ࡱ> Y[RSTUVWX'` fbjbjLULU 8.?.?Ŭ'3F    8X\b:"888QJUTAW!b#b#b#b#b#b#b$ehhGb:dHQ:d:dGb ( 88/\bHoHoHo:d4 88!bHo:d!bHoHo 5>&!S8 0r8 2gDFX rb0bF4 hvlh!Sh!StW[Hoo^,`WWWGbGbn*WWWb:d:d:d:d$   4 4 4       TABLE OF CONTENTS DAY 1 PAGE SESSION 1: INTRODUCTION AND BACKGROUND ...................................3-8 SESSION 2: DEFINING SEXUAL ABUSE AND EXPLOITATION .................9-11 SESSION 3: APPLICATION OF CODE OF CONDUCT.................................12-13 SESSION 4: POSSIBLE POINTS OF ABUSE & EXPLOITATION WITHIN THE SUPPLY DISTRIBUTION CHAIN .....................................14-15 SESSION 5: REPORTING MECHANISMS AND INVESTIGATIVE PROTOCOLS .......16-18 DAY 2 SESSION 6: RECAP OF DAY 1 .................................................................19 SESSION 7: TRAINING THEORY AND METHODOLOGY ............20-21 SESSION 8: DELIVERY.......22 SESSION 9: TRAINING TECHNIQUES.......................23 SESSION 10: PLANNING AND EXECUTING A TRAINING EVENT.......24 DAY 3 SESSION 11: RECAP OF DAY 2 ...........................................................26 SESSION 12: TRAINING PRACTICE ..........................................................26 SESSION 13: NEXT STEPS ....................................................................27-28 SESSION 15: EVALUATION .......................................................................29 ANNEXES: REFERENCE MATERIALS OPTIONAL EXCERCISES: ....................................................................30 HANDOUTS........31-50 BIBLIOGRAPHY............ USEFUL DOCUMENTS INTER-AGENCY STANDING COMMITTEE FINAL REPORT UNIVERSAL DECLARATION OF HUMAN RIGHTS WHO IS DIDIER BOURGUET ARTICLE SECRETARY GENERAL BULLETEN INTRODUCTION The international humanitarian community has recognized sexual exploitation and abuse as a global challenge in our working environment. In doing so, humanitarian actors have taken crucial steps in protecting vulnerable groups from such abuse and exploitation by defining standards of behavior for all humanitarian staff and partners. The humanitarian community further recognizes that all emergencies including conflict which normally results in displacement or natural disasters which result in food insecurity often erode and weaken social and political structures that are designed to protect members of the affected communities. In these circumstances, women and children have been found to be the most vulnerable to various forms of abuse. In such conditions, it is noted that abusive behavior thrives in secrecy and that no community or organization is immune to such behavior. Hence, special attention must be given to creating a transparent and responsive approach to deal with incidents of sexual abuse and exploitation within our working environment. The Secretary Generals Bulletin on special measures for the protection from sexual exploitation and sexual abuse (ST/SGB/2003/13) applies to all staff of the United Nations and lays down specific obligations for all UN staff and partners in relation to sexual exploitation and abuse (SEA). Each UN agency must ensure that its staff are aware of the policy and have selected Focal Point(s) and/or Alternate(s) to take reports pertaining sexual exploitation and abuse. To achieve this, in 2003 the Inter-agency Standing Committee on Prevention of Sexual Abuse and Exploitation (IASC) offered definitions and standards of behavior and terms of reference for focal points and in-country networks. The standards offered by the IASC require managers at all levels of the UN agencies to ensure their staff are aware of, understand and commit to the standards of behavior as well as establishing of reporting and investigating mechanisms which support their implementation. In support of the SCs Bulletin, WFP issued Executive Directors Circulars to facilitate the implementation of the Secretary-Generals Bulletin in January 2004 and February 2005. In February 2007 another on Policy on Harassment, Sexual Harassment and Abuse of Authority was circulated. These circulars commit WFP to ensuring that all its workplaces are free from such abuse and immediate action is taken should complaints of such behavior arise. They also outline the roles of managers, supervisors, and focal points, as well as define the chain of reporting. To reinforce these edicts, WFP Kenya has initiated a programme that will not only ensure all Kenya staff understand the UN Code of Conduct and commit to it, but also strengthens the existing reporting mechanism. This programme is designed to ensure that staff at all levels is aware of the reporting mechanisms, while management have clear and transparent steps for dealing with such incidents. The programme will support and strengthen existing Focal Persons to carry out their roles and responsibilities in terms of receiving and processing complaints, develop prevention strategies, ensuring victims receive relevant support and disseminate information. DAY 1 SESSION 1: INTRODUCTION  Ground Rules Cover the following housekeeping issues: The schedule and the importance of being on time. Location of meals, coffee and tea breaks Location of toilets. Switching off telephones. Importance of attending the full training. Expectations and Fears This exercise seeks to enable all participants to explore their fears and expectations, while the facilitator clarifies training objectives to facilitate trainees focus on unrealistic expectations, while ensuring expectations are met.  General Aims of the Workshop This workshop aims to: Create an understanding of the issues pertaining to sexual and other forms of exploitation, in order to develop mechanisms for strengthening and enhancing the protection and care of vulnerable groups in humanitarian crises. Explain the background to the problem of sexual exploitation and abuse of vulnerable groups in the humanitarian context. Give the participants an overview of gender-based violence and how it relates to sexual exploitation and abuse. Discuss factors that contribute to, and the effects of, sexual abuse and exploitation in the context of humanitarian work. Create awareness of the six core principles proposed by the Inter-Agency Standing Committee to guide the behaviour of humanitarian personnel. Build the capacity of staff to carry out training for the protection of vulnerable groups from sexual and other forms of exploitation and abuse. Create understanding of preventive and response principles. Specific Objectives By the end of the training programme participants should be able to: Explain the various types and contexts of sexual exploitation and abuse of vulnerable groups in emergencies. Explain and rationalise the core principles for standards of conduct and the obligations these core principles create. Describe the short and long term effects of sexual exploitation of children and women and highlight prevention strategies. Identify possible points of exploitation and abuse within the supply and distribution cycle (how they happen, at what point within programme implementation, supply and distribution chain) and identify potential prevention methods. Explain and apply mechanisms and procedures for reporting and investigating sexual exploitation and abuse. Highlight steps for preventive and response mechanisms Discuss and compile a needs analysis and tentative training proposal for WFP Kenya Country office. NOTES:................................................................................................................ BACKGROUND Towards the end of 2001, Save the Children Fund and UNHCR carried out a study in refugee camps in Liberia, Guinea and Sierra Leone. The study revealed that children and women were being sexually abused and exploited by people working both within and with the humanitarian aid community. The report was disseminated and caused a public outcry. An Inter-Agency Standing Committee was set up. It consisted of 17 leading agencies and NGO consortia and provided a good mixture of todays composite humanitarian world. It included full members, (FAO,OCHA, UNDP, UNFPA, UNHCR, UNICEF, WFP and WHO) and Standing Invitees (ICRC, IFRC, IOM,RSG-IDPs, OHCHR, World Bank) and three NGO consortia, the Steering Committee for Humanitarian Response (SCHR), Interaction and International Council of Voluntary Agencies (ICVA). In a 2002 report, the committee recognised that the problem was global, founded on unequal power relations and could not be tackled by one agency alone. The committee defined the concepts of humanitarian workers, sexual abuse and sexual exploitation; produced a plan of action suggesting actions to prevent and respond to sexual abuse and exploitation; and recommended some implementation processes. Some of the implementation activities include: piloting schemes to determine what is practical and feasible, collaboration by agencies to avoid fragmentation, training of humanitarian personnel and monitoring and evaluation of the activities to inform the refinement of the plan and other recommendations towards a common policy. The Committee noted a need to define the standards of behaviour of humanitarian personnel and suggested four guiding principles. That the problem be addressed within the wider framework of gender based violence. That the problem could only be conclusively tackled by establishing an environment conducive to preventing and eliminating the practice. Support mechanisms for survivors and access to legal resource and redress need to be established. Agencies must bear collective responsibility for the prevention and elimination of the problem and must be held accountable. Humanitarian agencies have a duty of care to beneficiaries and a responsibility to ensure that beneficiaries are treated with dignity and respect and that certain minimum standards of behavior are observed. The goal is to create an environment free of sexual exploitation and abuse in humanitarian crises, through integrating the prevention of and response to sexual exploitation and abuse into the protection and assistance function of all humanitarian workers. UN IASC Task Force on Preventing Sexual Exploitation and Abuse in Humanitarian Crises 2002  Possible Characters: District Chief Community Health Worker (male) Village elder (male) Village elder (female) Village chairperson Village shopkeeper Field Assistant School Teacher (female) Refugee Community Leader(male) Orphaned boy, aged 13 Orphaned girl in refugee camp, aged 13 Grandmother, caretaker of orphans Primary school boy, aged 12 Primary school girl, aged 12 Girl with physical disability, aged 12 Girl in prostitution, aged 16 Married girl in refugee camp, aged 14 Member of parliament Woman whose husband died of AIDS, aged 30 Unemployed boy, aged 17 Food Monitor International humanitarian worker Country Director Police Officer (male) NGO leader (female) Religious leader (male) UN national staff member Male Peacekeeper District Official For every statement which the character they are representing could answer yes, participants should take one large step forward. If a statement does not apply to their character, they should just stay where they are. Sometimes they may not be sure whether a statement applies to them, and should just take their best guess. Statements: I can influence decisions in my community. I get to meet visiting government officials in my village. I get new clothes on religious holidays. I can afford to buy and read newspapers regularly. I have access to and time to listen to the radio. I never have to queue at the dispensary. I have my own bank account. I can speak in family meetings. I can afford to buy or boil drinking water. I can buy condoms. I went to or I expect to go to secondary school. I can pay for treatment at a hospital if necessary. I can speak at a village meeting. I eat at least two full meals a day. I sometimes attend workshops and seminars. I have access to plenty of information about HIV. I am not afraid of walking on my own at night. I am not afraid of violence in my home. I have never had to line up for WFP food. Issues to note: Much of what we will be discussing in this training is related to POWER. Abuse and POWER are closely links. Violence and exploitation are almost always linked to POWER.Those who have more power can exploit and abuse others with impunity. Those who have the least power and very often they are women and children (boys and girls), especially girls are most likely to be exploited and abused. More often than not, the beneficiaries of WFP activities are women and children and are extremely vulnerable to exploitation and abuse. However, the focus of todays training is very specific to abuses that happen during the course of duty of UN personnel and our partners. It is important to bear in mind the context in which this occurs and to realize that this is part of a much larger problem of gender-based violence.  SESSION 2: DEFINING SEXUAL ABUSE AND EXPLOITATION Overview of Gender-Based Violence Although this training is focusing on the specific topic of sexual exploitation and abuse by UN personnel and partners, we need to be aware of the broader context of gender-based violence in which it occurs. Hence it is important to highlight that sexual exploitation and abuse are a form of gender-based violence. Gender-based violence (GBV) is defined as violence that is committed as a result of gender-based power imbalances. Because of their subordinate status, women and girls are the primary victims. GBV may be physical, sexual, psychological, economic or socio-cultural. Though women suffer the majority of gender-based abuses around the world, in situations of conflict men many also suffer tremendously as a result of their gender role expectations. Examples might include: forces conscription into fighting forces; forced rape of friends and neighbors as part of initiation, forced drug use, etc. Currently much of the research activities and programming addressing gender-based violence focuses on womenwhich is not entirely inappropriate since women bear the brunt of gender abuse. However, it is important to remember that men and boys can also be harmed through GBV. There is a well-documented global phenomenon that men in general have power and control over women and girls and often maintain this power through violence. This creates a cycle of oppression that causes, produces and reproduces violence against women and children. Violence and abuse perpetuate inequalities in interpersonal relationships and reinforce structures that enable violence against women and children to continue. This takes different forms across cultures but is perpetuated through structures that advantage men socially and economically compared to women and children. Women and girls are disempowered through unequal access to resources and decision-making. Victims of GBV usually have little recourse to justice, limited access to care and support and are often forced to adopt desperate forms of livelihoods for survival. While many may argue that consent is sometimes granted by victims, most victims are living in a context of vulnerability and scarce resources. They often have no choice; the only person with choice is the exploiter. Women are the majority of the worlds poor: 70% of people living in poverty (less than $1/day) are women. Women are less likely than men to hold paid and regular jobs within the formal employment sector. Women represent more than two-thirds of the worlds illiterate; Women are almost entirely excluded from political power: they hold 15.6% of elected parliamentary seats globally. Women own only 1% of the worlds land. Of the over half-million human beings trafficked across borders each year, an estimated 80% are female and 50% are minors. A projected 82 million girls around the world who are now between the ages of 10 and 17 will be married before their 18th birthdays. Complications from early pregnancy and child-bearing are the leading cause of death for 15-19 year olds worldwide. Studies from the US, Europe, and Australia have concluded that violence against women by their intimate partners poses among the greatest threat to womens health and welfare. In Canada, the yearly economic cost of responding to violence against women is over 1 billion per year.  The Task Force however, has offered the following definitions: Sexual Abuse: Actual or threatened physical intrusion of a sexual nature, including inappropriate touching, by force or under unequal or coercive conditions. Sexual Exploitation: Any abuse of a position of vulnerability, differential power, or trust for sexual purpose; this includes profiting monetarily, socially or politically from sexual exploitation of another. Humanitarian Workers: Include all workers engaged by humanitarian agencies, whether internationally or nationally recruited, or formally or informally retained from the beneficiary community, to conduct the activities of that agency. ............................................................................................................................................................................................ UN Human Rights Framework and Principles of Accountability There are various instruments on which the mandates and funding of all humanitarian action are based. Such mandates oblige all humanitarian actors to uphold a high standard of behaviour to specifically treat vulnerable groups of benifciaries with dignity and respect. These instruments include among others: International Human Rights Law. UN Convention on the Rights of the Child and Optional Protocols African Charter on the Rights and Welfare of Children UN Convention on the Elimination of all forms of Discrimination Against Women and Optional Protocol National Laws Kenya law Kenya is signatory to CRC, and has drafted the Childrens Act, which puts the age of consent at 18. The Childrens Act runs parallel to the penal code. Kenya is additionally a signatory to, and has ratified, the African Charter on the Rights of the Child and the Convention on the Elimination of all Forms of Discrimination Against Women (CEDAW). Kenyas Sexual Offences Act became law in July 2006, criminalizing sexual harassment. It associates offenders with persons in authority (power), or holding public office. Such offences attract a minimum of 3 year sentence or a fine of no less than Sh. 100,000 or both. The following offences are also forms of sexual offences and criminal under the penal code: rape, indecent assault (fondling), incest, procuration-trafficking, female genital mutilation of girls under 18, sodomy, abduction and confinement. Some factors contributing to sexual abuse and exploitation The following list depicts some factors that may cause or contribute to acts of sexual abuse and exploitation. If not directly contributing to the problem, such practices entrench attitudes and activities that exacerbate the problem. Some of the listed factors, such as early or marriage to a person below the age of 18 and forced marriage, are actually forms of sexual abuse. Trainers must make sure that the list is understood in context and as they relate to gender-based violence. Internal Organisation Factors Lack of policy: Lack of policy and mechanisms to deal with incidents of SEA. Organizational Culture: Organizational culture which does not place importance clear work ethics, policies, regulations and mandates. Abuse of power: Desire for individual to take advantage of positions of authority for sexual and other forms abuse. External Factors Early marriage Early marriage is very common among most African communities. These communities practice bride price economics in which a mans wealth is based on the number of cattle he owns and hence the number of wives he can afford. In such a setting marriages are often arranged with out the consent of the female party. Forced marriage Forced marriage in Sudan is common due to the dowry driven economy. Marriage is arranged and dowry paid to the family of the bride, with or without her consent. The majority of brides are as young as 13 to 16. Denial of education for girls or women Removing girls from school and prohibiting or obstructing access to education for girls and women is a common practice, which encourages abuse of girls and women. In Sudan access to education, especially in rural areas, is extremely limited for girls. Poverty Because of the long duration of the war in Sudan, the majority of the population has been adversely affected: by the lack of economic activity; the huge number of male heads of household at the front; the lack of remuneration or assistance to the families of soldiers; and poor agricultural conditions as a result of insecurity. Women and children have often been left alone to fend for the family. Lack of legal protection In a territory were a male-dominated customary legal system is the main form of judicial address and the modern legal system is limited in its operations, women and girls have limited access to fair representation. See comprehensive list in Handout # 1 and Handout 2 & 3 for effects and impact of sexual abuse and exploitation. SESSION 3: APPLICATION OF CODE OF CONDUCT Taking a Stand: Myths and Beliefs Exercise Exercise 6: Taking a Stand Time: 30 minutes Activity: Ask participants to stand up and accompany you to an empty space within the training area. Explain that you will read a number of statements with which they should either agree or disagree. Those who agree should move to your right and those who disagree to your left. Ask them to defend their positions. In the course of the debate, probe their explanations and ensure participant understand key issues including respect of human rights and humanitarian principles and collective responsibility. Statements The sexual activities of an aid worker during his/her private time are not the business of the employer. Sexual activity with anyone above 18 years of age cannot be regarded as sexual abuse or exploitation. In a situation where a beneficiary has initiated a sexual relationship with an aid worker, the worker cannot be accused of sexually abusing or exploiting the beneficiary. It really is not my business to report the sexual abuse and exploitation committed by other aid workers as long as I am not affected. If I marry a girl below 18 years of age, there is nothing wrong as long as my culture allows it. Women who have sex with aid workers in exchange for aid items are just as much to blame as the aid workers. Aid workers who give beneficiaries extra aid items or services in exchange for sex sometimes are only assisting the beneficiaries to cope with crisis. In terms of sexual behaviour, a local staff member should not be held to the same standards as an international staff member. Facilitator Notes: This exercise is very effect in unpacking some of the issues participant may still be unclear about or and preconceived ideas about policies, legal instruments and implementing the six principles. Most preconceived ideas are based on cultural and traditional beliefs. After the debate, return to the plenary and distribute a copy of the six principles for each participant to quickly read through. Then assign participants in pairs and assign them a single principle to discuss: The intention of the principle. What difficulties may arise in implementing the principle. How the difficulties could be overcome. During the presentation, explain the principles one by one.  The Inter-Agency Standing Committee Code of Conduct Principle 1 Sexual exploitation and sexual abuse constitute acts of serious misconduct and are therefore grounds for disciplinary measures, including summary dismissal; Principle 2 Sexual activity with children (persons under the age of 18) is prohibited regardless of the age of majority or age of consent locally. Mistaken belief in the age of a child is not a defence; Principle 3 Exchange of money, employment, goods or services for sex, including sexual favours or other forms of humiliating, degrading or exploitative behaviour, is prohibited. This includes any exchange of assistance that is due to beneficiaries of assistance; Principle 4 Sexual relationships between United Nations staff and beneficiaries of assistance, since they are based on inherently unequal power dynamics, undermine the credibility and integrity of the work of the United Nations and are strongly discouraged; Principle 5 Where a United Nations staff member develops concerns or suspicions regarding sexual exploitation or sexual abuse by a fellow worker, whether in the same agency or not and whether or not within the United Nations system, he or she must report such concerns via established reporting mechanisms; Principle 6 United Nations staff are obliged to create and maintain an environment that prevents sexual exploitation and sexual abuse. Managers at all levels have a particular responsibility to support and develop systems that maintain this environment. SESSION 4: POSSIBLE POINTS OF ABUSE & EXPLOITATION WITHIN THE CYCLE OF HUMANITARIN ACTIVITIES Exercise 5: Possible Points of Abuse and & Exploitation Objective: To identify potential points at which abuse and exploitation may be unintentionally facilitated within the humanitarian activity cycle. Time: 1 hour 30 minutes Activity: Distribute the diagram on the services, supplies and distribution chain to each participant and briefly explain it. Put participants in small groups and ask them to identify the particular risks and opportunities for sexual abuse and exploitation of beneficiaries likely to occur at each stage of the distribution chain and implementation of the humanitarian programmes. Each group should identify what strategies can be instituted to prevent sexual abuse and exploitation at the different stages of the programme cycle within humanitarian organizations and by communities - either with or without the support of humanitarian organizations. Facilitator Notes: Let each group report back to plenary and allow for discussion. Focus discussion on policy and awareness creation among stakeholders. It is important to highlight key issues such as awareness creation among various groups and clear policies guidelines where required. CYCLE FOR HUMANITARIAN SUPPLIES AND SERVICES            Basic Stages of Humanitarian Activities and Supplies Some humanitarian activities are described below to facilitate the identification of possible points of abuse and exploitation. Emergency / rapid/ community assessments Identifying needs (social services, food, non-food items). This often involves moving from area to area in the affected region. Activities include the assessing or collection of data by moving around affected areas and talking with members of the community in order to ascertain their needs. Analysis of data needs for protection services and food security, VAM, crop reports, social, legal problems etc. Delivery/ awareness creation/ networking The movement of supplies from location to location in preparation for distribution. Raising awareness on social issues of concern within the community and relevant professional sectors. Supply items arrive in the affected country either by sea, road, rail, river barge or air. Awareness is raised through group meetings, workshops and local networks and media Warehousing / capacity building Storage of supplies at port, in capital city, or district capital in preparation for distribution or forwarded to distribution point and storage of supplies at point of distribution. Encouraging and supporting general community members to start considering action and changes that uphold the fundamental aspects of social issue frame work through discussions. Pre-distribution preparations Discussions with community leaders and local administration to plan distribution activities; establish distribution plan (and local storage plan if necessary) with local relief/distribution committee. Agree beneficiaries to be targeted. Incorporating social concerns as part of everyday life and institutions policies and practices. Distribution The actual identification and targeting of beneficiaries. Actual distribution of supply items to targeted persons. Strengthening action and activities for the prevention of social concerns to ensure their sustainability, continued growth, and progress. Incorporation of the local workforce in social programmes. Post distribution activities / monitoring /evaluation Post distribution monitoring and programme evaluation is carried out to establish real recipients of and the effects of humanitarian supplies and social services, and to ascertain the diversion or leakage of supplies or services to unintended persons. Monitoring and evaluation is also designed to ascertain effects on social service or campaigns - negative or positive - in order to make appropriate changes. Post distribution, monitoring and evaluation is done at the distribution site or through visits to households. SESSION 5: REPORTING MECHANISMS AND INVESTIGATIVE PROTOCOLS Exercise 6: Scenarios Objective: To highlight the need for institutional reporting and investigative channels. Time: 1 hour 30 minutes Activity: Group participants and distribute to them the following scenarios (one scenario per group). Ask them to read the scenarios and tackle the tasks given. Refer to the reports to launch a presentation on the reporting and investigation mechanisms using the notes provided. Scenario 1. Nurse Anne Anne is a nurse with an international organization working in a remote village in the Kenya. One day while on her daily out-patient treatment routine she is confronted by two women and a young girl of about 13 years (based on her observation) who appears weak and is crying uncontrollably. She enquires about her condition and one of the women holding the young girl tell Anne that she is complaining of a stomach ache and adds that she is suspected to be pregnant. After an initial examination, Anne also observed the girl may be pregnant. While wheeling the girl into the examination room for further examination by the organizations doctor, the women begins to complain that they suspect the pregnancy is the result of an inappropriate relationship between the 13 year old girl and one of the male attendants working for the same organization as Anne. If you were Anne, what would you do? Scenario 2. Working Late A beneficiary worker often has to work late at night and must be dropped home by a male colleague (for security reasons). You notice that one of your colleagues is always eager to drop her home and you suspect that there may be sexual exploitation going on. What do you do? Scenario 3. Bride Price You are a head of a WFP Sub-Office and as you go about your daily tasks, an elder from the local community is ushered into your office wanting to see you. He begins by complimenting you on how well WFP is doing in helping the local community. He however, turns to an accusation that your organization was disrespecting his people by trying to discourage proper marriages. He describes with an angry tone the tale of how one of your male medical staff has refused to marry his daughter because of some absurd foreign policy of waiting until the girl is 18 years of age. He threatens to have you dealt with if you continue to hinder payment of bride price by your employees family to him. What do you do? Scenario 4. The Consultant Joe is a consultant hired to assist WFP in setting up a community project in school feeding. He is a former school teacher who is new to WFP and humanitarian work. After working with Joe for 3 weeks you develop strong suspicions that he is engaged in a relationship with your local education counterpart who is a well known womens leader. The two are known to meet after hours at a local bar and Joe has been seen going to her house. What do you do? Discussion: This exercises helps the trainer focus on core issues such as Focus discussion on key issues such as, prevention, reporting and investigative mechanisms, representation by staff of their organizations and challenges of implementing principles and codes of conduct. Reporting and Investigating What are the basic principles & requirements? All organizations must have reporting and investigative mechanisms in place. All mechanisms must be age and gender sensitive. Communities must be empowered and their capacity developed to monitor and report on the behaviour of humanitarian workers and commercial service providers. Perpetrators must be held accountable and victims must be protected. Important Definitions for Reporting Victim - the person who is sexually exploited/abused. This term is used as shorthand for the more common 'victim/survivor' and should not be taken to imply a lack of strength and resilience or capacity to survive. Complainant - person making the complaint - may or may not be a victim of sexual exploitation/abuse. Subject of the complaint (henceforth subject) - person alleged to have sexually exploited / abused. Witness - person giving evidence in the investigation; could be any or all of the victim, complainant, beneficiaries, staff members, staff of partner agencies etc. Key Principles for Investigating Confidentiality The protection of witnesses is the primary concern. The recording and processing of information should be done in line with best practice and at no time should an individual be compromised by the passing on of information, particularly when it involves external agencies and/or the police. If a member of staff is given information that suggests that another member of staff is abusing or sexually exploiting a woman or a child, it is very important that they do not promise confidentiality. This is because they have an obligation to report. The 'need to know' principle should be applied. When information is received it is important that only those responsible for passing on complaints or organising further inquiries are given the information. Written information must be stored securely. Transparency Clear reporting guidelines should be in place The process of reporting a complaint must be clear and as open possible to allow for investigation to be systematic. Organizations must promote willingness to respond to complaints and be clear what the process will entail. It is essential that employees be trained to know how to respond should a complaint be made and be clear how they themselves can make a complaint without putting their safety or job prospects at risk. No action should be taken against any member of staff who reports in good faith information indicating a breach in the code of conduct and which, following investigation, proves unfounded. However, if a staff member knowingly and wilfully reports false or malicious information regarding another member of staff, such reporting will constitute misconduct. Accessibility All beneficiaries and staff need to have access to individuals who can help them if they have a complaint. Focal points for reporting should be clear and part of other mechanisms that support beneficiaries. It is the managements responsibility to ensure that these processes are in place and do not exclude anyone who genuinely has a complaint to be made. Language, age, sexuality, gender, disability, faith, culture or job role should not hinder access to the complaints mechanism. For those women and children who have an impairment or disability it is essential that they have a means of being heard and that lack of mobility or verbal communication does not exclude them from making a complaint or from it being taken seriously. Mechanisms must be sensitive to the fact that boys and men can be sexually exploited too. Safety Witness protection and the safety of those likely to be charged with the responsibility for investigating a complaint must be of paramount concern. People making a complaint need to be able to make that complaint anonymously if they feel their safety would be compromised by doing otherwise. Mechanisms such as complaints boxes should be in place so that a complaint can be made without giving a name. Recording and Management of Information Information should be properly recorded as it could be used in subsequent disciplinary or even legal action, hence the need to make a record of the information detailed below. Anyone receiving a complaint about sexual abuse and exploitation of women and children must endeavour to record: The correct names of all involved, identity numbers of witnesses and victims. If possible, photo records of all workers to whom the complaint is made against. The nature of the complaint. A description of any visible sign of abuse or other injuries. An accurate account of what was said, in their own words and language or mode of communication. Any other observations made. Precise times, locations and dates given. Whether any one else knows or has been given the same information. A clear distinction between what is fact and hearsay. Your own relationship if any with the complainant. It is not staff's responsibility to ascertain whether or not the complaint is true but it is staff's responsibility to report the concern to the relevant authorities. Highlights of Activities for Preventive and Protective Activities Awareness raising- while training community on UN rules, work to understand negative attitudes, traditions, customs and behavior that may affect its implementation. Community involvement- sharing information, preventive activities, grass root partnerships and community trainers in an effort to positively influence negative practices. Identification of community monitors or focal points. Training- engage in training for life skills, counselling, legal and other necessary skills. Advocacy on legislation and enforcement legal support; identify issues in national security procedures. Monitoring and evaluation- assessing benefits and effects of activities. Services for recovery and reintegration- study the possibility of psycho-social care, physical security. SESSION 6: RECAP OF DAY 1 Exercise 7: Recap- On the Spot Objective: To review activities of the previous day. Time: 30 minutes Activity: Arrange chairs in a round musical chairs arrangement. Ask staff to sit on them while removing 1 and leaving 1 participant standing. Use music or some form of rhythm. Stop the music periodically and ask the person left standing to share a lesson they learned the previous day. As in musical chairs, remove 1 chair until all participants have been put on the spot to share a lesson learned. Discussion: Use the session to reinforce the key issues of the previous day. Confirm that there are no unclear or pending issues. NOTES................................................................................................. SESSION 7: TRAINING THEORY AND METHODOLOGY Communication for Training Exercise 8: Defining Communication Objective: To define communication and identify effective aspects of communication Time: 30 minutes Activity: Ask participants to: Pair up Hold the pen together and without talking, draw a house, tree and dog. Sign the drawing with the name of a famous artist. De-brief on the aspects of communication using the questions below: How did communication take place without talking? What behaviours did each person exhibit in the process? Why did communication succeed? What lessons do we learn about communication from that experience? Discussion: Define communication and explain using the notes below.  What is communication? That human effort to create a common understanding for the purpose of achieving an intended objective using established and excepted symbols, codes, meanings and signs and other modes of life. Aspects of communication include: The source: facilitator, participants, resource persons and resource materials e.g. handouts, videos The message: content of the communication e.g. information, feeling, ideas etc The medium: verbal, physical, written, visual or audio-visual means of relaying the message. The recipient: person at whom communication is targeted. The feedback: action taken by the recipient as a result of the communication. Key factors of communicating effectively Know and understand your audience. Know your objectives and subject matter. Use the most appropriate medium. Listen and observe feedback from your audience. Principles of Adult Learning Research indicates adults learn most effectively when: they participate in defining or refining their own learning objectives. when the content is focused upon real problems faced by the participants. when training is undertaken in a varied and participatory environment. Find below the Learning Cycle developed by David Kolb and further described by James A. McCaffery, Ph.D. to highlight the principles below the diagram.  SHAPE \* MERGEFORMAT         EXPERIENCE: concrete or direct - allowing participants to experience the learning process through use of activities such as case studies, problem solving, role-play, games, group tasks etc.. PROCESS: observation and refection allowing learners to sort out information from 1st phase by reflection in groups and presenting their ideas and experiences. GENERALIZATION: theory and concept- allowing participants to interpret and express lessons learned through group discussions, demonstrations and lectures. APPLICATION: applying and testing applying lessons learned through practicing of new skills, planning for action, field visits and discussion. Session 8: KEY COMPONENTS OF Delivery Principles of Facilitation A facilitator is an organizer and manager of a group process who uses various creative methods, resource materials and their own personality, skill and experience. A good facilitator will be marked out by the following general characteristics. Trust in other people and their capacities. Honesty. Patience. Humility. Confidence without arrogance. Respect for others opinions and ways of doing things. More specifically, as a communicator, a good facilitator will exhibit the following combinations of characteristics. Communication skills: good listening skills, hence an ability to synthesize information and provide feedback; audibility, tone variation, use of simple language, fluency. Inter-personal skills: use of body language, eye contact, rapport with the audience, sensitivity to gender, race, religion, culture, politics etc., trust in other peoples abilities, friendliness (not threatening to the audience), patience, ability to create an atmosphere of confidence among participants. Personal presentation: appropriate and respectable dressing, confidence, composure. Methods of communication: use of appropriate and varied channels, use of examples and illustrations, use of proverbs, anecdotes, idiom etc, use of humour but maintaining a balance with substance, use of drama, good handwriting and an ability to draw. Content: brief and to the point, choice of words appropriate to the context, clarity of message. Attitude : openness to learning, self-awareness of own strengths and weaknesses, interest in the subject and process, non-judgmental approach to ideas and participants. Organization: preparedness, proper time management, planning for and allowing participation, creative use of local environment. Creativity: ability to think on feet, flexibility in application of methods and appropriate management of the process, knowledge of group dynamics and an ability to adjust on the spot, innovative use of space and materials to create an attractive physical arrangement.  SESSION 9: TRAINING TECHNIQUES The techniques used can make or break a training session and therefore, must be selected carefully. In selecting an effective training technique, trainers must note the following attributes of learning.We Learn 1% through taste 2% through touch 3% through smell 11% through hearing 83% through sight We Remember 10% of what we read 20% of what we hear 30% of what we see 50% of what we see and hear 80% of what we say 90% of what we say and do (Source: VIPP Manual, 1993) Choosing Appropriate Training Techniques The Training Resources Group, INC. offers 3 types of learning including knowledge, behaviour and attitude learning. These types of learning call for synchronized training activities. Knowledge Learning Much of the formal and non-formal education that takes place throughout the work focuses on knowledge learning, from learning simple arithmetic to learning how to write objectives. Knowledge learning is the most easily measured of the three types. Behaviour Skills Learning Behaviour skills learning is more difficult than knowledge learning in that in many cases we are required to change the way we currently do something. For example, if an instructor has always used lecture as a method for transferring skills, it may be difficult for him/her to utilize experiential learning techniques. However, new behaviours can be learned and measured. Attitude Learning Attitude learning is the most difficult of the three types of learning. This is because humans develop attitudes based on what we believe is the right way of doing things. In order for a person to change these beliefs, they must learn that the new way is better. They must be convinced that a better way is possible. If the person is convinced that their present attitude is inaccurate or incomplete, they will make a conscious choice to change their attitude. Types of learningTraining ActivitiesEvaluation ActivitiesFacts, information sharingReading, songs, lectures, brainstorming, videoWritten or oral examsSkills (manual, thinking, planning, etc)Demonstrations or instructions followed by practice with feedback to correct mistakesObservation on the job or in practice or role play; an observation checklist might be usefulAttitudes and valuesDiscussion, role play, role-modelling, values, clarification exerciseIndirectly, by observing behaviour, especially on the job Session 10: Planning a training EVENT The planning of training workshops requires considering several steps, including: Step 1: Training Needs Assessment This is a process which profiles participants Identifying training needs including attitudes, skills and knowledge. Identifying the required resources: human, physical, capital and financial. Outlining short term and long term planning. Stage 2: Establish Learning Objectives This stage involves using the results of the training needs assessment to establish learning objectives. Articulate expected outputs of training. Logically sequence the topics. Select appropriate methods to use and materials required, bearing in mind the objectives of the event and the number of participants. Develop an outline programme covering all the days. Stage 3: Session Planning and Structuring States an introduction including objectives. Comprises of a body, which develops the fundamental part of learning and indicates the key content to be delivered - arranged logically. Has a closure or conclusion Stage 4: Evaluation of Training Extent to which objectives have been achieved. What participants liked most or least in the content and process. Realization of expectations and allayment of fears New knowledge, skills and attitudes gained. The appropriateness of methods used. Effectiveness of facilitation Level of participation. Duration of the event. Overall organization and logistics e.g. accommodation, food, venue, time management, adequacy of learning resources used, transportation etc. Suggestions for improvement. Stage 5: Report Writing The report format should conform with the style of the organization and purposes for which the report is being produced. A report should be produced as soon as possible. This way, the facilitators memory is still clear about the process and results and the participants are still enthusiastic about the process. KEYCOMPONENTS OF Designing training Session Climate Setting Stimulates interest and curiosity, induces participants to begin thinking about the subject at hand. Provides the rationale for why the subject is important to participants and how it will be useful to them. Links this training session to previous ones and places it into the overall framework of the workshop. Goal Clarification Presents to the participants statements which describe the intent, aim or purpose of the training activity. Provides an opportunity for participants to seek clarity of goals, add additional issues or raise concerns.Experience An activity which the group engages in that will provide an opportunity for them to experience a situation relevant to the goals of the training sessions. This experience becomes the data producing event from which participants can extract and analyze as they complete the learning cycle. Common experiences are role-plays, case studies, paper and pencil instruments, etc.Processing Participants share individual experiences and reactions to the experience. The experience is analyzed and reflected on thoughtfully by the group. The trainer guides and manages this process. GeneralizingParticipants determine how the patterns that evolved during the experience relate to the experiences of everyday life. Participants seek to identify key generalizations that could be inferred from the experience. Applying Using the insights and conclusions gained from the previous steps, the participants identify and share how they plan to incorporate these new insights into their everyday life. Answers the question, Now what? And How can I use what I learned Closure Briefly summarizes the events of the training session. Links back to goals and seeks to determine if goals have been met. Wraps up training session and gives a sense of completion. Links session to the rest of the programme, especially upcoming sessions. DAY 3 SESSION 11: recap of day 2 Exercise 11: Recap Objective: To review understanding of previous days discussions. Time: 30 minutes Activity: Pair up participants and have them discuss the events of the previous day. Ask one member of the group to give you their impression of the previous days proceedings and a second member to identify one thing they both learned during the proceedings. Discussion: Highlight major points made in the second day sessions and try to get an early evaluation of what needs to be stressed before the end of the workshop. SESSION 12: TRAINING PRACTICE Exercise 12 : Objective: Design an training session aimed at reinforcing the key topics of this training programme, while allowing participants to practice concepts of training skills and design Time: 90 minutes Activities: Divide participants into convenient groups and assign them to: Select priority target audience suited for this programme. Identify relevant objectives for training the group and suitable topics for the training. Indentify the relevant training techniques. In 1.5 hours, develop a training session whose timing fits the priority group and present it to the other participants in 15 minutes. Keep in mind the relevant steps in us at least 2 different training techniques (small groups, lecture, case study.) (Samples in handout # 9) Prepare a delivery session during which they will use the other participants as their trainees representing a specific audience to train. Share in facilitation tasks but have one clear lead facilitator. Facilitator notes: Note that they will be given feedback on: The steps of training design Training techniques Group facilitation Time management Overall achievement After every delivery session, provide feedback and record it on a board. Then ask participants to summarize the lessons they have leant from the practice facilitation and reinforce them.  SESSION 13: NEXT STEPS The final step of any training session is to assist participants practically to apply the information and skills gained. In doing so, participants need to apply their training to their organizations through an action plan. Below is a matrix to help them do that. Using knowledge gained from the 2 days, the participants should develop an action plan for the group or organization as a follow-up plan. The action plan should include: The activity (by category) Required resources Responsible person/s Time frame (use the matrix below) Think about your own organization. Think about the country in which you are working and how protection mechanisms can be extended to your various partners (NGOs, Vendors etc..) Identify location or area (s) of priority, target audience(s), communication medium and basic timeframe, the action plan matrix below should be completed Think about building community capacity to monitor, report and protect women and children. Think about monitoring and evaluation activities. Note and apply strategies for social change listed on Handout 11. Action Plan MatrixTarget/Audience ActivityResources requiredTime frameResponsible person (s) SESSION 15: Evaluation Distribute the evaluation form and ask participants to fill it in. Collect, tally and summarize for inclusion in the report Evaluation Questionnaire for Trainer's Workshop on Sexual Exploitation and Abuse of Vulnerable in Humanitarian Context 01. How did the course meet your expectations? Better than expected. As expected. Below expectations. Failed to meet expectations. Was the duration of the course: Too long. Too short. About right. Suggested duration (if too long or too short).. The course materials used were: Very good Good Fair Poor Please comment. ________________________________________________________________________________________________________________________________________________________________________________________________ What would you suggest for future improvement of the materials used. ________________________________________________________________________________________________________________________________________________________________________________________________ Please comment on the overall format and arrangements of the workshop. ________________________________________________________________________________________________________________________________________________________________________________________________ Please comment briefly on the overall performance of the Resource Person. ________________________________________________________________________________________________________________________________________________________________________________________________ State briefly the benefits you derived from your participation in this workshop. ________________________________________________________________________________________________________________________________________________________________________________________________ What topics if any do you feel should not be included in this training? ANNEXES OPTIONAL EXERCISES Exercise 1 : Legal Instruments Objective: Highlight the legal instruments for protecting victims from sexual abuse and exploitation. Time: 20 minutes Activities: Ask participants if they know of any international instrument that protects women and children from sexual abuse and exploitation. List the major instruments and highlight their provisions on the issue. Highlight provisions of the national law on sexual abuse and exploitation. Discussion Provide for plenary discussion to clarify issues which may be unclear.  Exercise 2: Adult Learning Objective: Highlight characteristics of adult learners. Time: 30 minutes Activities: Ask participants in plenary to define an adult learner. Note key points from the definitions offered. Group participants in pairs to come up with differences between adult and non-adult learners. Capture points on cards and display. Reinforce the points to come up with an exhaustive list of characteristics of adult learners. Discussion: Ask participants in plenary to suggest, based on the characteristics, what a trainer should do when dealing with adult learners. Reinforce using the notes below. Exercise 3: Designing training programme Objective: Enable participants to utilize training information. Time: 1hour 30 minutes Activity: Divide participants into groups and assign them to: Think of an actual event they would be facilitating. Develop a two day programme with time blocks and topics. For each programme, indicate Title of event Justification and objectives Venue Nature of participants Resources required and their sources Discussion: Highlight the need for a logical sequence training based on a presented note.  HANDOUTS HANDOUT: 1 General Factors Contributing to Sexual Abuse and Exploitation PovertyIncreases the vulnerability of women and children to prostitution and traffickingDisruption of societal lifeResulting from armed conflict or other natural disaster and leading to displacement or movement. It scatters the population, reduces their coping mechanisms, renders people defenceless when attacked, makes them easy targets for attack and kidnapping and exposes them to alien cultures which could easily lead to sexual abuse and exploitationGender power relationsTreatment of women and girls as inferior leads to their being voiceless in the face of assault, rape, early marriage, trafficking or other forms of sexual abuse and exploitationLoss of male power/roleIn family and community leading to use of abusive behaviour to assert authorityLegal justice systemsthat condone or are silent about gender based violence (SGBV)Separated and orphaned childrenAre at greater risk of being abused and exploited because of lack of protection from parents and close relatives and increased desperation to survive.Mental and physical disabilityMakes children and women easy targets of repeated abuse and exploitation because of reduced ability to make informed choices, resist, escape or complain.Traditional tensions and feudsBetween various clans/groups may also give rise to sexual violence.Domination of marginalized or minority ethnic groupsBy other groups through looting of their property which is almost always accompanied by abduction of children and women as well as rape and other forms of sexual abuse and exploitation. The abducted children and women are also enslaved physically and sexually.Cultural-social normsSuch as gender inequality, male dominance, lack of value for women and womens work leading to cultural practices such as early marriage, abduction, genital mutilation, gang rape and group sex.Lack of police protectionsecurity workers, and humanitarian organization presence.Abuse by military personnelIs also common where such personnel use the threat of arms to solicit sex and prevent the victims from reporting the abuse.Geographical location/environmentMay be near a high crime areaRetaliation and ethnic cleansingRefugees or returnees are considered materially privileged compared with local populationInteraction of different culturesExpose communities to new and different forms of sexual behaviour which they may succumb to due to vulnerability but which are otherwise repugnant, abusive and unacceptable in their culture.Dependency on aidDue to prolonged warfare and other disasters also exposes communities to abuse and exploitation by those providing the aid.Lack of food, fuel wood, income generationNeed for movement in isolated areas.Lack of belief in equalityOf human rights for all members of the communityAlcohol/drug abuse HANDOUT: 2 What Happens to the Minds and Hearts of Survivors? (The following section is taken in large part from Working with recent rape survivors: Specific Issues And Counseling Processes accessed September 21, 2003 from  HYPERLINK "http://www.secasa.com.au/index.php/workers/50/134" http://www.secasa.com.au/index.php/workers/50/134). 1. Statement: "I'm constantly jumpy. A sudden noise, an angry voice, moving bushes and I am afraid." Emotional Reaction: FEAR During an assault many victims fear for their lives. Often this fear is a direct result of the offender's threats. After the assault, a survivor may be fearful of the dark, being alone or going out by himself or herself. They may experience fear generated by the possibility of pregnancy or sexually transmitted infections (STIs) or live in fear of running into their assailant again. All of these fears are very real concerns and the worker should try to ensure that the material conditions of the victim's life are such that he or she is as secure as possible. In all instances the worker should regard the survivors fears as legitimate and support them to develop strategies that will contribute to a gradual rebuilding of their confidence in day-to-day living. 2. Statement: I feel so tense. I'm a nervous wreck." Emotional Reaction: ANXIETY Survivors of sexual assault often experience severe anxiety that may manifest in physical symptoms such as difficulties in breathing, muscle tension, nausea, stomach cramps or headaches. These symptoms can be eased as they gradually deal with the issues underlying the stress, and employ relevant stress management strategies. 3. Statement: I want to kill him; I hate him, everything, everyone." Emotional Reaction: ANGER / HOSTILITY Anger is a difficult emotion for most people. Culturally, women and children are often discouraged from expressing anger and it is most frequently displaced rather than directed at the appropriate target. The survivors anger towards their offender is more than justified. They may also be angry at the response they receive from others to whom they share their experiences with. As a caretaker, you need to be aware that you too could be a target of this anger and you must assist the survivor to identify ways to safely express their anger. However, it must be recognized that given their experiences, the victim's reactions are quite justified and often these feelings of hostility represent the beginning of a natural, positive emotion rather than a negative one. It indicates that the survivor is beginning to view the world and themselves in a different way. It also indicates that the survivor is not placing the entire blame for the assault on himself or herself but is recognizing that their assailant was responsible. It is most important to work towards the moment when the survivor is able to see the role played by society in creating both the assailant and the conditions in which rape occurs. Again, your goal as a caretaker is to help the survivor find positive and safe ways to vent anger and hostility into energy for sustained personal and social change. 4. Statement: I cant tell anyone about this. My husband will divorce me if he finds out, and my family will take my children. Emotional Reaction: ALIENATION/ ISOLATION Sexual assault survivors often experience feelings of alienation, isolation and despair if they are unable to share their experiences with others. They avoid talking about their experiences since remembering the violence is painful, they fear that others cannot understand them, and they fear being stigmatized or isolated by friends or family. But many survivors never forget their experiences and these are relived in nightmares and flashbacks. Not speaking about their assault, but reliving it in nightmares and flashbacks, results in a state of speechless fear that prevents survivors from healing. As a caretaker, you serve as a safe person in whom survivors can confide in. Assure survivors their confidentiality, and refer them to support groups and other safe places where they can share their story and begin to recover. It is very important that survivors have the opportunity to share what they have lived through. It is very important for survivors to understand that they are not alone, that they are not crazy, and that they can get help. Inviting survivors to tell the story of what happened to them, and making them feel comfortable enough to do so, is a critical first step in the healing process. Allowing survivors to share their story with people who are empathetic and respectful will help to restore the survivors dignity and help him/her to heal. 5. Statement: "I feel so helpless. Will I ever be in control again?" Emotional Reaction: POWERLESSNESS / LOSS OF CONTROL Because all forms of sexual violence involve a survivor losing power over his or her body during the assault, the caretaker's primary role must be to help the survivor feel empowered. By explaining procedures and options, by respecting and advocating for their choices, a caretaker can assist the survivor to regain a sense of control in their life. 6. Statement: "I feel so numb. Why am I so calm? Why can't I cry?" Emotional Reaction: NUMBNESS After a rape has occurred, many victims experience periods of emotional numbness that is a shock response. Those around them often misunderstand this response. For example, it may be taken as an indication that they are in control of the situation, or that they are calm and relatively unharmed. A numb reaction may even make people think that the survivor was never raped. However, emotional numbness is not an uncommon reaction to severe trauma. It should be interpreted as a victim's 'front line' defense against the overwhelming reality that they have been sexually assaulted. 7. Statement: I'm okay. I'll be all right. I dont need any help" Emotional Reaction: DENIAL Following the initial shock of the assault, or even months later, a survivor may deny to others or to themselves that they have been assaulted. They try to ignore the memory of what has happened in an attempt to regain stability. Also, some survivors may feel that if the offender did not penetrate them they were not sexually assaulted, or alternatively, if the offender did not ejaculate then it was not as bad. It must be remembered that sexual assault exists on a continuum and that all forms of sexual harassment and violation are experienced as threatening and can have devastating consequences for the survivor. 8. Statement: "I feel as if I did something to make this happen. If only I hadn't..." Emotional Reaction: GUILT / BLAME Survivors of sexual assault may feel that they could have avoided it by acting differently. These sorts of reactions are often strongly linked to the myths about sexual assault that prevail in the community which frequently blame the survivor rather than the offender. The behavior and reactions of friends, family, neighbors and police may reinforce the survivors own feeling that s/he 'asked for it'. The victim may also feel guilty that they have brought shame on their family and themselves by talking about it or reporting it to the police. Similarly, if they believe they could have resisted more forcefully they may also feel at fault. This is particularly true for adult survivors of childhood sexual abuse who tend to see themselves as they are now, as adults, rather than as they were at the time of the abuse. As caretakers and community members, our role is to provide information that demonstrates that men, women and children have been sexually assaulted under many circumstances. The offender is always at fault, never the survivor. Nothing a survivor does is asking for it. Under all circumstances the worker must reinforce that the victim is not to blame and that it is the offender who must take full responsibility for the crime they have committed. 9. Statement: "I feel so dirty, like there is something wrong with me now. Can you tell that I've been raped? What will people think?" Emotional Reaction: Embarrassment / shame Many people who have been sexually assaulted feel intensely ashamed and embarrassed. They often feel dirty and in some way 'marked for life'. This reaction may prevent survivors from speaking out about the assault. Cultural background factors can intensify such feelings. Underlying these reactions is that rape survivors often believe the myths pertaining to sexual assault. Encouraging survivors to work through these beliefs will help them place the responsibility for the assault with the offender. 10. Statement: "I feel I can't do anything any more.... even the simplest things." Emotional Reaction: LOSS OF CONFIDENCE The experience of assault exposes the victim to the stark reality that they cannot always protect themselves no matter how hard they try. The assault is not only an invasion of the survivors physical self but also the intellectual, social and emotional self. The experience of assault brings up many vulnerability issues that can devastate self-confidence and destroy assumptions about the world. To facilitate the survival process, caretakers must concentrate on helping survivors to build a newly defined sense of confidence. This confidence can begin with the realization that surviving the assault took incredible strength and determination. 11. Statement: I feel like I'm going crazy! Emotional Reaction: MOOD CHANGES After the assault, survivors emotions may swing from intense emotional pain to complete numbness. They may feel depressed, restless or deflated, confused or stridently angry. Feeling at the whim of emotions over which they have no control may make them believe they are psychologically unstable or crazy. As caretakers we can support survivors by predicting the possibility of intense mood changes and validating their responses while placing them within a framework of 'normal' and understandable responses to trauma. The victim should also be reassured that as they continue to work through the issues arising from the assault these reactions will subside. 12. Statement: "I'm disgusted by myself, by the memories. I'm just worthless. Emotional Reaction: Low Self-esteem Sexual assault humiliates and degrades survivors. Therefore, it is not surprising that survivors often experience low self-esteem. It is essential that, as caretakers, we focus attention on the positive aspects of the survivors character, strategies to cope, and personal achievements. 13. Statement: How am I going to go on? I feel so tired and hopeless. Emotional Reaction: Depression Many survivors of sexual violation suffer periods of depression. It may take the form of fear, the loss of will-to-live, anxiety or self-hatred, numbness, loss of appetite, disturbed sleep or include other physical indications of stress. As a caretaker, you should try to help to express personal grief, and repressed anger: anger at the perpetrator, anger at the injustice of the assault, and often anger at the injustice of the communitys reaction. The release of grief and the appropriate re-focusing of anger will empower the survivor. 14. Statement: I cant stop thinking about the attack. I have nightmares when I sleep and when Im awake. Emotional Reaction: Flashbacks and Nightmares Flashbacks: Memories of the assault often return without warning. Sometimes these flashbacks will be so vivid that the victim feels as if they have re-lived the experience of assault. As a caretaker, you need to explain to a survivor that she is having a flashback she may not realize what is going on. Reassure the survivor that flashbacks are not the result of irreversible psychological damage or an indicator of insanity. They represent a trauma response that, like nightmares, will decrease as issues are resolved and the healing process progresses. If a survivor experiences a flashback while working with you, help them to ground themselves. Encourage her/him to take slow, gentle breaths. Tell her she is remembering but she is not experiencing assault. Help her to look around the room and realize where they are. Tell her over and over again that she is in a safe place, that no one is going to hurt her. Nightmares: Survivors of sexual assault often experience sleepless nights and/or nightmares. The nightmare may involve reliving the assault that indicates that they have unresolved issues pertaining to the assault. It is the caretaker's role to support the victim in the process of overcoming nightmares. It is important to affirm that as the healing process continues, the nightmares or sleepless nights will become less frequent. Strategies for Survivors Experiencing Flashbacks / Nightmares: 1) Encourage survivors to talk about their nightmares/ flashbacks: Asking survivors to repeatedly tell their nightmares helps them to understand that nightmares are a symptom of the stress they are experiencing, and helps them to feel more in control. 2) Welcome, reassure, and empathize with the emotions of the survivors flashbacks/nightmares: this will reinforce for the survivor the importance of sharing her nightmares, and help him/her to understand the emotions stirred by the nightmare. Inviting the telling of flashbacks/nightmares and their upsetting content in a supportive environment will help the survivor to overcome fears that sharing their experience will provoke rejection or stigmatization. 3) For survivors who cannot verbalize their nightmares, or children who are reluctant to talk, encourage them to draw pictures of their flashbacks/nightmares. If it is possible to organize a support group of survivors, the group may want to draw a mural or make a quilt that tells their collective survival story and includes such pictures. Murals and quilts promote a sense of community and security. Group projects may feel safer for some survivors than individual drawings or tell stories. HANDOUT: 3 Specific Behaviors Of Children Following Sexual Assault (The following section is taken in large part from Working with recent rape survivors Specific Issues And Counseling Processes accessed September 21, 2003 from  HYPERLINK "http://www.secasa.com.au/index.php/workers/50/134" http://www.secasa.com.au/index.php/workers/50/134 ) Wetting/ Soiling Many young children lose bladder/bowel control following sexual violence. It can be frustrating for parents and humiliating and embarrassing for children. All children wet from time to time when they are sick, stressed or anxious. Children who have been sexually assaulted will often bed wet every night and sometimes more than once a night. Bedwetting can be linked to feelings and may be a result of nightmares. Extreme fear can cause loss of bladder control and may serve the purpose of waking a child from a terrifying dream. Bedwetting can also result from feelings of helplessness when children feel a loss of ownership and power over their body when it has been used by someone more powerful than they are. Nightmares All children have bad dreams from time to time but children who have experienced sexual assault often have nightmares every night sometimes more than once. They may have recurring dreams which are all the more frightening because they know what is coming. Nightmares can make children terrified of the dark leading to difficult behaviors. Their dreams are likely to reflect their fears and their sense of lack of control. Asking them to tell their dreams can help them to talk about what has happened. Persistent Pains Lots of children develop aches and pains that have no physical cause. These will often have a connection to an aspect of the assault. Sometimes if a child has experienced physical pain during the assaults their body can retain the memory of this pain, for example, one child who had been tied up continued to have tingling in his hands; another child had severe stomach pains after vaginal penetration. Another boy had blinding headaches because he felt he could not get the offender out of his head. Children may also think that something is broken inside of them. Repeated pain can also be a way for children to gain the extra love and attention they need at the time. Sometimes emotions manifest themselves physically for children because they do not have the ability to put it in to words. Clinginess Previously independent children often cling closely to their parents or caretakers after sexual assault. It is a communication of a real need to be reassured of being lovable and of being secure. Children are attempting to rebuild a sense of safety and trust through their relationships with close adults. They are trying to restore a sense of good touch by demanding affection and cuddles. In essence, they are trying to heal their wounds. Constant physical and verbal demands can be difficult for parents but can be modified by identifying what the child needs and putting limits on when and how they are met. Talking about a childs fears can help reduce clinginess. Aggression Aggression in children after sexual assault tends to be related to fear and anger. It can be a direct communication that states "I am never going to be hurt again. Anger is a healthy response and a necessary part of the recovery process from any trauma. It needs to be expressed in a safe and constructive way with firm limits against hurting yourself or others. To do this, anger needs to be acknowledged and recognized by the child and the adult. A child needs opportunities to discharge their anger. If this, for whatever reason, does not happen then anger is likely to come out through aggression. This causes the child more problems as their aggression prevents other people from seeing or understanding the child's needs. Aggression also stems from fear and a need to protect themselves from further hurt. This can be evident in boys who may believe they were weak because they did not fight off the offender. Sometimes they can make themselves feel more powerful by hurting other children or animals. Being aggressive can also cause a child to punish themselves and confirm their low self esteem because they have no friends and are always in trouble. Sexualized Behavior When children are sexually assaulted their sense of what is right and wrong becomes distorted. What they had previously learnt about bodies and sexual activity becomes invalid. If a child was shown how to light a fire, for example, it is likely that the child will attempt to repeat what they saw. When a child is raped by someone in their family, he or she may believe that they will get attention by being sexual with another person. If children have experienced sexual feelings, which is common in children who have been sexually assaulted, they are likely to try and recreate those reactions. They may begin to sexually act out with other children to try and make sense of what has happened to them. The trouble they may get into as a result of this behavior then confirms their view of themselves as dirty and bad. Triggers & Recovery Again, everyone who has suffered a trauma will react when they are reminded of it. The things that remind us can be called 'triggers' and they cause similar feelings to those experienced during the trauma. Very often these 'triggers' are not known to a childs caretaker because they relate to an aspect of the assault the caretaker may not know about. Some examples include the smell of engine oil for a girl assaulted by a mechanic; the feel of a beard; the sounds of the forest; someone resembling the offender; a song or a game. Some are obvious, others are not. Often children can be triggered by unrelated but upsetting events, because such events trigger their feelings of helplessness. When children are triggered then their behavior tends to reflect the fact that they are experiencing similar feelings to the ones they felt during the assaults. Caretakers should be encouraged to discuss with the child what sort of things trigger them, so they are all aware of situations when it may occur. The behaviors that children exhibit after sexual assault do tend to pass in time as children regain a sense of safety and self-control. When the feelings that drive the behavior are explored, they become less powerful and the behavior becomes more manageable. Establishing a link between the feeling and the behavior is important as it gives you an understanding of what is happening. Children can and do recover from sexual assault. The long term effects of sexual assault are often caused by secrecy, fear and denial of feelings. The more open and honest you can be about what happened the easier it is for children to be the same and the quicker the recovery. .. HANDOUT: 4 Global Overview: Facts, Statistics and Information Illustrate the enormity of the problem by citing the following pieces of information on the global situation. General violence against women is one of the crucial mechanisms by which women are forced into a subordinate position compared to men UN General Assembly Declaration on the Elimination of Violence against Women One in three women worldwide will be beaten or raped in her lifetime. UNFPA More than 90 million African women and girls are victims of female circumcision or other forms of genital mutilation. (Heise: 1994) In Africa In South Africa, it is estimated that a woman is raped every 83 seconds: only 20 of these cases are ever reported to the police. (Vetten:1996, Tribune:1991) In Addis Ababa, Ethiopia, half of the 100,000 prostitutes are under 18 years of age. Save the Children In a survey of 1652 women and girls between the age of 17 and 77 years in Kenya, 52% revealed that they had experienced some form of sexual abuse. In Zimbabwe, domestic violence accounts for more than 60% of murder cases that go through the high court in Harare. ZWRCN Other parts of the world A European Community fact-finding report estimated that more than 20,000 civilian women and girls were victims of rape in Bosnia since the fighting began in April 1992. (Human Rights Watch) In Canada, 62% of women murdered in 1987 died at the hands of an intimate male partner. (Canadian Centre for Justice Statistics: 1988) In the United States, it is estimated that 1 in 4 adolescents has been sexually or physically abused or forced by a date to have sex against her will. (New York Times, 10/1/97.) In the United States 90,186 women and girls reported being raped in 2000, Essence Magazine (August 2002) In a study of 475 people in prostitution from five countries (South Africa, Thailand, Turkey, USA, and Zambia): 62% reported having been raped in prostitution. 73% reported having experienced physical assault in prostitution. 92% stated that they wanted to escape prostitution immediately. (Melissa Farley, Isin Baral, Merab Kiremire, Ufuk Sezgin, "Prostitution in Five Countries: Violence and Post-traumatic Stress Disorder" (1998) Feminism & Psychology 8 (4): 405-426). .................................................................................................................. HANDOUT: 5 International Instruments i) Convention on the Rights of the Child Article 1: Defines a child as any human being below age 18. Article 11: Obliges states parties to protect children from illicit transfer and non-return and therefore trafficking. Article 19: Obliges states parties to protect children from al forms of maltreatment (including sexual abuse) by parents and any other person responsible for their care. Article 34: Obliges parties to protect children from sexual exploitation and abuse, including prostitution and pornography. Article 35: Obliges states parties to protect children from sale, trafficking and abduction. ii) Convention on the Elimination of All Forms of Discrimination Against Women Article 6: Obliges states parties to take measures to suppress all forms of trafficking of women and their exploitation in prostitution. Article 16 (1) b: Obliges states parties to accord women freedom of choice of spouses. Article 16 (2): Obliges parties to make betrothal null and to specify a minimum age of marriage iii) African Charter on the Rights and Welfare of the Child Article 2: Affirms that a child is anyone below age 18. Article 16: protects children from all forms of abuse including sexual abuse. Article 21: Protects children against harmful traditional practices (such as genital mutilation) and prohibits the betrothal and marriage of children below age 18. c) Kenyan Law The following forms of sexual offences are criminal: Rape (in the case of adults) and defilement (in the case of children) Indecent assault e.g fondling Incest Procuration e.g. trafficking or managing a brothel. Female genital mutilation of girls below age 18. Sodomy. Abduction and confinement. In the Criminal Law Amendment Act which came into affect on July 25, 2003, men and boys were brought into the bracket of protection against sexual abuse and penalties for sexual offences were made stronger e.g. Life sentence for those engaging in sexual intercourse with girls under age 16. Life sentence for attempted defilement. 21 years and hard labour for indecent assault. Five years for procuration. 14 years for abusing those of unsound mind. Life imprisonment for trafficking males and females for sexual activity out of the country. ___________________________________________________________________ HANDOUT: 6 Minimum components of investigative protocol There should be at least 2 people to whom staff member can report sexual exploitation or abuse, and at least one must be a woman. People to whom staff report should be trained in sexual exploitation and abuse. People investigating should be trained in age and gender sensitive investigation protocols for sexual abuse and exploitation. Investigation should commence immediately after reporting (ie: within 48 hours). There should be strict confidentiality. In the case of a child victim, the best interest of the child standard is paramount. If a childs safety demands that confidentiality standards cannot be met, safety takes precedence. Mechanisms must be developed to ensure that the dignity and the privacy of the victims are respected. Reporting mechanisms must respect international human rights standards. Due process rights of the accused must be respected. Results of the investigation should be made available to the accused, the victim and reporting party. Mechanisms to monitor sexual exploitation by aid workers of beneficiaries must be set up. These must be community based, gender balanced and include organizations working for the rights of children and women. Reporting mechanisms should be integrated into existing community structures (eg - relief committee etc.), and where the alleged perpetrator is a humanitarian worker, reports must be made to the appropriate agency. If investigations determine that sexual abuse or exploitation occurred, there must be appropriate punishment of the perpetrator and redress to the victim. Survivors of sexual abuse and exploitation must be told about their options for legal recourse. Where appropriate, law enforcement officials must be notified. HANDOUT 7 FACILITATION SKILLS ATRIBUTES TO NOTECommunication skillsGood listening skills, hence ability to synthesize information Provision of feedback Audibility Tone variation Use of simple language. Fluency.Inter-personal skillsUse of body language. Eye contact. Rapport with the audience. Sensitivity to gender, race, religion, culture, politics etc. Trust in other peoples abilities. Friendliness (not threatening to audience). Patience. Ability to create an atmosphere of confidence among participants.Personal presentationAppropriate and respectable dressing. Confidence Composure.Methods of communicationUse of appropriate and varied channels. Use of examples and illustrations. Use of proverbs, anecdotes, idiom etc. Use of humour but maintaining a balance with substance. Use of drama. Good handwriting and ability to draw.ContentBrief and to the point Choice of words- appropriate Clarity of message.AttitudeOpenness to learning. Self-awareness of own strengths and weaknesses. Interest in the subject and process. Non-judgmental approach to ideas and participants.Organization Preparedness. Proper time management. Planning for and allowing participation. Creative use of local environment.CreativityAbility to think on feet. Flexibility in application of methods and management of the process. Knowledge of group dynamics and ability to adjust on the spot. Innovative use of space and materials to create an attractive physical arrangement handout: 8 Training Techniques There are many participatory techniques. The ones described below are some of the most useful ones. Card Collection This refers to capturing points on cards and then pooling them for synthesis and analysis. Steps Visualize the question or topic to be considered. Distribute the same number of cards to each participant or buzz group making sure to use colour codes for different categories of ideas. The participants think and write their cards silently. When participants are through, they place the cards on the floor, face down in front of the group. Shuffle the cards. Read out each card loudly. Cards which are unclear in meaning, are improperly written or are not legible should be rewritten immediately. Pin the cards on a board making sure they are not overlapping. In this process, the plenary provides guidance on where the cards should be clustered. Cards which duplicate certain ideas should not be discarded because the repetition illustrates the importance participants attach to the idea. Once all the cards are pinned, guide the plenary in reviewing and labelling the clusters using a different colour and shape of card for the title. Strictly rely on participants suggestions for cluster titles. Once finalized, the clusters are consolidated in clouds and glued to the chart. If the ideas are to be used further, there might be a need to prioritize them by having participants vote using adhesive labels on which clusters they deem most important. Notes: Always bear in mind the number of participants so you do not collect too many cards which will take too long to cluster. If there are many participants, it is advisable to do card collection in buzz groups to reduce the number of cards per participant. In clustering and gluing, create empty spaces between cards and clusters. A chart which is overcrowded with cards is not appealing. _______________________________________________________________________________ Brainstorming This refers to the quick generation of ideas without censorship. The ideas are shouted out randomly by participants and captured by facilitators on cards or newsprint. Brainstorming is a preliminary part of the process. The results from brainstorming are used later for more rational deliberation. Steps Determine and visualize the question on which ideas are required. Participants shout out their ideas individually. One or two co-facilitators write the ideas on cards and pin them on boards. The cards are clustered and the clusters prioritized. Expert witness or expert panel This is a specific method designed to enable subject matter specialists (anyone with privileged information) or leaders to provide content in participatory events to meet the specific interests of participants. Steps Set up a row of chairs for the experts to sit on, facing the participants. Set other chairs (usually two) on either side of the row at an obtuse angle for participants to occupy when putting their questions to the experts. Visualize the topic of discussion. Distribute cards to participants. Introduce the expert(s) and ask them to sit. The expert(s) makes a short introductory presentation on the topic. Participants write down their questions on cards. A participant who wishes to ask a question has to move to one of the chairs on the side. It is only from here that s/he can ask the question. The participant hands over the question card to the facilitator who pins it up. The expert(s) responds directly to the question as briefly as possible. The facilitator writes the experts response and pins it under the question A participant can ask a follow up question after which s/he must move back to the plenary and leave the seat vacant for others. Expert (s) briefly wraps up on the topic. The information generated can then be used in group work or as reference for participants. ___________________________________________________________________ A subject specialist or leader is given the topic or advance questions on a topic and prepares presentation points on cards. Steps Ask participants to indicate what questions they would like tackled. Present the specialist with the questions overnight for preparation. Presenter researches and makes points on cards In plenary, the presenter goes through the cards and pins up on the board. Follow-up questions are asked and visualized with answers placed under each. ______________________________________________________________________________ Buzz Groups These are groups of two or three participants who, without breaking from the plenary, discuss a given topic and capture their points on cards. Steps Decide on topic of discussion and visualize the question. Ask participants to divide into the buzz groups. Allow time for discussion and writing. Collect the cards and pin up (with clustering if necessarily). Ideas generated can be used for further deliberations. Group Work This refers to the involvement of participants organized in small groups to discuss and prepare presentations based on their discussion. Steps Decide tasks for each group. Visualize the question(s) and instructions. Clarify how groups should present their presentations to the plenary. Divide participants into manageable groups (5-8 members is optimal). Assign each group space to work from and necessary resources. Give groups ample time for the tasks. Monitor the progress of groups and adjust time if necessary. As groups report back, allow responses from the plenary and capture the new ideas on cards. Summarize the ideas presented. _______________________________________________________________________________ Debates Debates allow participants to articulate opposing viewpoints on controversial issues. They can be structured in different ways. Below is described the forced choices structure. Steps Compose several controversial statements. Ask participants to stand facing you. Read each statement and ask those who agree with it to stand on your right and those opposing to stand on your left. Ask a few from each side to defend their position. Probe the explanations. Move on to the next statement until all the statements are covered. Return to plenary and synthesize the information generated. ___________________________________________________________________ Fishbowl Participants form two equal groups. One group forms an inner circle and the other an outer circle around it. Steps Visualize the question for discussion and choose a signal to set the participants moving. Ask the inner circle to move clockwise while the outer one moves anti-clockwise at the signal. When you make the signal again, they stop. The inner circle faces outwards and participants there come to face to face with participants in the outer circle. Each participant discusses the question with the partner until you signal them to move again. Once you are satisfied that the discussion has been adequate, stop the process. The participants then write the ideas generated on cards for clustering and further deliberation. ___________________________________________________________________ Fish Pond This is another method for generating ideas. It is particularly useful for discussing controversial issues and providing people with an open forum for airing their concerns. Steps Participants sit around a circle on their chairs. Two or three participants who have been previously briefed on their roles sit in an inner circle and start the discussion based on a visualized question with one acting as a moderator. Those in the outer circle listen without speaking. But if any of them wishes to contribute to the discussion, s/he must move with her/his chair into the inner circle. Once there, s/he must remain in the inner circle and join the others in the discussion. During the discussion, the facilitator takes notes on cards and pins them on the board. Notes: Participants tend to warm up slowly to the fish pond discussion. It is therefore important to provide ample time for the discussion to take off. But the session could also become very heated and long. Also be on the lookout to stop the process when it tends to veer off topic or when the question has been adequately discussed. ___________________________________________________________________ Role Plays A role play is a short illustrative dramatic scene exploring a specific element. It engages the participants in acting specific personalities. Steps Choose relevant topic(s) or theme(s). Divide the participants into groups to discuss and develop short plays which should not last more than ten minutes. Each group should develop a story line and briefly script it in the form of scenes. The group divides roles among members. The group rehearses the play. Each group presents its play in turns. The facilitator leads the groups in de-briefing about the role plays to draw out the issues of concern and lessons. The de-briefing allows participants to go back to their normal identities too. ___________________________________________________________________ Case Studies A case is a real life situation (factual or simulated) to illustrate certain facts, analyze problems and their consequences, examine relationships among variables, open room for debate and lead to logical conclusions. A case may be rendered orally, in writing, visually or audio-visually. Steps Choose a case that is relevant to the subject matter. Design and visualize questions for participants to answer. Visualize the instructions, including time allocated for the exercise. Divide participants into groups. Allow participants to go through the case individually and/or in groups. Let participants answer the questions in groups. Guide plenary discussion of issues from the case. Summarize and de-brief. Field Visit This is also an outdoor activity geared towards finding out information by physically visiting a site and investigating a specific topic by talking to people or making actual observations. It links the workshop to reality. Prior to undertaking the visit, choose an appropriate site and time, establish field contacts, design a realistic itinerary and make logistical arrangements: budgets, transport etc. Steps Determine the topic and objective of the visit. Divide participants into groups and develop questions to be investigated by each group. Select information collection methods. Divide responsibilities among group members and establish group norms for the field. Instruct the group very carefully on the task, methods and expected outputs. Pay the visit making observations, conducting interviews, taking notes and photos. Once back, let the groups discuss, refine their records and draw conclusions. Let the groups present their findings in plenary Notes: Field visits require a lot of time, preparation and resources. They should therefore be decided well beforehand and preparatory arrangements made. Ensure that the objective of the visit is made clear to the host community so that no false expectations are raised. HANDOUT: 9 Effective CommunicationEffective Listening  Face the person who is talking. Maintain eye contact while listening. Notice the speakers body language and determine if it matches what is being said. Do not do anything else as you listen. Encourage the speaker by asking short questions for clarification or reinforcing the speech without taking over. Use a tone that shows interest in the topic. Occasionally paraphrase the speakers main ideas. Questioning SkillsExplain that questioning is one of the most critical communication skills for a trainer. Explain the types of questions and ask participants to come up with examples. Then explain the qualities of a good question and what to bear in mind when designing questions. Types of Questions Leading questions: which direct the respondent to expected answers Rhetorical questions: which do not require a response. Probing questions: to seek more information and clarification. Closed questions: those that have a single and convergent answer. Such questions rely more on memory. Open-ended questions: those that can elicit varied valid responses and are therefore divergent in nature. Such questions rely on thinking and analysis. Simple questions: which are phrased in such a way that they ask for one response at a time. Compound questions: which ask for a variety of responses in one breath.Characteristics of a Good QuestionIn the context of training, a good question would be: Simply worded i.e. devoid of jargon. Short and clear. Not cluttered with too many elements at one go. Specific on the information it is seeking. Sensitive to culture, gender, race, religion etc. Testing the expected knowledge of the audience. Relevant to the occasion and topic Reproductive i.e. form a basis for generating more questions. Purpose of questionsIn designing questions, it is always critical to bear in mind the purpose. Among other things, we ask questions to: Get specific information. Improve understanding. Get clarification. Seek opinion, experiences, perspectives. Motivate thinking and generation of solutions. Evaluate.  HANDOUT 10 Training Resources Space Participatory training requires plenty of indoor and outdoor space because of the amount of resources used, frequent movement, re-arrangement of seats, games and exercises and grouping and re-grouping. Outdoor space provides a refreshing atmosphere for creative thinking. The standard plenary for participatory processes is a semi-circle of seats facing the pin boards with a large empty space in between the facilitator and participants. There are no tables for participants, mainly because the need to write is minimal. Tables may be provided on the sides for group work. Cards The use of coloured cards is now very common in participatory training. Cards come in different shapes and sizes. You may acquire these cards from stationers or make your own by shaping manila paper into desired shapes and sizes. Rectangular cards are mainly used for capturing main ideas while the circulars and ovals are best for titling of clusters. However, you can make creative use of shapes in your own way. To make the best use of the cards, follow the following rules. One idea per card: to allow for clustering of cards with similar ideas. Maximum three lines per card: to form blocks of words and avoid crowding the card. Key words not sentences: to capture essence of message succinctly. Upper and lower case letters as in normal writing: since capitals alone tend to blur. Large bold letters: readable from eight metres away. Colour and shape coding: to visually differentiate categories of ideas By coding is meant the use of a particular colour and shape for a specific category of ideas. Newsprint (flip chart) paper is used mainly for presenting instructions and drawing exercises. But they can also be used instead of wrapping paper and in group processes that require construction of models. Pin boards Ideally, the cards will be pinned on soft boards the average size of an ordinary black board. About 4-8 boards will usually be sufficient depending on the number of participants. But where you are unable to get ideal boards, use can be made of alternative display space such as walls, trees, cartons, blankets or sheets. This will sometimes make it impossible to use pins. But one can substitute that with autoclaving tape stuck to the back of cards or just place the loose cards on the floor. Pins These are used for holding the cards and newsprint onto the boards. The pins should be strategically placed on the upper part of the board for easy retrieval during the process. Wrapping Paper This is spread on the board and used to glue cards on. Once full, the glued sheet is numbered and removed in readiness for photography, scanning or keying in. Where you do not have the paper, you can use newsprint. Marker pens Use preferably black or blue pens because they are more legible. Marker pens come in different shapes of tips. The best are the felt chiselled tipped ones, which allow for broader and bolder writing. Autoclaving (masking) tape This is necessary for name tagging, holding processed charts on the walls, joining sheets of wrapping paper, physical demarcation of the floor for certain games and exercises, and holding cards where pins are not available. Adhesive labels Dots of about 12mm to 15mm (1/2 to 5/8), usually red or black, are used to vote on different priorities, mark the mood metre and to evaluate if ranking scales are being used. However, they can be substituted with marker pens. Scissors These are required to make new charts and to cut cards in different shapes when pre-cut cards are exhausted or when other shapes are desired. Glue This comes either in liquid form or in the form of glue sticks. It is used to hold the cards on the wrapping paper and make them ready for photography. Easels To hold the newsprint paper. Overhead Projector Use here is made of transparencies to project presentations on a screen. Powerpoint Presentation This uses the computer programme Powerpoint to project a presentation on a screen using an LCD projector. Handout 11 Steps for Social Change Community Assessment- a start to building trust with different groups within the community through discussion for learning, understanding problems and needs and preparing to set SMART objectives. These should include a number of activities, a timeframe and the number of and capacity of staff to implement activities. Specific Measurable Attainable Replicable Time-bound Awareness raising- includes working to engage, convince and inspire community members and leaders. Building Networks- encouraging and supporting different groups and sectors, while preparing community members to take action personally and publicly. This step also includes strengthening infrastructure to respond, while increasing the number of activities happening in the community. Integrating Action- your organization should aim at maintaining momentum for community-wide change. This level requires all stakeholders to work closely together to build relationships that support practical and real change. Consolidating Efforts- the main aim at this level is to sustain the positive changes made and further develop ways to promote the issue of sexual abuse and exploitation. This requires drawing from the wealth of experience from within the community to solidify and sustain efforts and achievement. Mobilising Communities to Prevent Domestic Violence, UNIFEM, Action Aid Uganda. SELECTED BIBLIOGRAPHY Bergdall, T.D. Methods for Active Participation. Nairobi, Oxford University Press, 1993. Blackburn, J. & Holand, J. Who Changes? Institutionalising Participation. London, IT Publications, 1997. Fals-Borda, O. & Rahman, M.A. Action and Knowledge: Breaking the Monopoly with Participatory Research. New York, The Apex Press, 1991. Friere, P. Pedagogy of the Oppressed. New York, The Seabury Press, 1970. Friedman, J. Empowerment: The Politics of Alternative Development. Cambridge Mass, Blackwell, 1992. Hamilton, Denis and Ulrich Gaertner. Goal Oriented Project Planning (GOPP): An Introduction to the Methodology. UNDP Office for Project Services, 1991. Johnston, Tony. The Sexual Abuse of Kenyan Women and Girls. Executive Printers, Nairobi, 2003. Kaner, S. & Lind, L. Facilitators Guide to Participatory Decision Making. Brussels, Institute of Cultural Affairs, 1996. Klebert, K., Einhard, S & Walter G.S. Winning Group Results. Hamburg, WindmAhle, 1992. Miruka, O. Visualisation in Participatory Programmes: Application in Cultural Orientation for Relief Workers in Sudan in Participatory Development in Kenya (Volume One), PAMFORK, 2000. Michau, Lori & Dipak, Naker, Mobilizing Communities to Prevent Domestic Violence, Raising Voices- Kampala, 2003. Rasmussen, P. E. Participatory Approaches toDdevelopment. Danish Association for International Co-operation, 1998. Schnelle, Eberhard. The Metaplan Method: Communication Tools for Planning & Learning Groups in Metaplan Series No. 7. Quickborn: 1979. Unicef. Games and Exercises: A manual for Facilitators and Trainers Involved in Participatory Group Events. New York, 1998. Unicef Bangladesh. Visualisation in Participatory Programmers: A Manual for Facilitators and Trainers Involved in Participatory Group Events. Dhaka and New York, 1993.     PAGE  PAGE 2  IASC News, September 2003.  Training Guide, Militaba, South Africa, 2000.  McCaffery, James A. The Experiential Approach to Training, Training Resources Group, INC., 20  Okumba, Miruka  Training Resources Group, INC.  Gormley, Wilma J. and McCaffery Ph.D., James A., Training Resources Group, Inc. Prevention of Sexual Exploitation and Abuse in the Humanitarian Context WFP Kenya Country Office By Jennifer Nduku Kiiti October 2007 A GUIDE FOR TRAINERS Exercise: Icebreaker Objectives: To enable participants to relax and get acquainted with one another. Also energizes participants. Time: 20 minutes Find someone in the room who: Has been in WFP for more than a year. Has facilitated a training before. Has attended a training on gender based violence. Was born in October. Comes from a family with more than 10 children. Speaks more than 3 languages. Facilitator Notes: As facilitators, this exercise helps the trainer know who are the participants and who has training experience. The trainer can change the questions to look for other required information. Exercise 2: Leveling Expectations and Fears Objective: As trainers, participants should be trained to ensure clarity of objectives and to clarify unrealistic expectations, while noting the fears of participants. Time: 15 minutes Activity: Ask participants in buzz groups of 2 to discuss their major expectations of the workshop and capture their responses on VIPP cards. Ask each participant to note down on a VIPP card his or her greatest fear of the workshop. Go through the cards and pin them up. Relate them to the objectives of the training and explain the focus of the workshop, weed out unrealistic expectations and allay the fears expressed. Facilitator Notes: Focus on leveling expectations and highlighting fears to guide the trainer and participants throughout the training. Review the findings at the end of the training programme as part of the evaluation exercise. Exercise 4: Key Definitions Objective: Inform participants of the global perspective of the problem and defining relevant concepts, while exploring local experiences and internalizing their impact. Time: 45 Minutes Activity: Assign participants in small groups to answer the following questions. Who is a humanitarian worker? What is sexual abuse? Give an example. What is sexual exploitation? Give an example. What is sexual harassment? Give an example. Discussion: Draw attention to the differences and similarities between the various types of sexual abuse in our working environment. Reinforce the structured definitions offered by the SG Bulletin and summarized below by highlighting key works and concepts included in the definitions (See underlined terms). Exercise 3: Introduction, Power Walk Exercise Objectives: To allow participants to see the relationships between gender and power and vulnerability to sexual exploitation and abuse. Time: 30 minutes Activity 1: Ask participants to briefly and clearly give their name, positions and departments in which they work to ensure that all know each other. Bring the participants to a large space (empty conference room or outdoor space) where they can stand side by side in a line and have room to take 25 large steps forward. Give each participant an index card with one of the Power Walk characters written on it. Ensure participants do not let anyone else know the character that they are representing. Bring the participants to a large space (empty conference room or outdoor space) where they can stand side by side in a line and have room to take 25 large steps forward. Facilitator Note: As facilitators, this role play begins the training by giving your participants an actual feeling of how it is to be less fortunate. This highlights the reality of being a beneficiary as well as how we interrelate within our working environment. Delivery/awareness creation Rapid / emergency/ assessment Capacity building/ warehousing Post-distribution monitoring/ programme evaluation Consolidating efforts/ actual distribution Integrating action / pre-distribution preparations/ PROCESS EXPERIENCE GENERALIZATION APPLICATION Recruitment and Procurement 019:Cpq 1 > ʷʛo^OCO7O7hv<CJaJmH sH h+6CJaJmH sH hHvh3CJaJmH sH  hHvh3CJ^JaJmH sH  hHvh&BCJ^JaJmH sH h=2h35CJaJmH sH hlh3mH sH 6jhlh35CJ0OJQJU\mHnHsH u$jhlhk}UmHnHsH uh&BmH sH hlhj=mH sH $jhlhj=UmHnHsH uhj=mH sH h3mH sH       $]`a$ n,^n`,Ŵe !"#$%&'()*+,-./023456789 $]`a$9;<=>?@ABCq2 3 ^`gdv< ^` $a$ $]`a$   ! ^ _ d  4 5 H ïn]O]9+hHvh35CJOJQJ^JaJmH sH h! CJ^JaJmH sH  hHvh3CJ^JaJmH sH %h! CJOJQJ\^JaJmH sH +hHvh3CJOJQJ\^JaJmH sH .hHvh35CJOJQJ\^JaJmH sH 'hHvh35CJOJQJaJmH sH $hHvh3CJOJQJaJmH sH hv<CJaJmH sH hHvhv<CJaJmH sH hHvh3CJaJmH sH  ! _ 5 6 i j P Q   q  !  H h i 2 N O P ŴŴŖkXEk6hHvh3CJaJmH sH %h CJOJQJ\^JaJmH sH %h! CJOJQJ\^JaJmH sH +hHvh3CJOJQJ\^JaJmH sH (hHvh3CJOJQJ^JaJmH sH hHvh3CJ\aJmH sH h! CJ^JaJmH sH  hHvh@TCJ^JaJmH sH  hHvh3CJ^JaJmH sH +hHvh35CJOJQJ^JaJmH sH %h! 5CJOJQJ^JaJmH sH    P h i n p ʾ娒llWB(hHvhICxCJOJQJ^JaJmH sH (hHvh3CJOJQJ^JaJmH sH %hv}P5CJOJQJ^JaJmH sH %hs5CJOJQJ^JaJmH sH +hHvh@T5CJOJQJ^JaJmH sH +hHvh35CJOJQJ^JaJmH sH hsCJaJmH sH hQCJaJmH sH hHvh@TCJaJmH sH hHvh3CJaJmH sH h CJaJmH sH 8LMN^_zDZtbSDS5S5hrn5CJ^JaJmH sH h35CJ^JaJmH sH hdt5CJ^JaJmH sH #hHvh35CJ^JaJmH sH (hHvh@TCJOJQJ^JaJmH sH (hHvhICxCJOJQJ^JaJmH sH %hs5CJOJQJ^JaJmH sH +hHvhICx5CJOJQJ^JaJmH sH (hHvh3CJOJQJ^JaJmH sH "hv}PCJOJQJ^JaJmH sH "hdtCJOJQJ^JaJmH sH  MN_MN+,OP)$d7$8$H$a$gd ad$a$gd ad$a$ $ h^ha$ gd@TgdICx MN+,DZmYmYmAm/#hu;ah ad6CJ OJQJ^JaJ .hoh ad56CJOJQJ^JaJmH sH &hu;ah ad56CJ OJQJ^JaJ &hoh ad56CJOJQJ^JaJ1hu;ah356CJ OJQJ]^JaJ mH sH -h adh36CJOJQJ\]^JmH sH +h adh3CJOJQJ\^JaJmH sH %hu;aCJOJQJ\^JaJmH sH %hu;aCJ OJQJ\^JaJ mH sH #hHvhrn5CJ^JaJmH sH ,OPp*+ֿzgQ?*(h>h3CJ OJQJ^JaJ mH sH "h adh35OJQJ\mH sH *h adh35CJ(OJQJ\^JmH sH $hu;a5CJ(OJQJ\^JmH sH ,hxQh6B*CJOJQJ^JaJph,hu;ah ad6B*CJ OJQJ^JaJ ph,hohQ6B*CJOJQJ^JaJph,hoh ad6B*CJOJQJ^JaJph,hu;ahu;a6B*CJ OJQJ^JaJ ph#hoh ad6CJOJQJ^JaJ)+gdW gdHv$d7$8$H$a$gdxQ$d7$8$H$a$gd adn_nN='+h<hVT5CJOJQJ^JaJmH sH !hVT5CJOJQJ^JmH sH  h adh3OJQJ^JmH sH h adh3OJQJmH sH #h adh3OJQJ\^JmH sH +h^h3CJOJQJ\^JaJmH sH 4jh^hHvCJOJQJUaJmHnHsH uh^hHvCJ aJ mH sH +hh3CJOJQJ\^JaJmH sH (hh<CJOJQJ^JaJmH sH (hh3CJOJQJ^JaJmH sH  }˹ufufWu?2.h[$h[$5OJQJ\^J.jhOJQJU^JmHnHsH tH uhxShOJQJmH sH hxShnOJQJmH sH hxSh>OJQJmH sH #hxSh>OJQJmHnHsH u"hxSh>5OJQJ\mH sH  hxShWOJQJ^JmH sH #hxShjH5OJQJ^JmH sH #hxShM5OJQJ^JmH sH !hqj5CJOJQJ^JmH sH !h7[95CJOJQJ^JmH sH *\va  & Fgd & Fgdgd $h^ha$gd[$$`^``a$gd[$gd> & F^gdg,gdWFXrsuv !!!ǴwbwwN:'heFhCJOJQJ\aJmH sH 'heFh5CJOJQJaJmH sH (heFhsfCJOJQJ^JaJmH sH (heFh27CJOJQJ^JaJmH sH (heFhCJOJQJ^JaJmH sH $hfkhCJOJQJaJmH sH $heFhCJOJQJaJmH sH $hdhCJOJQJaJmH sH 'hg.mh5CJOJQJaJmH sH !h[$5CJOJQJ^JmH sH  !!!!!""""w#^$$%d%%%%%%%%%%%%gd< & Fgd0F & Fgdgd & Fgd!!!""""w#]$^$$%%%%c%d%%ƲƲtaNaN:'hkdhkd5CJOJQJaJmH sH $heFh&gCJOJQJaJmH sH $heFh@KCJOJQJaJmH sH -heFhB*CJOJQJaJmH phsH 'heFh0F5CJOJQJaJmH sH $heFh0FCJOJQJaJmH sH 'heFh5CJOJQJaJmH sH $heFhCJOJQJaJmH sH #h adh5CJOJQJmH sH 'hfkh5CJOJQJaJmH sH %%%%%%%%%F''')/.2.Ƶ׋u`M4M`M1jh[h30JCJOJQJUaJmH sH $h[h3CJOJQJaJmH sH (h[h3CJOJQJ^JaJmH sH +hh<5CJ OJQJ^JaJ mH sH +hUh<CJOJQJ\^JaJmH sH &h adhd5CJOJQJ\mH sH  hd5CJOJQJ\mH sH  h5CJOJQJ\mH sH &h adh5CJOJQJ\mH sH 'hkdh5CJOJQJaJmH sH %F'))*+u,v,,R--3.4.a0c0e0f0g0h0i0j0k0l0m0$a$gdoG1$a$gd'X & Fgd3 & Fgd3 $da$gd3 & Fgd32.3.4.5.0`0a0b0c0d0ӾuZB BjhtE56CJOJQJU\]^JaJmHnHsH tH u.h56CJOJQJ\]^JaJmH sH 4hoG1h[56CJOJQJ\]^JaJmH sH .h[56CJOJQJ\]^JaJmH sH 4h[h'X56CJOJQJ\]^JaJmH sH +h[h'X6CJOJQJ^JaJmH sH (h[h'XCJOJQJ^JaJmH sH (hth3CJOJQJ^JaJmH sH .h[h36CJOJQJ]^JaJmH sH  m0n0o0p0q0r0s0t0u0v0w0x0y0z00000001 181W1 & Fa rgdg,lgdolgdo$a$gdoG1d0p0q0v0y0z000000011 12222o3ɸ~m_mQ@2@m_mQmheCJOJQJ^JaJ hehqq#CJOJQJ^JaJhoCJOJQJ^JaJhqq#CJOJQJ^JaJ hehoCJOJQJ^JaJ#heho5CJOJQJ^JaJ&heho5>*CJOJQJ^JaJ&hthkO5>*CJOJQJ^JaJ hkO5>*CJOJQJ^JaJh6-CJOJQJ^JaJ hITQhoCJOJQJ^JaJ.hoG156CJOJQJ\]^JaJmH sH W1m11111242Z2o2222223333L3]3o3p34gdol r^gdol & Fa rgdg,lo3p344444444)5Y5k55555/66677777777A8޾޾ްްްޢޔކކtbSho5CJOJQJ^JaJ#h}4ho5CJOJQJ^JaJ#hth=5CJOJQJ^JaJhd!CJOJQJ^JaJh\CJOJQJ^JaJhCJOJQJ^JaJhRCJOJQJ^JaJh^CJOJQJ^JaJ#heho>*CJOJQJ^JaJ hehoCJOJQJ^JaJ hthoCJOJQJ^JaJ4444*5S555556K6^6666 75777777^gdol & Fb gdg,lgdol7B8f88889::0;1; $Ifgdg,Ckd$$Ifl0%' t'644 laytg, & Fc$Ifgdg, & Fdgdg,l A8B888:::H:K:2;4;5;6;7;A;B;ܽܯ܉qYqF2'h adh3CJOJQJ\aJmH sH $h adh3CJOJQJaJmH sH .h$O56CJOJQJ\]^JaJmH sH .ho56CJOJQJ\]^JaJmH sH .hoG156CJOJQJ\]^JaJmH sH hCJOJQJ^JaJhy3CJOJQJ^JaJ hthoCJOJQJ^JaJhVZ8CJOJQJ^JaJ hehoCJOJQJ^JaJ#heho5CJOJQJ^JaJ1;2;3;4;5;7;i;j;;;;_@kd$$Ifl#$ t$644 la$If $a$gd[$a$gdoG1CkdT$$Ifl0%' t'644 laytg, B;i;j;;;;;]<<<<<=ѹtg]P>0PhVh_z5OJQJ^J#hHhR'5CJ OJQJ^JaJ h_zh_zOJQJ^Jh_zOJQJ^Jh_zhR'OJQJ^J h adh3OJQJ^JmH sH 7hchR'5B*CJ OJQJ\^JaJ mH phsH .hch35CJOJQJ\^JaJmH sH .hchR'5CJOJQJ\^JaJmH sH .hchR'5CJ OJQJ\^JaJ mH sH +h adh3CJOJQJ\^JaJmH sH  ;<<==7@8@BB^DD+EkEEFFyGHHgd! & F`gdg,l & F_gdg,lgd{#lgdM lgdNlgdVl==?-?6@7@8@BBBEFyGGHHHν{naTa=,jh adh3OJQJUmHnHsH uhO-UhHOJQJ^JhO-Uh,#OJQJ^JhW8h,#OJQJ^JhW8h{#OJQJ^Jh{#h{#OJQJ^J hHhHCJ OJQJ^JaJ hM OJQJ^JhM hM OJQJ^J hHhM CJ OJQJ^JaJ h_zOJQJ^Jh~OJQJ^Jh_zh_zOJQJ^J hHhNCJ OJQJ^JaJ HHHHHHH I(I>ICIHIRIYI]IfIsItIIIIIIIIFJGJHJȱȟȟȟȟȟȌ|j|j|j|Q1hN9h36CJ OJQJ]^JaJ hmH sH "hEh3>*OJQJhmH sH h adh3OJQJhmH sH $h%uh3CJ OJQJaJ mH sH #hEh3>*OJQJ^JmH sH ,h adh356CJOJQJ]hmH sH  h adh3OJQJ^JmH sH h!OJQJ^JmH sH 0h!h356CJOJQJ]aJhmH sH HHHHsItIIGJHJ^J2K3KK+L`MaMbMMMM_N & Fgd*^gdi1$a$gdi1gdi1 gdi1^ $^`a$ $^`a$$a$HJ^JJJJJJJJJJK1K2K3KKKK*L+L^LLֶziUiF7heh=A0OJQJmH sH hehEOJQJmH sH 'h adhi1OJQJ\^JaJ mH sH !hi1OJQJ\^JaJ mH sH +hi1hi1CJOJQJ\^JaJmH sH %h,_CJOJQJ\^JaJmH sH $hEh< CJOJQJaJmH sH h3CJOJQJmH sH #hEh3>*CJOJQJmH sH  h adh3CJOJQJmH sH 0h adh356CJOJQJ]^JhmH sH LLLLLM_M`MaMbM~M3NMN_N`NnNoNhhR@**hu[wh*5CJ OJQJ\aJ mH sH #h adh*OJQJ\^JmH sH +hu[wh*CJ OJQJ\^JaJ mH sH .h adh*5CJOJQJ\^JaJmH sH (hV 5CJOJQJ\^JaJmH sH .hu[whi15CJ OJQJ\^JaJ mH sH $h adhi1CJOJQJ^JmH sH +hEhi1<CJOJQJ^JaJmH sH heOJQJmH sH heh=A0OJQJmH sH heheOJQJmH sH _N`NnNoNyNOOPQQRSSTTiTjTTTgUhUyUUVVV  !gdR ! & F%gdg,gd* gd*oNyNOOOPPPPQQ+Q@QQQ°q`R`R`66h*h*56B*CJOJQJ\^JmH phsH hEKOJQJ^JmH sH  hh*OJQJ^JmH sH )hV h:lB*OJQJ^JmH phsH )hV h,_B*OJQJ^JmH phsH )hV hB*OJQJ^JmH phsH #hV B*OJQJ^JmH phsH )hV h*B*OJQJ^JmH phsH )h adh*B*OJQJ^JmH phsH &h adh*5OJQJ\^JmH sH QRRMRRS(STSSSSSTTӿq\A(1hhhR5CJOJQJ\]^JaJmH sH 4hhhR5>*CJOJQJ\]^JaJmH sH )h adh~j*6OJQJ\]^JmH sH  h3OJQJ\]^JmH sH  h) OJQJ\]^JmH sH &h adhK?OJQJ\]^JmH sH /h adh3B*OJQJ\]^JmH phsH &h adh3OJQJ\]^JmH sH (hNV5CJOJQJ\^JaJmH sH .hNVh35CJOJQJ\^JaJmH sH  T,TjTTTTUfUgUhUyUUUӼӤӏtYA3hfOJQJ^JmH sH /h adh356>*OJQJ\]^JmH sH 4hhhR5>*CJOJQJ\]^JaJmH sH 4hhR5>*CJOJQJ\]^JaJmH sH )hhhR>*OJQJ\]^JmH sH .hhhRCJOJQJ\]^JaJmH sH ,hhhR56OJQJ\]^JmH sH &hhhROJQJ\]^JmH sH /hhhR56>*OJQJ\]^JmH sH  UUUVVV}WWWWWWXXXiZjZZY[Z[[[̴|||gR91h adh356CJOJQJ\^JaJmH sH )h adh3B*OJQJ^JmH phsH )h adh356>*OJQJ^JmH sH (hh3CJ OJQJ^JaJ mH sH #h adh36OJQJ^JmH sH  h adhK?OJQJ^JmH sH /h adh356>*OJQJ\]^JmH sH (hh3CJOJQJ^JaJmH sH hfOJQJ^JmH sH  h adh3OJQJ^JmH sH VWWWXXXhZjZZZ[[[[[#\$\@\A\R\S\]\ $Ifgd, $Ifgd,^gd< N^Ngd< $a$gd< gd<  ![[{[[[[[[[[[[\洞wcP;*!h< 5CJOJQJ^JmH sH (h6@h< CJ OJQJ^JaJ mH sH $h< h< CJOJQJaJmH sH 'h< h< CJOJQJ\aJmH sH !hG WCJOJQJ\aJmH sH +hs56CJOJQJ\^JaJmH sH +h356CJOJQJ\^JaJmH sH 1h adh56CJOJQJ\^JaJmH sH 1h adh356CJOJQJ\^JaJmH sH 1h adhl}56CJOJQJ\^JaJmH sH  \#\$\0\?\@\A\G\Q\R\S\]\N^O^Z^;bʻʣ~f~SA-&h adh< OJQJ\]^JmH sH #h adh< 5OJQJ^JmH sH $h +h< CJ OJQJaJ mH sH .hHh< 5CJ OJQJ\^JaJ mH sH  h adh< OJQJ^JmH sH &h adh< 5OJQJ\^JmH sH .hHhH5CJ OJQJ\^JaJ mH sH h< CJOJQJ\mH sH #h adh< CJOJQJ\mH sH h adh< OJQJmH sH 'h adh< 5CJOJQJ^JmH sH ]\\]]N^O^Z^^)__Z``'aap?pApBpCpDpypp"q#qqGrrrrr9sss & F<gdg,h^h & F;gdg, & F  p!q"q#qrrrrsMtNtntotttt&uuuu3vUvv͈ym]N?Nh}1'h+s>OJQJmH sH h}1'h3OJQJmH sH h%h35OJQJmH sH hVOJQJmH sH hVhVOJQJmH sH hVh3OJQJmH sH h%h3OJQJmH sH 'hR$h35CJ OJQJaJ mH sH $hR$h3CJ OJQJaJ mH sH $h adh3CJOJQJaJmH sH h adh3OJQJmH sH h adh35OJQJmH sH sMtNtntot&uuuuEwFwTwwwQxxxxxy_zz {gdPe & F@gdg,h^h & F?gdg, & F>gdg, & F gd}1' & F=gdg, & F  & F<gdg,vvvvvEwFwTwxxxxzzzⷧs_PD8hPeOJQJmH sH h3OJQJmH sH h adh3OJQJmH sH 'h adh35CJOJQJaJmH sH h adh35OJQJmH sH 'h adh3CJOJQJ\aJmH sH h adh3OJQJ\mH sH h%h35OJQJmH sH $hR$h3CJ OJQJaJ mH sH hGOJQJmH sH h}1'OJQJmH sH h}1'h3OJQJmH sH h}1'h}1'OJQJmH sH zz { { { {{{{#{${ҾfO8&#h adh3OJQJ\^JmH sH ,h adh3B*OJQJ\^JmH phsH ,h adh35B*OJQJ^JmH phsH 0h adh35B*OJQJ^JaJmH phsH 'h adh35OJQJ^JaJmH sH +hoh3CJOJQJ\^JaJmH sH (h adh3CJOJQJ^JaJmH sH 'h adh3<CJOJQJaJmH sH .h adh35CJOJQJ\^JaJmH sH *h adh35CJOJQJ\aJmH sH  { { {${~{{{7|||HIbwx\wx> $ +$Ifa$ $$Ifa$ $ +$Ifa$$ & F$Ifa$gdg, $$Ifa$ $$Ifa$ $a$${0{}{~{{{{|||} }HbxҹxcO>OcO+%h adh3>*OJQJ\]mH sH  hQTOJQJ\]^JmH sH &h adh3OJQJ\]^JmH sH )h adh3>*OJQJ\]^JmH sH -h adh35CJOJQJ\]^JmH sH #h adh35CJOJQJmH sH .h adh35CJOJQJ]^JaJmH sH 1h adh35CJOJQJ\]^JaJmH sH *h adh35CJOJQJ\aJmH sH .h adh3CJOJQJ\]^JaJmH sH X[q҃\wxń˄Մ=ԫԫkXEXE%hf|B*OJQJ\]mH phsH %hBB*OJQJ\]mH phsH 3hoh3B*CJ OJQJ\]aJ mH phsH %h adh3>*OJQJ\]mH sH %hB*OJQJ\]mH phsH +h adh3B*OJQJ\]mH phsH %hl5B*OJQJ\]mH phsH %hdB*OJQJ\]mH phsH /h adh3B*CJOJQJ\]mH phsH =>?KƆUVWsӾjVE6 +h adh3CJOJQJ\^JaJmH sH h adh3OJQJmH sH  h adh3OJQJ^JmH sH &hr6B*OJQJ^JmH phsH ,hrhf|6B*OJQJ^JmH phsH ,hrh36B*OJQJ^JmH phsH %hrh36OJQJ\]mH sH %hrh H 6OJQJ\]mH sH (hrh356OJQJ\]mH sH *hoh3CJ OJQJ\]aJ mH sH +h adh3B*OJQJ\]mH phsH  >?UVWst!}$a$ & FGgdg, ekdq$$Ifl,"" t0644 la $$Ifa$st'()/ fgˊ̊ӊqr몏zhWhWhWhW>1h1h3B*CJ OJQJ^JaJ mH phsH  h adh3OJQJ^JmH sH #h adh35OJQJ^JmH sH (h adh3CJOJQJ^JaJmH sH 4h adh356CJOJQJ\]^JaJmH sH .h adh35CJOJQJ\^JaJmH sH $h adh3OJQJ^JaJmH sH +h adh3CJOJQJ\^JaJmH sH (h1h3CJ OJQJ^JaJ mH sH ()fgˊ̊qrȌƍÎĎюҎ $ & FFa$gdg, $ & F&a$gdg, & F $a$rnjȌōƍÎĎюҎ^_fgԱm\ԐI$h adh3CJOJQJaJmH sH  h adh3CJOJQJmH sH 'h1h35CJ OJQJaJ mH sH h adh3OJQJmH sH  h adh3OJQJ^JmH sH h adh3OJQJ\mH sH #h adh3OJQJ\^JmH sH  h adh3CJOJQJmH sH $h1h3CJ OJQJaJ mH sH 0h adh35B*CJOJQJ^JmH phsH ^_fg'ID $ & F'a$gdg,$a$$h^ha$ $ & FOa$gdg, $ & FFa$gdg, & F $ & F(a$gdg,'d?@(?^Ƶ׵דl]Ml9'h: h3OJQJ\^JaJmH sH h: h: OJQJ\^JaJh: h: OJQJ^JaJ'h: h35OJQJ^JaJmH sH $h1h3CJ OJQJaJ mH sH $h adh3OJQJ^JaJmH sH h adh3OJQJmH sH  h adh3OJQJ^JmH sH  h adh3CJOJQJmH sH (h1h3CJ OJQJ^JaJ mH sH &h adh36OJQJ]^JmH sH .d?@( fН#$d%d&d'dNOPQh^hgdTP & FPgdg, & FPgd:  $a$$h^ha$ $ & F'a$gdg,^Ҝ eНBʞƲ랈r_Jr9 h adh3OJQJ^JmH sH (h adh3CJOJQJ^JaJmH sH $h adh3OJQJ^JaJmH sH +h adh35CJOJQJ^JaJmH sH +h adh35CJOJQJ^JaJmH sH 'h adhTP5OJQJ^JaJmH sH 'h adh35OJQJ^JaJmH sH 'h: h35OJQJ^JaJmH sH !h1OJQJ\^JaJmH sH 'h adh3OJQJ\^JaJmH sH ΡϡE$ 0 $*$If^` a$$ 00$*$If^`0a$ #$d%d&d'dNOPQΡϡۡ޷vgN3N4h adh35@B*CJOJQJ^JmH phsH 0h adh35@B*OJQJ^JmH phsH h adh3OJQJmH sH &h adh3OJQJ\]^JmH sH -h adh356OJQJ]^JaJmH sH +h adh35CJOJQJ^JaJmH sH !h: 5CJOJQJaJmH sH +h adh35CJOJQJ^JaJmH sH  h adh3OJQJ^JmH sH  h adhTPOJQJ^JmH sH  ELUV_`u= RSδ|hTC-+h adh36B*OJQJ]mH phsH  h adh3OJQJ^JmH sH &h adh35CJOJQJ\mH sH 'h adh3@OJQJ\^JmH sH h adh3OJQJmH sH $h adh3@OJQJ^JmH sH *h adh35@OJQJ\^JmH sH 3h adh35@B*OJQJ\^JmH phsH -h adh3@B*OJQJ^JmH phsH 3h adh35@B*OJQJ\^JmH phsH  EV`u}Ģ=pȣ { ^$*$If & F ^$*$Ifgdg,$ 0$*$1$Ifa$$ & F 0$*$1$Ifa$gdg,$If$ 00$*$If^`0a$$ 0 $*$If^` a$ RTUVm23U}qooooX$ 0Nx*$1$^`Na$ $ 0*$a$gkd$$Ifl,"" t0644 la$ 0$*$Ifa$ $If^ STVm/0123TU`ҸrX<9h adh356@B*OJQJ\]^JmH phsH 7h adh35@B*CJOJQJ\^JmH phsH 3h adhTP5B*CJOJQJ\^JmH phsH 6jh adh30JB*OJQJU^JmH phsH )h adhTPB*OJQJ^JmH phsH )h adh3B*OJQJ^JmH phsH 3h adh35B*CJOJQJ\^JmH phsH $h adh3@OJQJ^JmH sH 3h adh36@B*OJQJ]^JmH phsH  `ƥǥ huw˱˱˱蚂lZG5#h adh35OJQJ^JmH sH $h adh3@OJQJ^JmH sH #h adh3OJQJ\^JmH sH *h adh35CJOJQJ\^JmH sH .h adh35@CJOJQJ\^JmH sH -h adh3@B*OJQJ^JmH phsH 3h adh35@B*OJQJ\^JmH phsH 9h adh356@B*OJQJ\]^JmH phsH -h adh3@B*OJQJ^JmH phsH  h>gۧܧ[$ & FQ 0*$a$gdg, $ 0*$a$ & FUgdg,$ 0x*$1$a$ۧܧ˩ԽhhhhhhP/hCh35@CJOJQJ^JaJmH sH <jhCh3@CJOJQJU^JaJmHnHsH u5jhCh3@CJOJQJU^JaJmH sH 5hCh3@B*CJOJQJ^JaJmH phsH ,hCh3@CJOJQJ^JaJmH sH $h adh3@OJQJ^JmH sH /h adh35@CJOJQJ^JaJmH sH ~ MN & F$ & FH 0*$a$gdg, $ 0*$a$˩ݩ~Ӫժ 0BDȫܫ߫KLMNP̵̵̵̵fL2hCh356@CJOJQJ^JaJmH sH 2hCh3@CJOJQJ\]^JaJmH sH 9jhCh30J@CJOJQJU^JaJmH sH /hCh3@CJH*OJQJ^JaJmH sH ,hCh3@CJOJQJ^JaJmH sH /hCh35@CJOJQJ^JaJmH sH 5hCh356@CJOJQJ]^JaJmH sH NOPRSTUVWXYʭԭޭ34 & F5gdg,$ & F5 a$gdg,$a$ 0*$ 0*$PRYewoP8o"+h adh3@CJOJQJ\^JmH sH /hgh35@CJOJQJ^JaJmH sH <jhgh30J5@CJOJQJU^JaJmH sH ,hgh3@CJOJQJ^JaJmH sH ,hgh3@CJOJQJ^JaJmH sH $h adh3@OJQJ^JmH sH !h: ;CJOJQJ^JmH sH 'h adh3;CJOJQJ^JmH sH $hCh3CJOJQJaJmH sH .hCh356CJOJQJ^JaJmH sH  E34WXnJ˰馑zcM:cM:zzcM:zc$hgh3CJOJQJaJmH sH *hgh35CJOJQJ\aJmH sH ,hjh3@CJ OJQJ^JaJ mH sH ,hgh3@CJOJQJ^JaJmH sH (hjh3CJ OJQJ^JaJ mH sH (hgh3CJOJQJ^JaJmH sH +hjh3CJ OJQJ\^JaJ mH sH .hgh35CJOJQJ\^JaJmH sH +hgh35CJOJQJ^JaJmH sH 4WXݱޱ?@jkx  0h*$  !0h*$  & F 0*$ & F 0*$  !0*$  & F 0*$ & F !0*$ 0*$ 0*$oݱޱ,?@KHjkwmVVV@+hgh3CJOJQJ]^JaJmH sH ,hjh3@CJ OJQJ^JaJ mH sH /hgh35@CJOJQJ^JaJmH sH 'hgh35CJOJQJaJmH sH 'hgh3CJOJQJ\aJmH sH $hjh3CJ OJQJaJ mH sH ,hgh3@CJOJQJ^JaJmH sH $hgh3CJOJQJaJmH sH *hgh35CJOJQJ\aJmH sH wxwxyz|}ιxfQ9$(hlFh3CJ OJQJ^JaJ mH sH .hlFh35CJOJQJ\^JaJmH sH (hG W5CJOJQJ\^JaJmH sH #h adh3@OJQJ\mH sH 'h adh3@OJQJ\^JmH sH /hgh3@CJOJQJ\^JaJmH sH (hgh3CJOJQJ^JaJmH sH (hgh3@CJOJQJaJmH sH .hgh35CJOJQJ\^JaJmH sH 1hgh35CJOJQJ\]^JaJmH sH  xyz{|i}rl$If  !0*$ikdd$$Ifl,"" t0644 la 0$*$If 0*$hijs͵ε^_{|_`sklɵɠɠɊv[vɠIɠIɠI#hlFh3OJQJ\^JmH sH 4jhlFh30JCJOJQJU\^JmH sH 'hlFh3CJOJQJ\^JmH sH +hlFh35CJ OJQJ^JaJ mH sH (hlFh3CJ OJQJ^JaJ mH sH &hlFh3OJQJ\]^JmH sH  hlFh3OJQJ^JmH sH (hG Wh3CJ OJQJ^JaJ mH sH  hG Wh3OJQJ^JmH sH ijs͵εڵ1D^_$a$$a$ikd$$Ifl,"" t0644 la_{|_`skl $Ifgd,  $a$ !<^_tn̴ooocJ7$h adh3CJOJQJ^JmH sH 1h adh35;@CJOJQJ\^JmH sH h3OJQJmH sH (hlFhlF@CJOJQJ^JmH sH -hlFhlF5;@OJQJ\^JmH sH 1hlFhlF5;@CJOJQJ\^JmH sH .hlFhlF5@CJOJQJ\^JmH sH (hlF5@CJOJQJ\^JmH sH  hlFhlFOJQJ^JmH sH h3OJQJ^JmH sH  !<k{rrr $Ifgd,kd$$IflF ,"   06    4 layt,^{rrr $Ifgd,kd$$IflF ,"   06    4 layt,^_t{rrr $Ifgd,kd$$IflF ,"   06    4 layt,no¾{ytyyydK$ & FZ 0~*$`~a$gdg,$ 0*$^a$gdlFkd?$$IflF ,"   06    4 layt,nowït`L8"*h adh35CJOJQJ\^JmH sH 'h adh35CJOJQJ^JmH sH 'h adh*y5CJOJQJ^JmH sH 'h adh35CJOJQJ^JmH sH $h adhHj@OJQJ^JmH sH $h adh3@OJQJ^JmH sH (h adh3@CJOJQJ^JmH sH 'h adh35@OJQJ^JmH sH 'h adh*y5@OJQJ^JmH sH &h adh35OJQJ\^JmH sH 'h adh3CJOJQJ\^JmH sH  ¾T>]CD $ 0*$a$$ & FZ 0 *$^`a$gdg,$ & FZ 0*$^`a$gdg,$ & FZ 0*$^`a$gdg,$ & FS 0*$1$a$gdg,8CD)*.56$Ǵs[C0$h adh3@OJQJ^JmH sH .h adh356CJOJQJ^JaJmH sH .h adh*y56CJOJQJ^JaJmH sH (h adh3CJOJQJ^JaJmH sH 1h adh356CJOJQJ]^JaJmH sH $h adh3CJOJQJ^JmH sH $h adh3CJOJQJ^JmH sH $h adh*yCJOJQJ^JmH sH (hlFh3CJ OJQJ^JaJ mH sH  h adh3OJQJ^JmH sH  Dq67f,Jby$$ & F[ 80z*$^`za$gdg,$ & F[ 80h*$^`a$gdg,$ & F 0*$a$  & F 0*$ & FRgdg,$%=>xyz{|}~"t & FW|$If^|`gdg,$If & FV$Ifgdg, & FV$Ifgdg,gdCh^h$ & F 0`*$^``a$$%6=>z{ŰkZkA(1hCh35;CJOJQJ\^JaJmH sH 1h+} h35;CJOJQJ\^JaJmH sH !h+} 5CJOJQJ^JmH sH 'h+} h+} 5CJOJQJ^JmH sH hCCJOJQJ^JmH sH h3CJOJQJ^JmH sH  h adh3OJQJ^JmH sH (hh3CJOJQJ^JaJmH sH #h adh35OJQJ^JmH sH #h adh*y5OJQJ^JmH sH ,hh3@CJOJQJ^JaJmH sH  gh@A &'͕ͭgO7.h adh35CJOJQJ]^JaJmH sH .h adh35CJ OJQJ]^JaJmH sH .h adh35CJOJQJ]^JaJmH sH +hh3CJOJQJ\^JaJmH sH .hh35CJOJQJ\^JaJmH sH >jhCh30J5;CJOJQJU\^JaJmH sH 1hCh35;CJOJQJ\^JaJmH sH 1hCh5;CJOJQJ\^JaJmH sH tghsT>kd$$Ifl,"" t644 la & FV$Ifgdg, & FV$Ifgdg,>kd$$Ifl,"" t644 la & FW|$If^|`gdg, 23@A!U>kd\$$Ifl,"" t644 la & FV$Ifgdg, 8$If^8 & FV$Ifgdg, &'BCVTUV~ &dP#$d%d&d'dNOPQ 0*$gd$a$>kd$$Ifl,"" t644 la'BCaSUWXvw;ZкА}iXDiD'h adh35CJOJQJ^JmH sH !h[s5CJOJQJ^JmH sH 'h adh3CJOJQJ\^JmH sH $h adh3@OJQJ^JmH sH 'h adh35@OJQJ^JmH sH *h adh3OJQJ\]^JaJmH sH *h adh35OJQJ]^JaJmH sH .h adh35CJOJQJ]^JaJmH sH .h adh35;@CJOJQJ^JmH sH VWXvw<=NO[0\p;Nx$ 0$*$Ifa$$ 0$*$1$Ifa$$ & F" 0$*$1$Ifa$gdg, $$Ifa$ $ 0*$a$ &dP[\ WmnpڴڞڋxbI0Ib0h adh956CJOJQJ\]^JmH sH 0h adh356CJOJQJ\]^JmH sH *h adh35CJOJQJ\^JmH sH $h2\5CJOJQJ\^JmH sH $hT3)5CJOJQJ\^JmH sH *h adh:>5CJOJQJ\^JmH sH $h35CJOJQJ\^JmH sH $hb5CJOJQJ\^JmH sH $h:>5CJOJQJ\^JmH sH $hs5CJOJQJ\^JmH sH ;MNbx|װ}kT@,'h<n5;CJOJQJ]^JmH sH 'h5;CJOJQJ]^JmH sH -h adh35;CJOJQJ]^JmH sH #h adh3OJQJ]^JmH sH h<@OJQJ^JmH sH hT3)@OJQJ^JmH sH $h adh3@OJQJ^JmH sH 'h adh3@OJQJ\^JmH sH $h<CJOJQJ\]^JmH sH *h adh35CJOJQJ\^JmH sH $hs*5CJOJQJ\^JmH sH xnllllekd$$Ifl,"" t0644 la$ 0$*$Ifa$$If$ & FX 0$*$1$Ifa$gdg, no!|$If ^ & FY gdg, & FT gdg, O RzȼȭȜu^J8#h adh%5OJQJ^JmH sH 'h adh35CJOJQJ^JmH sH ,h adh356OJQJ\]^JmH sH "hb56OJQJ\]mH sH (h adh356OJQJ\]mH sH  h adh3CJOJQJmH sH h adh?cOJQJmH sH h}OJQJmH sH h adh3OJQJmH sH  h adh3OJQJ^JmH sH -h adh35;CJOJQJ]^JmH sH 2=T$If\kd[$$Ifl4$J%0J%4 laf4TUZWȹxaO9&9$h<n5CJOJQJ\^JmH sH *hlh35CJOJQJ\^JmH sH #hlh3OJQJ]^JmH sH -hlh35;CJOJQJ]^JmH sH /h adh35@CJOJQJ^JaJmH sH -h adh35;CJOJQJ]^JmH sH #h adh3OJQJ]^JmH sH h adh3OJQJmH sH  h adh3OJQJ^JmH sH 'h adh35CJOJQJ^JmH sH #h adh35OJQJ^JmH sH  TUVWXYlffff$Ifkd$$Ifl\$r  0J%4 laYZ[\]^lffff$Ifkd $$Ifl\$r  0J%4 la^_`abclffff$IfkdY $$Ifl\$r  0J%4 lacdefghlf`ff$If$Ifkd $$Ifl\$r  0J%4 lahijklmlf```$If$Ifkd $$Ifl\$r  0J%4 lamnopqrlffff$Ifkd $$Ifl\$r  0J%4 larstuvwlffff$IfkdQ $$Ifl\$r  0J%4 lawxyz{|lffff$Ifkd$$Ifl\$r  0J%4 la|}~lffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lajdddd$IfkdI$$Ifl\$r  0J%4 lalffff$Ifkd $$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$IfkdE$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd=$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 lalffff$Ifkd$$Ifl\$r  0J%4 laWljjjj^^jjY$a$ $ 0*$a$kdw$$Ifl\$r  0J%4 la "6STt~ #^ & FD 88^8gdg, & FC8^8gdg, & FBgdg, ! & FA8^8gdg,,6TUVX[\bcyfWE.-hlh35>*CJ(OJQJ\^JmH sH #hlh35CJ(OJQJmH sH h5CJ(OJQJmH sH $hlh3CJOJQJ^JmH sH 'hjhj5CJOJQJ^JmH sH h3CJOJQJ^JmH sH hCJOJQJ^JmH sH $hlhjCJOJQJ^JmH sH hjCJ(OJQJ^JhjCJOJQJ^JmH sH  hlh3OJQJ^JmH sH $hlh3CJOJQJ^JmH sH #,8K UVWXYZ[c^gdj&d P ^gdj &d P gdj & FB&d P gdj^gdj & FBgdg, !^cdwxy2=yekd5$$Ifl,"" t0644 la & F$Ifgdg,$If $Ifcdwxy2=ҼvbvQv@,@'hlh35OJQJ^JaJmH sH  hlh3OJQJ^JmH sH  hh3CJ^JaJmH sH 'hh3OJQJ\^JaJmH sH 'hh35OJQJ^JaJmH sH (hlh3B*CJ\^JmH phsH hlh3CJ\^JmH sH h(8CJ\^JmH sH +hh35CJOJQJ^JaJmH sH hlh3CJmH sH hlh3CJmH sH &hlh35OJQJ\^JmH sH @L$Y_oy9IJĠzIJIJIJfRf'hlh35@OJQJ^JmH sH 'hlh3@OJQJ\^JmH sH &hlh35OJQJ\^JmH sH #hlh3OJQJ\^JmH sH #hlh35OJQJ^JmH sH "hlh35CJ\^JmH sH hlh3CJ^JmH sH h(8CJ^JmH sH +hh35CJOJQJ^JaJmH sH hlh3mH sH 1_@L}{ekd$$Ifl,"" t0644 la & F$Ifgdg,$If $If Ypz9Hek$ 0$*$Ifa$$ 0h$*$1$If^h`a$$ & F! 0$*$1$Ifa$gdg,$ & F! 0$*$1$Ifa$gdg, $$Ifa$XYZaɼoT8$&hlh36OJQJ]^JmH sH 7hlh356B*CJOJQJ^JaJmH phsH 4hlh356CJOJQJ\]^JaJmH sH +hlh35CJOJQJ^JaJmH sH +hlh35CJOJQJ^JaJmH sH +hlh35CJOJQJ^JaJmH sH hlh3mH sH hlh3CJmH sH h(8CJmH sH 'hlh35@OJQJ^JmH sH /hh35@CJOJQJ^JaJmH sH  Zb$Ifekd#$$Ifl,"" t0644 laabc&(>?@ Z[\pqrgi!#ABC裔裔sɵ)hlh36OJQJ\]^JmH sH hOJQJmH sH hlh3OJQJmH sH "hlh36OJQJ]mH sH &hlh36OJQJ]^JmH sH  hlh3OJQJ^JmH sH hOJQJ^JmH sH -hlh35CJOJQJ\]aJmH sH -'$Ifskd$$Ifl0F ," 064 la'(?$Ifskd/$$Ifl0F ," 064 la [$Ifskd$$Ifl0F ," 064 la[\r$IfskdY$$Ifl0F ," 064 lah$Ifskd$$Ifl0F ," 064 lahi"$Ifskd$$Ifl0F ," 064 la"#B$Ifskd$$Ifl0F ," 064 la$Ifskd$$Ifl0F ," 064 la8 諜ɜqa跜M&hlh36OJQJ]^JmH sH hlh36OJQJmH sH 0hlh356CJOJQJ\]aJmH sH #hlh36OJQJ^JmH sH hlh3OJQJmH sH hOJQJmH sH "hlh36OJQJ]mH sH  hlh3OJQJ^JmH sH hOJQJ^JmH sH -hlh35CJOJQJ\]aJmH sH $IfskdB$$Ifl0F ," 064 la$Ifskd$$Ifl0F ," 064 la$Ifskdl $$Ifl0F ," 064 la$Ifskd!$$Ifl0F ," 064 laG$Ifskd!$$Ifl0F ," 064 laFGHijk(*;<= $%'<UW^ilԽԽԽԽym[LhlhQDOJQJmH sH "hlhQD6OJQJ]mH sH hQDOJQJmH sH "hlh36OJQJ]mH sH hlh36OJQJmH sH hOJQJ^JmH sH &hlh36OJQJ]^JmH sH -hlh35CJOJQJ\]aJmH sH  hlh3OJQJ^JmH sH hlh3OJQJmH sH hOJQJmH sH GHj)$Ifskd+"$$Ifl0F ," 064 la)*<$Ifskd"$$Ifl0F ," 064 la $IfskdU#$$Ifl0F ," 064 la %V} $Ifgd$Ifskd#$$Ifl0F ," 064 laVWjk$Ifskd$$$Ifl0F ," 064 laklmx7||U&$d%d&d'dNOPQgd}gd}  !gd}skd%$$Ifl0F ," 064 lalmxTUɸtVtBt-)h}h}B*CJOJQJ^JaJph'h}h}0J"6CJOJQJ^JaJ;j%h}h}6B*CJOJQJU^JaJph5jh}h}6B*CJOJQJU^JaJph,h}h}6B*CJOJQJ^JaJph#h}h}6CJOJQJ^JaJ h}h}CJOJQJ^JaJ%h}56>*CJOJQJ\]^Jh}5CJOJQJ^Jh}5CJOJQJ\^Jh}mH sH 67PQVWgdʹu_ʹKʫ4,h|vh}B*CJOJQJ\^JaJph'h}h}56B*OJQJ^Jph*h}h}56B*OJQJ]^Jph!h}h}56OJQJ]^J)h|vh}B*CJOJQJ^JaJphh|vh}5CJ\^JaJh}h}5CJ\^J!h}h}B*OJQJ^Jph$h}h}5B*OJQJ^Jphh}h}CJh}h}5CJ\h}h}56CJ\7QVW=d|h^hgd}&$d%d&d'dNOPQgd}gd}&$d%d&d'dNOPQgd}&$d%d&d'dNOPQgd} dQ|&[f )$$d%d&d'dNOPQa$gd}&$d%d&d'dNOPQgd}gd}&$d%d&d'dNOPQgd}PQ|B&[f g   6 7  Ͼܬs^DD2h|vh}56B*CJOJQJ]^JaJph)h|vh}B*CJOJQJ^JaJph"h}h}5CJOJQJ\^J*h}h}56B*OJQJ]^Jph!h}h}56OJQJ]^J#h|vh}5CJOJQJ^JaJ h|vh}CJOJQJ^JaJh}h}OJQJ^J!h}h}B*OJQJ^Jph$h}h}5B*OJQJ^Jphf g   6 7   9d_`&$d%d&d'dNOPQgd}&$d%d&d'dNOPQgd}gd}   9Ncd_`efuNO0EOۜweVwۜwۜh}h}CJOJQJ^J"h}h}5CJOJQJ\^J,h|vh}5B*CJOJQJ^JaJphh}h}5CJ\^J'h}h}5;B*OJQJ^Jph*h}h}56B*OJQJ]^Jph)h|vh}B*CJOJQJ^JaJph$h}h}5B*OJQJ^Jph!h}h}B*OJQJ^JphefNO[[[&$d%d&d'dNOPQgd}&$d%d&d'dNOPQgd}gd}&$d%d&d'dNOPQgd})$$d%d&d'dNOPQa$gd} 0Ppq  ###W%%&&!$d%d&d'dNOPQgd}gd}&$d%d&d'dNOPQgd}&$d%d&d'dNOPQgd}gd}OPpq   ####V%W%%j(V*W*¶m\L=0h}h}OJQJ^Jh}h}CJOJQJ^Jh}h}5CJOJQJ^J!h}h}B*OJQJ^Jph,h|vh}5B*CJOJQJ^JaJph!h}h}B*OJQJ^Jph$h}h}5B*OJQJ^Jphh}h}5;CJ^Jh}h}5CJ^Jh}h}6CJ\]^Jh|vh}5CJ^JaJh}h}5CJ\^J$h}h};B*OJQJ^Jph&j(W*X*c**++++d,e,--..)$$d%d&d'dNOPQa$gd}gd}&$d%d&d'dNOPQgd}&!$d%d&d'dNOPQgd}W*X*c****<+=+>+}+~+++++++.񾫚k\E3"h}h}5CJOJQJ\^J,h|vh}5B*CJOJQJ^JaJphh}h}0J"OJQJ^J0j&h}h}B*OJQJU^Jph*jh}h}B*OJQJU^Jph!h}h}B*OJQJ^Jph$h}h}6B*OJQJ^Jphh}h}6OJQJ^J$h}h}5B*OJQJ^Jph#h}h}5CJOJQJ^JaJh}h}5OJQJ^J...000033333666%;&;9;u>v>w>x>>EEEv>gd}&$d%d&d'dNOPQgd}v>w>x>>>GAHA~BBDDEEE=E>EIE|E}EE$If&$d%d&d'dNOPQgd}gd}EHEIE}EEEEEtFFF GGGGGGGG"H>HHHIIIҼrrrr]rrrr)hlh356OJQJ\^JmH sH #hlh36OJQJ^JmH sH )hlh356OJQJ]^JmH sH #hlh35OJQJ^JmH sH  hlh3OJQJ^JmH sH +hlh35CJOJQJ^JaJmH sH hlh3mH sH h_vImH sH hr5CJOJQJ^Jh}5CJOJQJ^JEEEEFFGGGGG>H?HHH & Fekd#($$Ifl,"" t0644 laH:IIIIJJKKKK1L2L N N~NNNNNN !gdR&gdR & FgdR & F ! h^h & F & FE 8! Z,^Z`,gdg,IIImJxJJJJJKKKKKL0LN N N NnNǶ؀n؀؀`R`<+hRhR5CJOJQJ^JaJmH sH h3OJQJ^JmH sH hROJQJ^JmH sH #hlh35OJQJ^JmH sH #hlh36OJQJ^JmH sH #h_vIh_vI6OJQJ^JmH sH #h_vIh36OJQJ^JmH sH  h_vIh_vIOJQJ^JmH sH  h_vIh3OJQJ^JmH sH  hlh3OJQJ^JmH sH ,hlh356OJQJ\]^JmH sH nN}N~NNNNNNNNNŲv^H3(hlh3CJOJQJ^JaJmH sH +hlh35CJOJQJ^JaJmH sH /hlh356>*OJQJ\]^JmH sH *hlh35CJOJQJ\^JmH sH $h_vI5CJOJQJ\^JmH sH $hu5CJOJQJ\^JmH sH $hz@5CJOJQJ\^JmH sH  hRhROJQJ^JmH sH +hRhR5CJOJQJ^JaJmH sH %hR5CJOJQJ^JaJmH sH  NNNNNNNNNNNNNNNNNNNNNNN O!OOOCPDP ! !NNNN!O+OOODPNPPP QoQpQyQQ RQR_RRRRRRR*S4SySST,TWWwWxWѻѻѻѻѻѣѻѻѻэѣѻѻѻu__+ *hlh3CJOJQJ^JaJmH sH .hlh356CJOJQJ^JaJmH sH +hlh36CJOJQJ^JaJmH sH .h?_h356CJOJQJ^JaJmH sH +hlh3>*CJOJQJ^JaJmH sH (hlh3CJOJQJ^JaJmH sH 1hlh356CJOJQJ\^JaJmH sH #DPPPQ QoQpQQQQRRRRRRR)S*SxSySTT,T-TbTcTTTT & FNgdg, !TU4U`j`t`jjjjjjj & F7 0h$*$Ifgdg,  0$*$Ifskd!)$$Ifl0,"LL064 la t``````xkS> & FJ 0h$*$Ifgdg,$ & FJ 0h$*$Ifa$gdg,  0$*$Ifskd)$$Ifl0,"LL064 la & F7 0$*$Ifgdg,` a a#aKanaaaxkVVVV & F8 0h$*$Ifgdg,  0$*$Ifskd/*$$Ifl0,"LL064 la & FJ 0$*$Ifgdg,aabb b!b?b`S>> & FK 0h$*$Ifgdg,  0$*$Ifskd*$$Ifl0,"LL064 la & F8 0$*$Ifgdg,$ & F8 0h$*$Ifa$gdg,?bSbTb]bsbbbbxkVVVB & F9 0$*$Ifgdg, & F9 0h$*$Ifgdg,  0$*$Ifskd=+$$Ifl0,"LL064 la & FK 0$*$Ifgdg,rbbbbbbc c cYc{c|c}cccc%d&dxdydzd{d~ddd˷˷yjTAT$hkh5;CJOJQJ^JmH sH *hlh35;CJOJQJ^JmH sH hlh3CJ^JmH sH )hlh35@CJ\]^JmH sH ,hlh356@CJ\]^JmH sH "hlh35@\^JmH sH &hlh35@CJ\^JmH sH  hlh3@CJ^JmH sH $hlh3@OJQJ^JmH sH  hlh3OJQJ^JmH sH bb c cc0cYc|c{nYYYE & FL 0$*$Ifgdg, & FL 0h$*$Ifgdg,  0$*$If & F 0$*$Ifskd+$$Ifl0,"LL064 la|c}cccc&dydjjjV & F: 0$*$Ifgdg, & F: 0h$*$Ifgdg,  0$*$IfskdK,$$Ifl0,"LL064 laydzd{d|d}d~ddde]]#$d%d&d'dNOPQ 0*$skd,$$Ifl0,"LL064 laddeeepewecjjjlymzmmwnnnkolorosoRptpupVssssǵֵ֣֐~lWCl֣֣֣l&hlh36OJQJ\^JmH sH )hlh36OJQJ\]^JmH sH #hlh35OJQJ^JmH sH "hlh35CJ\^JmH sH %hlh356CJ]^JmH sH #hlh3OJQJ\^JmH sH #hlh36OJQJ^JmH sH hlh3CJ^JmH sH  hlh3OJQJ^JmH sH /hlh36B*OJQJ]^JmH phsH eeeoepewee3fkfffmghiiiiiii* & F$d%d&d'dNOPQgdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQ#$d%d&d'dNOPQ hheiibjcjjjkjk=l>lMlNli#$d%d&d'dNOPQ#$d%d&d'dNOPQ#$d%d&d'dNOPQ* & F$d%d&d'dNOPQgdg, NlymzmmmmmAnwnnnkolo* & F$d%d&d'dNOPQgdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQ lorosoRpupppq:qr`rr,sVssss* & F $d%d&d'dNOPQgdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQsutvt|t}tt u8uuuv v,v-vvvv* & F$d%d&d'dNOPQgdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQsutvt|tvvwwwgxhxmxoxpxbzzzm{n{۵mWA2hlh3CJ^JmH sH *hlh36@OJQJ\^JmH sH *hlh35@OJQJ]^JmH sH *hlh356@OJQJ^JmH sH 'hlh36@OJQJ^JmH sH hlh3mH sH $hlh3@OJQJ^JmH sH 'hlh35@OJQJ^JmH sH #hlh3OJQJ]^JmH sH  hlh3OJQJ^JmH sH &hlh35OJQJ\^JmH sH vvv0wWwwwwwww-$ 0$d%d&d'd*$NOPQa$* & F$d%d&d'dNOPQgdg,#$d%d&d'dNOPQ wwgxhxoxpxxxxEyyyffffff4$ & F 0$d%d&d'd*$NOPQa$gdg,.$d%d&d'dNOPQ^`gd35$ 00$d%d&d'd*$NOPQ^`0a$ yyCzbzzzzzm{n{t{Y*$ & F$d%d&d'dNOPQa$#$d%d&d'dNOPQ#$d%d&d'dNOPQ4$ & F 0$d%d&d'd*$NOPQa$gdg, n{t{u{}M}V}}}4239:~Єф҄ɵܵܒ~n~\Q?"hlh35CJ\^JmH sH hlh3mH sH #hlh3OJQJ\^JmH sH hlh3CJ\^JmH sH 'hlh35CJOJQJ^JmH sH $hlh3CJOJQJ^JmH sH hlh35CJ^JmH sH &hlh35OJQJ\^JmH sH $hlh3@OJQJ^JmH sH  hlh3OJQJ^JmH sH #hlh36OJQJ^JmH sH t{u{{{<|o|||}L}M}V}W}}}#$d%d&d'dNOPQ4$ & F 0$d%d&d'd*$NOPQa$gdg,#$d%d&d'dNOPQ}}}'~4xy239:* & F$d%d&d'dNOPQgdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQ:m&͂%~҄"iii#$d%d&d'dNOPQ#$d%d&d'dNOPQ#$d%d&d'dNOPQ* & F$d%d&d'dNOPQgdg, "#؇ه*+,NOPɶ{ɶjXjAɶj,hlh356OJQJ\]^JmH sH #hlh35OJQJ^JmH sH  hlh3OJQJ^JmH sH (hlh356CJ\]^JmH sH "hlh36CJ]^JmH sH 'hlh35CJOJQJ^JmH sH $hlh3@OJQJ^JmH sH $hlh3CJOJQJ^JmH sH "hlh35CJ\^JmH sH "hlh35CJ\^JmH sH "#VцRRRR4$ & F 0$d%d&d'd*$NOPQa$gdg,# $d%d&d'dNOPQ1$ & F 0$d%d&d'd*$NOPQa$#$d%d&d'dNOPQ цه+yUU#$d%d&d'dNOPQ( !$d%d&d'dNOPQ* & F$d%d&d'dNOPQgdg,4$ & F 0$d%d&d'd*$NOPQa$gdg,+,OPWXɉ||HHH4$ & F 0$d%d&d'd*$NOPQa$gdg,1$ & F 0$d%d&d'd*$NOPQa$. & F 0$d%d&d'd*$NOPQ#$d%d&d'dNOPQPWXċƎΎ׏؏ُݏҿucJ<-hkhCJ\^JaJmH sH hlh3\^JmH sH 1hlh35;@CJOJQJ\^JmH sH #hlh3:@CJ^JmH sH hlh3CJ\^JmH sH *hlh35@OJQJ]^JmH sH $hlh3CJOJQJ^JmH sH  hlh3OJQJ^JmH sH $hlh3@OJQJ^JmH sH .hlh356@CJOJQJ^JmH sH *hlh356@OJQJ^JmH sH 1z݊R1$ & F 0$d%d&d'd*$NOPQa$#$d%d&d'dNOPQ#$d%d&d'dNOPQ4$ & F 0$d%d&d'd*$NOPQa$gdg, ь)PEŎaaaaaaaa4$ & F 0$d%d&d'd*$NOPQa$gdg,9$ & F 00$d%d&d'd*$NOPQ^`0a$1$ & F 0$d%d&d'd*$NOPQa$ ŎƎΎώb׏؏ُڏ܏ݏ_]XXX #$d%d&d'dNOPQ4$ & F$ 0$d%d&d'd*$NOPQa$gdg,#$d%d&d'dNOPQ#$d%d&d'dNOPQ ݏ7]אu^^^^$ & F1 0$*$Ifa$gdg,$ 0$*$1$Ifa$ 0$*$1$If^kdY-$$Ifl4,""064 laf4$If  ǒȒɒےܒ̪̿̊t̗\C5hlh35\mH sH 1hlh35@CJOJQJ\]^JmH sH .hlh35@CJOJQJ]^JmH sH +hlh35@CJOJQJ^JmH sH hlh3CJmH sH $hlh3@OJQJ^JmH sH (hlh3@CJOJQJ^JmH sH hlh3@mH sH hlh3mH sH +hlh35CJOJQJ^JaJmH sH #hUh3CJ\^JaJmH sH אHum]W@$ & F 0$*$Ifa$gdg,$If$ 0$*$Ifa$nkd-$$Ifl0,"LL064 la  & F1$Ifgdg,$ & F1 0$*$Ifa$gdg,fǒȒɒܒݒmUO=$ 0$*$1$Ifa$$If$ 00$*$If^`0a$nkde.$$Ifl0,"LL064 la  & F$Ifgdg,$ & F 0$*$Ifa$gdg,ܒݒޒ!5Yj<>aؗvdvN*hlh35CJOJQJ\^JmH sH "hlh3@\]^JmH sH hlh3mH sH *hlh36@OJQJ]^JmH sH -hlh36@OJQJ\]^JmH sH 'hlh3@OJQJ\^JmH sH *hlh36@OJQJ\^JmH sH $hlh3@OJQJ^JmH sH 'hlh36@OJQJ^JmH sH ݒޒ!Y=>Tnkd.$$Ifl0,"LL064 la$If & F3$Ifgdg,$ & F3 0$*$1$Ifa$gdg,$ 0$*$1$Ifa$ >aΕ)[$If & F2$Ifgdg,$ & F2 0$*$1$Ifa$gdg,$ 0$*$Ifa$ $If wxxxxxxx & F4$Ifgdg,$If$Ifnkds/$$Ifl0,"LL064 la !"#)34FGHMNξ䫕o]J7%"hlh35CJ]^JmH sH %hlh356CJ\^JmH sH %hlh35CJ\]^JmH sH #hlh3OJQJ]^JmH sH #hlh35OJQJ^JmH sH 'hlh35CJOJQJ^JmH sH *hlh35CJOJQJ\^JmH sH $hU5CJOJQJ\^JmH sH hlh3@\^JmH sH +hlh35CJOJQJ^JaJmH sH hlh3mH sH  hlh3OJQJ^JmH sH  !"#$%&'(4GHNO_ nkd/$$Ifl0,"LL064 la_`uvUXYdeSTYZ   & F#gdg,YdSXYZ ͣʤ螺}kk\Q?"hlh35CJ]^JmH sH hlh3mH sH hlh3CJ^JmH sH #hlh3OJQJ\^JmH sH &hlh36OJQJ]^JmH sH %hlh356CJ\^JmH sH %hlh35CJ\]^JmH sH &hlh3OJQJ\]^JmH sH #hlh36OJQJ^JmH sH #hlh35OJQJ^JmH sH  hlh3OJQJ^JmH sH ̣ͣʤˤܤݤ¥ḁ̊ͥ[\ab!"56 ʤڤܤݤ¥ḁ̊ͥ[\`ablmƴƏƣ}kYƴƴƣE&hlh35OJQJ\^JmH sH "hlh356CJ^JmH sH "hlh35CJ]^JmH sH #hlh3OJQJ]^JmH sH &hlh3OJQJ\]^JmH sH  hlh3OJQJ^JmH sH #hlh3OJQJ\^JmH sH #hlh35OJQJ^JmH sH #hlh36OJQJ^JmH sH )hlh35OJQJ\]^JmH sH !"5ħƲzl^H0/h adh/Oi5@CJOJQJ^JaJmH sH +h/Oih/Oi5CJ$OJQJ^JaJ$mH sH h/OiOJQJ^JmH sH h3OJQJ^JmH sH #hlh36OJQJ^JmH sH )hlh36OJQJ\]^JmH sH  hlh3OJQJ^JmH sH &hlh3OJQJ\]^JmH sH #hlh35OJQJ^JmH sH #hlh3OJQJ\^JmH sH )hlh356OJQJ\^JmH sH      78  0*$gd/Oi$ 0*$a$gd/Oi 78Ovx%0F,>ӻmbP#hlh35OJQJ^JmH sH hlh3mH sH 5hQQh356@CJOJQJ]^JaJmH sH 5h<nh/Oi56@CJOJQJ]^JaJmH sH /h<nh/Oi@CJOJQJ\^JaJmH sH /h<nh/Oi5@CJOJQJ^JaJmH sH /h adh/Oi5@CJOJQJ^JaJmH sH (h<nh/Oi@CJOJQJaJmH sH 8w012$ & FI 0*$a$gdQQ$ 0*$a$gd/Oi$ & FI 0*$a$gd/OiحKԮLɯ>Sزu .ĴŴƴȴɴ˴̴δϴѴӴ± yuyuyuyuqh3hljhlUhlh3mH sH &hlh36OJQJ]^JmH sH  hlh3OJQJ^JmH sH  h5OJQJ\^JmH sH &hlh35OJQJ\^JmH sH  hQQ5OJQJ\^JmH sH /hlh36B*OJQJ]^JmH phsH (lm>?<=op+,ô !ôĴŴǴȴʴ˴ʹδдѴҴӴܴݴ޴ 9˵h]h&`#$$a$ !ӴԴڴ۴ܴ޴ߴ  9:˵̵hܶte\h35OJQJh35B*OJQJ\ph"h&B5B*OJQJ\ph"h35B*OJQJ\ph""h35B*CJ8OJQJaJ@ph""h&B5B*CJ<OJQJaJ@ph""h35B*CJ<OJQJaJ@ph"jh30JUjh30JUhlh<0JmHnHuh3 h30Jjh30JU$E_ghٶJ[\z{ & F]gdggdp!gdg#gdVTgdVT gdVT$a$gdk}$a$ $da$gdk}ͶضٶGHIJPQZ[\z{ƷǷ@A{n]]]]]]O]hqjhVT5CJOJQJ hqjhVTCJ OJQJ^JaJ hqjh[$OJQJ^JhqjhOJQJ^Jhqjh'XOJQJ^JhqjhVTOJQJ^JhqjhVT5OJQJ\^JhqjhVTCJOJQJ^JhqjhVTCJOJQJ\^Jh3h35CJOJQJ\h3OJQJh35OJQJhlh35OJQJƷǷ@A_123_* $ & Fa$gd[$$^`a$gd[$ $h^ha$gd[$gdVTgdVT & F]gdfe & F]gdg & F]gdg & F]gdggdp!ARS_pqr¸0123_ijIJďu]H7!hMhj=B*OJQJ^Jph)hMh[$B*CJOJQJ^JaJph/hMh[$5B*CJOJQJ\^JaJph+hMh[$5B*CJOJQJ\^Jphh3 h7[9hVTCJOJQJ^JaJ"hfehqj56CJOJQJ^J"hfeh56CJOJQJ^J"hfehVT56CJOJQJ^Jhfeh6CJOJQJ^JhqjhzpOJQJ^JhqjhVTOJQJ^JĹ $ѻӻɸ~i[J9.heFh[$CJaJ heFh[$CJOJQJ^JaJ!hfeh[$56OJQJ\^Jhfeh[$6OJQJ^J)hfeh[$56CJOJQJ\^JaJ)hfehCd56CJOJQJ\^JaJ/hMh[$5B*CJOJQJ\^JaJphhMh[$OJQJ^J hMh[$CJOJQJ^JaJ&hMh[$5CJOJQJ\^JaJ!hMh[$B*OJQJ^Jph!hMhB*OJQJ^Jph*ļżpҽFrؿgdoG1 n^`n n^`ngdY & F  ^` gd[$$a$gd[$$`^``a$gdM $ & Fa$gd[$ļżϼѼovr}~ϷyiyUC"htEhITQ5CJOJQJ\^J&htho5CJ OJQJ\^JaJ hYhY5OJQJ\^JhYhYOJQJ^Jh)h3OJQJ^J'h)h35B*OJQJ\^Jphh)h35OJQJ\^J/h)h35B*CJ OJQJ\^JaJ ph/h)h35B*CJOJQJ\^JaJph)hs5B*CJOJQJ\^JaJphh3Ŀؿ_`efgqr}~ fgͼ͏jYH6#htEhtE>*CJOJQJ^JaJ htEhtECJOJQJ^JaJ!htEhoG1B*OJQJ^Jph)htEhoG1B*CJOJQJ^JaJphhtEhoG15OJQJ\^J htEhoG1CJOJQJ^JaJhtEhoG1CJOJQJ^JhtEhoG1OJQJ^J htEhoG1CJOJQJ^JaJhtEhoG1OJQJ^J'htEhoG15CJOJQJ^JmH sH "htEhoG15CJOJQJ\^Jؿ`rh !=>Q]^~ gd6-lgdkO^gdtEl^gd6- `^``gdoG1gdoG1`^``gdoG1lgh#%6 !ѿo[I;7h3htEB*OJQJ^Jph#htEh6->*CJOJQJ^JaJ&hITQh6-5>*CJOJQJ^JaJ hehkOCJOJQJ^JaJhy36CJOJQJ^JaJhkO6CJOJQJ^JaJ#hkOhkO6CJOJQJ^JaJhkO5CJOJQJ^JaJ#hkOhkO5CJOJQJ^JaJh6-CJOJQJ^JaJ heh6-CJOJQJ^JaJhtE>*CJOJQJ^JaJ!<=>]^~)*9:FGcdef¼׼׳ס׳ס׍~hlh3mH sH hWfb&hWfbhWfb5CJOJQJ\^JaJh3OJQJ\^J h35\h35CJ\ h3CJh35CJOJQJ^Jh3CJ^Jh3&hWfbh35CJOJQJ\^JaJ hWfb5CJOJQJ\^JaJ~)*9:FGcdefgdWfb $ a$ 6 001hP/ =!"#P$.% R$$If!vh5'#v':V l t'65'aytg,R$$If!vh5'#v':V l t'65'aytg,L$$If!vh5$#v$:V l t$65$a$$If!vh5"#v":V l t065"yt,$$If!vh5"#v":V l t065"yt,u$$If!vh5"#v":V l t065"u$$If!vh5"#v":V l t065"z$$If!vh5"#v":V l t065"$$If!vh5"#v":V l t065"/ $$If!vh5"#v":V l t065"/ $$If!vh5 5 5 #v :V l065 4yt,$$If!vh5 5 5 #v :V l065 4yt,$$If!vh5 5 5 #v :V l065 4yt,$$If!vh5 5 5 #v :V l065 4yt,B$$If!vh5"#v":V l t65"B$$If!vh5"#v":V l t65"B$$If!vh5"#v":V l t65"B$$If!vh5"#v":V l t65"u$$If!vh5"#v":V l t065"$$If!vh5J%#vJ%:V l40J%5J%4f4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4$$If!vh55r 55 #v#vr #v#v :V l0J%55r 55 4u$$If!vh5"#v":V l t065"u$$If!vh5"#v":V l t065"u$$If!vh5"#v":V l t065"$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54$$If!vh5 5#v #v:V l065 54=DyK 2http://www.secasa.com.au/index.php/workers/50/134yK dhttp://www.secasa.com.au/index.php/workers/50/134=DyK 2http://www.secasa.com.au/index.php/workers/50/134yK dhttp://www.secasa.com.au/index.php/workers/50/134u$$If!vh5"#v":V l t065"$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5"#v":V l4065"4f4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4$$If!vh5L5L#vL:V l065L4'8@8 Normal_HmH sH tH H@H  Heading 1$ @& CJ(OJQJL@L  Heading 2$ @&5CJ$OJQJ@@@  Heading 3$ @&5N@N  Heading 4$$ @&a$ CJ8OJQJL@L  Heading 5$ @&5CJ4OJQJN@N  Heading 6$$@&a$5CJOJQJ^JL@L  Heading 7$ @&5CJ(OJQJH@H  Heading 8 <@&6CJ]aJL @L  Heading 9 $ @&5CJOJQJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k(No List JQ@J Body Text 3  5CJ(OJQJ4 @4 Footer  !LP@L Body Text 2$ a$ CJ`OJQJ6@"6  Footnote Text8Z@28 Plain TextOJQJZR@BZ Body Text Indent 2$N^Na$ OJQJhZC@RZ Body Text Indent$^a$CJ(OJQJ^JLB@bL Body Text$ a$5CJHOJQJ@&@q@ Footnote ReferenceH*.)@. Page Number4@4 Header  !tS@t Body Text Indent 3&$ 00*$^`0a$@OJQJ^J4+@4  Endnote Text>*@> Endnote ReferenceH*^0@^ List Bullet!$ & Fd]a$ OJQJ^J4/@4 Listh^h`>"@> Caption5CJOJQJ^JVYV l Document Map -DM CJOJQJaJL^@L } Normal (Web) !ddCJPJ nHtH0U@!0 } Hyperlink>*B*4>@24 $VTTitle#$a$5CJ$@OA@ #VT Char Char5CJ$mH sH tH jSj Wfb Table Grid7:V%0%@Ob@ R List Paragraph &^0KfM25c ?` (EfBA@Q5R789<;:EDGFSc ?` (EH fB  !"#$%&'()*+,-./023456789;<=>?@ABCq23 !_56ijPQqMN_MN + , O P )+*\vaw^dF!!"#u$v$$R%%3&4&a(c(e(f(g(h(i(j(k(l(m(n(o(p(q(r(s(t(u(v(w(x(y(z((((((() )8)W)m)))))*4*Z*o******++3+L+]+o+p+,,,,*-S-----.K.^.... /5//////B0f000012203132333435373i3j333344557888::^<<+=k==>>y?@@@@@sAtAAGBHB^B2C3CC+D`EaEbEEEE_F`FnFoFyFGGHIIJKKLLiLjLLLgMhMyMMNNNOOOPPPhRjRRZSSSSS#T$T@TATRTST]TTUUNVOVZVV)WWZXX'YYh?hAhBhChDhyhh"i#iiGjjjjj9kkkMlNlnlol&mmmmEoFoToooQpppppq_rr s s s$s~sss7tttHxIxbxwyxyyy\|w|x|>~?~~UVWst!()fg˂̂qrȄƅÆĆц҆^_fg'ID.d?@( fЕΙϙEV`u}Ě=pț RTUVm23U h>g۟ܟ[~ MNOPRSTUVWXYʥԥޥ34WXݩީ?@jkxyz{|ijsͭέڭ1D^_{|_`skl !<k^_tno¶T>]CDq67fۺ,Jby$%=>xyz{|}~"tghs23@A!U &'BCVTUVWXvw<=NO[0\p;Nxno!|2=TUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~W"6STt~ #,8K UVWXYZ[cdwxy2=1_@LYpz9HekZb'(? [\rhi"#BGHj)*< %VWjklmx7QVW=dQ|&[fg67  9 d _ `   efNO0Ppq Wj W"X"c""####d$e$%%&&&&((((++++....q1r122%3&3:3;3u6v6w6x666G9H9~::<<=====>=I=|=}=====>>?????>@?@@@:AAAABBCCCC1D2D F F~FFFFFFFFFFFFFFFFFFFFFFFFFFFF G!GGGCHDHHHI IoIpIIIQJRJJJJJ)K*KxKyKLL,L-LbLcLLLLM4MXjXtXXXXXX Y Y#YKYnYYYYZZ Z!Z?ZSZTZ]ZsZZZZZ [ [[0[Y[|[}[[[[&\y\z\{\|\}\~\\\]]]o]p]w]]3^k^^^m_``eaabbcbjbkbc=d>dMdNdyezeeeeeAfwfffkglgrgsgRhuhhhi:ij`jj,kVkkkkulvl|l}ll m8mmmn n,n-nnnnnn0oWoooooooogphpoppppppEqqqqCrbrrrrrmsnstsusssa΍)[wx !"#$%&'(4GHNO_`uvUXYdeSTYZ  ̛͛ʜ˜ܜݜÝ̝͝[\ab!"56     78w012lm>?<=op+,ìĬŬǬȬʬˬͬάЬѬҬެ 9˭E_ghٮJ[\z{Ưǯ@A_123_*ĴŴpҵFrط`rh !=>Q]^~޼߼)*9:FGcg0800000000000000000000000000000000000000000000000000000000000000000H0qH0qH0q00q0q0q00q0q0q0q0q(0 H0!0_H0!0(0 0 000 00i0i0i0i 00(0 0000000q0q(0q0(0q(0q0N0N0N0N(0q(0q0000000000000000q0q0 0 000000 0 0 0 0 000000000^ 0^ 0^ 0^ 0^ 0000000000 0 0 0 0 0 0 000000 0 0 0 0 0 0 00000000000q0 0 0 0 0 0 00 0 0 0 000000000000000000000000000a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0 a 0 a 0 a 0 a 0 a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 0a 00000b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0 b 0 b 0 b 0 b 0 b 0b 0b 0b 000d 0c 0c 0 0 c 0c 0c 0000 0 0000 0073073073 073 073073073073073073073073073_ 073_ 073_ 073_ 073_ 073` 073` 073_ 073073073073073073073073073073073073073 0 00C0C0q 0q 0q 0q 0q 0E 0E0`F0`F% 0`F% 0`F% 0`F% 0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0`F0q0q0S0S0S0S0S0S0S 0S 0S 0S 0S0S0S 0S 0S 0S 0S 0S 0S 0S 0S0S0S0S 0S 0S 0S 0S0S 0S0S 0S 0SX0SX0SX0S0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ 0\0\ 0\ 0\ 0\0\0\ 0\0\0\0\0\0\0\0\0\0\0\0\0\0\(0S03h03h03h03h(0S0:h0:h0:h0:h0:h0:h(0S0Dh 0Dh0Dh; 0Dh; 0Dh; 0Dh0Dh 0Dh0Dh< 0Dh< 0Dh< 0Dh< 0Dh0Dh 0Dh0Dh= 0Dh= 0Dh0Dh 0Dh> 0Dh0Dh 0Dh? 0Dh? 0Dh? 0Dh? 0Dh0Dh 0Dh0Dh@ 0Dh@ 0Dh@ 0Dh0Dh0Dh(0S0 s0 s0 s0 s 0 s 0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s 0 s(0S0W(0S0tG 0tG 0tG 0tG 0t0t0t0t0t0t0t0t0t0t0t0t0t0tH 0t0& 0& 0& 0& 00H 0t0ĆF 0ĆF 0ĆF 0Ć( 0ĆH 0t0F 0F 0F 0F 00H 0t0_O 0_O 0_0_H0t0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0 000 00@P 0@P 0@P 0@P 0@P 0@P 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0000000 0 0 000 0Ě 0Ě 0Ě 0Ě0000 0000000000000U 0U 0U 0U 00000000Q 0Q 0Q 000000000000000000000000H 0H 0H 0H 0 00M0M0M0M0M0M0M0M0M0M 0 0 00005 05 05 05 05 05 00000 0 00X 0 0 00 0 0ީ 00@ 00(00k0k0k 0k 0k0k0k 0k (00j0j0j0j0j0j(00έ0έ0έ0έ0έ0έ0έ0έ 0έ 0έ0|0|(00`0`(00l0l(0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000Z 0S 0S 0S 0000Z 0Z 0Z 0Z 0Z 00 00R 0R 0R 0x 0 0[ 0[ 0[ 0[ 0[ 0[ 0[ 0[ 0[ 0[ 0  000000000000V 0V 0V 0V 00V 0W 0W 0 0V 0V 0V 0V 0 0V 0V 0hV 0hV 0h0V 0 0V 03V 03V 0V 0V 0V 0V 0V 0V 0V 0 0000000000000000000000000" 0" 0" 0" 0" 0" 000X 0X 0X 0X 0X 000 0000000000T 0T 0T 0T 0000Y 0Y 0Y 0Y 0Y 00000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000000000A 0A 0A 0A 00B 0C 0C 0C 0C 00B 0D 0D 0D 0D 0000B 000B 000B 000B 000B 00000000000d0d 0d0d 0d0d 0d 0d0d0d 0d0d 0d0d0d0d 0d 0d 0d 0d 0d0d0d 0d0d0d0d0d0d0d! 0d! 0d! 0d! 0d! 0d! 0d! 0d! 0d0d0d 0d000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000000000000000000000800&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&800 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 !0 !0 !0 0 0 0 0 0 0 800#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0# 0# 0#0# 0#0# 0#0# 0#0#0# 0#0# 0#0#E 0# 0#0#0# 0#0# 0#0# 0#0# 0 #0# 0 #&0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#N 0#N 0#N 0#N 0#N 0#N 0#N 0#0#0#0#M 0#M 0#M 0#M 0#0#0#0#0#0#0#0#0#0#0#) 0#) 0#) 0#+ 0#. 0#0#. 0#, 0#* 0#- 0#, 0#, 0#/ 0#0 0#/ 0#0#00V0V0V0V0V0V 0V 0V 0V 6 0V6 0V6 0V6 0V6 0V6 0V 0V 0V 7 0V7 0V7 0V7 0V7 0V7 0V7 0V7 0V 0V 0V J 0VJ 0VJ 0V 0V 0V 8 0V8 0V8 0V8 0V8 0V8 0V 0V 0V K 0VK 0VK 0V 0V 0V 9 0V9 0V9 0V9 0V 0V 0V0V L 0VL 0VL 0VL 0V 0V 0V : 0V: 0V: 0V: 0V 0V 00z\0z\0z\0z\0z\0z\0z\0]0]0](0] 0p] 0p] 0p] 0p] 0p] 0p] 0p] 0p] 0p] 0 p] 0 p]0p]0p]0p]0p]0p]0p](0]0>d0>d0>d00ze 0ze 0ze 0ze 0ze00wf0wf0wf(0wf0lg 0lg 0lg 0lg 0lg 0lg 0lg 0lg 0lg 0lg 0 lg 0 lg 0 lg0lg0lg0lg0lg(0wf0vl 0vl 0vl 0vl 0vl 0vl0vl(0wf(0wf0 n0 n0 n(0wf0n 0n 0n 0n 0n 0n0n0n0n0n0n0n0n0n0n 0n 0n 0n 0n 0n 0n 0n 0n 0n(0wf(0wf(0wf0r 0r0r(0wf0ns 0ns 0ns 0ns 0ns 0ns 0ns 0ns0ns0ns00Mu0Mu0Mu(0Mu0u 0u 0u 0u 0u0u0u0u0u0u0u(0Mu03y 03y 03y 03y 03y 03y03y03y03y03y0000} 0}0} 0}0} 0} 0} 0} 0} 0} 0} 0}0}(0}(0}0 00 0 0 0 0 0 0 0 0 0 00(0}0 0 0 0 0 0 0 0 0 0 0 0000$ 0$ 000ׇ 0ׇ 0ׇ 0ׇ 0ׇ0݇0݇0݇0݇ 0݇1 0݇1 0݇1 0݇1 0݇1 0݇1 0݇1 0݇ 0݇0݇0݇  0݇ 0݇ 0݇ 0݇0݇0݇ 0݇0݇3 0݇3 0݇3 0݇3 0݇3 0݇3 0݇0݇ 0݇ 0݇ 0݇0݇2 0݇2 0݇2 0݇2 0݇2 0݇2 0݇2 0݇2 0݇0݇ 0݇ 0݇ 0݇0݇4 0݇4 0݇4 0݇4 0݇4 0݇4 0݇0݇ 0݇ 0݇0݇ 0ׇ0"0"0"0"0"0"0"0"00H0H0H0H0H0000# 0# 0# 0# 0# 0# 0000(00Y0Y000T0T0T(0T0 0 0 (0T0000T0͛0T00000(00Ý0Ý0Ý00\0\0\0\0\0\0\(0\0"0"0"(0\00000000000000000000X00I 0000000I 000I 000I 000I 0000000000000000000000000000000000000@000@000@000@000@00 0 |@0@000@0@0@0@0@0@0@0002000000000000000 000#000] 00] 00] 00] 00X] 00] 000@0@0@0@0@0@ 0@ 0@ 0@0000,-l00000 0 0 0 0000,-700000000000000FGD00HI000KL 0 0MN400MN4 00MN400STܭ000STܭ 00WXT0000WXT0 00STܭ00 &&&) H ,!%2.d0o3A8B;=HHJLoNQTU[[\;bdei!kVoppvz${=sr^S`˩Pwn$'cal OW*.?ADIKNOSUVY[svwz|9 ) %m0W1471;;H_NV]\ddfLko3ps {>E N4xi_ ^¾D$tVxTY^chmrw|#c'[h"G) Vk7df &.v>EHNDPTWJY,[ ^^_t``a?bb|cydehNllosvwyt{}:"ц+Ŏݏאݒ>_8ô*ؿ~f  #')+-/2368:=@BCEFGHJLMPQRTWXZ\]^_`abcdefghijklmnopqrtuxy{}~eT=#~##f_XX ")!!8TU@T/LT.(  p V  # "?0 \B  S D"?7\B  S D"?=\B @ S D"?B  BC3DEFŽ,"3 @#" ?/   |BC3DEFŽ,"3 @#" ?.   BC"DEFŽ,"" @#" ?-   BC"DEFŽ,"" @#" ?,   |BC"DEFŽ," @#" ?+   tBC"DE FŽ,"@#" ?*  |BC"DEFŽ," @#" ?)  |BC3DEFŽ,"3 @#" ?(  BC3DEFŽ,"3 @#" ?'  |BC3DEFŽ,"3 @#" ?&  |BC"DEFŽ," @#" ?%  BC"DEFŽ," @#" ?$  |BC3DEFŽ,"3 @#" ?#  |BC3DEFŽ,"3 @#" ?"  |BC"DEFŽ,"" @#" ?!  BC3DEFŽ,"3 @#" ?   |BC3DEFŽ,"3 @#" ?  BC3DEF Ž,""3 @#" ?  BC"DEFŽ,"" @#" ?  |BC"DEFŽ," @#" ?  tBC"DE FŽ,"@#" ?  BC"DEFŽ,"" @#" ?  |BC"DEFŽ," @#" ?  tBC"DE FŽ,"@#" ?   |BC"DEFŽ,"" @#" ? ! |BC"DEFŽ," @#" ? " tBC"DE FŽ,"@#" ? # |BC"DEFŽ," @#" ? $ |BC"DEFŽ," @#" ? % tBC"DE FŽ,"@#" ? & BC"DEFŽ,"" @#" ? ' |BC"DEFŽ," @#" ? ( |BC3DEFŽ,"3 @#" ? ) BC3DEF Ž,"""3 @#" ? * |BC3DEFŽ,"3 @#" ?  + BC3DEFŽ,"3 @#" ?  , tBC"DE FŽ,"@#" ?  - BC3DEFŽ,"3 @#" ?  . |BC3DEFŽ,"3 @#" ?  / |BC"DEFŽ," @#" ? 0 |BC"DEFŽ," @#" ? 1 |BC3DEFŽ,"3 @#" ? 2 |BC3DEFŽ,"3 @#" ? 3 |BC"DEFŽ," @#" ? 4 |BC3DEFŽ,"3 @#" ?V 5 # 5"?3 V 7 # 7"?8 P 8   "?6  V 9 # 9"?;  V : # :"?A  P ;   "?@  V < # <"?<  \B = S D"?:\B > S D"?9\B ? S D"??b @ 3 @#" `? b A 3 A#" `? h B C B#" `? \B C S D"?>P D  "?D P E  "?C P F  "?I P G  "?H \B H S D"?F\B I@ S D"?J\B J S D"?G\B K S D"?EV Q # Q"?1 V R # R"?2 V S # S"?5 \B T S D"?4B S  ?09CDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnoc(@ hhhhhhh&h.h1h3h5h:hTR(*!t5  #TTtS`$$T85TL  t7 T>xxt@=t9`G #-T<* ETGtCt?t@;\ uT:V TJ tE"tD"~ tKtH tJPXP$tG^L tF"~ ptIAAt* _Toc45013602 _Toc45013751 _Toc45013868 _Toc45014454 _Toc45440868 _Toc45441001 _Toc45441199 _Toc45604571 _Toc45013603 _Toc45013752 _Toc45013869 _Toc45014455 _Toc45440869 _Toc45441002 _Toc45441200 _Toc45604572 _Toc45013604 _Toc45013753 _Toc45013870 _Toc45014456 _Toc45440870 _Toc45441003 _Toc45441201 _Toc45604573 _Toc45013605 _Toc45013754 _Toc45013871 _Toc45014457 _Toc45440871 _Toc45441004 _Toc45441202 _Toc45604574 _Toc45013607 _Toc45013756 _Toc45013873 _Toc45014459 _Toc45440873 _Toc45441006 _Toc45441204 _Toc45604576 _Hlt85360006 _Hlt85360007ĆĆĆĆĆĆĆĆ________##g  !"#$%&'(@)@ІІІІІІІІeeeeeeee&&&&&&&&##gEq*tbr*tbs*bt*tbu*4bv*4bw*bx*by*4bz*b{*4b|*b}*tb~*b*b*.*\.*.*.*/*\/*/*/*0*\0*0*0*1*\1*1*1*2*\2*2*2*3*\3*3*4*\4*4*4*5*\5*5*5*6*\6*6*6*7*\7*7*7*8*\8*8*8*9*\9*9*9*:*\:*:*:* ;*\;* ;oFoFyFyFGGNNuPuPQQ???B@B@O@@@=AAAHBHBBBCCCCpD~DDDDDMڥMMԦԦUU  ""%g      !"#$%&'()*+,-./0123456789:;<=>?@ABCDtFtF~F~FGGNNzPzPQQ???M@W@W@@@EAAANBNBBB)C)CCC|DDDDDDM SSܦܦ##\\  ,,#11g  !"#$%&'()*+,-./0123456789:;<=>?@ABCD9'*urn:schemas-microsoft-com:office:smarttagsState85*urn:schemas-microsoft-com:office:smarttagsCity=*urn:schemas-microsoft-com:office:smarttags PlaceType=*urn:schemas-microsoft-com:office:smarttags PlaceNameBD*urn:schemas-microsoft-com:office:smarttagscountry-region8 *urn:schemas-microsoft-com:office:smarttagsdate9E*urn:schemas-microsoft-com:office:smarttagsplace 2003257DayMonthYearEDEDDEEDEDEDEEDE5DEDDE5EDEDDEE'DDDDED 5EE5E'E'E5E5E5EE'DED'EDE'E5EDaj&&EEmIxIGP??eEiEjEoEqEvEwEEEEEEFFLLLLNNQQTTğmw~ǧ%,^gpv,2;@BGʪت&-5u}!ŬŬǬǬȬȬʬˬͬάЬѬӬ۬ެ#;DͭԭwdgIfuPcT`i"#&&----@qAbEE;FBFGGKK\\-^7^abrr~~ۈ[_{}@JۮͰհ_cJNLT"#2:!()v{}v"x"##115(57"7aIhIOvOPP9T?TWWtXXXY?ZRZZZY[{[^^llNW5<׏QW!*× {٥+LUWަ%(ȧ;Mxy|٪ڪ !¬ŬŬǬǬȬȬʬˬͬάЬѬ 8ͭԯޯ?Q[g33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333OOVVĬŬŬǬǬȬȬʬˬͬάЬѬӬ۬ެh_j23~ķϷ`gh 6D  <<>>QQGRbcdgOOVVĬŬŬǬǬȬȬʬˬͬάЬѬӬ۬ެh23~ <<>>QQGbcdge{;F=_(p 6  F;:K#ڲ-1,Զhm1x>-l.8nfV,{}lfAdp6TbN>Cx>g4j!LpV g8x<.h3z'toFR.C@35 t,<Mh s'0ZRP6i{R:ޝ&# " & X,3S%. c2& t)'FV w/܎'#)5ZW&tW6 Q7d*lf`9Ӏ@Mn:7e=5lsB^Nj1Cr/U\C $Cx\q Dl,fBDX1F஀nsPhFR*;F q&G Q:gI8eIpHR؂MpS\?Tx| @V^ČRX~e2[XY%\UY (Y 9D{[&@m[&PY(K\  ]J^9qPbWD_[/cp cJ?: f\hk el l`dMm}n >hog4E`Sprp&)pstUhp6Njq ZlqZ u@/rhoKpS9qPbHRd1FHtReIUhp= th6 8n ]6q&Gp;F;K~ el/U\Cc2&V!`Sp,{}Ft,Mn:)pUYxhkTtsPhF!4" >",#qq#$R$''}1'R')H )T3)~j*g,P-2\-t/=A0i1oG133=4+6,6h7W8(8VZ8N97[9<<j=:>+s>K?Tu?/5@z@JA&BtErGHjH_vIG7J@KNkOEXPv}P Qp8QITQxQR[R*TQTO-UWG W?Yu|vlwu[wICx*y8y{J{{au|}}&}l}s~sCrUR.6@~#A X'X>QO!L*&9]l5Tr@lPesS:no d)6-|b5?c=0QArnV1F7d!e9QQzcxS&gM EK&i$O>z:  lFS=2>kbHqptQoQ^*BfO@T/B000132373i333#T$T\\\\LcMcgg s sVWΙϙTUyz{|ij !<k^_tgh@Avw2=TUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~xyZb'(? [\rhi"#BGHj)*< %VWjkl|=}===VVVVVVWWWXXX Y Y#YZZ ZSZTZ]ZZZ [|[}[[y\z\݇NJȊ܊=>a Ĭg 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3@l,f @Unknown Gz Times New Roman5Symbol3& z ArialCFComic Sans MS5& zaTahomaE& Century Gothic9Garamond?5 z Courier NewCА+Lucida GrandeWSimSunArial Unicode MS;Wingdings?Wingdings 2"1hc&?l ?l !PNj4d_ 2qHX?z2d&Protection of Women and Children fromJennifer Nduku Kiitisimone                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d Oh+'0 , L X d p|(Protection of Women and Children fromJennifer Nduku KiitiNormalsimon2Microsoft Office Word@V@zFH@w%@w%?l՜.+,D՜.+,X hp  Toshiba ' 'Protection of Women and Children from Title| 8@ _PID_HLINKSA4 O2http://www.secasa.com.au/index.php/workers/50/134 O2http://www.secasa.com.au/index.php/workers/50/134   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~     !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ACDEFGHIKLMNOPQZRoot Entry F8\Data 01Table ZjWordDocument8SummaryInformation(BDocumentSummaryInformation8JCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q