! 憓A@ƤDLA@7pT cۘT) M-:IENDB`$$If!vh#vh%:V l t065h%p ytP_$$If!vh#v#v#v#vV#vF#v:V l4 6`r0|) 5555V5F54yt 3^$$If!vh#v#v#v#vV#vF#v:V l4Y 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4Y 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4Y 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4Y 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4Y 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4\ 6`r0|)5555V5F54f4yt 3^$$If!vh#v#v#v#vV#vF#v:V l4 6`r0|)5555V5F54f4yt 3^ Document Map*-D M OJQJ^J2B@2 ,vkQ Body Text+xLoL +vkQBody Text CharOJQJ_HmH sH tH NoN S Header Char CJOJQJ_HaJmH sH tH FoF  S Footer CharOJQJ_HmH sH tH bOb S Front Page Bold/$xa$5CJKHOJQJ\aJB'`B Comment ReferenceCJaJ4@4  Comment Text1@j@@ Comment Subject25\:02: - List Bullet 3 & F(>6B> - List Bullet 2 4 & F)xoRx ~LHead145$$$ ``dF ^``a$5CJ$OJQJ_HmH sH tH d@bd Jz- List Paragraph6d\$^m$CJOJQJ_H aJ8Oq8 Jz-apple-style-span>o> 9 g Body CharCJOJQJ^JaJ\o\ 8 gBody9xx1$7$8$H$$CJOJQJ^J_HaJmH sH tH o ;q8Normal + Times New Roman Char,12 pt Char,Black Char CharCJaJ~O~ :q$Normal + Times New Roman,12 pt,Black ;7$8$H$CJOJQJaJFoF  E0Plain Text CharCJOJQJaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~^= pp002 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ ;INormalOJQJ_HmH sH tH Z@Z z Heading 1$<@&5CJKH OJQJ\^JaJ d@d ]W Heading 2$ x@&B*CJOJQJ\]aJphN@N z Heading 3$<@&5CJ\^JaJR@R z Heading 4$<@&5CJOJQJ\aJN@N z Heading 5 <@&56CJ\]aJP@P z Heading 6 <@&5CJOJQJ\aJJ@J z Heading 7 <@&CJOJQJaJP@P z Heading 8 <@&6CJOJQJ]aJF @F z Heading 9 <@& CJ^JaJDA`D Default Paragraph FontRi@R  Table Normal4 l4a (k`(No List FOF ( control-name 7$8$H$OJQJbob (Default 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH >Z@> <(0 Plain Text B*^Jph:O: IDefault1 B*^JphROR 5 Control Heading Name B*^Jph6@6 -6WHeader B*^JphB^@B 6W Normal (Web) B*^Jph~ob~ S61title9$$$ pdH]^a$5CJ$OJQJ_HmH sH tH jsj S61 Table Grid7:V0<m@< ^Z1 / 1.1 / 1.1.1 FDOD ^ZStyle1  & F5CJOJQJaJZoZ zHeading 1 Char&5CJKH \^J_HaJ mH sH tH LoL ]WHeading 2 CharB*CJ\]aJphN>@N * Title$<@&a$5CJ KH\^JaJ R`RC BpTOC 1 $ xx5;OJQJ\mHnHu:@: TnpTOC 2 ^ :OJQJ6U`6 u]0 Hyperlink >*B*ph4 @4 .u]Footer !<@< J-TOC 3 !^6OJQJ]>@> J-TOC 4 "X^XCJOJQJaJ>@> J-TOC 5 # ^ CJOJQJaJ>@> J-TOC 6 $^CJOJQJaJ>@> J-TOC 7 %^CJOJQJaJ>@> J-TOC 8 &x^xCJOJQJaJ>@> J-TOC 9 '@^@CJOJQJaJH@H y Balloon Text(CJOJQJ^JaJ.)@. 8 Page NumberRY@R x,JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] R871;<0*RTGT %TTXXXcpppsc y l I  Hp5_-~* !:")#0$$%h&!''c( ))**+1,@-/28467A#CCDeEFYHJ\LNSVzY\5^_cfj%lo%qrswy{uLhĕ͛9cסcTr2Tl:OF}OA<W Jx' "$O'/25=@FJK[ORUX7YG[\6^L`cbVhij5nsvw~&O"Ů3)IPb8>IR !"#$%&'()*+,./0123456789:;<>?@ABCDEFGHIJKMNOPQRSVbcefghijkmnopqstuvwxy{|}~   %( '#0,CCC@DHDWD`DiDtDDDDDgEGWetDLie ."-"8DRjYtdpYaޟHrAZ Bn"/uN[HM R-=LTUWXYZ[\]^_`adlrz   !"#$&')3YZz9UWXZz,HJKMm$'(*Je1MPQSs 1Kgjkm#&')Ig,HKLNn   0 k  : V Y Z \ |     4 P l o p r   0 3 4 6 V {  N j m n p 8;<>^w?[^_a,/02Ri:=>@` 2t;WZ[]} %()+K|Lhkln=Y\]_ '*+-Mp+GJKMm   -b~3679Y}!$%'G 2Sorsu#?BCEe5Milmo"%&(H_{~ # ? B C E e ! ! !!/!P!l!o!p!r!!!!!!!! "'"*"+"-"M"k"""""""""""#0#L#O#P#R#r########$$$$;<&<. > @ R X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%ĕX%X%̕X: !%,/X_cjls!!!!!t 1=,b$!^JBsI|T@H 0(  D0<(  P  # #" ?&8t ],  S"?%V  # ",V  # "],8t Z5,6  S"?$V  # "Z5,5V  # "5,6P  # #" ?#P  # #" ?"P  # #" ?!P  # #" ? P  # #" ?P  # #" ?P  # #" ?P  # #" ?,t ]  S"?P   "P   "],t X56   S"?P !  "X55P "  "56J #  #" ?J $  #" ?J %  #" ?J &  #" ?J '  #" ?J (  #" ?J )  #" ?J *  #" ?P + # #" ?P , # #" ?P - # #" ?P . # #" ?P / # #" ?  0 <0#" ?   1 01#" ?  2 ^@ABC EF @`s"*?  3 X@ABC EF @`s"*?  4 ^@ABC EF @`s"*?  5 X@ABC EF @`s"*?P 6 # #" ? 7 07#" ?  8 68#" ? P 9 # #" ?P : # A?#" ? ; 6;#" ?  < 6<#" ? B S  ?  !"#$%&'(R8M 1D5t7 p'%.t1$ t:MLqt;) I&t< c t9 'Kt6 52'w*t5> -t4 -t3> -t2 -t0"% t/ 2'P t.LB{ -t-"t,`g t+e*t*,0 f0t)/ /t(,0 f0t'/ /t& t%@ z t$ t#@ z t / f0t z t ,00'f0t /0'/t ,00'f0t /0'/t  0' t @ 0'z t  0' t @ 0'z t      !"#$%&'()*+,-./0123456789:;<=>?@ABCDENKLIJO\QRSTUVWXYZ[H]^_`abcdefghijklmnopqrstuvwxyz{|}~ /0'f0t  0'z tk I0<'D5tCheck35Check36Check133Check134Check135Check136Check81Check82Check83Check85Check86Check87Check88Check90Check91Check92Check94Check96Check101Check102Check103Check104Check105Check106Check107Check70Check71 _Toc243448065 _Toc311452427 OLE_LINK3 _Toc243446809 _Toc243447159 _Toc243448066 _Toc243448274 _Toc311452428 _Toc243448068 _Toc311452429 _Toc243446812 _Toc243447162 _Toc243448069 _Toc243448277 _Toc311452430 _Toc243448071 _Toc311452431 _Toc243448072 _Toc243448280 _Toc311452432 _Toc243448074 _Toc311452433 _Toc311452434 _Toc243448077 _Toc311452435 _Toc243448079 _Toc311452436 _Toc243448080 OLE_LINK1 OLE_LINK2 _Toc243448082 _Toc311452437 _Toc243448084 _Toc311452438 _Toc243448085 _Toc311452439 _Toc243448086 _Toc311452440 _Toc243448087 _Toc311452441 _Toc243448088 _Toc311452442 _Toc243448089 _Toc311452443 _Toc243448090 _Toc311452444 _Toc243448091 _Toc311452445 _Toc243448092 _Toc311452446 _Toc243448093 _Toc311452447 _Toc243448094 _Toc311452448 _Toc243448095 _Toc311452449 _Toc243448096 _Toc311452450 _Toc243448097 _Toc311452451 _Toc243448098 _Toc311452452 _Toc243448099 _Toc311452453 _Toc243448100 _Toc311452454 _Toc243448101 _Toc311452455 _Toc243448102 _Toc311452456 _Toc243448103 _Toc311452457 _Toc243448104 _Toc311452458 _Toc243448105 _Toc311452459 _Toc243448106 _Toc311452460 _Toc243448107 _Toc311452461 _Toc243448108 _Toc311452462 _Toc243448109 _Toc311452463 _Toc243448110 _Toc311452464 _Toc243448111 _Toc311452465 _Toc243448112 _Toc311452466 _Toc243448113 _Toc311452467 _Toc243448114 _Toc311452468 _Toc243448115 _Toc311452469 _Toc243448116 _Toc311452470 _Toc243448117 _Toc311452471 _Toc243448118 _Toc311452472 _Toc243448119 _Toc311452473 _Toc243448120 _Toc311452474 _Toc243448121 _Toc311452475 _Toc243448122 _Toc311452476 _Toc243448123 _Toc311452477 _Toc243448124 _Toc311452478 _Toc243448125 _Toc311452479 _Toc243448126 _Toc311452480 _Toc243448127 _Toc311452481 _Toc243448128 _Toc311452482 _Toc243448129 _Toc311452483 _Toc243448130 _Toc311452484 _Toc243448131 _Toc311452485 _Toc243448132 _Toc311452486 _Toc243448133 _Toc311452487 _Toc243448134 _Toc311452488 _Toc243448135 _Toc311452489 _Toc243448136 _Toc311452490 _Toc243448137 _Toc311452491 _Toc243448138 _Toc311452492 _Toc243448139 _Toc311452493 _Toc243448140 _Toc311452494 _Toc243448141 _Toc311452495 _Toc243446885 _Toc243447235 _Toc243448144 _Toc243448142 _Toc311452496 _Toc311452497 _Toc243448145 _Toc311452498 _Toc243448146 _Toc311452499 _Toc243448147 _Toc311452500 _Toc243448148 _Toc311452501 _Toc243446892 _Toc243447242 _Toc243448151 _Toc243448149 _Toc311452502 _Toc311452503 _Toc243448152 _Toc311452504 _Toc243448153 _Toc311452505 _Toc243448154 _Toc311452506 _Toc243448155 _Toc311452507 _Toc243448156 _Toc311452508 _Toc243448158 _Toc311452509 _Toc243448159 _Toc311452510 OLE_LINK4 OLE_LINK5 _Toc306192404 _Toc311452511 _Toc306192405 _Toc311452512 _Toc304965039 _Toc304965129 _Toc304965219 _Toc306192406 _Toc311452513 _Toc306192407 _Toc306192408 _Toc311452514$$O+00000::<<<<<EKEKNNNLQLQTWW^^b-e-ekk7s7syyJ~J~ՀՀ@@qqٷٷ\\88>>{{zzLL::PPggMM``Z Z   zz ! ! ) ),, - -55==BBAGAGPPRRTTUUZWZWAZAZW`W`aaeealaloovvaaaaar44))QQrr&&EE  D D D E E  S  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~***************************/$/$V+00000;;<<<<<KKNNNOQxQTWW _ _cCeCekkWsWsyy^~^~͓͓RRBBppRRkk~~OO{{>>bbww..     ! !=)=)--_-_-%6%6==BBYGYGPPRR1T1T%V%VwWxWQZQZy`y`AbAbee{l{l&o&oTvTvaadq  ԢԢææXXGGprv@@Ia''- - E E E h h  <<Sv&w&++==KKPQ Q-Q-T6T>??IIPPRRZZ:\E\U]`]^^``iiqq#u+u:B`bfn  :;GI04$v}abKMNPQSTVWPS..AAQ Q.Q0QUU-YEY Pz59uZWmWYYYYaaff٘ޘ&5KMNPQSTVWPS333333333333333333333333**tu9X,K(e1QKk'g,L k : Z  P p  4 { N n <w?_0i>t;[ )|Ll=] +p+K b7}%Ss#CMm&_# C !P!p!!! "+"k""""0#P####$$$((**////0 0/0001020:0:0v0v0w0x0|0000F3b3e3f3::::|>~>?*?-?.?cc ²gh aai. A JKKMNNPQSTVWbbc{ :PS**tu9X,K(e1QKk'g,L k : Z  P p  4 { N n <w?_0i>t;[ )|Ll=] +p+K b7}%Ss#CMm&_# C !P!p!!! "+"k""""0#P####$$$((**////0 0/0001020:0:0v0v0w0x0|0000F3b3e3f3::::|>~>?*?-?.?cc ²gh aai. A JKKMNNPQSTVWPSL^4̀3mA=.fE$eH$[}B%VR;&7xb:',k'P)v"k)*lO+Hz>[`+|c)-h -o"k.fD 2N)"}2|ޜU4 ur+\7|z]Dp)7Xf_9x j;1U?B#ZK?|no@~F,'J:<uK>x#LYJB(Q™|hT `6U 9Vq[r]Thr"/]T9e_7,pa 5/Dad(ra$]%&b8*5cʦԈ9g V{ i|hj5 5kxmJ*\ntJFnu0!ox Jw5pN8qzKyqxAs&~IBug:u@B=y$ %CzѰn}m`<~TB p(2 ^`OJQJo( hh^h`OJQJo(88^8`OJQJo(phhH^`OJQJ^Jo(hHo  ^ `OJ QJ o(hH  ^ `OJQJo(hHxx^x`OJQJ^Jo(hHoHH^H`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`CJo(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`)^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh00^0`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHhpp^p`OJQJ^Jo(hHoh@ @ ^@ `OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJ QJ o(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh ^`hH)h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h ^`hH)h^`OJQJo(hHh pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hH888^8`B*OJQJo(phhH8^`OJQJ^Jo(hHo8pp^p`OJ QJ o(hH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJ QJ o(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHop^p`OJ QJ o(hH@ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHoP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJ QJ o(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hSummaryInformation( DocumentSummaryInformation8PMsoDataStore4#wP 6w3WCGU4OJXOQ==24#wP 6wACCESS CONTROL POLICY AND PROCEDURES Tracy Brown Normal.dotmDSS4Microsoft Office Word@n @j@ji@\v6%O& _Toc3114524443b_Toc3114524433\_Toc3114524423V_Toc3114524413P_Toc3114524403J_Toc3114524393D_Toc3114524383>_Toc31145243738_Toc31145243632_Toc3114524353,_Toc3114524343&_Toc3114524333 _Toc3114524323_Toc3114524313_Toc3114524303_Toc3114524293_Toc3114524283_Toc311452427_Toc3114525003_Toc31Item  PropertiesUCompObjr _Toc311452488  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89qH^`OJQJ^Jo(hHoPP^P`OJ QJ o(hH88^8`OJQJo(hH^`OJQJ^Jo(hHo  ^ `OJ QJ o(hH  ^ `OJQJo(hHxx^x`OJQJ^Jo(hHoHH^H`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hHh88^8`OJQJo(hHh pp^p`hH.՜.+,D՜.+,P  hp|  DSS= %ACCESS CONTROL POLICY AND PROCEDURES Title@ 8@ _PID_HLINKSA[1mailto:Joseph.smackers@xyz.com2 _Toc3114525142_Toc3114525132_Toc3114525122_Toc3114525112_Toc3114525102_Toc3114525092_Toc3114525082_Toc3114525072_Toc3114525062_Toc3114525052_Toc3114525042_Toc3114525032_Toc3114525022_Toc3114525012_Toc3114525003_Toc3114524993_Toc3114524983_Toc3114524973_Toc3114524963_Toc3114524953_Toc3114524943_Toc3114524933_Toc3114524923_Toc3114524913|_Toc3114524903v_Toc3114524893p_Toc3114524883j_Toc3114524873d_Toc3114524863^_Toc3114524853X_Toc3114524843R_Toc3114524833L_Toc3114524823F_Toc3114524813@_Toc3114524803:_Toc31145247934_Toc3114524783._Toc3114524773(_Toc3114524763"_Toc3114524753_Toc3114524743_Toc3114524733_Toc3114524723 _Toc3114524713_Toc3114524703_Toc3114524693_Toc3114524683_Toc3114524673_Toc3114524663_Toc3114524653_Toc3114524643_Toc3114524633_Toc3114524623_Toc3114524613_Toc3114524603_Toc3114524593_Toc3114524583_Toc3114524573_Toc3114524563_Toc3114524553_Toc3114524543_Toc3114524533_Toc3114524523_Toc3114524513_Toc3114524503_Toc3114524493_Toc3114524483z_Toc3114524473t_Toc3114524463n_Toc3114524453hh @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh ^`hH)h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH hh^h`hH. P^`PhH.. ^`hH... x^`xhH....  ^`hH .....  X@ ^ `XhH ......  ^ `hH.......  8x^`8hH........  `H^``hH.........h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH88^8`OJQJo(hH^`OJQJ^Jo(hHo  ^ `OJ QJ o(hH  ^ `OJQJo(hHxx^x`OJQJ^Jo(hHoHH^H`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hHh88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh ^`hH.h   ^ `hH.h  L ^ `LhH.h xx^x`hH.h HH^H`hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h88^8`B*OJQJo(phhHh^`OJQJ^Jo(hHoh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH^`OJQJo(phhH^`OJQJ^Jo(hHopp^p`OJ QJ o(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJ QJ o(hH88^8`OJQJo(hH^`OJQJ^Jo(hHo  ^ `OJ QJ o(hH  ^ `OJQJo(hHxx^x`OJQJ^Jo(hHoHH^H`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`5o(() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`OJQJo(^`OJQJ^Jo(o v^v`OJ QJ o( F ^F `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o V^V`OJ QJ o(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh88^8`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJ QJ o(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJ QJ o(hH hh^h`hH. P^`PhH.. ^`hH... x^`xhH....  ^`hH .....  X@ ^ `XhH ......  ^ `hH.......  8x^`8hH........  `H^``hH.........h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`B*OJQJo(phhHh  ^ `OJ QJ o(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJ QJ o(hH^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.MpaIBu_9no@|~}!'JSA - j;hTC0H5/Daq[}B%6kI "mk'P)r"/]:u"}2Dp)7n} %Cz>$*\n]N$iN8q!o dyq<~~Q ZK?e(raJFn 2 xm uK 5k  mA AsmAR;&*5cx#LB(Q9Ve_w5pc)-c"k)U4hj9gb:'=y}$b %&b iMYU?+\7lO+[`+k.6U`*)ǚ`F1)LL5V        Ld                                            5V                          5V                                                                                                                             5V        5V        5V                 5V                                   5V                                   5V                                                                                                                                               5V                 5V        5V        5V                                                                                         5V                                            {!1nl38FaOG0vI}?]LegRR30bV`JZ^NP[m3\<:\ki%^pv7r  N.<048;,= DDGE*FM8VmWsjkmo9pLzz< 7U.9998GOUJ_gpi} b<%]fh} ( 4FIy4ObfZnX~G  %7LFV^Rpp-q4cj(?MvOQbefXotxy$ %N&'.:XFdV~{'@:A9OQQ]CddWezfg5v" 96 N f ?j H 2 = @ D I Gh k q .t _z < & 8 = K> J S \ wd m >r ' $  0 I8 S X X h | " S * A G AP Q x  i'0"@}D|Muw *.g7R8=CGjIe^`2z $9EfH VXlho1'o(eHbnix Y!G+-6FK[Rp-Df%lrzhi&(:<<<NNR4abACHKU<^jgqnw 11 cej{{H)G IIuLYaap$(!1<CJpMx$@$99:IzK\{   (,-^2:C V]bhku|z#/J( .57;E5Sm nz 3 ""017`vV&ou0POZ\gw>V v%&|>zArL'g  1  ? )C G L %Q S >[ ` f =l m o ! !!CG!'c!s!u!" "$"i0"1"O"\"|"" ## #-#!1#O9#A#$1$r$'$3$K$qQ$X$-Z$a$Oc$Gs$%k%!%,%-%1%7%V%YW%fa%@j%q% t%Uw%i&b'&/*&rI&P&xT&yU&+[&\&e&Qq&*'"'$'` '5'C'6D'I'&S'3V' p'p't'.z'z' ((F(#(((/(G(tJ(L(6T(](!`(k(v(y({(/}(f)u))*)b6)G)H)O)FP)CS)6Z)p).r)*"***2*p5*?*Q* U*c\*d\*++#+%-+;+N+mO+U+d+ri+?x+ ,,g0,G:,H,Q,x,},-N- --D-J-N-P-cX-Z-_-im-8n-v-Jz-z-. . .%.".5.77.7.o9.:.TI.I.Q.\.\e.{. / /v /F/)_/r/ow/S0"0{Q0[0o0/q0u01 111S61w=1>1SB1(a1}12 2 2222(2v,2,E2N2T2EU2MW2d2Up2l,3k0323b4373:3@M3Ns3u{344(4*464G4W4va4k4qu4x45555G5V5i5q5 ~5-6:/6/63656@6cC6KK6DP6SW6_6:n6q6s677 7E7;7>M7#8 88n"8mU8j8r8z8oz8r9 999&949C9{E9E9G9GO9U9v9 ::W::HT:lT:`:o:ft:t:;;; X;a;#c;;i <<$<-<<<A<E<OH<M<T<q[<g<6h<{<{< <C=+==!=%=-(=-=2=|5=+8=E=(G=O=S=p=0><>?>{A>g>m>is>w>i???$?$?J9?C?M?RS?l? @@ 4@?@G@[@b@hr@AAVTA`XAmA~AC BB'BHB JBKB`BeBHfB2sBB C" CC%C-C4C?C`ACKCrpCNtC'wC~zC{CDD8!DU'D>0D6D9DCDXDaD$E?ErE%Fu+FQ4F+7Fl@FwCFYF[F`FTfFkFGGt)Gy-G/G5GGGeGDfGvGwGnH HHHgHj!H"H$HR3H[>HyTHTHjHlH^qHI8 I*I4Il7IiIpIj{IIJ#pJuJzJKK(K.KOKVK3]KeKgKrKsKuKLdLoL%L7Lb>LDLGL;IL ML*QLd`LdL~L9MM0 M M(MOGMTMtMuM5NSN NJN.QNpvN4OO'O0O CO1NO%WOHWOgOCvOPsPP**P<*P>1P>P>PHPRPGXP]PfePxP'}PQO Q_Q&Q,Q8Q9QBQ_QvkQvQ R{RRR}2R[R^RS{SLStTSiVSXSXSTZS[SbSvS{S}S T*TTSTXT@tTyT U*USAUDU EU-ZUifUkUwlUonUtU?VVpHV&IV2YV]VbVQnViW+W .WW1W6W!7W8W_WgWnWuW XX6X'XP0X9NX_X|wX\Y_Y=Y?YLYojY}Y\Z Z Z4ZZv8Ze9Zj:ZTZ ^ZcZ*fZSfZsZa[[[Y"[11[=[E[L[S[a[o\\&\8\_N\nP\2[\]6 ]]V]]j"](]3]*5];]C]c]u]_}]^;^"&^ +^ 3^U^V^.[^_z6_6_B_pC_[jBxj k$k&(k*k.1k2k-7k8kWCk{KkNkVkYkhkjkzkoll l;l&l+l6lgBlJlNlZl(alel}llZmmomBmm-mLT[\='wHKKT flmsnwW *=HMZ,^Jot>{-1sCV,\|} V !5.m67;@~^l!qtq{}5He &uBCFoUfm%` u$E0*6:KQfwx%j+<kLNO\T]emn 3K7F0OwPtZ`5dwxZ 0 $P8FIZb?d~!&u6k>CWg}d  N%(+-C8Ps{~+ , !v6FQWZ[ bjik !>KYZ+:Lz(=G!UltB"4 8q?~@`z^#0n9:Gqt+x,.=MiuuD%/'( +.T9:+;2<`@RMPBS-Ts|z %"&@'S*BMR_f$6"%F'40>IH_VBZ[t 1CP^l/rsN f)d/O7c9V;@@_`Sl}}r#z16DIN)`qxdyq!:39L VuWq}Q!"Y'^(Gbf46<P/X%c(ekh;ms l';%CQ0YiijjmH 5!<=BIQUlaat)4FW %}-8NB\OVv`cy2z-=KN|Ypty n44o;?:BT_y .W1f57Z?FTWYi(T".'Al\i*[>A_Ojdu19:o:MTW``5o t~ IU)1~DIRlW(_yl 5158<Os{:<Q.X \>cL^%&+@@Yp rr}1iXgimtHx6{C\!!;q=;@RKTRUVda y\.46M;fXtwz`(0?\g{+7%8FV](+k6@N;h oat[ &KMUaZaZj KB# **.c2MgSmm/: '5q67IPjQm`.bet"8;=YQR])xfY4c7B>@XnYbo'r*s!?UhYQ]zg~(:+FL[QMcfgyith #%O(?MPejkxz{ ?F#G..jNo"3t:NNWb`@aocruTiG75FI,MN:huyf~khC-g;FbbgptvvJy\j {|}!";JQOsz.!5^gmL!018?Qj1|#]9}@DEko}0*0l6 CGDI.\Rbhri+pqr=&@gG}y6?DIuSV|jk@o}B#H z(H\h%ou-w+n(!@O[[cq'!*&,5>gF GSdl`#88;G-U[u/v1 7/0H8Zqsx3 B q?HMR]Sx\ mGm]oqssJt u~"b#&2 E4Ias?Gwp UDO>SIt!"Q$2(*5J=@BL]amcd ilu! L./;55< @CTc'k[o%\$>W\h+-13IDReboszh_ $(v./PP9Q\x{! m/G:P:O Rj J  l(*7#9;=0SSkl 8J\OTqc|f[o3s"tGtF >9i;ETl"{1&t3=yC ]dvT !+.~JSV`l=+z+5BJ^RV]^CajmU;(,084WoWoR*A,4=j?zGSanMu#xZzr q4x:>UHP Sd"b 1RwUmfS#&&HOadLk >CGIGsc{~ @W|XZ`ujS /:PE!Xpx}NB#;\>vyO?4?IJ} 2n2=5AGX ^y`bkh|n 0<>nKM@djjjR@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.@ CalibrimWingdings-RegularArial Unicode MS3Swiss5. .[`)Tahoma;. *Cx Helvetica?= *Cx Courier New;WingdingsA$BCambria Math"qh;BgBg&]%O&6%O&624== 3qHX (M! xx $ACCESS CONTROL POLICY AND PROCEDURES Tracy BrownDSS<L                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 45 6 7 8 9 : ; < = > ? @ A B C D EF G H I J K